Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Digital Certificate-Based Data Access Control Scheme in Blockchain., , , , and . IEEE Access, (2020)Adaptive block-based pixel value differencing steganography., and . Secur. Commun. Networks, 9 (18): 5036-5050 (2016)A Review of Blockchain-based Privacy Computing Research., , , , , and . CSCloud/EdgeCom, page 241-246. IEEE, (2023)Utilizing Machine Learning to Develop Cloud-Based Apprenticeship Programs Aligned with Labor Market Demands., , , and . CSCloud/EdgeCom, page 446-451. IEEE, (2023)Hybrid design for cloud data security using combination of AES, ECC and LSB steganography., and . Int. J. Comput. Sci. Eng., 19 (2): 153-161 (2019)A new text-based w-distance metric to find the perfect match between words., , , , , and . J. Intell. Fuzzy Syst., 38 (3): 2661-2672 (2020)Public watermarking scheme for 3D laser scanned archeological models., , , and . ISCC, page 382-389. IEEE Computer Society, (2012)Three-Dimensional Reconstruction Using Enhanced Shape from Stereo Technique., and . ACIS-ICIS, page 627-632. IEEE Computer Society, (2009)Colored texture classification with support vector machine and wavelet multiresolution analysis.. ISSPIT, page 309-313. IEEE Computer Society, (2015)A novel watermarking algorithm based on characteristics model of local fragmentary images., , , and . Int. J. Embed. Syst., 12 (1): 11-21 (2020)