Author of the publication

Reversible Data Hiding in Encrypted Images Based on Chinese Remainder Theorem and Secret Sharing Mechanism.

, , , , and . BDSIC, page 23-32. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Deconstruction to Reconstruction: A Plug-In Module for Diffusion-Based Purification of Adversarial Examples., , , and . IWDW, volume 14511 of Lecture Notes in Computer Science, page 48-62. Springer, (2023)Generalized Deep Neural Network Model for Cuffless Blood Pressure Estimation with Photoplethysmogram Signal Only., , , and . Sensors, 20 (19): 5668 (2020)Reversible Data Hiding in Encrypted Images Based on Chinese Remainder Theorem and Secret Sharing Mechanism., , , , and . BDSIC, page 23-32. ACM, (2021)An Anomaly-Based IDS Framework Using Centroid-Based Classification., , and . Symmetry, 14 (1): 105 (2022)A Novel Turtle Shell Based Scheme for Data Hiding., , and . IIH-MSP, page 89-93. IEEE, (2014)Homomorphic Encryption-Based Robust Reversible Watermarking for 3D Model., , , , and . Symmetry, 12 (3): 347 (2020)A video watermarking algorithm based on time factor matrix., , , , and . Multim. Tools Appl., 82 (5): 7509-7527 (February 2023)Image-Text Out-Of-Context Detection Using Synthetic Multimodal Misinformation., , , , and . CoRR, (2024)Towards property-preserving JPEG encryption with structured permutation and adaptive group differentiation., , , and . Vis. Comput., 40 (9): 6421-6447 (September 2024)Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations., and . IIH-MSP (1), volume 109 of Smart Innovation, Systems and Technologies, page 330-339. Springer, (2018)