Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography., , and . IWDW, volume 5450 of Lecture Notes in Computer Science, page 342-349. Springer, (2008)Local descriptor for retinal fundus image registration., , , , , , , and . IET Comput. Vis., 14 (4): 144-153 (2020)Deep learning-based breast cancer classification through medical imaging modalities: state of the art and research challenges., , , , , , , , and . Artif. Intell. Rev., 53 (3): 1655-1720 (2020)Has F5 really been broken?, , and . ICDP, page 1-5. IET / IEEE, (2009)A Feedback-based Admission Control Unit for QoS provision of video Transmission over WLANs., , , , , and . CCWC, page 1-6. IEEE, (2017)Concept of Entire Boolean Values Recalculation From Aggregates in the Preprocessed Category of Incomplete Soft Sets., , , , and . IEEE Access, (2017)A tree-based multiclassification of breast tumor histopathology images through deep learning., , , and . Comput. Medical Imaging Graph., (2021)SIDNFF: Source identification network forensics framework for cloud computing., , , and . ICCE-TW, page 418-419. IEEE, (2015)SIFT-Symmetry: A robust detection method for copy-move forgery with reflection attack., , , , and . J. Vis. Commun. Image Represent., (2017)Image steganography in spatial domain: A survey., , , , and . Signal Process. Image Commun., (2018)