Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Poster: A Hierarchical VR Streaming System through a WiFi Connection., , , , , , , and . EWSN, page 238-239. ACM, (2019)A Danger Theory Inspired Multi-agent Fusion Model for Network Security Assessment., , and . ICNC (3), page 599-603. IEEE Computer Society, (2007)Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes., , and . Information Hiding, volume 5284 of Lecture Notes in Computer Science, page 60-71. Springer, (2008)Single Actor Pooled Steganalysis., , and . ICGEC, volume 834 of Advances in Intelligent Systems and Computing, page 339-347. Springer, (2018)Classification of Snoring Sound-Related Signals Based on MLP., , , and . ICGEC, volume 834 of Advances in Intelligent Systems and Computing, page 625-632. Springer, (2018)Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images., , , and . MCAM, volume 4577 of Lecture Notes in Computer Science, page 351-360. Springer, (2007)Unified Data Hiding and Scrambling Method for JPEG Images., , , and . PCM (3), volume 11166 of Lecture Notes in Computer Science, page 373-383. Springer, (2018)Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode., , , and . Inf. Sci., (2016)Toward Construction-Based Data Hiding: From Secrets to Fingerprint Images., and . IEEE Trans. Image Processing, 28 (3): 1482-1497 (2019)Anonymous Hierarchical Identity-Based Encryption in Prime Order Groups., , and . ICDKE, volume 7696 of Lecture Notes in Computer Science, page 230-242. Springer, (2012)