An approach to face detection and recognition D Meena, R Sharan 2016 International Conference on Recent Advances and Innovations in …, 2016 | 87 | 2016 |
A secure non-blind block based digital image watermarking technique using DWT and DCT RK Arya, S Singh, R Saharan 2015 International Conference on Advances in Computing, Communications and …, 2015 | 38 | 2015 |
Information and communication technology for intelligent systems Y Bharti, R Saharan, A Saxena Springer, 2019 | 23 | 2019 |
A fast image encryption technique using Henon chaotic map K Mishra, R Saharan Progress in Advanced Computing and Intelligent Engineering: Proceedings of …, 2019 | 17 | 2019 |
Counting the number of people in crowd as a part of automatic crowd monitoring: A combined approach Y Bharti, R Saharan, A Saxena Information and Communication Technology for Intelligent Systems …, 2019 | 12 | 2019 |
Secure file deletion for solid state drives B Singh, R Saharan, G Somani, G Gupta Advances in Digital Forensics XII: 12th IFIP WG 11.9 International …, 2016 | 12 | 2016 |
A new cryptographic method for image encryption K Mishra, R Saharan, B Rathor Journal of Intelligent & Fuzzy Systems 32 (4), 2885-2892, 2017 | 9 | 2017 |
Blind detection attack resistant image watermarking B Singh, VS Dhaka, R Saharan 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE), 289-293, 2014 | 7 | 2014 |
MALWARE DETECTION USING DATA MINING TECHNIQUES C Raviraj, S Ravi International Journal of Information Technology and Knowledge Management 5 …, 2012 | 7* | 2012 |
Reassembly of 2D fragments in image reconstruction R Saharan, CV Singh Int J Comput Appl 19 (5), 41-45, 2011 | 7 | 2011 |
Algorithm to Enhance the Robustness and Imperceptibility of LSB RK Arya, R Saharan 2015 Second International Conference on Advances in Computing and …, 2015 | 6 | 2015 |
A New Approach for Suspect Detection in Video Surveillance M Singh, R Sahran Information and Communication Technology for Sustainable Development …, 2018 | 5 | 2018 |
A Novel Digital Image Watermarking Algorithm Using dual Key with RMI RK Arya, R Saharan International Journal of Computer Secience & Communication Networks 4 (3 …, 2014 | 5 | 2014 |
Blockchain technology for healthcare data R Saharan, R Prasad Rising Threats in Expert Applications and Solutions: Proceedings of FICR …, 2021 | 4 | 2021 |
Review paper on Image Registration Techniques RA Saharan International Journal of New Innovations in Engineering and Technology 4 (4 …, 2016 | 3 | 2016 |
A Novel Method for Image Encryption R Saharan, S Yadav Information and Communication Technology for Intelligent Systems …, 2019 | 2 | 2019 |
Tongue recognition and detection R Saharan, D Meena Progress in Advanced Computing and Intelligent Engineering: Proceedings of …, 2019 | 2 | 2019 |
Steganography Using Bit Plane Embedding and Cryptography B Rathor, R Saharan Proceedings of First International Conference on Smart System, Innovations …, 2018 | 2 | 2018 |
Statistical pixel block selection P Manuja, R Saharan 2014 IEEE International Conference on Advanced Communications, Control and …, 2014 | 2 | 2014 |
Identification of Potential Forensic Artifacts in Cloud Storage Application R Saharan, SK Panda 2020 International Conference on Computer Science, Engineering and …, 2020 | 1 | 2020 |