Author of the publication

Robust image hashing using non-uniform sampling in discrete Fourier domain.

, , and . Digital Signal Processing, 23 (2): 578-585 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fast and Secure Scheme for Data Outsourcing in the Cloud., , and . TIIS, 8 (8): 2708-2722 (2014)An Image Encryption Scheme Based on Concatenated Torus Automorphisms., , and . TIIS, 7 (6): 1492-1511 (2013)Nucleus and cytoplast contour detector from a cervical smear image., , and . Expert Syst. Appl., 39 (1): 154-161 (2012)Lossless recovery of a VQ index table with embedded secret data., , and . J. Visual Communication and Image Representation, 18 (3): 207-216 (2007)Spatial Similarity Retrieval in Video Databases., and . J. Visual Communication and Image Representation, 12 (2): 107-122 (2001)Path Planning for Racing Games., , , and . International Journal on Artificial Intelligence Tools, 19 (5): 679-702 (2010)A steganographic scheme by fully exploiting modification directions., and . Expert Syst. Appl., 38 (8): 10648-10657 (2011)A Letter-oriented Perfect Hashing Scheme Based upon Sparse Table Compression., and . Softw., Pract. Exper., 21 (1): 35-49 (1991)A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem., and . I. J. Network Security, 17 (2): 165-173 (2015)An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks., , and . I. J. Network Security, 17 (6): 702-707 (2015)