Author of the publication

An audio encryption technique through compressive sensing and Arnold transform.

, , and . Int. J. Trust. Manag. Comput. Commun., 3 (1): 74-92 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Compressive Video Coding for Embedded Camera Sensors: Compressed Domain Motion and Measurements Estimation., and . IEEE Trans. Mob. Comput., 19 (10): 2250-2263 (2020)Nonlinear Cryptosystem Based on QC-LDPC Codes for Enhanced Security and Reliability with Low Hardware Complexity and Reduced Key Size., and . Wirel. Pers. Commun., 96 (3): 4177-4197 (2017)Index Coded PSK Modulation in Vehicle to Vehicle Communication., , , , and . VTC Spring, page 1-6. IEEE, (2021)Audio security through compressive sampling and cellular automata., , and . Multimedia Tools Appl., 74 (23): 10393-10417 (2015)Low Complex System for Physical Layer Security Using NLFG and QCLDPC Code., and . SSCC, volume 467 of Communications in Computer and Information Science, page 313-324. Springer, (2014)SPCOR: a secure and privacy-preserving protocol for mobile-healthcare emergency to reap computing opportunities at remote and nearby., , and . IET Inf. Secur., 14 (6): 670-682 (2020)An audio encryption technique through compressive sensing and Arnold transform., , and . Int. J. Trust. Manag. Comput. Commun., 3 (1): 74-92 (2015)A key management technique based on elliptic curves for static wireless sensor networks., and . Secur. Commun. Networks, 8 (18): 3726-3738 (2015)A novel low-complexity scheme for improving security of NLFG-based symmetric key cryptosystem using secure concatenated RS-QCLDPC code., and . Secur. Commun. Networks, 8 (16): 2888-2900 (2015)Design and implementation of hardware-efficient modified Rao-Nam scheme with high security for wireless sensor networks., , , and . J. Inf. Secur. Appl., (2016)