Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blood vessel structure segmentation from retinal scan image using Kekre's fast codebook generation algorithm., , , and . ICWET, page 10-14. ACM, (2011)SAR Image Segmentation using Vector Quantization Technique on Entropy Images, , and . CoRR, (2010)Keystroke dynamic analysis using relative entropy & timing sequence Euclidian distance., , , , and . ICWET, page 220-223. ACM, (2011)Increased cover capacity using advanced multiple LSB algorithms., , and . ICWET, page 25-31. ACM, (2011)Finger-Knuckle-Print verification using Kekre's wavelet transform., and . ICWET, page 32-37. ACM, (2011)Palmprint recognition using Kekre's wavelet's energy entropy based feature vector., , , and . ICWET, page 39-45. ACM, (2011)Performance comparison of DCT and Walsh transform for steganography., , , and . ICWET, page 81-88. ACM, (2010)Image retrieval by Kekre's transform applied on each row of Walsh transformed VQ codebook., , and . ICWET, page 127-133. ACM, (2010)Fingerprint Orientation Field Estimation Algorithm Based on Optimized Neighborhood Averaging., and . ICETET, page 228-234. IEEE Computer Society, (2009)Data traffic in a new centralized switch node architecture for LAN., , and . Comput. Commun. Rev., 24 (1): 68-94 (1994)