Author of the publication

A Robust Double Layer Steganography Technique Based on DNA Sequences.

, , and . ICFNDS, page 38:1-38:5. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Hiding Method Based on DNA Basic Characteristics., , and . DEIS, volume 194 of Communications in Computer and Information Science, page 53-62. Springer, (2011)Efficient Intelligent Energy Routing Protocol in Wireless Sensor Networks., , , , and . IJDSN, (2015)Investigation of Touch-Based User Authentication Features Using Android Smartphone., and . AMLTA, volume 488 of Communications in Computer and Information Science, page 135-144. Springer, (2014)Framework for Video Steganography Using Integer Wavelet Transform and JPEG Compression., , , and . Future Internet, 14 (9): 254 (2022)A Conceptual Model to Identify Illegal Activities on the Bitcoin System., , , , and . ACeS, volume 1487 of Communications in Computer and Information Science, page 18-34. Springer, (2021)Factors influencing medical tourism adoption in Malaysia: A DEMATEL-Fuzzy TOPSIS approach., , , , , , , , and . Comput. Ind. Eng., (2019)Coronary Heart Disease Diagnosis Through Self-Organizing Map and Fuzzy Support Vector Machine with Incremental Updates., , , , , , , and . Int. J. Fuzzy Syst., 22 (4): 1376-1388 (2020)A Robust Double Layer Steganography Technique Based on DNA Sequences., , and . ICFNDS, page 38:1-38:5. ACM, (2020)Nearest Neighbor For Histogram-based Feature Extraction., , and . ICCS, volume 4 of Procedia Computer Science, page 1296-1305. Elsevier, (2011)Security Evaluation for Graphical Password., , , and . DICTAP (1), volume 166 of Communications in Computer and Information Science, page 431-444. Springer, (2011)