Author of the publication

A novel image encryption technique using one dimensional chaotic map and circular shift technique.

, , and . ICSCA, page 112-116. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Boolean operation based lossless threshold secret image sharing., , and . Multim. Tools Appl., 81 (24): 35293-35316 (2022)A blind audio watermarking based on singular value decomposition and quantization., and . Int. J. Speech Technol., 25 (3): 759-771 (2022)Image encryption using permutation generated by modified Regula-Falsi method., , and . Appl. Intell., 52 (10): 10979-10998 (2022)Efficient Obstacle Detection and Tracking Using RGB-D Sensor Data in Dynamic Environments for Robotic Applications., , , , , and . Sensors, 22 (17): 6537 (2022)Smart sentiment analysis system for pain detection using cutting edge techniques in a smart healthcare framework., , , , and . Clust. Comput., 26 (1): 119-135 (February 2023)An Image Encryption Method Using Chaos and DNA Encoding., , and . CICBA, volume 1406 of Communications in Computer and Information Science, page 42-56. Springer, (2021)Video Motion Estimation Using Prediction Based Hybrid Approach., and . ICPR (4), page 737-740. IEEE Computer Society, (2004)Generation of Pseudorandom Sequence Using Regula-Falsi Method., , and . ICMC, volume 1262 of Advances in Intelligent Systems and Computing, page 393-405. Springer, (2020)Song Classification: Classical and Non-classical Discrimination Using MFCC Co-occurrence Based Features., , , and . FGIT-SIP, volume 260 of Communications in Computer and Information Science, page 179-185. Springer, (2011)Block truncation coding using pattern fitting., and . Pattern Recognit., 37 (11): 2131-2139 (2004)