Author of the publication

A Study on Image Electronic Money Based on Watermarking Technique.

, , , , and . PCM (3), volume 3333 of Lecture Notes in Computer Science, page 508-514. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Fingerprinting Algorithm for Digital Image and Video., , , and . Security and Management, page 595-600. CSREA Press, (2003)13.2 A 32Gb 8.0Gb/s/pin DDR5 SDRAM with a Symmetric-Mosaic Architecture in a 5th-Generation 10nm DRAM Process., , , , , , , , , and 27 other author(s). ISSCC, page 234-236. IEEE, (2024)Assessment of the GNSS-RTK for Application in Precision Forest Operations., , , and . Remote. Sens., 16 (1): 148 (January 2024)A Study on Image Electronic Money Based on Watermarking Technique., , , , and . PCM (3), volume 3333 of Lecture Notes in Computer Science, page 508-514. Springer, (2004)Multi-Bits Image Watermarking Technique Against Geometrical Attacks., , and . Security and Management, page 112-117. CSREA Press, (2003)Fingerprinting Algorithm for Tracing Colluders, , and . Proc. IEEE International Symposium on Consumer Electronics ISCE 2007, page 1--5. (20--23 June 2007)Watermarking Technique of Controlling the Data-hiding Capacity., , , and . SIP, page 61-65. IASTED/ACTA Press, (2003)Accurate Free Energy Estimations of Molecular Systems Via Flow-based Targeted Free Energy Perturbation., , and . CoRR, (2023)Holographic ImageWatermarking for Secure Content.., , , and . TrustBus, volume 3184 of Lecture Notes in Computer Science, page 219-231. Springer, (2004)Development of Visible Anti-copy Patterns., , , and . TrustBus, volume 3184 of Lecture Notes in Computer Science, page 209-218. Springer, (2004)