Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hybrid Data Deduplication Approach in Entity Resolution Using Chromatic Correlation Clustering., , , , and . FCS, volume 879 of Communications in Computer and Information Science, page 153-167. Springer, (2018)A Hybrid Image Cryptographic and Spatial Digital Watermarking Encryption Technique for Security and Authentication of Digital Images., , , , , and . UKSim, page 322-326. IEEE, (2015)A Hybrid Encryption Technique for Securing Biometric Image Data Based on Feistel Network and RGB Pixel Displacement., , , , , and . SNDS, volume 420 of Communications in Computer and Information Science, page 530-539. Springer, (2014)Applying Cluster Refinement to Improve Crowd-Based Data Duplicate Detection Approach., , , , , , , and . IEEE Access, (2019)Cost-Based and Effective Human-Machine Based Data Deduplication Model in Entity Reconciliation., , , , , , and . ICSAI, page 1265-1270. IEEE, (2018)A Security Technique for Authentication and Security of Medical Images in Health Information Systems., , , , , and . ICCSA (Short Papers/poster papers/PhD student showcase works), page 8-13. IEEE Computer Society, (2015)A Hybrid Cryptographic and Steganographic Security Approach for Identity Management and Security of Digital Images., , , , , and . SSCC, volume 536 of Communications in Computer and Information Science, page 228-237. Springer, (2015)A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Digital Images., , , , , and . SSCC, volume 536 of Communications in Computer and Information Science, page 89-98. Springer, (2015)A Novel Hybrid Discrete Cosine Transformation and Visual Cryptographic Technique for Securing Digital Images., , , , , and . UKSim, page 327-332. IEEE, (2015)Feature Based Encryption Technique for Securing Digital Image Data Based on FCA-Image Attributes and Visual Cryptography., , , , , and . ICCSA (4), volume 9158 of Lecture Notes in Computer Science, page 712-724. Springer, (2015)