Author of the publication

An improved method for LSB based color image steganography combined with cryptography.

, , , and . ICIS, page 1-4. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new branch and bound algorithm for noncovex quadratic programming with box constraints., and . FSKD, page 562-566. IEEE, (2013)Distribution-based invariant feature construction using genetic programming for edge detection., , and . Soft Comput., 19 (8): 2371-2389 (2015)Disassembly sequence planning and application using simplified discrete gravitational search algorithm for equipment maintenance in hydropower station., , , , , and . Expert Syst. Appl., (2022)Low-Level Feature Extraction for Edge Detection Using Genetic Programming., , and . IEEE Trans. Cybern., 44 (8): 1459-1472 (2014)An Optimal Combining Attack Strategy Against Economic Dispatch of Integrated Energy System., , , , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 70 (1): 246-250 (2023)Fault Diagnosis for Rolling Bearings Based on Composite Multiscale Fine-Sorted Dispersion Entropy and SVM With Hybrid Mutation SCA-HHO Algorithm Optimization., , , and . IEEE Access, (2020)Extracting the Brain-Like Representation by an Improved Self-Organizing Map for Image Classification., , , and . ICASSP, page 1-5. IEEE, (2023)Hybrid Particle Swarm Optimisation Algorithms Based on Differential Evolution and Local Search., , and . Australasian Conference on Artificial Intelligence, volume 6464 of Lecture Notes in Computer Science, page 313-322. Springer, (2010)An improved method for LSB based color image steganography combined with cryptography., , , and . ICIS, page 1-4. IEEE Computer Society, (2016)Genetic Programming for Edge Detection Based on Accuracy of Each Training Image., , and . Australasian Conference on Artificial Intelligence, volume 7106 of Lecture Notes in Computer Science, page 301-310. Springer, (2011)