Author of the publication

Grouping strategies for promoting image quality of watermarking on the basis of vector quantization.

, , , and . J. Vis. Commun. Image Represent., 21 (1): 49-55 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework of Multicast Key Agreement for Distributed User on 3G-WLAN., , , and . NCM, page 2062-2068. IEEE Computer Society, (2009)Tor Browser Forensics in Exploring Invisible Evidence., , , and . SMC, page 3909-3914. IEEE, (2018)Secure Protocol for Identity-based Provable Data Possession in Cloud Storage., , , , and . ICCCS, page 327-331. IEEE, (2019)A Conference Key Multicasting Scheme Using Knapsack and Secret Sharing., and . DEXA, volume 1677 of Lecture Notes in Computer Science, page 372-381. Springer, (1999)Multicasting Secret Images using a Knapsack-like Cipher System.. CAINE, page 67-72. ISCA, (2004)ID-based authentication for mobile conference call., , , and . SEC, volume 54 of IFIP Conference Proceedings, page 49-58. Chapman & Hall, (1996)Reversible SMVQ Image Hiding Using Adaptive Search Order Coding., , , , and . DICTA, page 1-6. IEEE, (2016)Dynamic embedding strategy of VQ-based information hiding approach., , , and . J. Vis. Commun. Image Represent., (2019)Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks., , and . J. Commun., 3 (1): 20-26 (2008)Guest Editorial: Information and Communication Security in Multimedia Applications., and . Multimedia Tools Appl., 75 (22): 14503-14506 (2016)