default search action
Search dblp for Publications
export results for "toc:db/books/collections/SM2019.bht:"
@incollection{DBLP:books/sp/19/0001RSYF19, author = {Muhammad Sharif and Mudassar Raza and Jamal Hussain Shah and Mussarat Yasmin and Steven Lawrence Fernandes}, editor = {Amit Kumar Singh and Anand Mohan}, title = {An Overview of Biometrics Methods}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {15--35}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_2}, doi = {10.1007/978-3-030-15887-3\_2}, timestamp = {Wed, 14 Apr 2021 09:01:34 +0200}, biburl = {https://dblp.org/rec/books/sp/19/0001RSYF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/AfzalJMARM19, author = {Sitara Afzal and Mubashir Javed and Muazzam Maqsood and Farhan Aadil and Seungmin Rho and Irfan Mehmood}, editor = {Amit Kumar Singh and Anand Mohan}, title = {A Segmentation-Less Efficient Alzheimer Detection Approach Using Hybrid Image Features}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {421--429}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_20}, doi = {10.1007/978-3-030-15887-3\_20}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/AfzalJMARM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/Boveiri19, author = {Hamid Reza Boveiri}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Supercomputing with an Efficient Task Scheduler as an Infrastructure for Big Multimedia Processing}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {723--752}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_35}, doi = {10.1007/978-3-030-15887-3\_35}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/19/Boveiri19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/DiwakarK19, author = {Manoj Diwakar and Pardeep Kumar}, editor = {Amit Kumar Singh and Anand Mohan}, title = {3-D Shape Reconstruction Based {CT} Image Enhancement}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {413--419}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_19}, doi = {10.1007/978-3-030-15887-3\_19}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/DiwakarK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/DiwakarK19a, author = {Manoj Diwakar and Pardeep Kumar}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Wavelet Packet Based {CT} Image Denoising Using Bilateral Method and Bayes Shrinkage Rule}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {501--511}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_24}, doi = {10.1007/978-3-030-15887-3\_24}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/DiwakarK19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/GopalakrishnanR19, author = {T. Gopalakrishnan and S. Ramakrishnan}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Performance Analysis of Image Encryption Methods Using Chaotic, Multiple Chaotic and Hyper-Chaotic Maps}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {233--265}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_10}, doi = {10.1007/978-3-030-15887-3\_10}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/GopalakrishnanR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/HosnyD19, author = {Khalid M. Hosny and Mohamed M. Darwish}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Performance Analysis of Invariant Quaternion Moments in Color Image Watermarking}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {167--208}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_8}, doi = {10.1007/978-3-030-15887-3\_8}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/HosnyD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/HurrahPS19, author = {Nasir N. Hurrah and Shabir A. Parah and Javaid A. Sheikh}, editor = {Amit Kumar Singh and Anand Mohan}, title = {A Secure Medical Image Watermarking Technique for E-Healthcare Applications}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {119--141}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_6}, doi = {10.1007/978-3-030-15887-3\_6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/HurrahPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/IqbalMSP19, author = {Nadeem Iqbal and Malik Muhammad Saad Missen and Nadeem Salamat and V. B. Surya Prasath}, editor = {Amit Kumar Singh and Anand Mohan}, title = {On Video Based Human Abnormal Activity Detection with Histogram of Oriented Gradients}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {431--448}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_21}, doi = {10.1007/978-3-030-15887-3\_21}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/IqbalMSP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/JanakiramanTRPA19, author = {Siva Janakiraman and Karuppusamy Thenmozhi and John Bosco Balaguru Rayappan and V. Moorthi Paramasivam and Rengarajan Amirtharajan}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Realization of Chaos-Based Private Multiprocessor Network Via {USART} of Embedded Devices}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {323--340}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_14}, doi = {10.1007/978-3-030-15887-3\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/JanakiramanTRPA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/JaswalNN19, author = {Gaurav Jaswal and Aditya Nigam and Ravinder Nath}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Finger Biometrics for e-Health Security}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {577--617}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_28}, doi = {10.1007/978-3-030-15887-3\_28}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/JaswalNN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/JindalS19, author = {Neeru Jindal and Kulbir Singh}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Digital Image Forensics-Gateway to Authenticity: Crafted with Observations, Trends and Forecasts}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {681--701}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_33}, doi = {10.1007/978-3-030-15887-3\_33}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/JindalS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/Kasana19, author = {Geeta Kasana}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Hybrid