Author of the publication

Quadruple histogram shifting-based reversible information hiding approach for digital images.

, , , , and . Multim. Tools Appl., 80 (17): 26297-26317 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building and Evaluating Adaptive Web Pages., , and . J. Inf. Knowl. Manag., (2013)Voice over internet protocol voicemail security system using two factor authentication and biometric prints with new efficient hybrid cryptosystem., , , , and . Multim. Tools Appl., 80 (7): 9877-9893 (2021)Content Verification of Encrypted Images Transmitted Over Wireless AWGN Channels., , , , , , and . Wirel. Pers. Commun., 88 (3): 479-491 (2016)Comparison of Two Optical Image Encryption Techniques., , , , and . FSDM, volume 309 of Frontiers in Artificial Intelligence and Applications, page 948-957. IOS Press, (2018)An Authentication Protocol Based on Kerberos 5., , , and . Int. J. Netw. Secur., 12 (3): 159-170 (2011)Faces and Facial Features Detection in Color Images., , and . GMAI, page 209-214. IEEE Computer Society, (2006)Hiding data in video sequences using steganography algorithms., , , and . ICTC, page 353-358. IEEE, (2013)Quadruple histogram shifting-based reversible information hiding approach for digital images., , , , and . Multim. Tools Appl., 80 (17): 26297-26317 (2021)Efficient audio integrity verification algorithm using discrete cosine transform., , , , , , and . Int. J. Speech Technol., 19 (1): 1-8 (2016)Secure Implementation for Video Streams Based on Fully and Permutation Encryption Techniques., , , , , and . ICCA, page 50-55. IEEE, (2017)