Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A two-class information concealing system based on compressed sensing., , , , , and . ISCAS, page 1356-1359. IEEE, (2013)On the Security of a Class of Diffusion Mechanisms for Image Encryption., , , , , , and . IEEE Trans. Cybern., 48 (4): 1163-1175 (2018)Bi-level Protected Compressive Sampling., , , and . IEEE Trans. Multim., 18 (9): 1720-1732 (2016)Joint quantization and diffusion for compressed sensing measurements of natural images., , , and . ISCAS, page 2744-2747. IEEE, (2015)A unified sequential method for PCA., , and . ICECS, page 583-586. IEEE, (1999)Embedding Cryptographic Features in Compressive Sensing., , , , and . CoRR, (2014)Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure., , , , and . CoRR, (2015)Hopf bifurcation in a control system for the Washout filter-based delayed neural equation, , , and . Chaos, Solitons & Fractals, 23 (1): 101--115 (January 2005)Chaos and its synchronization in two-neuron systems with discrete delays, , , and . Chaos, Solitons & Fractals, 21 (1): 133--142 (July 2004)A Modified Chaotic Cryptographic Method., , and . Communications and Multimedia Security, volume 192 of IFIP Conference Proceedings, Kluwer, (2001)