Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correction to: A simple and effective sub-image separation method., , , and . Multim. Tools Appl., 81 (11): 14911 (2022)A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform., , , and . J. Vis. Commun. Image Represent., (2018)Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem., , , , and . IET Image Process., 13 (10): 1705-1713 (2019)An efficient forensic technique for exposing region duplication forgery in digital images., , , and . Appl. Intell., 48 (7): 1791-1801 (2018)International comparisons of laboratory values from the 4CE collaborative to predict COVID-19 mortality., , , , , , , , , and 60 other author(s). npj Digit. Medicine, (2022)Paillier Cryptosystem based Mean Value Computation for Encrypted Domain Image Processing Operations., , , and . ACM Trans. Multim. Comput. Commun. Appl., 15 (3): 76:1-76:21 (2019)Intuitive weights of harm for therapeutic decision making in smear-negative pulmonary Tuberculosis: an interview study of physicians in India, Pakistan and Bangladesh., , , , , , , and . BMC Medical Informatics Decis. Mak., (2014)Threshold-based steganography: a novel technique for improved payload and SNR., , , , and . Int. Arab J. Inf. Technol., 13 (4): 380-386 (2016)A simple and effective sub-image separation method., , , and . Multim. Tools Appl., 81 (11): 14893-14910 (2022)A passive technique for detecting copy-move forgeries by image feature matching., , , , , and . Multim. Tools Appl., 79 (43-44): 31759-31782 (2020)