Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Hiding Scheme Using Covering Codes in Halftone Images Based on Error Diffusion., , and . APSCC, page 1483-1488. IEEE Computer Society, (2008)A Duplicate Chinese Document Image Retrieval System., , , and . Encyclopedia of Information Science and Technology (I), Idea Group, (2005)A ROI image retrieval method based on CVAAO., , , and . Image Vision Comput., 26 (11): 1540-1549 (2008)A HDWT-based reversible data hiding method., , , , , and . Journal of Systems and Software, 82 (3): 411-421 (2009)High-capacity reversible data hiding in binary images using pattern substitution., , , and . Computer Standards & Interfaces, 31 (4): 787-794 (2009)Robust Image Hiding Method., , , and . JCIS, Atlantis Press, (2006)A least-significant-bit substitution data hiding scheme by using modulus function and optimal permutation refining., , , and . IJMIS, 1 (2): 139-152 (2010)Image Hiding with an Improved Genetic Algorithm and an Optimal Pixel Adjustment Process., , , and . ISDA (3), page 320-325. IEEE Computer Society, (2008)