Author of the publication

Content-based Image Hiding Method for Secure Network Biometric Verification.

, , , , and . Int. J. Comput. Intell. Syst., 4 (4): 596-605 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Moving Cast Shadow Detection of Vehicles in Traffic Scene., , , , , and . IScIDE, volume 7751 of Lecture Notes in Computer Science, page 115-124. Springer, (2012)Integrative Radiomics Models To Predict Biopsy Results For Negative Prostate MRI., , , , and . ISBI, page 877-881. IEEE, (2021)Double Closed-Loop Network for Image Deblurring., , , , , and . ICASSP, page 2325-2329. IEEE, (2022)Towards Machine-Assisted Biomedical Data Preparation: A Use Case on Disparity in Access to Health Care., , , , and . SeWeBMeDA@ESWC, volume 3466 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)Joint Semantic Segmentation and Object Detection Based on Relational Mask R-CNN., , , , , and . ICIC (1), volume 13393 of Lecture Notes in Computer Science, page 506-521. Springer, (2022)A Novel Hand-Based Personal Identification Approach., , , , and . ICANNGA (2), volume 4432 of Lecture Notes in Computer Science, page 309-317. Springer, (2007)Leveraging Event Reporting Through Knowledge Support: A Knowledge-Based Approach to Promoting Patient Fall Prevention., , , , , and . MedInfo, volume 245 of Studies in Health Technology and Informatics, page 973-977. IOS Press, (2017)An Approach of Iris Recognition Based on Partical Swarm Optimization., , , and . FCST, page 541-545. IEEE Computer Society, (2010)Unsupervised feature selection by regularized matrix factorization., , , , , and . Neurocomputing, (2018)Semantically-targeted analytics for reproducible scientific discovery., , , , , , and . AIDR, page 2:1-2:4. ACM, (2019)