Author of the publication

A Hybrid Cryptographic and Steganographic Security Approach for Identity Management and Security of Digital Images.

, , , , , and . SSCC, volume 536 of Communications in Computer and Information Science, page 228-237. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Images Watermarking Scheme Based on Singular Value Decomposition., , , and . J. Inf. Hiding Multim. Signal Process., 4 (1): 9-18 (2013)A Hybrid Image Cryptographic and Spatial Digital Watermarking Encryption Technique for Security and Authentication of Digital Images., , , , , and . UKSim, page 322-326. IEEE, (2015)A New Encryption Cipher for Securing Digital Images of Video Surveillance Devices Using Diffie-Hellman-MD5 Algorithm and RGB Pixel Shuffling., , , and . EMS, page 305-311. IEEE, (2013)A Hybrid Encryption Technique for Securing Biometric Image Data Based on Feistel Network and RGB Pixel Displacement., , , , , and . SNDS, volume 420 of Communications in Computer and Information Science, page 530-539. Springer, (2014)Concept Lattice and Soft Sets. Application to the Medical Image Analysis., , and . FCA4AI@ECAI, volume 2729 of CEUR Workshop Proceedings, page 121-128. CEUR-WS.org, (2020)A novel robust informed watermarking approach and tamper detection based on weber differential excitation descriptor., , , and . ISPACS, page 194-198. IEEE, (2015)Feature Based Encryption Technique for Securing Digital Image Data Based on FCA-Image Attributes and Visual Cryptography., , , , , and . ICCSA (4), volume 9158 of Lecture Notes in Computer Science, page 712-724. Springer, (2015)A Dual Watermarking Approach for DICOM Images., , , and . ATSIP, page 1-6. IEEE, (2020)A Novel Hybrid Discrete Cosine Transformation and Visual Cryptographic Technique for Securing Digital Images., , , , , and . UKSim, page 327-332. IEEE, (2015)Logic of Typical and Atypical Instances of a Concept - A Mathematical Model., and . Axioms, 8 (3): 104 (2019)