Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifiable Visual Cryptography., , , , and . ICGEC, page 464-467. IEEE, (2012)An efficient segmentation algorithm for CAPTCHAs with line cluttering and character warping., , , and . Multimedia Tools Appl., 48 (2): 267-289 (2010)A New Approach for Recommender System., , , and . ICACS, page 35-39. ACM, (2017)Video Resizing for Mobile Device., , , and . IIH-MSP, page 388-391. IEEE, (2014)Multisecret Image Sharing., , , , , and . IIH-MSP, page 977-980. IEEE Computer Society, (2009)An Advanced Least-Significant-Bit Embedding Scheme for Steganographic Encoding., , , , and . PSIVT, volume 5414 of Lecture Notes in Computer Science, page 349-360. Springer, (2009)Data Transmission System for Mobile Device by Audio Hiding Approach., , , , and . IIH-MSP, page 385-387. IEEE, (2014)Object-Based Image Steganography Using Affine Transformation., and . IJPRAI, 16 (6): 681-696 (2002)A New Approach for Recognizing Multifont Chinese Characters Used in a Special Application., and . IJPRAI, 10 (3): 203-222 (1996)Automatic Recognition of Bird Songs Using Cepstral Coefficients, , and . Journal of Information Technology and Applications, 1 (1): 17-23 (2006)