Author of the publication

Reversible Data Hiding Algorithm in Homomorphic Encrypted Domain Based on EC-EG.

, , , , and . INCoS, volume 1035 of Advances in Intelligent Systems and Computing, page 269-277. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Video Steganography Algorithm Based on Trailing Coefficients., , , and . INCoS, page 360-364. IEEE, (2015)VisionFM: a Multi-Modal Multi-Task Vision Foundation Model for Generalist Ophthalmic Artificial Intelligence., , , , , , , , , and 32 other author(s). CoRR, (2023)Leveraging Multimodal Fusion for Enhanced Diagnosis of Multiple Retinal Diseases in Ultra-wide OCTA., , , , , and . CoRR, (2023)Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme., , , and . J. Syst. Softw., 84 (2): 219-225 (2011)New CCA-Secure Proxy Re-encryption Scheme without Random Oracles., , and . CIS, page 377-381. IEEE Computer Society, (2010)Virus-Evolutionary Genetic Algorithm Based Selective Ensemble for Steganalysis., , and . 3PGCIC, page 553-558. IEEE Computer Society, (2014)VisionCLIP: An Med-AIGC based Ethical Language-Image Foundation Model for Generalizable Retina Image Analysis., , , , and . CoRR, (2024)New Construction of PVPKE Scheme and Its Application in Information Systems and Mobile Communication., , , and . Mob. Inf. Syst., (2015)Generative Steganography Based on GANs., , , and . ICCCS (6), volume 11068 of Lecture Notes in Computer Science, page 537-549. Springer, (2018)Certificateless Multi-signcryption Scheme in Standard Model., , and . INCoS, page 475-479. IEEE, (2016)