Author of the publication

Robust watermarking scheme and tamper detection based on threshold versus intensity.

, , , and . J. Innov. Digit. Ecosyst., 2 (1-2): 1-12 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust watermarking scheme and tamper detection based on threshold versus intensity., , , and . J. Innov. Digit. Ecosyst., 2 (1-2): 1-12 (2015)A Hybrid Image Cryptographic and Spatial Digital Watermarking Encryption Technique for Security and Authentication of Digital Images., , , , , and . UKSim, page 322-326. IEEE, (2015)A Hybrid Encryption Technique for Securing Biometric Image Data Based on Feistel Network and RGB Pixel Displacement., , , , , and . SNDS, volume 420 of Communications in Computer and Information Science, page 530-539. Springer, (2014)A New Encryption Cipher for Securing Digital Images of Video Surveillance Devices Using Diffie-Hellman-MD5 Algorithm and RGB Pixel Shuffling., , , and . EMS, page 305-311. IEEE, (2013)New Images Watermarking Scheme Based on Singular Value Decomposition., , , and . J. Inf. Hiding Multim. Signal Process., 4 (1): 9-18 (2013)Concept Lattice and Soft Sets. Application to the Medical Image Analysis., , and . FCA4AI@ECAI, volume 2729 of CEUR Workshop Proceedings, page 121-128. CEUR-WS.org, (2020)A novel robust informed watermarking approach and tamper detection based on weber differential excitation descriptor., , , and . ISPACS, page 194-198. IEEE, (2015)Generating optimal informed and adaptive watermark image based on zero-suppressed binary decision diagrams for medical images., , , and . Int. J. Electron. Secur. Digit. Forensics, 8 (3): 262-284 (2016)Toward a Computational Theory of Conceptual Metaphor., , and . FLAIRS, AAAI Press, (2014)Aspecto-Temporal Meanings Analysed by Combinatory Logic., , and . J. Log. Lang. Inf., 23 (3): 253-274 (2014)