Author of the publication

Bio-inspired Hybrid Face Recognition System for Small Sample Size and Large Dataset.

, , and . IIH-MSP, page 384-388. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Steganalysis for palette-based images using generalized difference image and color correlogram., , and . Signal Process., 91 (11): 2595-2605 (2011)Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks., , , , , and . Comput. Networks, (2016)An efficient wavelet-tree-based watermarking method., , , , , and . Expert Syst. Appl., 38 (12): 14357-14366 (2011)A blockchain-based conditional privacy-preserving authentication scheme for edge computing services., , , , and . J. Inf. Secur. Appl., (2022)Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts., , , , and . IEEE Access, (2017)Consumer, Commercial and Industrial IoT (In)Security: Attack Taxonomy and Case Studies., , , , , and . CoRR, (2021)Cross-layer design and optimization techniques in wireless multimedia sensor networks for smart cities., , , and . Comput. Sci. Inf. Syst., 16 (1): 1-17 (2019)Improvement of the Efficient Secret Broadcast Scheme., , and . IEICE Trans. Inf. Syst., 93-D (12): 3396-3399 (2010)A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata., , , and . J. Netw. Comput. Appl., 36 (1): 235-248 (2013)Intrinsic authentication of multimedia objects using biometric data manipulation., , , , and . Int. Arab J. Inf. Technol., 9 (4): 336-342 (2012)