Author of the publication

Image steganography for authenticity of visual contents in social networks.

, , , and . Multimedia Tools Appl., 76 (18): 18985-19004 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On-Line Model Modification for Adaptive Object Recognition., and . ECAI, page 668-672. IOS Press, (2000)Mobile-Cloud Assisted Video Summarization Framework for Efficient Management of Remote Sensing Data Generated by Wireless Capsule Sensors., , and . Sensors, 14 (9): 17112-17145 (2014)Aerial Photo Image Retrieval Using Adaptive Image Classification., , and . KES (3), volume 4253 of Lecture Notes in Computer Science, page 284-291. Springer, (2006)Sequential attention mechanism for weakly supervised video anomaly detection., , , and . Expert Syst. Appl., (November 2023)Activity Recognition Using Temporal Optical Flow Convolutional Features and Multilayer LSTM., , , , and . IEEE Trans. Ind. Electron., 66 (12): 9692-9702 (2019)Adaptive key frame extraction for video summarization using an aggregation mechanism., , and . J. Vis. Commun. Image Represent., 23 (7): 1031-1040 (2012)An intelligent system for complex violence pattern analysis and detection., , , , , , , and . Int. J. Intell. Syst., 37 (12): 10400-10422 (December 2022)Adaptive image data hiding using transformation and error replacement., , , and . Multim. Tools Appl., 73 (2): 825-840 (2014)Determining speaker attributes from stress-affected speech in emergency situations with hybrid SVM-DNN architecture., , , , , and . Multim. Tools Appl., 77 (4): 4883-4907 (2018)Efficient Fire Detection for Uncertain Surveillance Environment., , , , and . IEEE Trans. Ind. Informatics, 15 (5): 3113-3122 (2019)