RNN-LSTM-GRU based language transformation

A Khan, A Sarfaraz - Soft Computing, 2019 - Springer
In past, rule-based and statistical machine translation techniques were employed to solve
Urdu transliteration techniques. As mentioned in the literature, Urdu is considered as low …

An efficient privacy preserving protocol for dynamic continuous data collection

H Sajjad, T Kanwal, A Anjum, A Khan, A Khan… - computers & …, 2019 - Elsevier
Past and ongoing decades have witnessed significant uplift in data generation due to ever
growing sources of data. Collection and aggradation of such huge data have triggered …

Highly robust hybrid image watermarking approach using Tchebichef transform with secured PCA and CAT encryption

R Noor, A Khan, A Sarfaraz, Z Mehmood, AM Cheema - soft computing, 2019 - Springer
In the modern era of technology, watermarking plays an important role in embedding of the
copyright information in order to provide authenticity in imperceptible and robust manner. In …

An image authentication and tampered detection scheme exploiting local binary pattern along with hamming error correcting code

P Pal, B Jana, J Bhaumik - Wireless Personal Communications, 2021 - Springer
Abstract Local Binary Pattern (LBP) has been widely used for texture analysis, feature
extraction, visual investigation, pattern matching, and image authentication. It is essential to …

FFT-ETM based distortion less and high payload image steganography

A Khan, A Sarfaraz - Multimedia Tools and Applications, 2019 - Springer
This paper is presenting a novel high capacity based imperceptible and robust image
steganography technique for obscured communication. A considerable literature studied on …

2DOTS-multi-bit-encoding for robust and imperceptible image watermarking

A Khan - Multimedia Tools and Applications, 2021 - Springer
In this article, a new and improvised image watermarking (IW) technique on colored images
is proposed to mitigate robustness and imperceptibility issues found often in the past …

Watermark visibility adjustable RVW scheme for JPEG images

DRD Brabin, JRP Perinbam, D Meganathan - Wireless Personal …, 2020 - Springer
In digital images, visible watermarks are embedded to convey the ownership information
directly to the world so that copyright violations can be prevented. The removable visible …

Watermarking Techniques for Mobile Application: A Review

AA Ghani, SI Hisham, NAA Usop, NBA Warif - International Conference of …, 2021 - Springer
This paper reviewed mobile applications schemes for image watermarking techniques used
to secure user media files. Due to the increase in number of smartphones and Internet …