Author of the publication

Improve the security of image robust hash using fuzzy commitment scheme.

, , and . Neural Computing and Applications, 23 (1): 67-72 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Niu, Xiamu
add a person with the name Niu, Xiamu
 

Other publications of authors with the same name

Reversible image watermarking by histogram modification for integer DCT coefficients., , , , and . MMSP, page 143-146. IEEE, (2004)MDCT-Based Perceptual Hashing for Compressed Audio Content Identification., , , and . MMSP, page 381-384. IEEE, (2007)Multiresolution watermarking for video based on gray-level digital watermark., , and . IEEE Trans. Consumer Electronics, 46 (2): 375-384 (2000)Hiding traces of double compression in JPEG images based on Tabu Search., and . Neural Computing and Applications, 22 (Supplement-1): 283-291 (2013)A Normal-Traffic Network Covert Channel., , , and . CIS (1), page 499-503. IEEE Computer Society, (2009)Robust Speech Hashing for Content Authentication., , and . IEEE Signal Process. Lett., 16 (9): 818-821 (2009)Background contrast based salient region detection., , , and . Neurocomputing, (2014)A passive technique for detecting copy-move forgery with rotation based on polar complex exponential transform., , , , and . ICDIP, volume 9631 of SPIE Proceedings, page 963104. SPIE, (2015)Quantum realization of the nearest-neighbor interpolation method for FRQI and NEQR., , and . Quantum Information Processing, 15 (1): 37-64 (2016)Template Protection for Multimodal Biometric System., , , and . IIH-MSP, page 1101-1104. IEEE Computer Society, (2009)