Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A reversible acoustic data hiding method based on analog modulation., , , , and . Inf. Sci., (2014)How to Hide the Real Receiver Under the Cover Receiver: CP-ABE With Policy Deniability., , and . IEEE Access, (2020)Novel Reversible Acoustic Steganography Based on Carrier Orthogonality., , , and . WISA, volume 12583 of Lecture Notes in Computer Science, page 112-123. Springer, (2020)High-Capacity Data-Hiding Scheme on Synthesized Pitches Using Amplitude Enhancement - A New Vision of Non-Blind Audio Steganography., , , , and . Symmetry, 9 (6): 92 (2017)Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines., , and . AsiaJCIS, page 66-73. IEEE, (2020)Preserving privacy of online digital physiological signals using blind and reversible steganography., , , , and . Comput. Methods Programs Biomed., (2017)How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security., , and . Symmetry, 13 (9): 1629 (2021)Adaptive resource management for spot workers in cloud computing environment., , , and . Int. J. Web Grid Serv., 18 (4): 437-452 (2022)Data Hiding on Social Media Communications Using Text Steganography., , , , , and . CRiSIS, volume 10694 of Lecture Notes in Computer Science, page 217-224. Springer, (2017)Efficient Adaptive Resource Management for Spot Workers in Cloud Computing Environment., , , and . IMIS, volume 279 of Lecture Notes in Networks and Systems, page 373-382. Springer, (2021)