Author of the publication

Reversible Data Hiding in Encrypted Images Based on Chinese Remainder Theorem and Secret Sharing Mechanism.

, , , , and . BDSIC, page 23-32. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guided filtering based color image reversible data hiding., , , and . J. Vis. Commun. Image Represent., (2017)Efficient image noise estimation based on skewness invariance and adaptive noise injection., , , , and . IET Image Process., 14 (7): 1393-1401 (2020)Reversible data hiding for JPEG images with a cascaded structure., and . IET Image Process., 16 (5): 1486-1499 (2022)Face Recognition Based on Point Cloud Data Captured by Low-cost mmWave Radar Sensors., , , and . CCWC, page 74-83. IEEE, (2023)Robust Hashing for Image Authentication Using Zernike Moments and Local Features., , , and . IEEE Trans. Inf. Forensics Secur., 8 (1): 55-63 (2013)Reversible Data Hiding in Encrypted Images Based on Chinese Remainder Theorem and Secret Sharing Mechanism., , , , and . BDSIC, page 23-32. ACM, (2021)Perceptual authentication hashing for digital images based on multi-domain feature fusion., , , , and . Signal Process., (2024)A virtual human interaction using scaffolded ping-pong feedback for healthcare learners to practice empathy skills., , , , , , , , and . IVA, page 2:1-2:8. ACM, (2022)Can we talk about bruno?: exploring virtual human counselors' spoken accents and their impact on users' conversations., , , , and . IVA, page 4:1-4:7. ACM, (2022)Expose noise level inconsistency incorporating the inhomogeneity scoring strategy., , , , and . Multimedia Tools Appl., 77 (14): 18139-18161 (2018)