Author of the publication

Securing images with a diffusion mechanism based on Fractional Brownian Motion.

, , , , and . J. Inf. Secur. Appl., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Energy-Efficient Routing Scheduling Based on Fuzzy Ranking Scheme for Internet of Things., , , , and . IEEE Internet Things J., 9 (10): 7251-7260 (2022)Comparison of RSH with shape signatures and MACT technique for shape analysis of HIV-1 protein., , , and . CIBCB, page 47-53. IEEE, (2012)A Re-Solving Heuristic with Bounded Revenue Loss for Network Revenue Management with Customer Choice., and . Math. Oper. Res., 37 (2): 313-345 (2012)A latency simulator for many-core systems., , and . SpringSim (ANSS), page 151-158. SCS/ACM, (2011)1-930638-56-6.A Fast Keypoint Based Hybrid Method for Copy Move Forgery Detection., , and . CoRR, (2016)Scheduling and bandwidth allocation for integrated services over DOCSIS cable networks., , and . VCIP, volume 4671 of Proceedings of SPIE, page 993-1005. SPIE, (2002)Low-overhead error-resilient bit-plane image coding., , and . ISCAS (4), page 50-53. IEEE, (1999)Diamond-Shaped Mesh Network Routing with Cross-Layer Design to Explore the Benefits of Multi-Beam Smart Antennas., , , and . ICCCN, page 1-5. IEEE, (2016)A low complexity error recovery technique for wavelet image codecs with inter-subband dependency., and . IEEE Trans. Consumer Electronics, 48 (4): 973-981 (2002)A robust numerical method for singularly perturbed semilinear convection-diffusion problems., and . Neural Parallel & Scientific Comp., 18 (2): 155-166 (2010)