Author of the publication

Reversible data hiding in compressed and encrypted images by using Kd-tree.

, , , , , and . Multimedia Tools Appl., 78 (13): 17535-17554 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

2D Microscopy of Magnetic Field Using Atomic Vapor Cell., , and . NEMS, page 998-1001. IEEE, (2021)Fuzzy Logic Testing Approach for Measuring Software Completeness., and . Symmetry, 13 (4): 604 (2021)Density-aware and background-aware network for crowd counting via multi-task learning., , , , , and . Pattern Recognit. Lett., (2021)Reversible data hiding in compressed and encrypted images by using Kd-tree., , , , , and . Multimedia Tools Appl., 78 (13): 17535-17554 (2019)Vehicle Detection based on Positive Samples Selection with Low Threshold., , , , and . SMC, page 125-130. IEEE, (2022)MLRNet: Towards Real-Time Crowd Counting With Mobile-Based Lightweight Framework., , , , , and . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, page 1201-1208. IEEE, (2022)Crowd Counting based on Density Map Dynamic Refinement., , , , , and . IJCNN, page 1-7. IEEE, (2022)Security Analysis of Random Phase Encoding Based Image Encryption in Gyrator Transform Domains., , , , and . CIS, page 579-582. IEEE Computer Society, (2013)A Neural Network Based Lossless Digital Image Watermarking in the Spatial Domain., and . ISNN (2), volume 3497 of Lecture Notes in Computer Science, page 772-776. Springer, (2005)CIM-CSS: A Formal Modeling Approach to Context Identification and Management for Intelligent Context-Sensitive Systems., , , , , , and . IEEE Access, (2019)