Author of the publication

(N, 1) secret sharing approach based on steganography with gray digital images.

, , , and . WCNIS, page 325-329. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Smart Backoff Scheme for Multicast Flows in Wireless LAN., , and . Smart CR, 5 (3): 159-167 (2015)An Integrated Algorithm for Fractional Pixel Interpolation and Motion Estimation of H.264., , , and . DCC, page 541. IEEE Computer Society, (2010)A reliable overlay video transport protocol for multicast agents in wireless mesh networks., , , and . Int. J. Communication Systems, 25 (5): 553-570 (2012)Adaptive video streaming over HTTP., , and . ACM Southeast Regional Conference, page 26:1-26:3. ACM, (2014)(N, 1) secret sharing approach based on steganography with gray digital images., , , and . WCNIS, page 325-329. IEEE, (2010)A troughput model: sequential vs concurrent processing., , , , , and . Inf. Syst., 7 (1): 65-83 (1982)APPMPS: An Asynchronous Parallel Plastic Multiprocessing System., , and . IEEE Systems Journal, 9 (2): 382-392 (2015)Considerations for determining the degrees of centralization or decentralization in the computing environment., , and . Information & Management, 2 (1): 15-29 (1979)Dynamic cluster header selection and conditional re-clustering for wireless sensor networks., , and . IEEE Trans. Consumer Electronics, 56 (4): 2249-2257 (2010)An Adaptive Primary Path Switching Scheme for Seamless mSCTP Handover., , , and . Smart CR, 1 (2): 150-160 (2011)