Author of the publication

Centroid-Based Audio Steganography Scheme in Wavelet Domain.

, , , , , and . J. Inf. Hiding Multim. Signal Process., 9 (5): 1222-1232 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chinese Remainder Theorem-Based Secret Image Sharing with Small-Sized Shadow Images., , , , , and . Symmetry, 10 (8): 340 (2018)Participants increasing for threshold random grids-based visual secret sharing., and . J. Real-Time Image Processing, 14 (1): 13-24 (2018)Chinese remainder theorem-based two-in-one image secret sharing with three decoding options., , , , and . Digit. Signal Process., (2018)A Novel Coding Method for Multiple System Barcode Based on QR Code., , , and . ACIIDS (2), volume 7197 of Lecture Notes in Computer Science, page 99-108. Springer, (2012)Research on the Capacity of Error-Correcting Codes-Based Information Hiding., , and . IIH-MSP, page 1158-1161. IEEE Computer Society, (2008)Secret Image Sharing Based on Error-Correcting Codes., , , , , and . BigDataSecurity/HPSC/IDS, page 86-89. IEEE, (2017)Penrose tiling for visual secret sharing., , , and . Multim. Tools Appl., 79 (43-44): 32693-32710 (2020)Threshold progressive visual cryptography construction with unexpanded shares., , and . Multimedia Tools Appl., 75 (14): 8657-8674 (2016)Clarity Corresponding to Contrast in Visual Cryptography., , , , and . ICYCSEE (1), volume 623 of Communications in Computer and Information Science, page 249-257. Springer, (2016)An Improved Algorithm for Iris Location., , and . CIS, page 964-967. IEEE Computer Society, (2007)