Author of the publication

Guest Editorial: Robust and Secure Data Hiding Techniques for Telemedicine Applications.

, , , , , , , , and . Multimedia Tools Appl., 76 (5): 7563-7573 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient web information retrieval based on usage mining., , , , and . RAIT, page 591-595. IEEE, (2012)Real-time image denoising algorithm in teleradiology systems., and . Real-Time Image Processing, volume 6063 of SPIE Proceedings, page 606304. SPIE, (2006)Handling Data Integrity Issue in SaaS Cloud., , and . FICTA (2), volume 328 of Advances in Intelligent Systems and Computing, page 127-134. Springer, (2014)Load Balancing of Distributed Servers in Distributed File Systems., , , , , , , , and . ICT Innovations, volume 399 of Advances in Intelligent Systems and Computing, page 29-37. Springer, (2015)Combined and Improved Framework of Infrastructure as a Service and Platform as a Service in Cloud Computing., , and . SocProS, volume 236 of Advances in Intelligent Systems and Computing, page 831-839. Springer, (2012)Guest Editorial: Robust and Secure Data Hiding Techniques for Telemedicine Applications., , , , , , , , and . Multimedia Tools Appl., 76 (5): 7563-7573 (2017)