Highly randomized image steganography using secret keys S Dagar International Conference on Recent Advances and Innovations in Engineering …, 2014 | 32 | 2014 |
Comparative study of image steganography techniques H Arora, C Bansal, S Dagar 2018 International Conference on Advances in Computing, Communication …, 2018 | 25 | 2018 |
LSB based image steganography using X-Box mapping E Dagar, S Dagar 2014 International Conference on Advances in Computing, Communications and …, 2014 | 19 | 2014 |
Modified Prim’s algorithm S Dagar International Journal of Computer and Information Technology 3 (2), 26-29, 2012 | 8 | 2012 |
RGB based dual key image steganography S Dagar IET Digital Library, 2013 | 7 | 2013 |
Image steganography using secret key & gray codes S Dagar, V Kumar, Y Bagoriya International Journal of Innovative Technology and Exploring Engineering 2 …, 2013 | 5 | 2013 |
Comparative study of various steganography techniques E Dagar, S Dagar International Journal of Emerging Engineering Research and Technology …, 2014 | 4 | 2014 |
Comparative Analysis of Various Factors of Authentication S Chugh, S Dagar IJARCSSE 5 (3), 5, 2015 | 2 | 2015 |
A Novel Approach to Multifactor Authentication for Mobile Devices using Jumbled Image Set S Dagar International Journal of Innovative Research in Computer and Communication …, 2017 | | 2017 |
Steganography Techniques: A Review T Rashid, S Dagar IJIRT 2 (12), 5, 2016 | | 2016 |
A Novel Approach to Image Steganography Using Keys S Dagar, T Rashid IJIRCCE 4 (5), 7, 2016 | | 2016 |
Boundary Value Sort S Dagar, V Kumar, R Walia Interchange 2 (8), 2013 | | 2013 |