Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Quantum Encryption and Authentication Framework Integrated with IoT., , , and . Security, Privacy and Trust in the IoT Environment, Springer, (2019)Tamper Proofing Identification and Authenticated DICOM Image Transmission Using Wireless Channels and CR Network., , , , , and . Wirel. Pers. Commun., 97 (4): 5573-5595 (2017)Transreceiving of encrypted medical image - a cognitive approach., , , , , , and . Multim. Tools Appl., 77 (7): 8393-8418 (2018)Detecting and Mitigating Selfish Primary Users in Cognitive Radio., , , and . Wirel. Pers. Commun., 109 (2): 1021-1031 (2019)Hybrid spectrum management using integrated fuzzy and femtocells in cognitive domain., , , and . J. Intell. Fuzzy Syst., 41 (6): 6079-6088 (2021)Uncover the cover to recover the hidden secret - A separable reversible data hiding framework., , , and . Multim. Tools Appl., 80 (13): 19695-19714 (2021)Triple chaotic image scrambling on RGB - a random image encryption approach., , , and . Secur. Commun. Networks, 8 (18): 3335-3345 (2015)ROI-based medical image watermarking for accurate tamper detection, localisation and recovery., , , , and . Medical Biol. Eng. Comput., 59 (6): 1355-1372 (2021)Mojette (d) Secret Image "SEDIH" in an Encrypted Double Image - A Histo Approach., , , and . Int. J. Netw. Secur., 19 (1): 47-59 (2017)Image encryption through RNA approach assisted with neural key sequences., , , , , , , and . Multim. Tools Appl., 79 (17-18): 12093-12124 (2020)