Author of the publication

Self-embedding framework for tamper detection and restoration of color images.

, , , and . Multim. Tools Appl., 81 (13): 18563-18594 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chaos based novel cryptographic technique based on a new logistic map., and . Int. J. Soc. Comput. Cyber Phys. Syst., 2 (1): 73-94 (2017)Underwater image restoration: A state-of-the-art review., , , and . IET Image Process., 15 (2): 269-285 (2021)CESCAL: A joint compression-encryption scheme based on convolutional autoencoder and logistic map., , , and . Multim. Tools Appl., 83 (11): 32069-32098 (March 2024)Embedding in medical images with contrast enhancement and tamper detection capability., , and . Multim. Tools Appl., 80 (2): 2009-2030 (2021)ESEIABS: Energy and spectrum efficient hybrid technique for 5G and beyond networks using interference aware beam selection., , , and . ICT Express, 9 (5): 769-775 (October 2023)Realization of a New Robust and Secure Watermarking Technique Using DC Coefficient Modification in Pixel Domain and Chaotic Encryption., , , and . J. Glob. Inf. Manag., 25 (4): 80-102 (2017)Secure Patient Data Transfer Using Information Embedding and Hyperchaos., and . Sensors, 21 (1): 282 (2021)DWFCAT: Dual Watermarking Framework for Industrial Image Authentication and Tamper Localization., , , , and . IEEE Trans. Ind. Informatics, 17 (7): 5108-5117 (2021)Analysis of Streaming Data Using Big Data and Hybrid Machine Learning Approach., , and . Handbook of Multimedia Information Security, Springer, (2019)Secure patient data transmission on resource constrained platform., , , and . Multim. Tools Appl., 83 (5): 15001-15026 (February 2024)