Author of the publication

Data Hiding Method with Quality Control for Binary Images.

, and . J. Softw. Eng. Appl., 2 (1): 20-24 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Space-Efficient First Race Detection in Shared Memory Programs with Nested Parallelism., , and . PARA, volume 2367 of Lecture Notes in Computer Science, page 253-263. Springer, (2002)Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA., , , and . International Conference on Computational Science (4), volume 3994 of Lecture Notes in Computer Science, page 661-668. Springer, (2006)Improving the Single-Assumption Authenticated Diffie-Hellman Key Agreement Protocols., , and . ICCSA (1), volume 4705 of Lecture Notes in Computer Science, page 926-936. Springer, (2007)A Reversible Data Hiding Scheme Using Even-Odd Embedding Method., , and . ICIC (2), volume 6216 of Lecture Notes in Computer Science, page 213-220. Springer, (2010)Robust Remote User Authentication Scheme., , and . ICOIN, volume 3090 of Lecture Notes in Computer Science, page 935-942. Springer, (2004)Efficient nonce-based remote user authentication scheme using smart cards., , and . Appl. Math. Comput., 167 (1): 355-361 (2005)Systolic architectures for inversion/division using AB2 circuits in GF(2m)., and . Integr., 35 (1): 11-24 (2003)Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function., and . IEICE Trans. Inf. Syst., 94-D (11): 2167-2170 (2011)Robust Authentication Scheme between User and Remote Autonomous Object in Telecommunications System., , and . IEICE Trans. Inf. Syst., 94-D (5): 1113-1116 (2011)Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem., and . J. Supercomput., 63 (1): 235-255 (2013)