Author of the publication

A novel image hiding approach based on correlation analysis for secure multimodal biometrics.

, , , , , and . J. Netw. Comput. Appl., 33 (3): 247-257 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Two-Stage Region-Based Image Retrieval Approach Using Combined Color and Texture Features., , , , and . Australian Conference on Artificial Intelligence, volume 4304 of Lecture Notes in Computer Science, page 1010-1014. Springer, (2006)A modified FCM algorithm for MRI brain image segmentation using both local and non-local spatial constraints., , , , and . Comput. Medical Imaging Graph., 32 (8): 685-698 (2008)Implementation of Electromagnetic Scattering From Conductors., , , and . PPSC, page 216-220. SIAM, (1993)Jackknife Empirical Likelihood for the Accelerated Failure Time Model with Censored Data., , and . Communications in Statistics - Simulation and Computation, 44 (7): 1818-1832 (2015)Flexible Goal Recognition via Graph Construction and Analysis., , and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 1118-1127. Springer, (2005)Segmentation of 3-D MRI Brain Images Using Information Propagation., , , , and . MIAR, volume 4091 of Lecture Notes in Computer Science, page 348-355. Springer, (2006)A Novel Color Image Watermarking Method Based on Genetic Algorithm and Hybrid Neural Networks., , , , and . RSCTC, volume 4259 of Lecture Notes in Computer Science, page 806-814. Springer, (2006)A Fast and Robust Personal Identification Approach Using Handprint., , , , and . MRCS, volume 4105 of Lecture Notes in Computer Science, page 175-182. Springer, (2006)A Novel Color Image Watermarking Method Based on Genetic Algorithm and Neural Networks., , , , and . ICONIP (3), volume 4234 of Lecture Notes in Computer Science, page 225-233. Springer, (2006)Content-Based Biometric Image Hiding Approach., , , , and . Int. J. Pattern Recognit. Artif. Intell., 25 (4): 565-581 (2011)