Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Object detection framework to generate secret shares., , and . Multim. Tools Appl., 79 (33-34): 24685-24706 (2020)Single secret image sharing scheme using neural cryptography., , and . Multim. Tools Appl., 79 (17-18): 12183-12204 (2020)An Intelligent Image Fire Detection Approach Based On Deep Convolutional Neural Network., and . ICCCNT, page 1-6. IEEE, (2023)A Novel Approach of an (n, n) Multi-Secret Image Sharing Scheme Using Additive Modulo., , and . CVIP (1), volume 459 of Advances in Intelligent Systems and Computing, page 149-158. Springer, (2016)Classification of Imbalanced Data Using Decision Tree and Bayesian Classifier., , and . AICV, volume 1153 of Advances in Intelligent Systems and Computing, page 458-466. Springer, (2020)A novel pitch based voice recognition model (PVRM)., , and . RAIT, page 1-4. IEEE, (2018)Denoising Images with Varying Noises Using Autoencoders., , and . CVIP (2), volume 1148 of Communications in Computer and Information Science, page 3-14. Springer, (2019)Natural share-based lightweight (n, n) single secret image sharing scheme using LSB stuffing for medical images., , and . J. Supercomput., 79 (17): 19138-19167 (November 2023)Image compression and encryption using chinese remainder theorem., and . Multim. Tools Appl., 78 (12): 16727-16753 (2019)Securing Data Through Steganography and Secret Sharing Schemes: Trapping and Misleading Potential Attackers., , , and . IEEE Consumer Electron. Mag., 7 (5): 40-45 (2018)