Securing Digital Image with Authentication Code
in Computer Vision and Image Processing in Intelligent Systems and Multimedia Technologies, Muhammad Sarfraz, (ed), Pennsylvania, USA: IGI Global pp. 203-215. Doi:10.4018/978-1-4666-6030-4.ch011
Privacy and Accountability Concerns in the Age of Big Data
in Big Data: Storage, Sharing, and Security, Fei Hu (ed), CRC Press, pp. 341-356. DOI: 10.1201/b19694-17
Blind steganalysis using machine intelligence
in Computational Techniques and Algorithms for Image Processing, S. Ramakrishnan and Ibrahiem M. M. El Emary Ed. Saarbr cken: Lambert Academic Publishing (LAP),
Cry baby's using spectrographic analysis to assess neonatal health status from an infant?s cry
in Advances in Speech Recognition: Mobile Environments, Call Centers and Clinics, Amy Neustein Ed. Berlin: Springer
Message from the general chairs
Information Systems Security, Lecture Notes in Computer Science 6503, by Somesh Jha, Anish Mathuria (Eds.) Springer-Verlag, Berlin, Heidelberg, Dec. 2010, pp. VI 10.1007/978-3-642-17714-9
Desertification and Land Degradation Atlas of India : Assessment and analysis of changes over 15 years based on remote sensing
Space Applications Centre, ISRO. Ahmedabad, India. pp. 282.
Message from the technical program chairs
Information Systems Security, Lecture Notes in Computer Science 6503, by Somesh Jha, Anish Mathuria (Eds.) Springer-Verlag, Berlin, Heidelberg, Dec. 2010, pp. VII 10.1007/978-3-642-17714-9
Devy, Ganesh Orality and literacy, Part 1: India,” in
A concise companion to postcolonial literature Shirley Chew and David Richards, Eds. Chichester: Wiley-Blackwell, 2010. pp. 29-39.
Identity: introspection and integrity
pp. 331-345.
Gandhi's Key writings: in search of unity
in The Cambridge Companion to Gandhi, Judith M. Brown and Anthony Parel, Eds., Cambridge: Cambridge University Press, pp. 71-92. Doi: 10.1017/CCOL9780521116701.005.