Author of the publication

Predictive pixel differencing expansion in data reversibility scheme.

, , , and . ICUIMC, page 17:1-17:7. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An adaptive EMD embedding method by condensing secret messages based on consecutive ones transformation and token substitution., , and . ICUIMC, page 390-395. ACM, (2008)Reversible Data Hiding Scheme Based on Difference Expansion Using Shiftable Block Strategy for Enhancing Image Fidelity., , , and . iCAST, page 1-6. IEEE, (2019)Predictive pixel differencing expansion in data reversibility scheme., , , and . ICUIMC, page 17:1-17:7. ACM, (2012)A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images., , and . KSII Trans. Internet Inf. Syst., 14 (6): 2554-2575 (2020)A Robust and Removable Watermarking Scheme Using Singular Value Decomposition., , , , and . KSII Trans. Internet Inf. Syst., 10 (12): 5268-5285 (2016)An improvement of EMD embedding method for large payloads by pixel segmentation strategy., , and . Image Vis. Comput., 26 (12): 1670-1676 (2008)An Image Authentication Method Based on Deep Convolutional Generative Adversarial Network., , , and . ICFET, page 168-172. ACM, (2020)Unsupervised Defect Detection based on Boundary Equilibrium Generative Adversarial Network., , , and . ICFET, page 178-182. ACM, (2020)An image hiding scheme based on magic square., and . iCAST, page 301-305. IEEE, (2017)A High Payload Edge Detection-Based Image Steganography Robust to RS-Attack by Using LSB Substitution and Pixel Value Differencing., , and . IIH-MSP (1), volume 109 of Smart Innovation, Systems and Technologies, page 272-279. Springer, (2018)