Author of the publication

An image authentication and recovery system based on discrete wavelet transform and convolutional neural networks.

, , , and . Multim. Tools Appl., 81 (14): 19351-19375 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hiding Digital Watermarks Using Fractal Compression Technique., and . Fundam. Informaticae, 58 (2): 189-202 (2003)Efficient Extraction of Target Users for Package Promotion in Big Social Networks., and . IEEE Trans. Comput. Soc. Syst., 7 (5): 1111-1122 (2020)An image authentication and recovery system based on discrete wavelet transform and convolutional neural networks., , , and . Multim. Tools Appl., 81 (14): 19351-19375 (2022)Multi-level visual secret sharing scheme with smooth-looking., , , , and . ICIS, volume 403 of ACM International Conference Proceeding Series, page 155-160. ACM, (2009)An Image Steganographic Scheme Based on Support Vector Regression., , , and . ISDA (3), page 519-524. IEEE Computer Society, (2008)Reversible Palette Image Steganography Based on De-clustering and Predictive Coding., , and . JCIS, Atlantis Press, (2006)A new multi-secret images sharing scheme using Largrange's interpolation., , , and . J. Syst. Softw., 76 (3): 327-339 (2005)Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization., and . Fundam. Informaticae, 63 (1): 89-106 (2004)Applying GMEI-GAN to Generate Meaningful Encrypted Images in Reversible Data Hiding Techniques., , , and . Symmetry, 13 (12): 2438 (2021)High-capacity reversible data hiding in binary images using pattern substitution., , , and . Comput. Stand. Interfaces, 31 (4): 787-794 (2009)