Author of the publication

Reversible Steganography for VQ Indices Using the Modified State Codebook.

, , , and . IIH-MSP, page 320-323. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Watermarking Scheme Based on Principal Component Analysis Technique., and . Informatica, 14 (4): 431-444 (2003)An Improvement of Square Matrix Encoding by Adjusting Digits in a Matrix., , and . Int. J. Netw. Secur., 16 (4): 313-317 (2014)Automatic Brain Cancer Segmentation on PET Image., , , , , , , and . Int. J. Pattern Recognit. Artif. Intell., 35 (3): 2150008:1-2150008:22 (2021)An Image Hiding Method by Linking Multiple Pixels with XOR Operator., , , and . ICGEC, page 39-42. IEEE, (2012)Removing blocking effects using an artificial neural network., , and . Signal Process., 86 (9): 2381-2387 (2006)An image authentication method by applying Hamming code on rearranged bits.. Pattern Recognit. Lett., 32 (14): 1679-1690 (2011)A Generalized Image Interpolation-based Reversible Data Hiding Scheme with High Embedding Capacity and Image Quality., , , and . KSII Trans. Internet Inf. Syst., 8 (9): 3286-3301 (2014)A Novel Cluster-Based Difference Expansion Transform for Lossless Data Hiding., and . ICGEC, page 172-175. IEEE Computer Society, (2011)A Verifiable and Recoverable Secret Image Sharing Mechanism., and . ISPA, page 288-293. IEEE Computer Society, (2011)Non-iterative privacy preservation for online lotteries., , and . IET Inf. Secur., 3 (4): 139-147 (2009)