Author of the publication

Guest Editorial: Robust and Secure Data Hiding Techniques for Telemedicine Applications.

, , , , , , , , and . Multimedia Tools Appl., 76 (5): 7563-7573 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reliability estimation and prediction for extension of exponential distribution using informative and non-informative priors., , and . Int. J. Systems Assurance Engineering and Management, 6 (4): 466-478 (2015)Expected total test time and Bayesian estimation for generalized Lindley distribution under progressively Type-II censored sample where removals follow the Beta-binomial probability law., , and . Applied Mathematics and Computation, (2013)Can face and soft-biometric traits assist in recognition of newborn?, , and . RAIT, page 74-79. IEEE, (2012)Privacy preservation for soft biometrics based multimodal recognition system., and . Computers & Security, (2016)Hybrid BFO and PSO Swarm Intelligence Approach for Biometric Feature Optimization., and . IJSIR, 7 (2): 36-62 (2016)Big data, knowledge co-creation and decision making in fashion industry., , , and . Int J. Information Management, (2018)Real-time recognition of cattle using animal biometrics., , , , and . J. Real-Time Image Processing, 13 (3): 505-526 (2017)Bayesian inference for Poisson-inverse exponential distribution under progressive type-II censoring with binomial removal., , and . Int. J. Systems Assurance Engineering and Management, 9 (6): 1235-1249 (2018)DNA MATRIX, a tool for constructing transcription factor binding sites Weight matrix, , , and . CoRR, (2010)A Short Note on Self-Duality of Goppa Codes on Elliptic and Hyperelliptic Function Fields., and . CoRR, (2019)