Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dynamic Watermarking Scheme for Color Image Authentication., , , , and . ARTCom, page 314-318. IEEE Computer Society, (2009)A chip-based watermarking framework for color image authentication., , , and . ICCCS, page 178-183. ACM, (2011)DNA Encoding and Channel Shuffling for Secured Encryption of Audio Data., , , and . Multim. Tools Appl., 78 (17): 25019-25042 (2019)Secret Image Sharing with Embedded Session Key., , , , and . CISIM, volume 245 of Communications in Computer and Information Science, page 286-294. Springer, (2011)Convergence Analysis of Backpropagation Algorithm for Designing an Intelligent System for Sensing Manhole Gases., , , and . CoRR, (2017)Energy aware topology security scheme for mobile ad hoc network., , , and . ICCCS, page 114-118. ACM, (2011)MTCNN++: A CNN-based face detection algorithm inspired by MTCNN., , , and . Vis. Comput., 40 (2): 899-917 (February 2024)A fragile color image watermarking framework focusing a new invisible domain., , , and . ICCCS, page 172-177. ACM, (2011)Identifying hazardousness of sewer pipeline gas mixture using classification methods: a comparative study., , and . Neural Comput. Appl., 28 (6): 1343-1354 (2017)On-line diagnosibility of baseline interconnection network., and . HiPC, page 247-252. IEEE Computer Society, (1998)