Author of the publication

Reversible Data Hiding in Partially-Encrypted Images.

, , , and . ICCCS (3), volume 11065 of Lecture Notes in Computer Science, page 670-679. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Spatiotemporal Distribution of Evaporation Fractions of Different Vegetation Types Based on FLUXNET Site., , , and . IEEE Geosci. Remote. Sens. Lett., (2024)Diurnal and seasonal variations of wind farm impacts on land surface temperature over western Texas, , , , and . Climate Dynamics, 41 (2): 307--326 (2013)Reversible Data Hiding in Partially-Encrypted Images., , , and . ICCCS (3), volume 11065 of Lecture Notes in Computer Science, page 670-679. Springer, (2018)Pedestrian violence detection based on optical flow energy characteristics., , , , and . ICSAI, page 1261-1265. IEEE, (2017)An Image Retrieval Method Based on Spatial Features of Colors., , and . ISCSCT (1), page 284-287. IEEE Computer Society, (2008)E-2DLDA: A New Matrix-Based Image Representation Method for Face Recognition., , , and . ICONIP (2), volume 4233 of Lecture Notes in Computer Science, page 236-243. Springer, (2006)A Tunable Bound of the Embedding Level for Reversible Data Hiding with Contrast Enhancement., , , and . ICCCS (1), volume 10039 of Lecture Notes in Computer Science, page 134-144. (2016)Research on Combined Rough Sets with Fuzzy Sets., , , and . ISIP, page 163-167. IEEE Computer Society, (2008)Algorithm Description of Generalized Binary Linked List., , , and . ICNSC, page 1700-1704. IEEE, (2008)A Novel Steganography Scheme Based on Asymmetric Embedding Model., , , and . ICCCS (4), volume 11066 of Lecture Notes in Computer Science, page 183-194. Springer, (2018)