Transforms Based Oblivious Fragile Watermarking Techniques}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {143--166}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_7}, doi = {10.1007/978-3-030-15887-3\_7}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/Kasana19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/KoMP19, author = {Hoon Ko and Libor Mesicek and Sung Bum Pan}, editor = {Amit Kumar Singh and Anand Mohan}, title = {{ECG} Security Challenges: Case Study on Change of {ECG} According to Time for User Identification}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {619--628}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_29}, doi = {10.1007/978-3-030-15887-3\_29}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/KoMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/KumarB19, author = {Sanoj Kumar and Gaurav Bhatnagar}, editor = {Amit Kumar Singh and Anand Mohan}, title = {{SIE:} An Application to Secure Stereo Images Using Encryption}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {37--61}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_3}, doi = {10.1007/978-3-030-15887-3\_3}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/KumarB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/KumarPK19, author = {Shailesh Kumar and Shashwat Pathak and Basant Kumar}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Automated Detection of Eye Related Diseases Using Digital Image Processing}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {513--544}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_25}, doi = {10.1007/978-3-030-15887-3\_25}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/KumarPK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/MaselenoOD0I19, author = {Andino Maseleno and Marini Othman and P. Deepalakshmi and K. Shankar and M. Ilayaraja}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Hash Function Based Optimal Block Chain Model for the Internet of Things (IoT)}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {289--300}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_12}, doi = {10.1007/978-3-030-15887-3\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/MaselenoOD0I19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/MehrajKOAJ19, author = {Tehseen Mehraj and Burhan Ul Islam Khan and Rashidah Funke Olanrewaju and Farhat Anwar and Ahmad Zamani Bin Jusoh}, editor = {Amit Kumar Singh and Anand Mohan}, title = {An Adaptive and Viable Face Identification for Android Mobile Devices}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {301--322}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_13}, doi = {10.1007/978-3-030-15887-3\_13}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/MehrajKOAJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/NeelimaS19, author = {Arambam Neelima and Kh. Manglem Singh}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Perceptual Hash Function for Images Based on Hierarchical Ordinal Pattern}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {267--287}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_11}, doi = {10.1007/978-3-030-15887-3\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/NeelimaS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/PreethiL19, author = {D. Preethi and D. Loganathan}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Quantization Table Selection Using Firefly with Teaching and Learning Based Optimization Algorithm for Image Compression}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {473--499}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_23}, doi = {10.1007/978-3-030-15887-3\_23}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/PreethiL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/RajputR19, author = {Amitesh Singh Rajput and Balasubramanian Raman}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Example Based Privacy-Preserving Video Color Grading}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {63--87}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_4}, doi = {10.1007/978-3-030-15887-3\_4}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/RajputR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/Ranjani19, author = {J. Jennifer Ranjani}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Quantum Image Processing and Its Applications}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {395--411}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_18}, doi = {10.1007/978-3-030-15887-3\_18}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/19/Ranjani19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/RashidHP19, author = {Mamoon Rashid and Aamir Hamid and Shabir A. Parah}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Analysis of Streaming Data Using Big Data and Hybrid Machine Learning Approach}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {629--643}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_30}, doi = {10.1007/978-3-030-15887-3\_30}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/RashidHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/SahuSKSK19, author = {Sima Sahu and Harsh Vikram Singh and Basant Kumar and Amit Kumar Singh and Prabhat Kumar}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Image Processing Based Automated Glaucoma Detection Techniques and Role of De-Noising: {A} Technical Survey}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {359--375}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_16}, doi = {10.1007/978-3-030-15887-3\_16}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/SahuSKSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/SahuSKSK19a, author = {Sima Sahu and Harsh Vikram Singh and Basant Kumar and Amit Kumar Singh and Prabhat Kumar}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Enhancement and De-Noising of {OCT} Image by Adaptive Wavelet Thresholding Method}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {449--471}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_22}, doi = {10.1007/978-3-030-15887-3\_22}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/SahuSKSK19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/SaitU0K19, author = {Abdul Rahaman Wahab Sait and J. Uthayakumar and K. Shankar and K. Sathesh Kumar}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Introduction to Multimedia Tools and Applications}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {3--14}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_1}, doi = {10.1007/978-3-030-15887-3\_1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/SaitU0K19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/SaroshPS19, author = {Parsa Sarosh and Shabir A. Parah and Rimsha Sarosh}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Role of Multimedia in Medicine: Study of Visual Prosthesis}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {559--576}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_27}, doi = {10.1007/978-3-030-15887-3\_27}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/SaroshPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/SheikhuPB19, author = {Javaid A. Sheikh and Mehboob ul{-}Amin and Shabir A. Parah and Ghulam Mohiuddin Bhat}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Resource Allocation in Co-Operative Relay Networks for {IOT} Driven Broadband Multimedia Services}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {703--721}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_34}, doi = {10.1007/978-3-030-15887-3\_34}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/SheikhuPB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/Singh19, author = {Ghanshyam Singh}, editor = {Amit Kumar Singh and Anand Mohan}, title = {IoT for Healthcare: System Architectures, Predictive Analytics and Future Challenges}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {753--773}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_36}, doi = {10.1007/978-3-030-15887-3\_36}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/Singh19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/Singh19a, author = {Ghanshyam Singh}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Internet-of-Things with Blockchain Technology: State-of-the Art and Potential Challenges}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {775--795}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_37}, doi = {10.1007/978-3-030-15887-3\_37}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/Singh19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/SinghB19, author = {Satendra Pal Singh and Gaurav Bhatnagar}, editor = {Amit Kumar Singh and Anand Mohan}, title = {A Novel Watermarking Technique for Multimedia Security}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {89--118}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_5}, doi = {10.1007/978-3-030-15887-3\_5}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/SinghB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/SinghN19, author = {Rajiv Singh and Swati Nigam}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Deep Neural Networks for Human Behavior Understanding}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {667--679}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_32}, doi = {10.1007/978-3-030-15887-3\_32}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/SinghN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/SinghP19, author = {Harsh Vikram Singh and Purnima Pal}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Robust and Secure Hiding Scheme for Open Channel Transmission of Digital Images}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {341--356}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_15}, doi = {10.1007/978-3-030-15887-3\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/SinghP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/SinghV19, author = {Harsh Vikram Singh and Sarvesh Kumar Verma}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Detector and Descriptor Based Recognition and Counting of Objects in Real Time Environment}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {545--556}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_26}, doi = {10.1007/978-3-030-15887-3\_26}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/SinghV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/ThankiBT19, author = {Rohit M. Thanki and Surekha Borra and Deven Trivedi}, editor = {Amit Kumar Singh and Anand Mohan}, title = {Security of Biometric and Biomedical Images Using Sparse Domain Based Watermarking Technique}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {209--232}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_9}, doi = {10.1007/978-3-030-15887-3\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/ThankiBT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/TiwariKA19, author = {Shailendra Tiwari and Kavkirat Kaur and K. V. Arya}, editor = {Amit Kumar Singh and Anand Mohan}, title = {A Study on Dictionary Learning Based Image Reconstruction Techniques for Big Medical Data}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {377--393}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_17}, doi = {10.1007/978-3-030-15887-3\_17}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/TiwariKA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/VasanthiK19, author = {K. Vasanthi and N. Bala Kumar}, editor = {Amit Kumar Singh and Anand Mohan}, title = {An Efficient Lung Image Classification Using {GDA} Based Feature Reduction and Tree Classifier}, booktitle = {Handbook of Multimedia Information Security: Techniques and Applications}, pages = {645--666}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3\_31}, doi = {10.1007/978-3-030-15887-3\_31}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/VasanthiK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/19/SM2019, editor = {Amit Kumar Singh and Anand Mohan}, title = {Handbook of Multimedia Information Security: Techniques and Applications}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15887-3}, doi = {10.1007/978-3-030-15887-3}, isbn = {978-3-030-15886-6}, timestamp = {Wed, 14 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/SM2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.