Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-image authentication in frequency domain., and . Int. J. Inf. Commun. Technol., 11 (2): 166-186 (2017)An Authentication Technique in Frequency Domain through Wavelet Transform (ATFDWT), , and . CoRR, (2012)Diffusion and Encryption of Digital Image Using Genetic Algorithm., , and . FICTA (1), volume 327 of Advances in Intelligent Systems and Computing, page 729-736. Springer, (2014)Job Scheduling in Computational Grid Using a Hybrid Algorithm Based on Genetic Algorithm and Particle Swarm Optimization., , and . ICITAM, volume 863 of Studies in Computational Intelligence, page 873-885. Springer, (2019)Imperceptible Image Authentication Using Wavelets., and . Int. J. Netw. Secur., 18 (5): 861-873 (2016)Image Authentication Technique in Frequency Domain based on Discrete Fourier Transformation (IATFDDFT), and . CoRR, (2012)Chaotic Visual Cryptography Based Digitized Document Authentication., , and . Wireless Personal Communications, 96 (3): 3585-3605 (2017)Secured and Imperceptible Data Transmission Through Digital Audio Signal with Reduced Internal Noise., and . Wireless Personal Communications, 100 (2): 505-518 (2018)Innovative Low-Cost Perimeter Security Gadget With In-built Mechanism to Ensure Confidentiality, Authenticity and Non-Repudiation, , , and . International Journal of Computer Networks & Communications (IJCNC), 14 (04): 117-135 (July 2022)Digital signature protocol for visual authentication., , , and . Int. Arab J. Inf. Technol., 16 (4): 712-719 (2019)