Title | Published in | Published on | Published by | Role | Details |
Context Pixel-based Reversible Data Hiding Scheme using
Pixel Value Ordering | The Visual Computer | Jul, 2023 | Springer | Co-Author,Corresponding Author |
Impact Factor: 3.50000
Indexing: SCOPUS, SCIE
Article's Web Link:
|
Reference Pixel-Based Reversible Data Hiding Scheme Using Multi-Level Pixel Value Ordering | Multimedia Tools and Applications, Springer | Jul, 2023 | Springer | Co-Author,Corresponding Author |
Impact Factor: 3.60000
Indexing: SCOPUS, SCIE
Article's Web Link:
|
Robust Data Hiding Scheme for Highly Compressed Image Exploiting BTC with Hamming Code | Multimedia Tools and Applications
10.1007/s11042-023-15727-w | Apr, 2023 | Springer | Co-Author,Corresponding Author |
Impact Factor: 3.60000
Indexing: SCOPUS, SCIE
Article's Web Link:
|
Aspect based sentiment analysis using multi-criteria decision-making and deep learning under COVID-19 pandemic in India | CAAI Transactions on Intelligence Technology | Oct, 2022 | The Institute of Engineering and Technology | Co-Author |
Impact Factor: 7.98500
Indexing: SCOPUS
Article's Web Link: https://doi.org/10.1049/cit2.12144
|
Fuzzy Proximity based Robust Data Hiding
Scheme with Interval Threshold | Soft Computing | Oct, 2022 | Springer | Corresponding Author |
Impact Factor: 3.73200
Indexing: SCI
Article's Web Link: https://doi.org/10.1007/s00500-022-07552-4
|
Reversible Data Hiding Scheme
Exploiting Center Folding with Fuzzy Weight Strategy | Journal of Information Security and Applications (JISA) , Volume 69, September 2022, 103276 | Jul, 2022 | Elsevier | Corresponding Author |
Impact Factor: 4.96000
Indexing: SCI
Article's Web Link: https://doi.org/10.1016/j.jisa.2022.103276
|
A Dual Image Based Data Hiding Scheme Based on Difference of Pixel Values in Integer Wavelet Transform Domain | CICBA | Jul, 2022 | Springer | |
Impact Factor: 0.00000
Indexing:
Article's Web Link:
|
Robust data hiding scheme through distinct keypoint selection exploiting modified Bilateral-Laplacian SIFT with encoding pipeline | Displays 74(1):102268 | Jul, 2022 | Elsevier | Corresponding Author |
Impact Factor: 3.07400
Indexing: SCOPUS, SCI
Article's Web Link: 10.1016/j.displa.2022.102268
|
Application of type-2 defuzzification method to solve profit
maximization solid transportation problem considering carbon emission | International
Journal of Information and Management Sciences (IJIMS) | Jun, 2022 | International
Journal of Information and Management Sciences (IJIMS) | Corresponding Author |
Impact Factor: 0.00000
Indexing: SCOPUS
Article's Web Link:
|
Fuzzy Logic with Superpixel-Based Block Similarity Measures for Secured Data Hiding Scheme | https://doi.org/10.1007/978-981-19-0105-8_44 | Jun, 2022 | Lecture Notes in Networks and Systems, vol 404. Springer, Singapore. https://doi.org/10.1007/978-981-19-0105-8_44 | Corresponding Author |
Impact Factor: 0.00000
Indexing: SCOPUS
Article's Web Link: https://doi.org/10.1080/19393555.2021.1956023
|
Two-layers robust data hiding
scheme for highly compressed image exploiting AMBTC with difference expansion | Journal of King Saud University - Computer and Information Sciences
Volume 34, Issue 8, Part A, September 2022, Pages 5240-5260 | May, 2022 | Elsevier | Corresponding Author |
Impact Factor: 9.00600
Indexing: SCOPUS, SCI
Article's Web Link: https://doi.org/10.1016/j.jksuci.2022.05.013
|
Active Queue Management in RED Considering
Critical Point on Target Queue | Journal of Interconnection Networks, Vol. 21, No. 03, 2150017 (2021) | 2021 | World Scientific Publishing Co Pte Ltd | Co-Author |
Impact Factor: 0.00000
Indexing: SCOPUS
Article's Web Link: https://doi.org/10.1142/S0219265921500171
|
A new DCT based robust image watermarking scheme using cellular automata | Information Security Journal: A Global Perspective
