Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity Verification System Using Data Hiding and Fingerprint Recognition., , , , , , , and . MMSP, page 1-4. IEEE, (2005)High capacity lossless data hiding based on integer wavelet transform., , , , , , and . ISCAS (2), page 29-32. IEEE, (2004)Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique., , , , , and . ICME, page 1520-1523. IEEE Computer Society, (2005)Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA)., , , , , , and . IWDW, volume 4283 of Lecture Notes in Computer Science, page 49-60. Springer, (2006)Reversible data hiding based on wavelet spread spectrum., , , , and . MMSP, page 211-214. IEEE, (2004)Double-threshold reversible data hiding., , , , and . ISCAS, page 1129-1132. IEEE, (2010)Steganalysis based on Markov Model of Thresholded Prediction-Error Image., , , and . ICME, page 1365-1368. IEEE Computer Society, (2006)A content-based image authentication system with lossless data hiding., , , and . ICME, page 213-216. IEEE Computer Society, (2003)Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function., , , , , , , , and . ITCC (1), page 768-773. IEEE Computer Society, (2005)Optimum Histogram Pair Based Image Lossless Data Embedding., , , , , and . IWDW, volume 5041 of Lecture Notes in Computer Science, page 264-278. Springer, (2007)