Author of the publication

An Advanced Least-Significant-Bit Embedding Scheme for Steganographic Encoding.

, , , , and . PSIVT, volume 5414 of Lecture Notes in Computer Science, page 349-360. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy Consumption Analysis for Sensors in Multi-sink Wireless Sensor Networks., , , , and . IIH-MSP, page 735-738. IEEE, (2014)A Novel Visible Watermarking Scheme Based on Distance Transform., , , and . IIH-MSP (1), volume 81 of Smart Innovation, Systems and Technologies, page 307-313. Springer, (2017)A Vision-Based Augmented-Reality System For Multiuser Collaborative Environments., , , , and . IEEE Trans. Multim., 10 (4): 585-595 (2008)A Simple Watermarking Scheme with High Perceptual Quality for Still Color Images Based on RWM and Centroid., , , and . J. Inf. Hiding Multim. Signal Process., 6 (3): 577-590 (2015)Hierarchical Particle Swarm Optimization Algorithm of IPSVR Problem., , , , , and . ICGEC, volume 238 of Advances in Intelligent Systems and Computing, page 231-238. Springer, (2013)Improved Invertible Secret Image Sharing with Steganography., and . IIH-MSP, page 93-96. IEEE Computer Society, (2011)High-Payload Image Hiding Scheme Using k-Way Block Matching., and . IIH-MSP, page 70-73. IEEE Computer Society, (2010)Rendering 3D Solid Model., , , and . ICGEC, volume 329 of Advances in Intelligent Systems and Computing, page 309-316. Springer, (2014)Prevention of cheating in visual cryptography by using coherent patterns., , , and . Inf. Sci., (2015)Region Incrementing Visual Cryptography.. IEEE Signal Process. Lett., 16 (8): 659-662 (2009)