Volume 31, 2022 - Issue 5 | 2021 | Taylor and Francis | Corresponding Author |
Impact Factor: 0.00000
Indexing: SCOPUS
Article's Web Link: https://doi.org/10.1080/19393555.2021.1956023
|
FCSTP with possibility and expected value approaches in hybrid uncertain environments | TWMSJournal Of Applied And Engineering Mathematics, 11(4), 998-1011. | 2021 | TWMS Journal Of Applied And Engineering Mathematics | Co-Author |
Impact Factor: 0.00000
Indexing: SCOPUS
Article's Web Link: https://hdl.handle.net/11729/3249 http://jaem.isikun.edu.tr/web/index.php/archive/113-vol11-no4/759
|
An Image Authentication and Tampered Detection Scheme Exploiting Local Binary Pattern Along with Hamming Error Correcting Code | Wireless Personal Communications | Issue 1/2021 | 2021 | Springer | Corresponding Author |
Impact Factor: 0.00000
Indexing: SCOPUS
Article's Web Link: https://www.springerprofessional.de/en/an-image-authentication-and-tampered-detection-scheme-exploiting/19291660
|
Application of fuzzy logic based GA and PSO to solve 4D multi-item transportation problem for substitute and complementary items | Evolutionary Intelligence volume 15, pages 2187–2206 (2022) | 2021 | Springer Nature | Co-Author,Corresponding Author |
Impact Factor: 2.60000
Indexing: SCOPUS, SCIE
Article's Web Link: https://doi.org/10.1007/s12065-021-00630-w
|
Application of Fuzzy Logic based GA and PSO to solve 4D Multi-item transportation problem for substitute and complementary items | Evolutionary Intelligence , 15, pages 2187–2206 (2022) | 2021 | Springer | Corresponding Author |
Impact Factor: 2.57700
Indexing: SCOPUS, SCI
Article's Web Link: https://doi.org/10.1007/s12065-021-00630-w
|
Improving the Reversible LSB MatchingScheme Based on the Likelihood Re-encoding Strategy | Entropy, 23(5), 577. | 2021 | Entropy | Co-Author |
Impact Factor: 2.52400
Indexing: SCOPUS
Article's Web Link: https://doi.org/10.3390/e23050577
|
A secure reversible color image watermarking scheme based on LBP, lagrange interpolation polynomial and weighted matrix | Multimedia Tools and Applications | 2021 | Springer | Corresponding Author |
Impact Factor: 2.57700
Indexing: SCOPUS, SCI
Article's Web Link: https://doi.org/10.1007/s11042-021-10651-3
|
Application of Dynamic Weight
with Distance to Reduce Packet Loss in RED based Algorithm | EAIT-2020 | 2021 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
Comparative analysis of bio-
inspired dragonfly and honeybee algorithm-based routing protocols with the ant colony
algorithm for MANET | EAIT-2020 | 2021 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
A Nobel Congestion Control Algorithm Using Buffer
Occupancy RED | CIPR-2021 | 2021 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
A Novel Data Hiding Technique Based on
QR Code Decomposition in Transform Domain | CIPR-2021 | 2021 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
A Predictable Active Queue Management to Reduce Sensitivity of RED Parameter | International Journal of Engineering &Technology | 2020 | Science Publishing Corporation, Dubai, UAE | |
Impact Factor: 0.00000
Indexing:
Article's Web Link:
|
Superpixel based Robust Reversible
Data Hiding Scheme Exploiting Arnold Transform with DCT and CA | Journal
of King Saud University - Computer and Information Sciences | 2020 | Elsevier | |
Impact Factor:
Indexing:
Article's Web Link:
|
Improved center-folding based directional pixel value
ordering for reversible data hiding scheme | Multimedia Tools and Applications | 2020 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
Improved center folding based directional pixel value
ordering for reversible data hiding scheme | Multimedia Tools and Applications | 2020 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
