Author of the publication

Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices.

, , , , , , and . Multim. Tools Appl., 76 (3): 3519-3536 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bug Patterns Detection from Android Apps., , and . GSKI (2), volume 849 of Communications in Computer and Information Science, page 273-283. Springer, (2017)Erratum to: Video Summarization Based Tele-endoscopy: A Service to Efficiently Manage Visual Data Generated During Wireless Capsule Endoscopy Procedure., , and . J. Medical Systems, 38 (11): 130 (2014)Statistical and analytical approach of multi-criteria group decision-making based on the correlation coefficient under intuitionistic 2-tuple fuzzy linguistic environment., , , , and . Expert Syst. Appl., (2022)Three Decades of Coastal Changes in Sindh, Pakistan (1989-2018): A Geospatial Assessment., , , and . Remote. Sens., 12 (1): 8 (2020)A Systematic Mapping Review on MOOC Recommender Systems., , , , and . IEEE Access, (2021)Mobile cloud-assisted paradigms for management of multimedia big data in healthcare systems: Research challenges and opportunities., , , , , and . Int. J. Inf. Manag., (2019)AI-Driven Salient Soccer Events Recognition Framework for Next-Generation IoT-Enabled Environments., , , , , , and . IEEE Internet Things J., 10 (3): 2202-2214 (February 2023)Deepview: Deep-Learning-Based Users Field of View Selection in 360° Videos for Industrial Environments., , , , , , and . IEEE Internet Things J., 10 (4): 2903-2912 (February 2023)Clustering-Based Speech Emotion Recognition by Incorporating Learned Features and Deep BiLSTM., , and . IEEE Access, (2020)CNN features with bi-directional LSTM for real-time anomaly detection in surveillance networks., , , , , and . Multim. Tools Appl., 80 (11): 16979-16995 (2021)