Author of the publication

Novel Image Authentication Scheme for AMBTC-Compressed Images.

, , and . IIH-MSP, page 134-137. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fast-Handover-Supported Authentication Protocol for Vehicular Ad Hoc Networks., , and . J. Inf. Hiding Multim. Signal Process., 7 (5): 960-969 (2016)An Interpolative AMBTC-based high-payload RDH scheme for encrypted images., , , , and . Signal Process. Image Commun., (2019)Security Analyses of an Anonymous Two Factor Authentication Protocol for Roaming Service in Global Mobile Networks., , , and . SNPD, page 213-217. IEEE, (2021)Improvements of EMD Embedding for Large Payloads., , and . IIH-MSP, page 473-476. IEEE Computer Society, (2007)A Multipurpose Wavelet-Based Image Watermarking., , and . ICICIC (3), page 70-73. IEEE Computer Society, (2006)An Efficient Improvement on Safkhani et al.'s Hash-based Mutual Authentication Protocol for RFID Systems., , and . J. Inf. Hiding Multim. Signal Process., 7 (3): 653-658 (2016)A novel reversible data hiding scheme based on AMBTC compression technique., , , and . Multim. Tools Appl., 74 (11): 3823-3842 (2015)A Secure Three-Factor Anonymous User Authentication Scheme for Internet of Things Environments., , , and . Symmetry, 13 (7): 1121 (2021)A Security Enhancement on a Remote User Authentication Scheme Based on the Rabin Cryptosystem with Secure Password Updating., , , and . AINA Workshops, page 160-164. IEEE Computer Society, (2012)Blood Cell Image Classification Based on Hierarchical SVM., , , , and . ISM, page 129-136. IEEE Computer Society, (2011)