Data mining techniques: a survey paper N Jain, V Srivastava IJRET: International Journal of Research in Engineering and Technology 2 (11 …, 2013 | 245 | 2013 |
A survey of digital watermarking techniques and its applications LK Saini, V Shrivastava arXiv preprint arXiv:1407.4735, 2014 | 116 | 2014 |
A steganography algorithm for hiding image in image by improved LSB substitution by minimize detection VK Sharma, V Shrivastava Journal of Theoretical and Applied Information Technology 36 (1), 1-8, 2012 | 110 | 2012 |
Application of Data Mining–A Survey Paper A Sharma, R Sharma, VK Sharma, V Shrivatava International Journal of Computer Science and Information Technologies 5 (2 …, 2014 | 43 | 2014 |
A new digital signature algorithm based on factorization and discrete logarithm problem S Vishnoi, V Shrivastava International Journal of Computer Trends and Technology 3 (4), 653-657, 2012 | 33 | 2012 |
An amend implementation on leach protocol based on energy hierarchy KG Vijayvargiya, V Shrivastava International Journal of Current Engineering and Technology 2 (4), 427-431, 2012 | 27 | 2012 |
Improved RGB-LSB steganography using secret key A Gangwar, V Shrivastava International Journal of Computer Trends and Technology-volume4Issue2-2013, 2012 | 22 | 2012 |
Analysis of attacks on hybrid DWT-DCT algorithm for digital image watermarking with MATLAB LK Saini, V Shrivastava arXiv preprint arXiv:1407.4738, 2014 | 17 | 2014 |
RDA Algorithm: Symmetric Key Algorithm D Goyal, V Srivastava International Journal of Information and Communication Technology Research 2 (4), 2012 | 10 | 2012 |
Improving the performance of least significant bit substitution steganography against rs steganalysis by minimizing detection probability VK Sharma, V Shrivastava International Journal of Information and Communication Technology Research 1 (4), 2011 | 7 | 2011 |
An Improved Novel Steganographic Technique For RGB And YCbCr Colorspace S Maurya, V Shrivastava IOSR Journal of Computer Engineering 16 (2), 155-157, 2014 | 6 | 2014 |
Review of various Techniques in Clustering M Gupta, V Shrivastava International Journal of Advanced Computer Research (IJACR) Volume-3 Number …, 2013 | 6 | 2013 |
A New Hybrid DWT-DCT Algorithm for Digital Image Watermarking LK Saini, V Shrivastava International Journal of Advance Engineering and Research Development …, 2014 | 5 | 2014 |
Simulation Results and Performance Evaluation of Routing Protocols in Mobile Ad Hoc Networks NK Agarwal, V Shrivastava International Journal of Emerging Science and Engineering (IJESE) 1 (7), 25-28, 2013 | 5 | 2013 |
A Literature Review on Water Marking Techniques C Kavadia, V Shrivastava International Journal of Scientific Engineering and Technology 1 (4), 8-11, 2012 | 5 | 2012 |
A Framework for Improving Target Marketing Using Collaborative Data Mining Approach V Shrivastava, R Boghey, B Verma IJICT Journal 1 (2), 2011 | 5 | 2011 |
Security problems and their upshots in routing protocols of DHT based overlay networks A Saroliya, V Shrivastava Journal of Theoretical and Applied Information Technology 1 (1), 19-23, 2005 | 5 | 2005 |
Performance evaluation of software development effort estimation using neuro-fuzzy model V Agrawal, V Shrivastava vol 4, 193-199, 2015 | 4 | 2015 |
Security and Privacy Issues in Cloud, Fog and Edge Computing A Pandey, DV Shrivastava, V Pathak, N Pathak, S Sharma Fog and Edge Computing (February 5, 2023), 2023 | 3 | 2023 |
An opcode statistical analysis for metamorphic malware SK Agarwal, V Shrivastava International Journal of Advanced Research in Computer Science and Software …, 2013 | 3 | 2013 |