Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fault-Tolerant Energy-Efficient Tree in Dynamic WSNs, , and . International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC), 4 (2): 13 (April 2013)Homomorphic encryption systems statement: Trends and challenges., , and . Comput. Sci. Rev., (2020)New Images Watermarking Scheme Based on Singular Value Decomposition., , , and . J. Inf. Hiding Multim. Signal Process., 4 (1): 9-18 (2013)A novel robust informed watermarking approach and tamper detection based on weber differential excitation descriptor., , , and . ISPACS, page 194-198. IEEE, (2015)An Efficient and Robust Hybrid Watermarking Scheme for Text-Images., and . Int. J. Netw. Secur., 18 (6): 1152-1158 (2016)Schur and DCT Decomposition Based Medical Images Watermarking., , and . ES, page 204-210. IEEE, (2018)A blind watermarking approach based on hybrid Imperialistic Competitive Algorithm and SURF points for color Images' authentication., , and . Biomed. Signal Process. Control., (July 2023)Toward a Secure and Robust Medical Image Watermarking in Untrusted Environment., , and . AMLTA, volume 723 of Advances in Intelligent Systems and Computing, page 693-703. Springer, (2018)A Multi-Key Based Lightweight Additive Homomorphic Encryption Scheme., , , and . AI-CSP, page 1-6. IEEE, (2021)Robust and Imperceptible Medical Image Watermarking Based on Dijkstra Algorithm., , , , and . ICFNDS, page 1:1-1:6. ACM, (2019)