A steganography algorithm for hiding image in image by improved LSB substitution by minimize detection VK Sharma, V Shrivastava Journal of Theoretical and Applied Information Technology 36 (1), 1-8, 2012 | 111 | 2012 |
Efficient image steganography using graph signal processing VK Sharma, DK Srivastava, P Mathur IET Image Processing 12 (6), 1065-1071, 2018 | 39 | 2018 |
Detection and Classification of ECG Noises using Decomposition on MixedCodebook for Quality Analysis sharma vijay Kumar, Pramendra Healthcare Technology Letters, 2020 | 34 | 2020 |
Highly Secure DWT Steganography Scheme for Encrypted Data Hiding DS Vijay Kumar sharma, Pratistha Mathur Information and Communication Technology for Intelligent Systems 1, 665-674, 2019 | 17* | 2019 |
Secure link establishment method to prevent jelly fish attack in MANET A Thomas, VK Sharma, G Singhal 2015 International Conference on Computational Intelligence and …, 2015 | 15 | 2015 |
Comprehensive data hiding technique for discrete wavelet transform-based image steganography using advance encryption standard VK Sharma, DK Srivastava Computing and Network Sustainability: Proceedings of IRSCNS 2016, 353-360, 2017 | 14 | 2017 |
Hilbert quantum image scrambling and graph signal processing-based image steganography VK Sharma, PC Sharma, H Goud, A Singh Multimedia Tools and Applications 81 (13), 17817-17830, 2022 | 12 | 2022 |
A daubechies DWT based image steganography using smoothing operation. VK Sharma, DK Srivastava, P Mathur Int. Arab J. Inf. Technol. 17 (2), 154-161, 2020 | 10 | 2020 |
Eliminating cover image requirement in discrete wavelet transform based digital image steganography P Sehgal, VK Sharma International Journal of Computer Applications 68 (3), 2013 | 10 | 2013 |
DWT-SVD Based Image Steganography Using Threshold Value Encryption Method AZ Jyoti Khandelwal, Vijay Kumar SharmaDilbag Singh Computers, Materials and Continua 72 (2), 3299-3312, 2022 | 8 | 2022 |
Improved segmentation technique for underwater images based on k-means and local adaptive thresholding AA Rajeev, S Hiranwal, VK Sharma Information and Communication Technology for Sustainable Development …, 2018 | 8 | 2018 |
A study of steganography based data hiding techniques V Sharma, D Srivastava, P Mathur, V Kumar International Journal of Emerging Research in Management and Technology 6 (4 …, 2017 | 8 | 2017 |
Overlapped flowers yield detection using computer-based interface A Sharma, VK Sharma, DK Srivastava Perspectives in Science 8, 25-27, 2016 | 8 | 2016 |
Modified Particle Swarm Optimization Based on Aging Leaders and Challengers Model for Task Scheduling in Cloud Computing SS Shikha Chaudhary,Vijay Kumar Sharma , R. N. Thakur , Amit Rathi ... Mathematical Problems in Engineering 2023, 1-11, 2023 | 7* | 2023 |
Improving the performance of least significant bit substitution steganography against rs steganalysis by minimizing detection probability VK Sharma, V Shrivastava International Journal of Information and Communication Technology Research 1 (4), 2011 | 7 | 2011 |
Image Watermarking in Frequency Domain using Hu’s Invariant Moments and Firefly Algorithm S Sharma, S Choudhary, VK Sharma, A Goyal, MM Balihar | 6 | 2022 |
Biometric Authentication-Based Data Encryption Using ECG Analysis and Diffie–Hellman Algorithm A Bhardwaj, S Chaudhary, VK Sharma Ambient Communications and Computer Systems: RACCCS-2018, 523-532, 2019 | 6 | 2019 |
Secure Electronic Fund Transfer Model based on Two level Authentication DKS Viiay Kumar Sharma, Pratistha Mathur 2018 Second International Conference on Electronics, Communication and …, 2018 | 6 | 2018 |
Performance Improvement In Discrete Wavelet Transform Based Digital Image Steganography By The Use Of Integer Wavelet Transform V Parul Sehgal International Journal of Engineering Research & Technology 2 (6), 972-977, 2013 | 5 | 2013 |
Secure data hiding technique using secret image scrambling RJ Krishna, A Singh, VS Rathore 2020 4th International Conference on Electronics, Communication and …, 2020 | 4 | 2020 |