Author of the publication

Towards Improving the Imperceptibility of Steganography Schemes: Adaptive Scaling Approach.

, , , and . IIT, page 51-56. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Morphological Generation for the Indexing of Arabic Speech Recordings., , and . Int. J. Comput. Proc. Oriental Lang., 20 (1): 1-14 (2007)Distortion-free Watermarking Scheme for Compressed Data in Columnar Database., , and . ICETE (2), page 343-353. SciTePress, (2018)Beyond Uniformity and Independence: Analysis of R-trees Using the Concept of Fractal Dimension., and . PODS, page 4-13. ACM Press, (1994)Exposed-mode of Wormhole Attack in Opportunistic Mobile Networks: Impact Study and Analysis., , and . EICC, page 19-25. ACM, (2023)Providing Interactive Functions for Staggered Multicast Near Video-on-Demand Systems., , , and . ICMCS, Vol. 2, page 949-953. IEEE Computer Society, (1999)0-7695-0253-9.Identifying malicious peers in MANETs., and . ICECS, page 898-901. IEEE, (2008)Scalable Multimedia Disk Scheduling., , , and . ICDE, page 498-509. IEEE Computer Society, (2004)Towards Improving the Imperceptibility of Steganography Schemes: Adaptive Scaling Approach., , , and . IIT, page 51-56. IEEE, (2020)Framework for Protecting the Confidentiality of Outsourced Data on Cloud., , and . IIT, page 29-34. IEEE, (2020)Impact Study and Analysis of Hidden-mode of Wormhole Attack in Opportunistic Mobile Networks., , and . IIT, page 144-149. IEEE, (2023)