Skip to main content
Security and Defence Management
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Al-Muhtadi, Jalal
,
Basit Shahzad
,
Kashif Saleem
,
Wasif Jameel
, and
Mehmet A. Orgun
.
"
Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment
."
Health Informatics Journal
10, no. 22 (2017).
K. Naik, Seena
,
G. A. Ramachandra
, and
M. V. Bramhan Reddy
.
"
An Extended Security Framework for E-Government
."
International Journal of Advanced Research in Computer Science
5, no. 1 (2014): 152-154.
Meshu, Tesfayee
, and
Sanjiv G Rao
.
"
Framework for Securing Educational E-Government Service
."
International Journal on Cybernetics & Informatics (IJCI)
5, no. 4 (2016).
Røberg, Pernille Monstad
.
Unveiling barriers and enablers of risk management in interoperability efforts: A study from the Norwegian public sector
In
Faculty of Economic and Social Sciences, Department of Information Systems
. Vol. Master’s Thesis. University of Agder, 2013.
Hashim, Hasan Adnan
.
A Study of Adoption and Acceptance of e-Umrah System in Saudi Arabia: Overcoming Infrastructure Barriers and Limitations
In
Information School
. Vol. Doctor of Philosophy. University of Sheffield, 2014.
Asare-Nuamah, Peter
, and
‘Darko Emmanuel Agyepong
.
"
Techno Legal Support for E-Governance and Implementation Challenges in Ghana
."
SOCRATES: An International, Multi-lingual, Multi-disciplinary, Refereed (peer-reviewed), Indexed Scholarly journal
4, no. Extra 3 (2016): 47-57.
Izzati, Berlian Maulidya
.
Analisis Pengaruh Kualitas Layanan Publik E-Government (Government to Citizen) Terhadap Penciptaan Public Value (Studi Kasus: Kota Surabaya)
In
Institut Teknologi Sepuluh Nopember
. Vol. Masters thesis., 2017.
Guo, Jing-Ming
, and
Ming-Feng Wu
.
"
Improved Block Truncation Coding Based on the Void-and-Cluster Dithering Approach
."
IEEE Transactions on Image Processing
8, no. 1 (2009).
Guo, Jing-Ming
, and
Yun-Fu Liu
.
"
Joint Compression/Watermarking Scheme Using Majority-Parity Guidance and Halftoning-Based Block Truncation Coding
."
IEEE Transactions on Image Processing
19, no. 8 (2010).
Guo, Jing-Ming
,
Min-Feng Wu
, and
Yong-Chuen Kang
.
"
Watermarking in conjugate ordered dither block truncation coding images
." In
IEEE International Symposium on Circuits and Systems
. Taipei, Taiwan , 2009.
Hu, Yu-Chen
,
Chun-Chi Lo
,
Wu-Lin Chen
, and
Chia-Hsien Wen
.
"
Joint image coding and image authentication based on absolute moment block truncation coding
."
Journal of Electronic Imaging
22, no. 1 (2013).
A.Saleh, Noura
,
Hoda N.Boghdady
,
Samir I.Shaheen
, and
Ahmed M.Darwish
.
"
High capacity lossless data embedding technique for palette images based on histogram analysis
."
Digital Signal Processing
20, no. 6 (2010): 1629-1636.
Hsu, Ching-Sheng
, and
Shu-Fen Tu
.
Digital Watermarking Scheme with Visual Cryptography
In
International MultiConference of Engineers and Computer Scientists, IMECS 2008
. Vol. I. Hong Kong, 2008.
Kim, Cheonshik
,
Dongkyoo Shin
, and
Dongil Shin
.
Data Hiding in a Halftone Image Using Hamming Code (15, 11)
In
Intelligent Information and Database Systems. ACIIDS 2011. Lecture Notes in Computer Science
. Vol. 6592. Berlin, Heidelberg: Springer, 2011.
Guo, Jing-Ming
, and
Jia-Jin Tsai
.
"
Reversible data hiding in low complexity and high quality compression scheme
."
Digital Signal Processing
22, no. 5 (2012): 776-785.
Kim, Cheonshik
.
Data Hiding Based on Compressed Dithering Images
In
Advances in Intelligent Information and Database Systems. Studies in Computational Intelligence
. Vol. 283. Berlin, Heidelberg: Springer, 2010.
Guo, Jing-Ming
, and
Jia-Jin Tsai
.
"
Reversible data hiding in highly efficient compression scheme
." In
IEEE International Conference on Acoustics, Speech and Signal Processing
. Taipei, Taiwan , 2009.
Tu, Shu-Fen
, and
Ching-Sheng Hsu
.
"
A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography
."
The International Arab Journal of Information Technology
9, no. 3 (2012).
Somasundaram, K
, and
Ph Sumitra
.
"
RGB & Gray Scale Component on MPQ-BTC in Image Compression
."
International Journal on Computer Science and Engineering (IJCSE)
3, no. 4 (2011).
Saleh, Noura A.
,
Hoda N. Boghdady
,
Samir I. Shaheen
, and
Ahmed M. Darwish
.
"
An Efficient Lossless Data Hiding Technique for Palette-Based Images with Capacity Optimization
." In
14th International Workshop on Systems, Signals and Image Processing and 6th EURASIP Conference focused on Speech and Image Processing, Multimedia Communications and Services
. Maribor, Slovenia , 2007.
Guo, Jing-Ming
, and
Chih-Yu Lin
.
"
Parallel and element-reduced error-diffused block truncation coding
."
IEEE Transactions on Communications
58, no. 6 (2010).
Kim, Cheonshik
,
Dongkyoo Shin
,
Dongil Shin
, and
Ching-Nung Yang
.
A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC
In
Intelligent Information and Database Systems. ACIIDS 2012. Lecture Notes in Computer Science
. Vol. 7197. Berlin, Heidelberg: Springer, 2012.
Keissarian, Farhad
.
"
An Image Watermarking Scheme based on Image Visual Activity for Copyright Protection
." In
Innovations in Information Technologies (IIT)
. Dubai, Dubai , 2007.
Borra, Surekha
,
Viswanadha Raju S.
, and
Lakshmi H.R.
.
Visual Cryptography Based Lossless Watermarking for Sensitive Images
In
Swarm, Evolutionary, and Memetic Computing. SEMCCO 2015. Lecture Notes in Computer Science
. Vol. 9873. Cham: Springer, 2015.
Maiti, Chinmay
, and
Bibhas Chandra Dhara
.
"
A binary watermarking scheme using quantization levels of BTC-PF method
." In
International Conference on Communications, Devices and Intelligent Systems (CODIS)
. Kolkata, India , 2012.
Pages
« първа
‹ предишна
…
341
342
343
344
345
346
347
348
349
…
следваща ›
последна »
384722 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
26/08/2015
Closing the Call on National Case Studies in Organizing Cybersecurity
10/04/2015
CfP on Education & Training for Cybersecurity and Resilience
26/03/2015
CfP on Crisis Management Policies, Organisation and Capabilities
15/08/2014
EvoCS project webiste launched
31/07/2014
Call for Papers on Heart Failure and Stress Response
25/03/2015
Standing Call for Papers for the Biomedical Data Journal
07/04/2015
Call for Papers on Brain Disorders announced
31/03/2015
Call for Papers on High Throughput Drug Screening
07/01/2015
The Winter 2014 issue of Connections now online
03/04/2015
Call for Papers on Evolving Concepts of Security
view all