Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Multiple Watermarking Using Entropy Based Spread Spectrum., , , and . IC3 (1), volume 94 of Communications in Computer and Information Science, page 497-507. Springer, (2010)Real Dual Tree Based Feature Variance for Face Recognition., , , and . SocProS (2), volume 131 of Advances in Intelligent and Soft Computing, page 637-647. Springer, (2011)Detection of copy-move image forgery with efficient block representation and discrete cosine transform., , and . J. Intell. Fuzzy Syst., 35 (5): 5241-5253 (2018)An integrated method of copy-move and splicing for image forgery detection., , , and . Multim. Tools Appl., 77 (20): 26939-26963 (2018)Multiple watermarking for copyright protection using DWT and dual-tree CWT., , , and . IJIEI, 1 (3/4): 348-369 (2011)An Effective Video Bootleg Detection Algorithm Based on Noise Analysis in Frequency Domain., , and . CVIP (1), volume 1147 of Communications in Computer and Information Science, page 227-238. Springer, (2019)DCT-based unique faces for face recognition using Mahalanobis distance., , , and . IITM, page 208-212. ACM, (2010)