Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Speech Authentication and Recovery Scheme in Encrypted Domain., , , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 46-60. (2016)Concealing Fingerprint-Biometric Data into Audio Signals for Identify Authentication., , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 129-144. (2016)Fourier-Mellin Transform and Fractal Coding for Secure and Robust Fingerprint Image Hashing., and . AVSS, page 1-7. IEEE, (2018)Random Hash Code Generation for Cancelable Fingerprint Templates using Vector Permutation and Shift-order Process., and . CoRR, (2021)DeepFake Detection for Human Face Images and Videos: A Survey., , , and . IEEE Access, (2022)Adaptive and Robust Fourier-Mellin-Based Image Watermarking for Social Networking Platforms., , , , , and . ICME, page 2843-2848. IEEE, (2023)A hybrid BTP approach with filtered BCH codes for improved performance and security., , , , , and . J. Inf. Secur. Appl., (2022)Biometric template attacks and recent protection mechanisms: A survey., , , , and . Inf. Fusion, (March 2024)Fractal Coding-Based Robust and Alignment-Free Fingerprint Image Hashing., , and . IEEE Trans. Inf. Forensics Secur., (2020)Identification of Electronic Disguised Voices in the Noisy Environment., , , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 75-87. (2016)