Author of the publication

Hierarchical encryption using short encryption keys for scalable access control of JPEG 2000 coded images.

, , , and . ICIP, page 3116-3119. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Scheme of Reversible Data Hiding for the Encryption-Then-Compression System., , and . IEICE Trans. Inf. Syst., 104-D (1): 43-50 (2021)Supporting Creation of FAQ Dataset for E-Learning Chatbot., , , and . KES-IDT (1), volume 142 of Smart Innovation, Systems and Technologies, page 3-13. Springer, (2019)Secure online image trading scheme using DCT coefficients and moment invariants feature., , , , and . ISCE, page 291-292. IEEE, (2013)A dual permutation-based separable reversible information hiding scheme in encrypted images.. ISCE, page 293-294. IEEE, (2013)A new color QR code forward compatible with the standard QR code decoder., , and . ISPACS, page 26-31. IEEE, (2013)Modulo arithmetic-based image watermarking and its theoretical analysis of image-quality., , , and . ICIP (1), page 969-972. IEEE, (2005)A scrambling method for Motion JPEG videos enabling moving objects detection from scrambled videos., , and . ICIP, page 773-776. IEEE, (2008)A cheat preventing method with efficient pixel expansion for Naor-Shamir's visual cryptography., , and . ICIP, page 5527-5531. IEEE, (2014)Generalized Histogram Shifting-Based Blind Reversible Data Hiding with Balanced and Guarded Double Side Modification.. IWDW, volume 8389 of Lecture Notes in Computer Science, page 488-502. Springer, (2013)A Key Derivation Scheme for Hierarchical Access Control to JPEG 2000 Coded Images., , , , and . PSIVT (2), volume 7088 of Lecture Notes in Computer Science, page 180-191. Springer, (2011)