default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 38 matches
- 2019
- Muhammad Sharif, Mudassar Raza, Jamal Hussain Shah, Mussarat Yasmin, Steven Lawrence Fernandes:
An Overview of Biometrics Methods. Handbook of Multimedia Information Security 2019: 15-35 - Sitara Afzal, Mubashir Javed, Muazzam Maqsood, Farhan Aadil, Seungmin Rho, Irfan Mehmood:
A Segmentation-Less Efficient Alzheimer Detection Approach Using Hybrid Image Features. Handbook of Multimedia Information Security 2019: 421-429 - Hamid Reza Boveiri:
Supercomputing with an Efficient Task Scheduler as an Infrastructure for Big Multimedia Processing. Handbook of Multimedia Information Security 2019: 723-752 - Manoj Diwakar, Pardeep Kumar:
3-D Shape Reconstruction Based CT Image Enhancement. Handbook of Multimedia Information Security 2019: 413-419 - Manoj Diwakar, Pardeep Kumar:
Wavelet Packet Based CT Image Denoising Using Bilateral Method and Bayes Shrinkage Rule. Handbook of Multimedia Information Security 2019: 501-511 - T. Gopalakrishnan, S. Ramakrishnan:
Performance Analysis of Image Encryption Methods Using Chaotic, Multiple Chaotic and Hyper-Chaotic Maps. Handbook of Multimedia Information Security 2019: 233-265 - Khalid M. Hosny, Mohamed M. Darwish:
Performance Analysis of Invariant Quaternion Moments in Color Image Watermarking. Handbook of Multimedia Information Security 2019: 167-208 - Nasir N. Hurrah, Shabir A. Parah, Javaid A. Sheikh:
A Secure Medical Image Watermarking Technique for E-Healthcare Applications. Handbook of Multimedia Information Security 2019: 119-141 - Nadeem Iqbal, Malik Muhammad Saad Missen, Nadeem Salamat, V. B. Surya Prasath:
On Video Based Human Abnormal Activity Detection with Histogram of Oriented Gradients. Handbook of Multimedia Information Security 2019: 431-448 - Siva Janakiraman, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, V. Moorthi Paramasivam, Rengarajan Amirtharajan:
Realization of Chaos-Based Private Multiprocessor Network Via USART of Embedded Devices. Handbook of Multimedia Information Security 2019: 323-340 - Gaurav Jaswal, Aditya Nigam, Ravinder Nath:
Finger Biometrics for e-Health Security. Handbook of Multimedia Information Security 2019: 577-617 - Neeru Jindal, Kulbir Singh:
Digital Image Forensics-Gateway to Authenticity: Crafted with Observations, Trends and Forecasts. Handbook of Multimedia Information Security 2019: 681-701 - Geeta Kasana:
Hybrid Transforms Based Oblivious Fragile Watermarking Techniques. Handbook of Multimedia Information Security 2019: 143-166 - Hoon Ko, Libor Mesicek, Sung Bum Pan:
ECG Security Challenges: Case Study on Change of ECG According to Time for User Identification. Handbook of Multimedia Information Security 2019: 619-628 - Sanoj Kumar, Gaurav Bhatnagar:
SIE: An Application to Secure Stereo Images Using Encryption. Handbook of Multimedia Information Security 2019: 37-61 - Shailesh Kumar, Shashwat Pathak, Basant Kumar:
Automated Detection of Eye Related Diseases Using Digital Image Processing. Handbook of Multimedia Information Security 2019: 513-544 - Andino Maseleno, Marini Othman, P. Deepalakshmi, K. Shankar, M. Ilayaraja:
Hash Function Based Optimal Block Chain Model for the Internet of Things (IoT). Handbook of Multimedia Information Security 2019: 289-300 - Tehseen Mehraj, Burhan Ul Islam Khan, Rashidah Funke Olanrewaju, Farhat Anwar, Ahmad Zamani Bin Jusoh:
An Adaptive and Viable Face Identification for Android Mobile Devices. Handbook of Multimedia Information Security 2019: 301-322 - Arambam Neelima, Kh. Manglem Singh:
Perceptual Hash Function for Images Based on Hierarchical Ordinal Pattern. Handbook of Multimedia Information Security 2019: 267-287 - D. Preethi, D. Loganathan:
Quantization Table Selection Using Firefly with Teaching and Learning Based Optimization Algorithm for Image Compression. Handbook of Multimedia Information Security 2019: 473-499 - Amitesh Singh Rajput, Balasubramanian Raman:
Example Based Privacy-Preserving Video Color Grading. Handbook of Multimedia Information Security 2019: 63-87 - J. Jennifer Ranjani:
Quantum Image Processing and Its Applications. Handbook of Multimedia Information Security 2019: 395-411 - Mamoon Rashid, Aamir Hamid, Shabir A. Parah:
Analysis of Streaming Data Using Big Data and Hybrid Machine Learning Approach. Handbook of Multimedia Information Security 2019: 629-643 - Sima Sahu, Harsh Vikram Singh, Basant Kumar, Amit Kumar Singh, Prabhat Kumar:
Image Processing Based Automated Glaucoma Detection Techniques and Role of De-Noising: A Technical Survey. Handbook of Multimedia Information Security 2019: 359-375 - Sima Sahu, Harsh Vikram Singh, Basant Kumar, Amit Kumar Singh, Prabhat Kumar:
Enhancement and De-Noising of OCT Image by Adaptive Wavelet Thresholding Method. Handbook of Multimedia Information Security 2019: 449-471 - Abdul Rahaman Wahab Sait, J. Uthayakumar, K. Shankar, K. Sathesh Kumar:
Introduction to Multimedia Tools and Applications. Handbook of Multimedia Information Security 2019: 3-14 - Parsa Sarosh, Shabir A. Parah, Rimsha Sarosh:
Role of Multimedia in Medicine: Study of Visual Prosthesis. Handbook of Multimedia Information Security 2019: 559-576 - Javaid A. Sheikh, Mehboob ul-Amin, Shabir A. Parah, Ghulam Mohiuddin Bhat:
Resource Allocation in Co-Operative Relay Networks for IOT Driven Broadband Multimedia Services. Handbook of Multimedia Information Security 2019: 703-721 - Ghanshyam Singh:
IoT for Healthcare: System Architectures, Predictive Analytics and Future Challenges. Handbook of Multimedia Information Security 2019: 753-773 - Ghanshyam Singh:
Internet-of-Things with Blockchain Technology: State-of-the Art and Potential Challenges. Handbook of Multimedia Information Security 2019: 775-795
skipping 8 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-21 23:17 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint