Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A secure data hiding method based on preservation of saturated pixels., , , and . ICDIP, volume 8334 of SPIE Proceedings, page 83342Z. SPIE, (2012)Joint image coding and lossless data hiding in VQ indices using adaptive coding techniques., , , , and . Inf. Sci., (2018)An Improved Image Data Hiding Method Using Two-Layer Embedment Strategy., , , and . AICI (2), volume 7003 of Lecture Notes in Computer Science, page 439-443. Springer, (2011)A Reversible Data Hiding Scheme for AMBTC Images Using Gray Code and Exclusive-OR Approaches., , , , and . CISP-BMEI, page 1-5. IEEE, (2018)Reversible Data Hiding in Partially-Encrypted Images., , , and . ICCCS (3), volume 11065 of Lecture Notes in Computer Science, page 670-679. Springer, (2018)An efficient reversible authentication scheme for demosaiced images with improved detectability., , , and . Signal Process. Image Commun., (2020)A high capacity reversible data hiding scheme using orthogonal projection and prediction error modification., , , and . Signal Process., 90 (11): 2911-2922 (2010)A High Visual Quality Embedding Method in Edges Based on Pixel Pair Difference., , , , and . EAI Endorsed Trans. Creative Technol., 2 (4): e1 (2015)Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images., , , , and . Symmetry, 10 (8): 318 (2018)A Space Increased Reversible Information Hiding Technique by Reducing Redundant Recording., , , , , and . ITQM, volume 17 of Procedia Computer Science, page 229-236. Elsevier, (2013)