Ngoc-Tu Huynh

According to our database1, Ngoc-Tu Huynh authored at least 15 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Preserving friendly stacking and weighted shadows in selective scalable secret image sharing.
Multim. Tools Appl., 2023

2021
Secure session between an IoT device and a cloud server based on elliptic curve cryptosystem.
Int. J. Inf. Comput. Secur., 2021

2019
AAVSS: Auxiliary Authorization Mechanism Based on Arbitrary-Angle VSS.
Int. J. Netw. Secur., 2019

2018
Minima-maxima preserving data hiding algorithm for absolute moment block truncation coding compressed images.
Multim. Tools Appl., 2018

An Improved Data Hiding Method Based on Lempel-Ziv-Welch Compression Codes.
Int. J. Netw. Secur., 2018

Key-value based data hiding method for NoSQL database.
Proceedings of the 10th International Conference on Knowledge and Systems Engineering, 2018

An improved QR decomposition for color image watermarking.
Proceedings of the 10th International Conference on Knowledge and Systems Engineering, 2018

2016
Measuring Similarity for Short Texts on Social Media.
Proceedings of the Computational Social Networks - 5th International Conference, 2016

2015
A novel reversible data hiding scheme based on difference-histogram modification and optimal EMD algorithm.
J. Vis. Commun. Image Represent., 2015

Quadri-directional searching algorithm for secret image sharing using meaningful shadows.
J. Vis. Commun. Image Represent., 2015

Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique.
Digit. Signal Process., 2015

2014
Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation.
Signal Process., 2014

2012
Strong Tamper-Localization, Visual Secret Sharing Scheme Based on Exploiting Modification Direction.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
Sharing a Secret Image in Binary Images with Verification.
J. Inf. Hiding Multim. Signal Process., 2011

Lossless Secret Sharing Scheme with High Quality Shares Based on VQ-Compressed Images.
Int. J. Pattern Recognit. Artif. Intell., 2011


  Loading...