Author of the publication

Medical image watermarking for copyright protection based on Visual Cryptography.

, , , and . ICMCS, page 93-98. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Method for Fall Detection of Elderly Based on Human Shape and Motion Variation., , , and . ISVC (2), volume 10073 of Lecture Notes in Computer Science, page 156-167. Springer, (2016)Multi-model Approach for Multicomponent Texture Classification., , , and . ICISP, volume 7340 of Lecture Notes in Computer Science, page 36-44. Springer, (2012)Blind Invisible Watermarking Technique in DT-CWT Domain Using Visual Cryptography., , , and . ICIAP (1), volume 8156 of Lecture Notes in Computer Science, page 813-822. Springer, (2013)Blind Separation of Cyclo-stationary Signals using Generalized Eigenvalue Approach., , and . ICECS, page 689-692. IEEE, (2007)Empirical eigenanalysis of indoor UWB propagation channels., , , and . GLOBECOM, page 3215-3219. IEEE, (2004)DP and RL Approach Optimization for Embedded System Communications with Energy Harvesting., , and . I4CS, volume 717 of Communications in Computer and Information Science, page 167-182. Springer, (2017)3D Recognition Using Neural Networks., , , and . Computer and Information Science, 5 (2): 105-110 (2012)Low-Rankness Transfer for Realistic Denoising., , and . IEEE Trans. Image Processing, 25 (12): 5768-5779 (2016)Adaptive quantization based on saliency map at frame level of H.264/AVC rate control scheme., , , , and . EUVIP, page 61-66. IEEE, (2011)Performance Analysis of Fountain Codes in Wireless Body Area Networks., , and . SENSORNETS, page 45-49. SciTePress, (2016)