Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Multiple Watermarking Using Entropy Based Spread Spectrum., , , and . IC3 (1), volume 94 of Communications in Computer and Information Science, page 497-507. Springer, (2010)Detection of copy-move image forgery with efficient block representation and discrete cosine transform., , and . J. Intell. Fuzzy Syst., 35 (5): 5241-5253 (2018)Real Dual Tree Based Feature Variance for Face Recognition., , , and . SocProS (2), volume 131 of Advances in Intelligent and Soft Computing, page 637-647. Springer, (2011)An integrated method of copy-move and splicing for image forgery detection., , , and . Multim. Tools Appl., 77 (20): 26939-26963 (2018)An Effective Video Bootleg Detection Algorithm Based on Noise Analysis in Frequency Domain., , and . CVIP (1), volume 1147 of Communications in Computer and Information Science, page 227-238. Springer, (2019)Multiple watermarking for copyright protection using DWT and dual-tree CWT., , , and . IJIEI, 1 (3/4): 348-369 (2011)DCT-based unique faces for face recognition using Mahalanobis distance., , , and . IITM, page 208-212. ACM, (2010)