Author of the publication

Reversible data hiding in compressed and encrypted images by using Kd-tree.

, , , , , and . Multimedia Tools Appl., 78 (13): 17535-17554 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy-efficient self-organization for wireless sensor networks: a fully distributed approach., , and . GLOBECOM, page 2728-2732. IEEE, (2004)Towards a Semantic Web-enabled Knowledge Base to Elicit Security Requirements for Misuse Cases., , , , , and . WOSIS, page 103-112. SciTePress, (2011)A Novel Wind Power Prediction Scheme by Coupling the BP Neural Network Model with the Fireworks Algorithm., , , , , and . Scalable Comput. Pract. Exp., 25 (4): 3114-3125 (2024)Security Analysis of Image Encryption Based on Gyrator Transform by Searching the Rotation Angle with Improved PSO Algorithm., , , , and . Sensors, 15 (8): 19199-19211 (2015)Reversible data hiding in compressed and encrypted images by using Kd-tree., , , , , and . Multimedia Tools Appl., 78 (13): 17535-17554 (2019)Forward Engineering Completeness for Software by Using Requirements Validation Framework (S)., , , , and . SEKE, page 523-686. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2019)Stability in a predator-prey model with Crowley-Martin function and stage structure for prey., , , and . Appl. Math. Comput., (2014)Fuzzy Irrigation Decision Support System., , and . AAAI, page 1499. AAAI Press / The MIT Press, (1994)0-262-61102-3.An access-based energy efficient clustering protocol for ad hoc wireless sensor network., and . PIMRC, page 1022-1026. IEEE, (2004)Hopf bifurcation for a delayed predator-prey diffusion system with Dirichlet boundary condition., , and . Appl. Math. Comput., (2017)