Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image steganography using deep learning based edge detection., , , , and . Multim. Tools Appl., 80 (24): 33475-33503 (2021)Correction to: Human activity recognition from sensor data using spatial attention-aided CNN with genetic algorithm., , and . Neural Comput. Appl., 35 (16): 12239 (June 2023)A secured image steganography method based on ballot transform and genetic algorithm., , , , and . Multim. Tools Appl., 81 (27): 38429-38458 (November 2022)Secured image steganography based on Catalan transform., , , and . Multim. Tools Appl., 80 (9): 14495-14520 (2021)Exploiting Laguerre transform in image steganography., , , and . Comput. Electr. Eng., (2021)Application of Lah transform for security and privacy of data through information hiding in telecommunication., , , and . Trans. Emerg. Telecommun. Technol., (2021)Late acceptance hill climbing aided chaotic harmony search for feature selection: An empirical analysis on medical data., , , , and . Expert Syst. Appl., (July 2023)Human activity recognition from sensor data using spatial attention-aided CNN with genetic algorithm., , and . Neural Comput. Appl., 35 (7): 5165-5191 (March 2023)Image contrast improvement through a metaheuristic scheme., , , , and . Soft Comput., 27 (18): 13657-13676 (2023)