Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VQ Image Steganographic Method with High Embedding Capacity Using Multi-way Search Approach., , and . KES (3), volume 3683 of Lecture Notes in Computer Science, page 1058-1064. Springer, (2005)Compressing Vector Quantization Index Table Using Side Match State Codebook., , and . J. Inf. Hiding Multim. Signal Process., 6 (1): 47-58 (2015)Data hiding for vector quantization images using mixed-base notation and dissimilar patterns without loss of fidelity., , and . Inf. Sci., (2012)Inter-embedding error-resilient mechanism in scalable video coding., , , , and . Inf. Sci., (2015)Joint fingerprinting and decryption with noise-resistant for vector quantization images., , , , and . Signal Process., 92 (9): 2159-2171 (2012)Reversible Data Hiding in the VQ-Compressed Domain., , and . IEICE Trans. Inf. Syst., 90-D (9): 1422-1429 (2007)PreAugNet: improve data augmentation for industrial defect classification with small-scale training data., , and . J. Intell. Manuf., 35 (3): 1233-1246 (March 2024)Self-Authentication Mechanism with Recovery Ability for Digital Images., , and . CISIS, page 299-304. IEEE Computer Society, (2013)Extraction of coronary arteries by using a sequence of x-ray angiographic images., , and . Medical Imaging: Image Processing, volume 4322 of SPIE Proceedings, SPIE, (2001)Three-Pronged Compensation and Hysteresis Thresholding for Moving Object Detection in Real-Time Video Surveillance., , , , and . IEEE Trans. Ind. Electron., 64 (6): 4945-4955 (2017)