Author of the publication

Security analysis of a reversible watermarking algorithm for encrypted images in wavelet domain.

, , and . Multimedia Tools Appl., 78 (8): 9827-9843 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Frequency Operators for Condensative Queries over Data Streams., and . ICEBE, page 518-526. IEEE Computer Society, (2005)R-GMA: An Information Integration System for Grid Monitoring., , , , , , , , , and 11 other author(s). CoopIS/DOA/ODBASE, volume 2888 of Lecture Notes in Computer Science, page 462-481. Springer, (2003)Condensative Stream Query Language for Data Streams., , and . ADC, volume 63 of CRPIT, page 113-122. Australian Computer Society, (2007)Towards a relational approach to data streams in centralised and distributed systems.. Heriot-Watt University, Edinburgh, UK, (2007)British Library, EThOS.Selectively Storing XML Data in Relations., and . DEXA, volume 4080 of Lecture Notes in Computer Science, page 22-32. Springer, (2006)Security analysis of a reversible watermarking algorithm for encrypted images in wavelet domain., , and . Multimedia Tools Appl., 78 (8): 9827-9843 (2019)Stream Operators for Querying Data Streams., , , and . WAIM, volume 3739 of Lecture Notes in Computer Science, page 404-415. Springer, (2005)