Author of the publication

An Objective Non-Reference Metric Based on Arimoto Entropy for Assessing the Quality of Fused Images.

, , , , and . Entropy, 21 (9): 879 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Semi-fragile Self-recoverable Watermarking Algorithm Using Group-Based Wavelet Quantization., , , , and . PCM, volume 7674 of Lecture Notes in Computer Science, page 327-336. Springer, (2012)Enhancing biometric security with wavelet quantization watermarking based two-stage multimodal authentication., , , , and . ICPR, page 2416-2419. IEEE Computer Society, (2012)Fabric Defect Detection Method Based on Sparse and Dense Mixed Low-rank Decomposition., , , , , and . SPAC, page 515-519. IEEE, (2018)Perfect Gaussian integer sequences from cyclic difference sets., , and . ISIT, page 115-119. IEEE, (2016)Sparse Reconstruction Based Watermarking for Secure Biometric Authentication., , , and . CCBR, volume 7098 of Lecture Notes in Computer Science, page 244-251. Springer, (2011)Learning compact ConvNets through filter pruning based on the saliency of a feature map., , , , and . IET Image Process., 16 (1): 123-133 (2022)Real-time seed sorting system via 2D information entropy-based CNN pruning and TensorRt acceleration., , , , and . IET Image Process., 17 (6): 1694-1708 (May 2023)Constructions of complete permutation polynomials., , , and . Des. Codes Cryptogr., 86 (12): 2869-2892 (2018)Further properties of several classes of Boolean functions with optimum algebraic immunity., , , and . Des. Codes Cryptogr., 52 (3): 303-338 (2009)New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences., , , and . SETA, volume 7280 of Lecture Notes in Computer Science, page 327-337. Springer, (2012)