Application of random triangular and Gaussian
type-2 fuzzy variable to solve fixed charge multi-item four-dimensional transportation
problem | Applied Soft Computing | 2020 | Elsevier | |
Impact Factor:
Indexing:
Article's Web Link:
|
A Survey to Analyse
Routing Algorithms for Opportunistic Network | Procedia Computer Science | 2020 | Elsevier | |
Impact Factor:
Indexing:
Article's Web Link:
|
A New Efficient Swarm-based
Routing Protocol for MANET Exploiting DRAGONFLY with HONEY BEE | VCIPECH-2020 | 2020 | KIET Group of Institutions Ghaziabad | |
Impact Factor:
Indexing:
Article's Web Link:
|
Hiding data in dual color images reversibly via weighted matrix | Journal of Information Security and Applications,50,2020 | 2020 | Elsevier | |
Impact Factor:
Indexing:
Article's Web Link:
|
Robust
Watermarking scheme for compressed image through DCT exploiting Superpixel and
Arnold transform | Conference Proceeding | 2020 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
Multi-Sensor Tracking Simulator Design and its
Challenges | Conference Proceeding | 2020 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
Weighted matrix based random data hiding scheme within a pair of interpolated image | Conference Proceeding | 2020 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
Multiple Radar Data Fusion to Improve the Accuracy in Position Measurement Basedon K-means Algorithm | Conference Proceeding | 2020 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
High Payload RDH Through Directional PVO Exploiting Center-
Folding Strategy. | Conference Proceeding | 2020 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
A
Robust Audio Authentication Scheme Using (11,7) Hamming Error Correcting Code. | Conference Proceeding | 2020 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
Authentication
on Interpolated Sub-Sampled based Image Steganography Exploiting Secret Sharing. | Conference Proceeding | 2020 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
Center-Symmetric
Local Binary Pattern-Based Image Authentication Using Local and Global Features
Vector. | Advances in Intelligent Systems and Computing | 2020 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
Data Hiding Based on
Decagon-Shaped Shell | Advances in Intelligent Systems and Computing | 2020 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
A New Repeated Pixel Value Difference-Based Steganographic Scheme with Overlapped Pixel | Intelligent Computing: Image Processing Based Applications, | 2020 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
Application of fuzzy programming techniques to solve solid transportation problem with additional constraints | Operations Research And Decisions | 2020 | Operations Research And Decisions | |
Impact Factor:
Indexing:
Article's Web Link:
|
Fake Image and News Detection on Social Media ThroughTrust-ware Based Community Portal | Conference Proceeding | 2019 | YSC-2019 | |
Impact Factor:
Indexing:
Article's Web Link:
|
FC 4D MITPs in Crisp and Rough Environments for Substitutable and Complementary Items with Budget Constraints | MDPI-mathematics. Mathematics 7, no. 3 (2019): 281, IF-1.105 (SCI Journal) | 2019 | MDPI | |
Impact Factor:
Indexing:
Article's Web Link:
|
A Novel Method for High Capacity Reversible Data Hiding Scheme Using Difference Expansion | International Journal of Natural Computing Research (IJNCR), IGI Global. | 2019 | IGI Global. | |
Impact Factor:
Indexing:
Article's Web Link:
|
Robust Watermarking Scheme for Tamper
Detection and Authentication Exploiting Cellular Automata | IET Image Processing, IEEE, DOI: 10.1049/iet-ipr.2018.6638 | 2019 | IEEE | |
Impact Factor:
Indexing:
Article's Web Link:
|
