Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines D Kumar, S Chand, B Kumar Journal of Ambient Intelligence and Humanized Computing 10, 641-660, 2019 | 39 | 2019 |
Text detection and localization in natural scene images based on text awareness score R Soni, B Kumar, S Chand Applied Intelligence 49 (4), 1376-1405, 2019 | 36 | 2019 |
An improved histogram-shifting-imitated reversible data hiding based on HVS characteristics R Kumar, S Chand, S Singh Multimedia Tools and Applications 77, 13445-13457, 2018 | 36 | 2018 |
Multilevel heterogeneous network model for wireless sensor networks S Singh, S Chand, B Kumar Telecommunication Systems 64, 259-277, 2017 | 36 | 2017 |
A reversible high capacity data hiding scheme using pixel value adjusting feature R Kumar, S Chand Multimedia Tools and Applications 75, 241-259, 2016 | 35 | 2016 |
An efficient text steganography scheme using Unicode Space Characters R Kumar, S Chand, S Singh Int. J. Forensic Comput. Sci 10 (1), 8-14, 2015 | 29 | 2015 |
An Email based high capacity text steganography scheme using combinatorial compression R Kumar, S Chand, S Singh 2014 5th international conference-confluence the next generation information …, 2014 | 28 | 2014 |
Genetic algorithm‐based meta‐heuristic for target coverage problem Manju, S Chand, B Kumar IET Wireless Sensor Systems 8 (4), 170-175, 2018 | 27 | 2018 |
A space based reversible high capacity text steganography scheme using font type and style R Kumar, A Malik, S Singh, B Kumar, S Chand 2016 International Conference on Computing, Communication and Automation …, 2016 | 27 | 2016 |
QoS in mobile ad-hoc networks P Sra, S Chand Wireless Personal Communications 105, 1599-1616, 2019 | 26 | 2019 |
Image forgery detection using co-occurrence-based texture operator in frequency domain S Agarwal, S Chand Progress in Intelligent Computing Techniques: Theory, Practice, and …, 2018 | 25 | 2018 |
A reversible data hiding scheme using pixel location. R Kumar, S Chand, S Singh Int. Arab J. Inf. Technol. 15 (4), 763-768, 2018 | 23 | 2018 |
Modified staircase data broadcasting scheme for popular videos S Chand, H Om IEEE transactions on broadcasting 48 (4), 274-280, 2002 | 22 | 2002 |
An optimal high capacity reversible data hiding scheme using move to front coding for LZW codes R Kumar, S Chand, S Singh Multimedia Tools and Applications 78, 22977-23001, 2019 | 21 | 2019 |
Trend analysis in machine learning research using text mining D Sharma, B Kumar, S Chand 2018 international conference on advances in computing, communication …, 2018 | 21 | 2018 |
Target coverage heuristic based on learning automata in wireless sensor networks Manju, S Chand, B Kumar IET Wireless Sensor Systems 8 (3), 109-115, 2018 | 19 | 2018 |
Optimal feature and classifier selection for text region classification in natural scene images using Weka tool R Soni, B Kumar, S Chand Multimedia Tools and Applications 78 (22), 31757-31791, 2019 | 18 | 2019 |
A reversible high capacity data hiding scheme using combinatorial strategy R Kumar, S Chand, S Singh International Journal of Multimedia Intelligence and Security 3 (2), 146-161, 2018 | 18 | 2018 |
3-Level heterogeneity model for wireless sensor networks S Chand, S Singh, B Kumar International Journal of Computer Network and Information Security 5 (4), 40, 2013 | 17 | 2013 |
hetADEEPS: ADEEPS for heterogeneous wireless sensor networks S Chand, S Singh, B Kumar International Journal of Future Generation Communication and Networking 6 (5 …, 2013 | 16 | 2013 |