Author of the publication

Reversible Data Hiding in Encrypted Image via Secret Sharing Based on GF(p) and GF(2⁸).

, , , , and . IEEE Trans. Circuits Syst. Video Technol., 32 (4): 1928-1941 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smart card-based password authenticated key agreement protocol using chaotic maps., , and . Int. J. Commun. Syst., (2017)A Composite Perfect Hashing Scheme for Large Letter-Oriented Key Sets.. J. Inf. Sci. Eng., 7 (2): 173-186 (1991)Cryptanalysis of the Secret Exponent of the RSA Scheme., , and . J. Inf. Sci. Eng., 12 (2): 277-290 (1996)Very Effective Multi-Layer Reversible Embedding Method Using Low Distortion Modification., , , and . J. Inf. Hiding Multim. Signal Process., (2015)An Image Compression Method Based on Block Truncation Coding and Linear Regression., and . J. Inf. Hiding Multim. Signal Process., 7 (1): 198-215 (2016)A novel self-tuning feedback controller for active queue management supporting TCP flows., , , , , , and . Inf. Sci., 180 (11): 2249-2263 (2010)Comments and Proofs to Published Paper - A Novel Reversible Robust Watermarking Algorithm Based on a Chaotic System., , and . Int. J. Netw. Secur., 16 (5): 389-392 (2014)Security enhancement for digital signature schemes with fault tolerance in RSA., and . Inf. Sci., 177 (19): 4031-4039 (2007)A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper)., , , and . J. Commun., 5 (1): 5-12 (2010)Efficient Electronic Patient Information Hiding Scheme With Tamper Detection Function for Medical Images., , , and . IEEE Access, (2022)