displayNone
banner

Publications

Books Chapters

  • Securing Digital Image with Authentication Code in Computer Vision and Image Processing in Intelligent Systems and Multimedia Technologies, Muhammad Sarfraz, (ed), Pennsylvania, USA: IGI Global pp. 203-215. Doi:10.4018/978-1-4666-6030-4.ch011
  • Privacy and Accountability Concerns in the Age of Big Data in Big Data: Storage, Sharing, and Security, Fei Hu (ed), CRC Press, pp. 341-356. DOI: 10.1201/b19694-17
  • Blind steganalysis using machine intelligence in Computational Techniques and Algorithms for Image Processing, S. Ramakrishnan and Ibrahiem M. M. El Emary Ed. Saarbr cken: Lambert Academic Publishing (LAP),
  • Cry baby's using spectrographic analysis to assess neonatal health status from an infant?s cry in Advances in Speech Recognition: Mobile Environments, Call Centers and Clinics, Amy Neustein Ed. Berlin: Springer
  • Message from the general chairs Information Systems Security, Lecture Notes in Computer Science 6503, by Somesh Jha, Anish Mathuria (Eds.) Springer-Verlag, Berlin, Heidelberg, Dec. 2010, pp. VI 10.1007/978-3-642-17714-9
  • Desertification and Land Degradation Atlas of India : Assessment and analysis of changes over 15 years based on remote sensing Space Applications Centre, ISRO. Ahmedabad, India. pp. 282.
  • Message from the technical program chairs Information Systems Security, Lecture Notes in Computer Science 6503, by Somesh Jha, Anish Mathuria (Eds.) Springer-Verlag, Berlin, Heidelberg, Dec. 2010, pp. VII 10.1007/978-3-642-17714-9
  • Devy, Ganesh Orality and literacy, Part 1: India,” in A concise companion to postcolonial literature Shirley Chew and David Richards, Eds. Chichester: Wiley-Blackwell, 2010. pp. 29-39.
  • Identity: introspection and integrity pp. 331-345.
  • Gandhi's Key writings: in search of unity in The Cambridge Companion to Gandhi, Judith M. Brown and Anthony Parel, Eds., Cambridge: Cambridge University Press, pp. 71-92. Doi: 10.1017/CCOL9780521116701.005.
Back to Top