Author of the publication

Improved Data Hiding Method by Block Parity for Binary Images.

, , and . CSSE (3), page 931-934. IEEE Computer Society, (2008)978-0-7695-3336-0.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation., and . ICIC (3), volume 2 of Communications in Computer and Information Science, page 1103-1109. Springer, (2007)Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA., , , and . International Conference on Computational Science (4), volume 3994 of Lecture Notes in Computer Science, page 661-668. Springer, (2006)Space-Efficient First Race Detection in Shared Memory Programs with Nested Parallelism., , and . PARA, volume 2367 of Lecture Notes in Computer Science, page 253-263. Springer, (2002)A Reversible Data Hiding Scheme Using Even-Odd Embedding Method., , and . ICIC (2), volume 6216 of Lecture Notes in Computer Science, page 213-220. Springer, (2010)Robust Remote User Authentication Scheme., , and . ICOIN, volume 3090 of Lecture Notes in Computer Science, page 935-942. Springer, (2004)Improving the Single-Assumption Authenticated Diffie-Hellman Key Agreement Protocols., , and . ICCSA (1), volume 4705 of Lecture Notes in Computer Science, page 926-936. Springer, (2007)Systolic architectures for inversion/division using AB2 circuits in GF(2m)., and . Integr., 35 (1): 11-24 (2003)A Power-Sum Systolic Architecture in GF(2m)., , , and . ICOIN (2), volume 2344 of Lecture Notes in Computer Science, page 409-417. Springer, (2002)A Secure Password-Authenticated Key Exchange Between Clients with Different Passwords., and . APWeb Workshops, volume 3842 of Lecture Notes in Computer Science, page 659-663. Springer, (2006)Efficient nonce-based remote user authentication scheme using smart cards., , and . Appl. Math. Comput., 167 (1): 355-361 (2005)