Author of the publication

A robust watermarking scheme exploiting balanced neural tree for rightful ownership protection.

, , and . Multim. Tools Appl., 72 (3): 2225-2248 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation of CNN on Zynq based FPGA for Real-time Object Detection., , and . ICCCNT, page 1-7. IEEE, (2019)An improved Crow Search Algorithm for high-dimensional problems., , and . J. Intell. Fuzzy Syst., 33 (6): 3597-3614 (2017)Neuro-fuzzy based estimation of rotor flux for Electric Vehicle operating under partial loading., , and . J. Intell. Fuzzy Syst., 41 (5): 5653-5663 (2021)Standalone operation of wind turbine operated self excited induction generator., and . RAIT, page 321-325. IEEE, (2016)Robust adaptive fuzzy controller applied to double inverted pendulum., , and . J. Intell. Fuzzy Syst., 32 (5): 3669-3687 (2017)A robust watermarking scheme exploiting balanced neural tree for rightful ownership protection., , and . Multim. Tools Appl., 72 (3): 2225-2248 (2014)A balanced neural tree for pattern classification., , , and . Neural Networks, (2012)Soft sensor for inferential control in non-isothermal CSTR., , , and . ICACCI, page 1785-1790. IEEE, (2016)Human Action Recognition using a Hybrid NTLD Classifier., , , and . AVSS, page 262-269. IEEE Computer Society, (2010)Image Encryption Using Chaotic 3-D Arnold's Cat Map and Logistic Map., , and . CVIP (2), volume 704 of Advances in Intelligent Systems and Computing, page 365-378. Springer, (2017)