Author of the publication

Two-directional two-dimensional modified Fisher principal component analysis: an efficient approach for thermal face verification.

, , , , and . J. Electronic Imaging, 22 (2): 023013 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Providing End-to-End Security Using Quantum Walks in IoT Networks., , , , , , , and . IEEE Access, (2020)Automated detection of shockable ECG signals: A review., , , , , , , , , and 5 other author(s). Inf. Sci., (2021)DITrust Chain: Towards Blockchain-Based Trust Models for Sustainable Healthcare IoT Systems., , , , , and . IEEE Access, (2020)Toward Spectrum Efficiency and Reliability for Heterogeneous Users in CR-Enabled Social Internet of Things., , , , , , , and . IEEE Access, (2023)Energy and task completion time minimization algorithm for UAVs-empowered MEC SYSTEM., , and . Sustain. Comput. Informatics Syst., (2022)A Novel 3D Reversible Data Hiding Scheme Based on Integer-Reversible Krawtchouk Transform for IoMT., , , , , and . Sensors, 23 (18): 7914 (September 2023)An Efficient Cryptosystem based on the Logistic-Chebyshev Map., , , , and . SKIMA, page 1-6. IEEE, (2019)Chaotic Image Encryption Using Bézier Curve in DCT Domain Scrambling., , and . DEIS, volume 194 of Communications in Computer and Information Science, page 30-41. Springer, (2011)Image Encryption Scheme of Pixel Bit Based on Combination of Chaotic Systems., , , and . IIH-MSP, page 369-373. IEEE Computer Society, (2011)Applicable image cryptosystem using bit-level permutation, particle swarm optimisation, and quantum walks., and . Neural Comput. Appl., 35 (25): 18325-18341 (September 2023)