Author of the publication

Reversible Watermarking Scheme with Visibility Using Randomize Distance.

, , , and . ICGEC, page 204-207. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tor Browser Forensics in Exploring Invisible Evidence., , , and . SMC, page 3909-3914. IEEE, (2018)A Framework of Multicast Key Agreement for Distributed User on 3G-WLAN., , , and . NCM, page 2062-2068. IEEE Computer Society, (2009)Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks., , and . J. Commun., 3 (1): 20-26 (2008)Dynamic embedding strategy of VQ-based information hiding approach., , , and . J. Vis. Commun. Image Represent., (2019)Multicasting Secret Images using a Knapsack-like Cipher System.. CAINE, page 67-72. ISCA, (2004)ID-based authentication for mobile conference call., , , and . SEC, volume 54 of IFIP Conference Proceedings, page 49-58. Chapman & Hall, (1996)Reversible SMVQ Image Hiding Using Adaptive Search Order Coding., , , , and . DICTA, page 1-6. IEEE, (2016)Secure Protocol for Identity-based Provable Data Possession in Cloud Storage., , , , and . ICCCS, page 327-331. IEEE, (2019)A Conference Key Multicasting Scheme Using Knapsack and Secret Sharing., and . DEXA, volume 1677 of Lecture Notes in Computer Science, page 372-381. Springer, (1999)Data embedding in image-media using weight-function on modulo operations., , , and . ACM Trans. Embed. Comput. Syst., 12 (2): 21:1-21:12 (2013)