Directional Pixel Value Ordering Based Secret Sharing Using Sub-Sampled Image Exploiting Lagrange Polynomial | DOI :10.1007/s42452-019-0659-1, SN Applied Sciences, Springer | 2019 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
A Method of Building Ontology Based Information knowledgebase | International Journal of Computer Sciences and Engineering (IJCSE), 7(1), Jan 2019 | 2019 | IJCSE, (UGC Approved) | |
Impact Factor:
Indexing:
Article's Web Link:
|
Pixel Value Ordering with Prediction Error Expansion Based High Fidelity Reversible Data Hiding Scheme | International Journal of Applied Engineering Research (IJAER), 14(4), (2019) pp. 998-1006 | 2019 | IJAER, (UGC Approved) | |
Impact Factor:
Indexing:
Article's Web Link:
|
Watermarking Scheme using LBP for Image Authentication and Tamper Detection through dual image | Security and Privacy, Wiley Online Library | 2019 | Wiley Online Library | |
Impact Factor:
Indexing:
Article's Web Link:
|
A robust reversible data hiding scheme for Color Image using Reed-Solomon Code | Multimedia Tools and Application (MTA), Springer, 2019 | 2019 | Springer, (IF-1.541) | |
Impact Factor:
Indexing:
Article's Web Link:
|
LFSR-based Multi-ant Cellular Automation and Chaotic Map based Image Encryption | Security and Privacy, Wiley Online Library, 1(6), e52 | 2019 | Wiley Online Library. | |
Impact Factor:
Indexing:
Article's Web Link:
|
Copy Move Forgery Detection through Graph Neighborhood Degree | International Journal of Applied Engineering Research (IJAER), 13(18), pp. 13421-13427 | 2018 | IJAER, (UGC Approved) | |
Impact Factor:
Indexing:
Article's Web Link:
|
Improved data hiding capacity through repeated embedding using modified weighted matrix for color image | International Journal of Computers and Applications (IJCA) | 2018 | Taylor and Francis | |
Impact Factor:
Indexing:
Article's Web Link:
|
Weighted matrix based reversible watermarking scheme using color image | Multimedia Tools and Application (MTA), Springer | 2018 | Springer (IF-1.530) | |
Impact Factor:
Indexing:
Article's Web Link:
|
Directional PVO for Reversible Data Hiding Scheme withImage Interpolation | Multimedia Tools and Application (MTA), Springer | 2018 | Springer (IF-1.530) | |
Impact Factor:
Indexing:
Article's Web Link:
|
Secured Steganographic Scheme For Highly Compressed Color Image Using Weighted Matrix Through DCT | International Journal of Computers and Applications (IJCA) | 2018 | Taylor & Francis | |
Impact Factor:
Indexing:
Article's Web Link:
|
Analysis of Factors and their Impacts in Measurement Accuracy and Prioritization of Radars | International Journal of Research and Analytical Reviews (IJRAR), 5(4), December 2018 | 2018 | IJRAR, (UGC Approved) | |
Impact Factor:
Indexing:
Article's Web Link:
|
Analysis of Factors and their Impacts in Measurement Accuracy and Prioritization of Radars | International Journal of Research and Analytical Reviews (IJRAR),, Vol-5, Issue-4, December 2018, pp- 548-554. (UGC Approved). | 2018 | IJRAR | |
Impact Factor:
Indexing:
Article's Web Link:
|
Reversible Data Hiding Scheme Using Sub-Sampled ImageExploiting Lagrange’s Interpolating Polynomial | Multimedia Tools and Application (MTA), Springer. | 2017 | Springer (IF-1.530) | |
Impact Factor:
Indexing:
Article's Web Link:
|
Reversible Watermarking Scheme Using PVD-DE | Proceedings of the International Conference at Calcutta Business School, Kolkata on March 24-25, 2017 | 2017 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
Extended Directional IPVO for Reversible Data Hiding Scheme | Proceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) was held in Haldia, India during November 2-3, 2017 | 2017 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
