Author of the publication

A Security Technique for Authentication and Security of Medical Images in Health Information Systems.

, , , , , and . ICCSA (Short Papers/poster papers/PhD student showcase works), page 8-13. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Secure Communication of Data in IoT Networks: A Technical Research Report., , and . ICA3PP (3), volume 12454 of Lecture Notes in Computer Science, page 580-591. Springer, (2020)An Integrated RoIP Communication Network for Effective Collaboration During Emergency and Disaster Management.. AFRICOMM, volume 208 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 174-185. Springer, (2016)A Security Technique for Authentication and Security of Medical Images in Health Information Systems., , , , , and . ICCSA (Short Papers/poster papers/PhD student showcase works), page 8-13. IEEE Computer Society, (2015)A cryptographic image encryption technique for facial-blurring of images.. CoRR, (2013)Using Formal Concepts Analysis Techniques in Mining Data from Criminal Databases and Profiling Events Based on Factors to Understand Criminal Environments.. ICCSA (5), volume 9790 of Lecture Notes in Computer Science, page 480-496. Springer, (2016)A Hybrid Lossy Compression Using 2-D Discrete Cosine Transform and Visual Cryptographic Technique for Security of Multimedia Image Data Communications in Internet of Things.. AFRICOMM, volume 208 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 292-303. Springer, (2016)A Novel Hybrid Discrete Cosine Transformation and Visual Cryptographic Technique for Securing Digital Images., , , , , and . UKSim, page 327-332. IEEE, (2015)A Hybrid Cryptographic and Steganographic Security Approach for Identity Management and Security of Digital Images., , , , , and . SSCC, volume 536 of Communications in Computer and Information Science, page 228-237. Springer, (2015)A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Digital Images., , , , , and . SSCC, volume 536 of Communications in Computer and Information Science, page 89-98. Springer, (2015)A Novel Cryptographic Encryption Technique for Securing Digital Images in the Cloud Using AES and RGB Pixel Displacement., , and . EMS, page 293-298. IEEE, (2013)