| Publication | Date of Publication | Type |
|---|
Enhance embedding capacity for switch map based multi-group EMD data hiding Mathematical Biosciences and Engineering | 2022-08-03 | Paper |
Reducing file size and time complexity in secret sharing based document protection Mathematical Biosciences and Engineering | 2022-08-03 | Paper |
High capacity data hiding with absolute moment block truncation coding image based on interpolation Mathematical Biosciences and Engineering | 2021-08-13 | Paper |
Cheating identifiable secret sharing scheme using symmetric bivariate polynomial Information Sciences | 2020-09-08 | Paper |
Quantum Relief algorithm Quantum Information Processing | 2018-11-01 | Paper |
DC/sub m/ codes for constructing t-EC/AUED codes IEEE Transactions on Computers | 2018-07-09 | Paper |
Efficient Encoding Algorithm for Second-Order Spectral-Null Codes Using Cyclic Bit Shift IEEE Transactions on Computers | 2018-06-12 | Paper |
Almost-aspect-ratio-invariant visual cryptography without adding extra subpixels Information Sciences | 2018-05-16 | Paper |
Efficient Encoding/Decoding for Second-Order Spectral-Null Codes by Reducing Random Walks IEEE Transactions on Computers | 2017-07-27 | Paper |
| Two-decoding-option image sharing method | 2017-07-11 | Paper |
Reducing Code Length of Second-Order Spectral-Null Code IEEE Transactions on Computers | 2017-05-16 | Paper |
A discussion on the relationship between probabilistic visual cryptography and random grid Information Sciences | 2017-02-02 | Paper |
New extended visual cryptography schemes with clearer shadow images Information Sciences | 2016-07-08 | Paper |
A note on error-correcting codes for authentication and subliminal channels Information Processing Letters | 2016-06-01 | Paper |
Extended color visual cryptography for black and white secret image Theoretical Computer Science | 2015-12-08 | Paper |
Threshold secret image sharing Information and Communications Security | 2014-09-29 | Paper |
Flexible Visual Cryptography Scheme and Its Application Transactions on Data Hiding and Multimedia Security IX | 2014-05-06 | Paper |
MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty Signal Processing | 2009-10-26 | Paper |
A comment on ``Sharing secrets in stego images with authentication Pattern Recognition | 2009-05-07 | Paper |
Design of Efficient Second-Order Spectral-Null Codes IEEE Transactions on Information Theory | 2008-12-21 | Paper |
A Comment on “Systematic Single Asymmetric Error-Correcting Codes” IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Colored visual cryptography scheme based on additive color mixing Pattern Recognition | 2008-08-13 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2007-05-02 | Paper |
Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation Pattern Recognition | 2006-06-30 | Paper |
New colored visual secret sharing schemes Designs, Codes and Cryptography | 2001-08-05 | Paper |
On the analysis and design of group theoretical t-syEC/AUED codes IEEE Transactions on Computers | 1996-01-01 | Paper |