Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online word-of-mouth antecedents, attitude and intention-to-purchase electronic products in Pakistan., , , , , and . Telematics and Informatics, 33 (2): 388-400 (2016)A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption., , , , , and . TIIS, 9 (5): 1938-1962 (2015)Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices., , , , , , and . Multimedia Tools Appl., 76 (3): 3519-3536 (2017)A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image., , , , and . Multimedia Tools Appl., 75 (22): 14867-14893 (2016)A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image., , , , and . CoRR, (2015)Multi-grade brain tumor classification using deep CNN with extensive data augmentation., , , , , and . J. Comput. Science, (2019)Erratum to: Video Summarization Based Tele-endoscopy: A Service to Efficiently Manage Visual Data Generated During Wireless Capsule Endoscopy Procedure., , and . J. Medical Systems, 38 (11): 130 (2014)Mobile cloud-assisted paradigms for management of multimedia big data in healthcare systems: Research challenges and opportunities., , , , , and . Int J. Information Management, (2019)Saliency-directed prioritization of visual data in wireless surveillance networks., , , and . Information Fusion, (2015)CNN-based anti-spoofing two-tier multi-factor authentication system., , , , , , , and . Pattern Recognition Letters, (2019)