Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Watermarking-based tamper detection and recovery algorithms for official documents., , , and . CCE, page 1-6. IEEE, (2011)A parallel implementation of multiple secrete image sharing based on Cellular Automata with LSB steganography., , , and . SoMeT, page 191-196. IEEE, (2013)Adaptive hybrid beamforming based on a convex combination of complex stochastic gradient filters., , and . LATINCOM, page 1-6. IEEE, (2015)An Atomic function-based approach of Harris Affine detector., , , and . SoMeT, page 185-189. IEEE, (2013)Copy-Move Forgery Detection Algorithm using Frequency Transforms, SURF and MSER., , , and . IWBF, page 1-6. IEEE, (2019)Iris Image Evaluation for Non-cooperative Biometric Iris Recognition System., , , and . MICAI (2), volume 7095 of Lecture Notes in Computer Science, page 499-509. Springer, (2011)Copyright Protection in Video Distribution Systems by Using a Fast and Robust Watermarking Scheme., , , , and . IEA/AIE, volume 9799 of Lecture Notes in Computer Science, page 409-421. Springer, (2016)A Visible Watermarking with Automated Location Technique for Copyright Protection of Portrait Images., , , , and . IEICE Trans. Inf. Syst., 99-D (6): 1541-1552 (2016)Aedes mosquito detection in its larval stage using deep neural networks., , , , , and . Knowl. Based Syst., (2020)Statistical Assessment of Discrimination Capabilities of a Fractional Calculus Based Image Watermarking System for Gaussian Watermarks., , , , , and . Entropy, 23 (2): 255 (2021)