Author of the publication

Comments on "efficient SVD speech watermarking with encrypted images".

, , , , and . Multim. Tools Appl., 83 (6): 15617-15628 (February 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Use of Neumann series decomposition to fit the Weighted Euclidean distance and Inner product scoring models in automatic speaker recognition., , and . Pattern Recognit. Lett., (2019)Ambiguity attacks on SVD audio watermarking approach using chaotic encrypted images., , , , and . Multim. Tools Appl., 79 (3-4): 2031-2045 (2020)AES Embedded Hardware Implementation., , , , and . AHS, page 103-109. IEEE Computer Society, (2007)Comments on "efficient SVD speech watermarking with encrypted images"., , , , and . Multim. Tools Appl., 83 (6): 15617-15628 (February 2024)Efficient Path Key Establishment for Wireless Sensor Networks., , and . EURASIP J. Wireless Comm. and Networking, (2008)Efficient Use of UAVs for Public Safety in Disaster and Crisis Management., , and . Wirel. Pers. Commun., 116 (1): 369-380 (2021)Improving Key Distribution forWireless Sensor Networks., , , and . AHS, page 82-88. IEEE Computer Society, (2007)Algerian Modern Colloquial Arabic Speech Corpus (AMCASC): regional accents recognition within complex socio-linguistic environments., , , and . Lang. Resour. Evaluation, 51 (3): 613-641 (2017)Path-Key Establishment for Wireless Sensor Networks., , and . MWCN, page 146-150. IEEE, (2007)Providing security and energy efficiency in wireless ad-hoc sensor networks through Secure Cluster-Head Election (SEC-CH-E)., , and . TSP, page 47-51. IEEE, (2012)