Representation and Exploring the Semantic Organization of Bangla Word in theMental Lexicon: Evidence from Cross-modal Priming Experiments and VectorSpace Model | Proceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) was held in Haldia, India during November 2-3, 2017 | 2017 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
High Capacity Reversible Data Hiding Scheme Using Dual Color Image through(7, 4) Hamming Code | Proceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) was held in Haldia, India during November 2-3, 2017 | 2017 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
Hamming code based watermarking scheme for Image Authentication andTampered detection | Proceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) will be held in Haldia, India during November 2-3, 2017 | 2017 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
Exploring the semantic organization of Bangla words in the mental
lexicon | Procedia Computer Science 115 (2017) 556–562 | 2017 | Procedia Computer Science , Elsevier | |
Impact Factor:
Indexing:
Article's Web Link:
|
Partial reversible data hiding scheme using (7, 4) hamming code | Multimedia Tools and Application, Springer, 1-16 | 2016 | Springer (IF-1.530) | |
Impact Factor:
Indexing:
Article's Web Link:
|
Dual Image Based Reversible Data Hiding Scheme Using (7,4) Hamming Code | Multimedia Tools and Application, Springer. 1-23 | 2016 | Springer (IF-1.530) | |
Impact Factor:
Indexing:
Article's Web Link:
|
Dual Image based Reversible Data Hiding Scheme Using Pixel Value Difference With Exploiting Modification Direction | Proceedings of the First International Conference on Intelligent Computing and Communication Volume 458 of the series Advances in Intelligent Systems and Computing, Pages 549-557 | 2016 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
Dual Image based Reversible Data Hiding Scheme using Weighted Matrix | Int. J. of Electronics and Information Engineering, Vol.5, No.1, PP.6-19, Sept. 2016, DOI: 10.6636/IJEIE.201609.5(1).02) | 2016 | IJEIE | |
Impact Factor:
Indexing:
Article's Web Link:
|
High payload reversible data hiding scheme using weighted matrix | Optik -International Journal for Light and Electron Optics, 127(6), 3347-3358, http://dx.doi.org/10.1016/j.ijleo.2015.12.055 | 2016 | Elsevier (Impact Factor: 0.677) | |
Impact Factor:
Indexing:
Article's Web Link:
|
Dual-Image Based Reversible Data Hiding Scheme Using Pixel Value Difference Expansion | International Journal of Network Security, 18(04),633-643, DOI: 10.6633/IJNS.201607.18(4).04 | 2016 | IJNS | |
Impact Factor:
Indexing:
Article's Web Link:
|
An Efficient Weight Matrix based Reversible DataHiding Scheme | International Conference on Computers and Management (ICCM-2015), Jaipur (Rajasthan), India | 2015 | ACM | |
Impact Factor:
Indexing:
Article's Web Link:
|
An Efficient Data Hiding Scheme Using Hamming Error Correcting Code | Proceedings of the Sixth International Conference on Computer and Communication Technology (ICCCT '15), 2015, Pages 360-365. | 2015 | ACM digital library | |
Impact Factor:
Indexing:
Article's Web Link:
|
Reversible Data Hiding Through Hamming Code Using Dual Image | Proceedings of the International Congress on Information and Communication Technology, Volume 439 of the series Advances in Intelligent Systems and Computing, Pages 495-504 | 2015 | Springer (AISC). | |
Impact Factor:
Indexing:
Article's Web Link:
|
Dual Image Based Reversible Data Hiding Scheme Using Three Pixel Value Difference | Information Systems Design and Intelligent Applications Volume 434 of the series Advances in Intelligent Systems and Computing, Pages 403-412 | 2015 | AISC-Springer. | |
Impact Factor:
Indexing:
Article's Web Link:
|
Hierarchical Visual Secret Sharing Scheme Using Steganography | Mathematics and Computing,Springer Proceedings in Mathematics & Statistics, Volume 139, pp 363-389, 2015 | 2015 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
