Author of the publication

Secured Genetic Algorithm Based Image Hiding Technique with Boolean Functions.

, , , and . Int. J. Netw. Secur., 18 (4): 758-768 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Weighted Location Based LSB Image Steganography Technique., , , , , , and . ACC (2), volume 191 of Communications in Computer and Information Science, page 620-627. Springer, (2011)A Huffman Code Based Image Steganography Technique., , , , and . ICAA, volume 8321 of Lecture Notes in Computer Science, page 257-265. Springer, (2014)Secured Genetic Algorithm Based Image Hiding Technique with Boolean Functions., , , and . Int. J. Netw. Secur., 18 (4): 758-768 (2016)A new (k, n) secret image sharing scheme (SISS)., , , and . Int. Arab J. Inf. Technol., 14 (4): 448-456 (2017)A new contrast enhancement method of retinal images in Diabetic Screening System., , , , , and . ReTIS, page 255-260. IEEE, (2015)Mining Frequent Itemsets Using Genetic Algorithm, , , and . CoRR, (2010)A Tutorial on Different Classification Techniques for Remotely Sensed Imagery Datasets., , , and . Smart Comput. Rev., (2014)Robustness measure of hybrid intra-particle entanglement, discord, and classical correlation with initial Werner state., and . Quantum Inf. Process., 15 (2): 791-807 (2016)A novel technique for image steganography based on Block-DCT and Huffman Encoding, , , and . CoRR, (2010)Image Secret Sharing in Stego-Images with Authentication., , , and . QSHINE, volume 115 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 764-770. Springer, (2013)