Author of the publication

An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images.

, , , , and . EAI Endorsed Trans. Ind. Networks Intell. Syst., 7 (24): e2 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LimonDroid: a system coupling three signature-based schemes for profiling Android malware., , , and . Iran J. Comput. Sci., 4 (2): 95-114 (2021)Creating awareness about security and safety on highways to mitigate wildlife-vehicle collisions by detecting and recognizing wildlife fences using deep learning and drone technology., , , , , and . CoRR, (2023)Supervised Learning Based Detection of Malware on Android., and . Mobile Security and Privacy, Elsevier, (2017)Detection of Vulnerabilities Related to Permissions Requests for Android Apps Using Machine Learning Techniques., , , , and . SoCPaR, volume 1383 of Advances in Intelligent Systems and Computing, page 810-822. Springer, (2020)Mobile Money Phishing Cybercrimes: Vulnerabilities, Taxonomies, Characterization from an Investigation in Cameroon., , , , and . AFRICOMM, volume 499 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 430-445. Springer, (2022)An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images., , , , and . EAI Endorsed Trans. Ind. Networks Intell. Syst., 7 (24): e2 (2020)Feature Analysis and Classification of Collusive Android App-Pairs Using DBSCAN Clustering Algorithm., , , and . SAFER-TEA, volume 566 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 86-96. Springer, (2023)Support to Interaction Between Medical Practitioners and Patients: A Systematic Review., and . SAFER-TEA, volume 566 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 380-408. Springer, (2023)A Reliable Weighting Scheme for the Aggregation of Crowd Intelligence to Detect Fake News., , , and . Inf., 11 (6): 319 (2020)A Game Theoretical Model for Anticipating Email Spear-Phishing Strategies., , , , and . EAI Endorsed Trans. Scalable Inf. Syst., 8 (30): e5 (2021)