Author of the publication

Image Watermarking Scheme With Unequal Protection Capability Based on Error Correcting Codes.

, , and . J. Multim., 5 (5): 427-433 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Proxy User Authentication Protocol Using Source-Based Image Morphing., , and . Comput. J., 58 (7): 1573-1584 (2015)Multi-round dynamic swap optimisation for table-based steganography., , and . IET Image Processing, 9 (12): 1073-1082 (2015)A fast algorithm for matrix embedding steganography.. Digit. Signal Process., (2014)Novel Lossless Morphing Algorithm for Secret Sharing via Meaningful Images., , and . J. Inf. Hiding Multim. Signal Process., 7 (6): 1168-1184 (2016)Study of micro-channel shape and material property on cooling performance of high power LED chips., and . NEMS, page 498-501. IEEE, (2014)A New Scheme to Improve the Quality of Compressed Image Transmission by Turbo Unequal Error Protection Codes., , and . IIH-MSP, page 226-229. IEEE Computer Society, (2011)A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method., , and . Int. J. Netw. Secur., 18 (3): 410-419 (2016)OCTMAC: A VLC based MAC protocol combining optical CDMA with TDMA for VANETs., , , , and . CITS, page 234-238. IEEE, (2017)The Construction of Knowledge Graph for Personalized Online Teaching., , , , , and . DMBD (2), volume 1454 of Communications in Computer and Information Science, page 98-107. Springer, (2021)CR-LCRP: Course recommendation based on Learner-Course Relation Prediction with data augmentation in a heterogeneous view., , , , , and . Expert Syst. Appl., (2024)