Author of the publication

Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique.

, , , , , and . ICME, page 1520-1523. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High capacity lossless data hiding based on integer wavelet transform., , , , , , and . ISCAS (2), page 29-32. IEEE, (2004)Identity Verification System Using Data Hiding and Fingerprint Recognition., , , , , , , and . MMSP, page 1-4. IEEE, (2005)Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique., , , , , and . ICME, page 1520-1523. IEEE Computer Society, (2005)Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA)., , , , , , and . IWDW, volume 4283 of Lecture Notes in Computer Science, page 49-60. Springer, (2006)Double-threshold reversible data hiding., , , , and . ISCAS, page 1129-1132. IEEE, (2010)Reversible data hiding based on wavelet spread spectrum., , , , and . MMSP, page 211-214. IEEE, (2004)A content-based image authentication system with lossless data hiding., , , and . ICME, page 213-216. IEEE Computer Society, (2003)Steganalysis based on Markov Model of Thresholded Prediction-Error Image., , , and . ICME, page 1365-1368. IEEE Computer Society, (2006)A Novel Bayesian Classifier with Smaller Eigenvalues Reset by Threshold Based on Given Database., , , , , and . ICIAR, volume 4633 of Lecture Notes in Computer Science, page 375-386. Springer, (2007)Steganalyzing Texture Images., , and . ICIP (2), page 153-156. IEEE, (2007)