Author pages are created from data sourced from our academic publisher partnerships and public sources.
Stream Video based Human Identification using Ai
Energy Optimized Node Level Trust Based Data Transaction in Wireless Sensor Network
Wireless Sensor Networks (WSN), is widespread used by various fields due to its advantages and application. Expand
A SECURE IMAGE STEGANOGRAPHY METHOD USING CONTOURLET TRANSFORM DOMAIN
Steganography, is a specialty of concealed correspondence is one of the branches of concealing the data. It additionally executes top secret information transmission and conceals the subsistence of… Expand