RNN-LSTM-GRU based language transformation
A Khan, A Sarfaraz - Soft Computing, 2019 - Springer
In past, rule-based and statistical machine translation techniques were employed to solve
Urdu transliteration techniques. As mentioned in the literature, Urdu is considered as low …
Urdu transliteration techniques. As mentioned in the literature, Urdu is considered as low …
An efficient privacy preserving protocol for dynamic continuous data collection
Past and ongoing decades have witnessed significant uplift in data generation due to ever
growing sources of data. Collection and aggradation of such huge data have triggered …
growing sources of data. Collection and aggradation of such huge data have triggered …
Highly robust hybrid image watermarking approach using Tchebichef transform with secured PCA and CAT encryption
In the modern era of technology, watermarking plays an important role in embedding of the
copyright information in order to provide authenticity in imperceptible and robust manner. In …
copyright information in order to provide authenticity in imperceptible and robust manner. In …
An image authentication and tampered detection scheme exploiting local binary pattern along with hamming error correcting code
Abstract Local Binary Pattern (LBP) has been widely used for texture analysis, feature
extraction, visual investigation, pattern matching, and image authentication. It is essential to …
extraction, visual investigation, pattern matching, and image authentication. It is essential to …
FFT-ETM based distortion less and high payload image steganography
A Khan, A Sarfaraz - Multimedia Tools and Applications, 2019 - Springer
This paper is presenting a novel high capacity based imperceptible and robust image
steganography technique for obscured communication. A considerable literature studied on …
steganography technique for obscured communication. A considerable literature studied on …
2DOTS-multi-bit-encoding for robust and imperceptible image watermarking
A Khan - Multimedia Tools and Applications, 2021 - Springer
In this article, a new and improvised image watermarking (IW) technique on colored images
is proposed to mitigate robustness and imperceptibility issues found often in the past …
is proposed to mitigate robustness and imperceptibility issues found often in the past …
Watermark visibility adjustable RVW scheme for JPEG images
DRD Brabin, JRP Perinbam, D Meganathan - Wireless Personal …, 2020 - Springer
In digital images, visible watermarks are embedded to convey the ownership information
directly to the world so that copyright violations can be prevented. The removable visible …
directly to the world so that copyright violations can be prevented. The removable visible …
Watermarking Techniques for Mobile Application: A Review
This paper reviewed mobile applications schemes for image watermarking techniques used
to secure user media files. Due to the increase in number of smartphones and Internet …
to secure user media files. Due to the increase in number of smartphones and Internet …