Author of the publication

Secure and Progressive Image Transmission through Shadows Generated by Multiwavelet Transform.

, and . IJWMIP, 6 (6): 907-931 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Image Sharing Scheme for Internet Applications in Adverse Environments., , and . SITIS, page 168-172. IEEE Computer Society, (2013)A Secret Image Sharing Method Using Integer Wavelet Transform., and . EURASIP J. Adv. Sig. Proc., (2007)Secure and Progressive Image Transmission through Shadows Generated by Multiwavelet Transform., and . IJWMIP, 6 (6): 907-931 (2008)Object Recognition Based on Fuzzy Morphological Polynomial Signal Representation., , , and . ACC (3), volume 192 of Communications in Computer and Information Science, page 334-341. Springer, (2011)Novel high-capacity data hiding technique using summation and LSD parity of pixel groups., , and . ICMLC, page 383-389. IEEE, (2014)Human Action Recognition Using Depth Images., , and . ITCS, volume 253 of Lecture Notes in Electrical Engineering, page 67-76. Springer, (2013)Secret Image Sharing Using Multiwavelet Transform., and . J. Inf. Sci. Eng., 27 (2): 733-748 (2011)A Secret Image Sharing Method Using Integer-to-Integer Wavelet Transform., and . ICPR (3), page 802-805. IEEE Computer Society, (2006)Delivering messages over user-friendly code images grabbed by mobile devices with error correction., and . ICME Workshops, page 1-6. IEEE Computer Society, (2015)A Blind Image Watermarking Based on Dual Detector., , and . J. Inf. Sci. Eng., 25 (6): 1723-1736 (2009)