Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Quantum Encryption and Authentication Framework Integrated with IoT., , , and . Security, Privacy and Trust in the IoT Environment, Springer, (2019)Tamper Proofing Identification and Authenticated DICOM Image Transmission Using Wireless Channels and CR Network., , , , , and . Wirel. Pers. Commun., 97 (4): 5573-5595 (2017)Detecting and Mitigating Selfish Primary Users in Cognitive Radio., , , and . Wirel. Pers. Commun., 109 (2): 1021-1031 (2019)Transreceiving of encrypted medical image - a cognitive approach., , , , , , and . Multim. Tools Appl., 77 (7): 8393-8418 (2018)Hybrid spectrum management using integrated fuzzy and femtocells in cognitive domain., , , and . J. Intell. Fuzzy Syst., 41 (6): 6079-6088 (2021)Uncover the cover to recover the hidden secret - A separable reversible data hiding framework., , , and . Multim. Tools Appl., 80 (13): 19695-19714 (2021)ROI-based medical image watermarking for accurate tamper detection, localisation and recovery., , , , and . Medical Biol. Eng. Comput., 59 (6): 1355-1372 (2021)Triple chaotic image scrambling on RGB - a random image encryption approach., , , and . Secur. Commun. Networks, 8 (18): 3335-3345 (2015)Image encryption through RNA approach assisted with neural key sequences., , , , , , , and . Multim. Tools Appl., 79 (17-18): 12093-12124 (2020)Misconstrued voice on SC-FDMA for secured comprehension - a cooperative influence of DWT and ECC., , , and . Multim. Tools Appl., 81 (5): 7201-7217 (2022)