Author of the publication

An effective compressed image authentication scheme based on N-variant AMBTC.

, , and . Multim. Tools Appl., 83 (2): 3801-3829 (January 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive sampling approach for volumetric shadows in dynamic scenes., , , , and . IET Image Processing, 7 (8): 762-767 (2013)Application of a Reciprocal Confluence Tree Unit to Similar-Picture Retrieval., and . SSD, volume 692 of Lecture Notes in Computer Science, page 437-442. Springer, (1993)A Progressive Image Transmission Scheme Based on Block Truncation Coding., , and . Human.Society@Internet, volume 2105 of Lecture Notes in Computer Science, page 383-397. Springer, (2001)A Novel Key Agreement Scheme in a Multiple Server Environment., and . WISA, volume 4298 of Lecture Notes in Computer Science, page 187-197. Springer, (2006)A group-oriented (t, n) undeniable signature scheme without trusted center., , and . ACISP, volume 1172 of Lecture Notes in Computer Science, page 266-274. Springer, (1996)Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control., , and . Inscrypt, volume 4990 of Lecture Notes in Computer Science, page 457-462. Springer, (2007)Direct Candidates Generation: A Novel Algorithm for Discovering Complete Share-Frequent Itemsets., , and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 551-560. Springer, (2005)A Method for Sending Confidential Messages to a Group without Trusted Parties., and . ISPA, volume 2745 of Lecture Notes in Computer Science, page 375-381. Springer, (2003)Cryptanalysis of the Improved User Efficient Blind Signatures., and . ICICS, volume 2229 of Lecture Notes in Computer Science, page 42-46. Springer, (2001)An Efficient Convertible Authenticated Encryption Scheme and Its Variant., and . ICICS, volume 2836 of Lecture Notes in Computer Science, page 382-392. Springer, (2003)