Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Guo, Jing-Ming
, and
Jia-Jin Tsai
.
"
Reversible data hiding in highly efficient compression scheme
." In
IEEE International Conference on Acoustics, Speech and Signal Processing
. Taipei, Taiwan , 2009.
Tu, Shu-Fen
, and
Ching-Sheng Hsu
.
"
A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography
."
The International Arab Journal of Information Technology
9, no. 3 (2012).
Somasundaram, K
, and
Ph Sumitra
.
"
RGB & Gray Scale Component on MPQ-BTC in Image Compression
."
International Journal on Computer Science and Engineering (IJCSE)
3, no. 4 (2011).
Saleh, Noura A.
,
Hoda N. Boghdady
,
Samir I. Shaheen
, and
Ahmed M. Darwish
.
"
An Efficient Lossless Data Hiding Technique for Palette-Based Images with Capacity Optimization
." In
14th International Workshop on Systems, Signals and Image Processing and 6th EURASIP Conference focused on Speech and Image Processing, Multimedia Communications and Services
. Maribor, Slovenia , 2007.
Guo, Jing-Ming
, and
Chih-Yu Lin
.
"
Parallel and element-reduced error-diffused block truncation coding
."
IEEE Transactions on Communications
58, no. 6 (2010).
Kim, Cheonshik
,
Dongkyoo Shin
,
Dongil Shin
, and
Ching-Nung Yang
.
A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC
In
Intelligent Information and Database Systems. ACIIDS 2012. Lecture Notes in Computer Science
. Vol. 7197. Berlin, Heidelberg: Springer, 2012.
Keissarian, Farhad
.
"
An Image Watermarking Scheme based on Image Visual Activity for Copyright Protection
." In
Innovations in Information Technologies (IIT)
. Dubai, Dubai , 2007.
Borra, Surekha
,
Viswanadha Raju S.
, and
Lakshmi H.R.
.
Visual Cryptography Based Lossless Watermarking for Sensitive Images
In
Swarm, Evolutionary, and Memetic Computing. SEMCCO 2015. Lecture Notes in Computer Science
. Vol. 9873. Cham: Springer, 2015.
Maiti, Chinmay
, and
Bibhas Chandra Dhara
.
"
A binary watermarking scheme using quantization levels of BTC-PF method
." In
International Conference on Communications, Devices and Intelligent Systems (CODIS)
. Kolkata, India , 2012.
Maiti, Chinmay
, and
Bibhas Chandra Dhara
.
A Robust Binary Watermarking Scheme Using BTC-PF Technique
In
Eco-friendly Computing and Communication Systems. ICECCS 2012. Communications in Computer and Information Science
. Vol. 305. Berlin, Heidelberg: Springer, 2012.
Tu, Shu-Fen
, and
Ching-Sheng Hsu
.
A VC-Based Copyright Protection Scheme for Digital Images of Multi-Authorship
In
World Congress on Engineering, WCE 2007
. Vol. I. London, U.K., 2007.
Ra, Kim Mi
.
"
Desires of Residential Mobility and the Related Variables among the Rental Apartment Residents (임대아파트 거주자의 주거이동 희망 여부와 관련 변인 )
."
Journal of Korean Home Management Association
21, no. 4: 11-21.
Kim, Cheonshik
.
"
Data Hiding Based on BTC using EMD
."
The Journal of The Institute of Internet, Broadcasting and Communication
14, no. 2: 11-16 .
Mingfang, Jiang
, and
Zhu Ningbo
.
"
Image fragile watermarking algorithm based on BTC domain (基于 BTC 域的图像脆弱水印算法)
."
Science and Technology and Engineering
3 (2009).
Saleh, Noura A.
,
Hoda N. Boghdady
,
Samir I. Shaheen
, and
Ahmed M. Darwish
.
"
A Quasi-Lossless Data Embedding Technique Based on Euclidean Distance Calculation
." In
The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)
. Valencia, Spain , 2007.
Maiti, Chinmay
, and
Bibhas Chandra Dhara
.
"
A grayscale watermark technique using sub-sampling and singular value decomposition
." In
International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)
. Chennai, India , 2016.
Kim, Cheonshik
,
Minho Jo
,
You-Sik Hong
, and
Hyun-Sook Park
.
"
Data Hiding Based on EMD for Ordered Block Truncation Coding (ODBTC를 위한 EMD 기법에 기반한 데이터 은닉 )
."
The Institute of Electronics Engineers of Korea - Computer and Information
46, no. 6 (2009): 27-34.
Mohammad, Nur
,
Xingming Sun
, and
Hengfu Yang
.
"
An Excellent Image Data Hiding Algorithm Based on BTC
."
Information Technology Journal
10, no. 7 (2011): 1415-1420.
Saleh, Noura A.
,
Hoda N. Boghdady
,
Samir I. Shaheen
, and
Ahmed M. Darwish
.
"
A Quasi-Lossless Data Embedding Technique for Color Palletized Images
." In
IEEE International Conference on Signal Processing and Communications
. Dubai, United Arab Emirates , 2007.
Manaf, Azizah Abdul
,
Ali Boroujerdizade
, and
Seyed Mojtaba Mousavi
.
"
Review of Robust Video Watermarking Methods for Copyright Protection Application
."
International Journal of Video&Image Processing and Network Security IJVIPNS-IJENS
16, no. 3 (2016).
Tohidi, Faranak
.
Ownership Authentication by Digital Image Watermarking Based on Block Truncation Coding
In
Advanced Informatics School
. Vol. Master of Computer Science (Information Security). Universiti Teknologi Malaysia, 2012.
Guo, Jing-Ming
, and
Yun-Fu Liu
.
"
Majority-Parity-Guided Watermarking for Block-Truncated Images
." In
Fifth International Conference on Information Assurance and Security
. Xi'an, China , 2009.
Kim, Cheonshik
,
YongSoo Choi
,
Hyoung-Joong Kim
,
Dongkyoo Shin
, and
Dongil; Shin
.
"
Reversible Data Hiding for Halftone Images Using Histogram Modification
."
International Information Institute (Tokyo). Information; Koganei
16, no. 3 (2013): 1861-1872.
Yang, Hengfu
, and
Guang SUN
.
"
High capacity data hiding scheme in BTC domain combining visual perception
."
Computer Engineering and Applications
3 (2011): 165-168.
Moro, Dulce Rosario He
.
Algoritmo de marca de agua para im´agenes en escala de grises basado en secreto compartido visual y puntos caracter´ısticos
. Vol. Maestra en ciencias en el a´ rea de ciencias computacionales. Instituto Nacional de Astrof´ısica , O´ ptica y Electro´nica Tonantzintla, Puebla, 2008.
Pages
« първа
‹ предишна
…
342
343
344
345
346
347
348
349
350
…
следваща ›
последна »
372494 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance