Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wire-tap channel concept in nature and society., , and . IISA, page 231-236. IEEE, (2014)A Multiple Robust Digital Watermarking System for Still Images., , and . IJCSA, 9 (3): 37-46 (2012)Concatenated digital watermarking system robust to different removal attacks., , , and . Comput. Sci. Inf. Syst., 11 (4): 1581-1594 (2014)On the Existence of Perfect Stegosystems., , and . IWDW, volume 3710 of Lecture Notes in Computer Science, page 30-38. Springer, (2005)Cryptanalysis of McEliece's Public-Key Cryptosystem., and . EUROCRYPT, volume 547 of Lecture Notes in Computer Science, page 68-70. Springer, (1991)Image Authentication Based on Modular Embedding., , , , and . IEICE Transactions, 89-D (4): 1498-1506 (2006)A stegosystem with blind decoder based on a noisy channel., , , and . DSP, page 1-5. IEEE, (2013)Selective image authentication tolerant to JPEG compression., , and . IISA, page 1-6. IEEE, (2015)Secret key agreement based on a communication through wireless MIMO-based fading channels., , , and . FedCSIS, page 823-830. (2016)Hybrid authentication based on noisy channels., and . Int. J. Inf. Sec., 1 (4): 203-210 (2003)