Weighted Matrix Based Reversible Data Hiding Scheme Using Image Interpolation | Computational Intelligence in Data Mining—Volume 2
Volume 411 of the series Advances in Intelligent Systems and Computing pp 239-248 | 2015 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
Cheating Prevention in Hierarchical Visual Secret Sharing Scheme Using Weight Matrix-Based Steganography | Mathematical Sciences International Research Journal, Volume 3, No 2, ISSN-22788697, pp 796-799, 2014 | 2014 | International Multidisciplinary Research Foundation | |
Impact Factor:
Indexing:
Article's Web Link:
|
Survey on Size Invariant Visual Cryptography | International Journal of Computer Science and Information Technologies, Volume 5, No. 3, pp 3985-3990, ISSN-0975-9646, 2014 | 2014 | Tech Science Publications | |
Impact Factor:
Indexing:
Article's Web Link:
|
Survey on Cheating and Prevention Techniques in Visual Cryptography | Mathematical Sciences International Research Journal, 3(Special Issue), 961-976 | 2014 | IMRF | |
Impact Factor:
Indexing:
Article's Web Link:
|
Cheating Prevention in Hierarchical Visual Secret Sharing Scheme using weight matrix-based Steganography | Mathematical Sciences International Research Journal, 3(2), 796-799 | 2014 | IMRF | |
Impact Factor:
Indexing:
Article's Web Link:
|
Survey on Size Invariant Visual Cryptography | International Journal of Computer Science and Information Technologies, 5(3), 3985-3990 | 2014 | IJCST | |
Impact Factor:
Indexing:
Article's Web Link:
|
Cheating Prevention In Visual Cryptographic Schemes Using Message Embedding: A Hardware Based Practical Approach | Proceedings of International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT-2014), pp 319 – 324, DOI: 10.1109/ICICICT.2014.6781300, 2014 | 2014 | IEEE | |
Impact Factor:
Indexing:
Article's Web Link:
|
Key Distribution in Wireless Sensor Networks using Quantum Cryptography | International Journal of Mobile & Adhoc Network, 3(4), 250-256. | 2013 | IJMAN | |
Impact Factor:
Indexing:
Article's Web Link:
|
Key Distribution In Wireless Sensor Networks Using Quantum Cryptography | International Journal of Mobile
& Adhoc Network, Volume 3 Issue- 4, pp 250-256, ISSN 2231–6825, 2013 | 2013 | International forum of researchers Students and Academician (IFRSA) | |
Impact Factor:
Indexing:
Article's Web Link:
|
Image Steganography based on Cellular Automata | International Journal of Pure and Applied Mathematics, Volume 83, No 5, pp 701-715, ISSN-1311-8080, 2013 | 2013 | Academic Publications | |
Impact Factor:
Indexing:
Article's Web Link:
|
New Image Noise Reduction Schemes Based on Cellular Automata | International Journal of Soft Computing and Engineering, Volume-2, Issue-2, pp 98-103, ISSN 2231-2707, 2012 | 2012 | Blue Eyes Intelligence Engineering & Sciences Publication | |
Impact Factor:
Indexing:
Article's Web Link:
|
A Cryptosystem For Encryption and Decryption of Long Confidential Message | Information Security and Assurance Communications in Computer and Information Science, Springer, Volume 76, pp 86-96, 2010 | 2010 | Springer | |
Impact Factor:
Indexing:
Article's Web Link:
|
Object Extraction Using Novel Region Merging and Multidimensional Features | Fourth Pacific-Rim Symposium on Image and Video Technology (PSIVT), pp 356 – 361, Print ISBN: 978-1-4244-8890-2 , DOI: 10.1109/PSIVT.2010.66, 2010 | 2010 | IEEE | |
Impact Factor:
Indexing:
Article's Web Link:
|
Recognition Of Partially Occluded, Expression Variant Faces Using Elastic Bunch Graph Matching | Proceedings of 1st IEEE-International Conference on Signal and Image Processing (IEEE-ICSIP-06), 2006 | 2006 | IEEE | |
Impact Factor:
Indexing:
Article's Web Link:
|