BibTeX records: Swathi C

download as .bib file

@article{DBLP:journals/corr/abs-1806-02907,
  author       = {Tejas K and
                  Swathi C and
                  Rajesh Kumar M},
  title        = {Copy Move Forgery using Hus Invariant Moments and Log Polar Transformations},
  journal      = {CoRR},
  volume       = {abs/1806.02907},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.02907},
  eprinttype    = {arXiv},
  eprint       = {1806.02907},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-02907.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-04154,
  author       = {Tejas K and
                  Swathi C and
                  Rajesh Kumar M},
  title        = {Intensity and Rescale Invariant Copy Move Forgery Detection Techniques},
  journal      = {CoRR},
  volume       = {abs/1809.04154},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.04154},
  eprinttype    = {arXiv},
  eprint       = {1809.04154},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-04154.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-09267,
  author       = {Tejas K and
                  Swathi C and
                  Aravind Kumar D and
                  Rajesh Muthu},
  title        = {Automated Region Masking Of Latent Overlapped Fingerprints},
  journal      = {CoRR},
  volume       = {abs/1710.09267},
  year         = {2017},
  url          = {http://arxiv.org/abs/1710.09267},
  eprinttype    = {arXiv},
  eprint       = {1710.09267},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1710-09267.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-09550,
  author       = {Karthik Reddy and
                  Tejas K and
                  Swathi C and
                  Ashok K and
                  Rajesh Kumar M},
  title        = {High Capacity, Secure (n, n/8) Multi Secret Image Sharing Scheme with
                  Security Key},
  journal      = {CoRR},
  volume       = {abs/1710.09550},
  year         = {2017},
  url          = {http://arxiv.org/abs/1710.09550},
  eprinttype    = {arXiv},
  eprint       = {1710.09550},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1710-09550.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics