Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A reliable and secure image watermarking algorithm using homomorphic transform in DWT domain., and . Multidimens. Syst. Signal Process., 32 (1): 131-160 (2021)Image security enhancement to medical images by RDWT-DCT-Schur decomposition-based watermarking and its authentication using BRISK features., , and . Multim. Tools Appl., 83 (22): 61883-61912 (July 2024)Analysis of Optimum Interleaver for Receivers in IDMA Systems., , and . ICDCN, volume 5408 of Lecture Notes in Computer Science, page 400-407. Springer, (2009)Pattern analysis approach for prediction using Wavelet Neural Networks., , , and . ICNC, page 695-699. IEEE, (2011)A Secured and Robust Medical Image Watermarking Approach for Protecting Integrity of Medical Images., and . Trans. Emerg. Telecommun. Technol., (2021)Employee retention: By way of management control systems., and . Ubiquity, 2008 (April): 9:1 (2008)Internet of medical things-based authentication for an optimized watermarking of encrypted EEG., , and . J. Supercomput., 80 (3): 2970-3004 (February 2024)ANFIS optimization-based watermarking for securing integrity of medical images with blockchain authentication., , , and . Comput. Electr. Eng., (2024)DCT-based unique faces for face recognition using Mahalanobis distance., , , and . IITM, page 208-212. ACM, (2010)Analysis and design of optimum interleaver for iterative receivers in IDMA scheme., , and . Wirel. Commun. Mob. Comput., 9 (10): 1312-1317 (2009)