Author:
Kaur Kamal Nayan,Divya ,Gupta Ishu,Singh Ashutosh Kumar
Reference15 articles.
1. V. M. Potdar, S. Han and E. Chang, “A survey of digital image watermarking techniques,” INDIN ‘05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005, pp. 709–716.
2. H. Wei, M. Yuan, J. Zhao and Z. Kou, “Research and realization of digital watermark for picture protecting,” 2009 IEEE First International Workshop on Education Technology and Computer Science (ETCS’09), China, vol. 1, 2009, pp. 968–970.
3. S. Chhabra and A. K. Singh, “Dynamic data leakage detection model based approach for MapReduce computational security in cloud,” 2016 Fifth International Conference on Eco-friendly Computing and Communication Systems (ICECCS), Bhopal, 2016, pp. 13–19.
4. H. Taneja, Kapil and A. K. Singh, “Preserving Privacy of Patients based on Reidentification Risk,” Fourth International Conference on Eco-friendly Computing and Communication Systems (ICECCS), 2015, pp. 448–454.
5. J. Kumar and A. K. Singh, “Dynamic resource scaling in cloud using neural network and black hole algorithm,” 2016 Fifth International Conference on Eco-friendly Computing and Communication Systems (ICECCS), Bhopal, 2016, pp. 63–67.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献