Author of the publication

Discrete Cosine Transformation Based Image Authentication and Secret Message Transmission Scheme.

, , , , and . CICSyN, page 374-379. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extraction of Features from Signature Image and Signature Verification Using Clustering Techniques., , , and . SUComS, volume 78 of Communications in Computer and Information Science, page 493-503. Springer, (2010)Image feature based high capacity steganographic algorithm., , and . Multimedia Tools Appl., 78 (14): 20019-20036 (2019)Supervised chromosome clustering and image classification., , and . Future Gener. Comput. Syst., 27 (4): 372-376 (2011)Application of Non Compact Trie Structure in Plant Taxonomy., and . CATA, page 145-150. ISCA, (2007)A Secure Scheme for Image Transformation., , , , and . SNPD, page 490-493. IEEE Computer Society, (2008)Discrete Cosine Transformation Based Image Authentication and Secret Message Transmission Scheme., , , , and . CICSyN, page 374-379. IEEE Computer Society, (2009)Refine Crude Corpus for Opinion Mining., , , , , , and . CICSyN, page 17-22. IEEE Computer Society, (2009)Digital Imaging in Pathology towards Detection and Analysis of Human Breast Cancer., , and . CICSyN, page 295-300. IEEE Computer Society, (2010)Identification of Plant Using Leaf Image Analysis., , , and . FGIT-SIP/MulGraB, volume 123 of Communications in Computer and Information Science, page 291-303. Springer, (2010)An improved brain MR image binarization method as a preprocessing for abnormality detection and features extraction., , , and . Frontiers Comput. Sci., 11 (4): 717-727 (2017)