Author of the publication

Reversible Fragile Watermarking for Multichannel Images with High Redundancy Channels.

, , and . Multim. Tools Appl., 79 (35-36): 26427-26445 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Selection of GA Parameters for Fragile Watermarking., , and . EvoApplications, volume 8602 of Lecture Notes in Computer Science, page 526-537. Springer, (2014)Multiple Sequence Alignment with Genetic Algorithms., and . CIBB, volume 6160 of Lecture Notes in Computer Science, page 206-214. Springer, (2009)Environmental information systems for land planning., , , and . EnviroInfo (2), page 26-36. Editions du Tricorne, Geneva, (2004)28-29-30-275-3.Improving Knowledge-Based System Performance by Experience., and . EWSL, page 15-23. Pitman Publishing, (1988)Query Languages Supporting Descriptive Rule Mining: A Comparative Study., , , and . Database Support for Data Mining Applications, volume 2682 of Lecture Notes in Computer Science, Springer, (2004)Evaluation of Distraction in a Driver-Vehicle-Environment Framework: An Application of Different Data-Mining Techniques., and . ICDM, volume 5633 of Lecture Notes in Computer Science, page 176-190. Springer, (2009)Learning Quantitative Features in a Symbolic Environment., and . ISMIS, volume 542 of Lecture Notes in Computer Science, page 296-305. Springer, (1991)Learning First Order Theories.. ISMIS, volume 869 of Lecture Notes in Computer Science, page 356-365. Springer, (1994)From Common Sense Reasonig to Neural Network Models: a Conditional and Multi-preferential Approach for Explainability and Neuro-Symbolic Integration., , , , , and . FCR@KI, volume 3242 of CEUR Workshop Proceedings, page 66-78. CEUR-WS.org, (2022)Optimization of Association Rules Extraction Through Exploitation of Context Dependent Constraints., , , and . AI*IA, volume 3673 of Lecture Notes in Computer Science, page 258-269. Springer, (2005)