Author of the publication

On the Security of Multi-secret Visual Cryptography Scheme with Ring Shares.

, and . IWDW, volume 7809 of Lecture Notes in Computer Science, page 485-494. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Block-based second order prediction on AVS-Part 2., , and . PCS, page 542-545. IEEE, (2010)An efficient hardware design for HDTV H.264/AVC encoder., , , , and . J. Zhejiang Univ. Sci. C, 12 (6): 499-506 (2011)On the Convergence of Boosting Procedures., and . ICML, page 904-911. AAAI Press, (2003)Spectral clustering and the high-dimensional stochastic blockmodel, , and . The Annals of Statistics, 39 (4): 1878--1915 (August 2011)Reversible MCMC on Markov equivalence classes of sparse directed acyclic graphs, , and . CoRR, (2012)Boosting, and . Wiley Interdisciplinary Reviews: Computational Statistics, 2 (1): 69--74 (2010)A Statistical Perspective on Algorithmic Leveraging., , and . ICML, volume 32 of JMLR Workshop and Conference Proceedings, page 91-99. JMLR.org, (2014)Early stopping for non-parametric regression: An optimal data-dependent stopping rule., , and . Allerton, page 1318-1325. IEEE, (2011)Visual Cryptography and Random Grids Schemes., and . IWDW, volume 8389 of Lecture Notes in Computer Science, page 109-122. Springer, (2013)Image subband coding using context-based classification and adaptive quantization., , and . IEEE Trans. Image Process., 8 (12): 1702-1715 (1999)