Author of the publication

Chinese remainder theorem-based two-in-one image secret sharing with three decoding options.

, , , , and . Digit. Signal Process., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chinese remainder theorem-based two-in-one image secret sharing with three decoding options., , , , and . Digit. Signal Process., (2018)Secret image sharing with separate shadow authentication ability., , , , , and . Signal Process. Image Commun., (2020)Adaptive Audio Steganography Scheme Based on Wavelet Packet Energy., , , , and . BigDataSecurity/HPSC/IDS, page 26-31. IEEE, (2017)Centroid-Based Audio Steganography Scheme in Wavelet Domain., , , , , and . J. Inf. Hiding Multim. Signal Process., 9 (5): 1222-1232 (2018)DUSC-DQN: An Improved Deep Q-Network for Intelligent Penetration Testing Path Design., , , , , and . ICCCS, page 476-480. IEEE, (2022)A Cybersecurity Knowledge Graph Completion Method for Scalable Scenarios., , , and . KSEM (4), volume 14120 of Lecture Notes in Computer Science, page 83-98. Springer, (2023)VISHNU: A Software Behavior Trustworthiness Control Method Based on DRTM., , , and . IPTC, page 169-172. IEEE Computer Society, (2011)Research on Network Security Issues from the Perspective of Multilayer Networks., , , and . DSIT, page 92-97. ACM, (2021)A Cyber Threat Entity Recognition Method Based on Robust Feature Representation and Adversarial Training., and . ICCPR, page 255-259. ACM, (2023)PTGroup: An Automated Penetration Testing Framework Using LLMs and Multiple Prompt Chains., , , and . ICIC (9), volume 14870 of Lecture Notes in Computer Science, page 220-232. Springer, (2024)