Author of the publication

Intra-Block Correlation Based Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling.

, , , , , and . Symmetry, 13 (6): 1072 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid data labeling algorithm for clustering large mixed type data., and . J. Intell. Inf. Syst., 45 (2): 273-293 (2015)Reversible data hiding in encrypted image using two-pass pixel value ordering., , , and . J. Inf. Secur. Appl., (August 2023)An improved and secure multiserver authentication scheme based on biometrics and smartcard., and . Digit. Commun. Networks, 4 (1): 27-38 (2018)MCRMR: Maximum coverage and relevancy with minimal redundancy based multi-document summarization., and . Expert Syst. Appl., (2019)Geometrico-Harmonic Data Broadcasting and Receiving Scheme for Popular Videos., and . IEEE Trans. Circuits Syst. Video Techn., 17 (1): 16-25 (2007)Design of a USIM and ECC based handover authentication scheme for 5G-WLAN heterogeneous networks., and . Digit. Commun. Networks, 6 (3): 341-353 (2020)ViStA: Video Streaming and Analytics Benchmark., , , and . ISPASS, page 73-75. IEEE, (2021)A modified remote authentication method with smartcards and check digits., and . ICDSE, page 206-209. IEEE, (2014)Time-Efficient Tree-Based Algorithm for Mining High Utility Patterns., and . ISI (1), volume 320 of Advances in Intelligent Systems and Computing, page 409-418. Springer, (2014)Host-Based Intrusion Detection Using Statistical Approaches., and . FICTA, volume 404 of Advances in Intelligent Systems and Computing, page 481-493. Springer, (2015)