Author of the publication

Parallel Implementation of RSA 2D-DCT Steganography and Chaotic 2D-DCT Steganography.

, , , and . CVIP (1), volume 459 of Advances in Intelligent Systems and Computing, page 593-605. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring Vectorization and Prefetching Techniques on Scientific Kernels and Inferring the Cache Performance Metrics., and . Int. J. Grid High Perform. Comput., 7 (2): 18-36 (2015)Parallelization of Machine Learning Models for Credit Card Fraud Detection., , , , and . Int. J. Syst. Syst. Eng., (2023)Accelerating Image Encryption with AES Using GPU: A Quantitative Analysis., , , , and . ISDA (2), volume 941 of Advances in Intelligent Systems and Computing, page 372-380. Springer, (2018)Frequent Item Set Mining of Large Datasets Using CUDA Computing., and . SocProS (2), volume 1057 of Advances in Intelligent Systems and Computing, page 739-747. Springer, (2018)Parallelisation of machine learning models for credit card fraud detection., , , , and . Int. J. Syst. Syst. Eng., 13 (4): 386-406 (2023)An Integrated Intrusion Detection System for Credit Card Fraud Detection., , and . ACITY (1), volume 176 of Advances in Intelligent Systems and Computing, page 55-60. Springer, (2012)Chicken swarm foraging algorithm for big data classification using the deep belief network classifier., , , , and . Data Technol. Appl., 55 (3): 332-352 (2021)Parallel Implementation of RSA 2D-DCT Steganography and Chaotic 2D-DCT Steganography., , , and . CVIP (1), volume 459 of Advances in Intelligent Systems and Computing, page 593-605. Springer, (2016)GPU-Accelerated implementation of a genetically optimized image encryption algorithm., , , , , and . Soft Comput., 25 (22): 14413-14428 (2021)An integrated intrusion detection system using correlation-based attribute selection and artificial neural network., , , , and . Trans. Emerg. Telecommun. Technol., (2021)