Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Substitution box generation using Chaos: An image encryption application., , , , and . Appl. Math. Comput., (2018)Cipher image damage and decisions in real time., , , , , and . J. Electronic Imaging, 24 (1): 013012 (2015)Handwritten Digit Classification Based on Alpha-Beta Associative Model., , , and . CIARP, volume 5197 of Lecture Notes in Computer Science, page 437-444. Springer, (2008)A Novel Approach to Automatic Color Matching., , , and . CIARP, volume 4225 of Lecture Notes in Computer Science, page 529-538. Springer, (2006)Images encryption using AES and variable permutations., , , , and . CoRR, (2014)Melanoma Detection in Dermoscopic Images Using a Cellular Automata Classifier., , , , and . Comput., 11 (1): 8 (2022)Cipher Image Damage: An Application of Filters., , , and . Polibits, (2015)Cryptosystem Based on the Elliptic Curve With a High Degree of Resistance to Damage on the Encrypted Images., , , , and . IEEE Access, (2020)Una evidencia robusta de que el algoritmo DES fortalecido con una permutación inicial variable es eficiente., , , and . Computación y Sistemas, (2012)The Substitution-Boxes Incompatibility in JPEG Image Encryption., , , and . DSC, page 1-7. IEEE, (2023)