280 results on '"Jana, Biswapati"'
Search Results
2. Face Mask Detection Exploiting CNN and MobileNetV2
3. Secured Reversible Data Hiding Scheme with NMI Interpolation and Arnold Transformation
4. Secure Data Communication Through Improved Multi-level Pixel Value Ordering Using Center-Folding Strategy
5. Reversible data hiding strategy exploiting circular distance interpolation utilizing optimal pixel adjustment with error substitution
6. Context pixel-based reversible data hiding scheme using pixel value ordering
7. Dual image based secured reversible data hiding scheme exploiting huffman compression tree combining bit-reversal permutation technique
8. A Dual-Image Based Secured Reversible Data Hiding Scheme Exploiting Weighted Matrix and Cellular Automata
9. A Novel Approach of Fragile Watermarking for Authentication and Tamper Detection Exploiting Local Binary Pattern (LBP)
10. Reference pixel-based reversible data hiding scheme using multi-level pixel value ordering
11. Robust data hiding scheme for highly compressed image exploiting btc with hamming code
12. A cellular automata based secured reversible data hiding scheme for dual images using bit-reversal permutation technique
13. A Novel Approach of Fragile Watermarking for Authentication and Tamper Detection Exploiting Local Binary Pattern (LBP)
14. Secured Reversible Data Hiding Scheme with NMI Interpolation and Arnold Transformation
15. Face Mask Detection Exploiting CNN and MobileNetV2
16. Secure Data Communication Through Improved Multi-level Pixel Value Ordering Using Center-Folding Strategy
17. Secured Information Communication Exploiting Fuzzy Weight Strategy
18. RIWT Generative Feedback Residual Network for Secure Clinical Data Communication in Healthcare Unit
19. Fuzzy Logic with Superpixel-Based Block Similarity Measures for Secured Data Hiding Scheme
20. A Data Hiding Technique Based on QR Code Decomposition in Transform Domain
21. Fuzzy proximity-based robust data hiding scheme with interval threshold
22. Understanding Fake News Detection on Social Media: A Survey on Methodologies and Datasets
23. Fake News Identification Through Natural Language Processing and Machine Learning Approach
24. A Dual Image Based Data Hiding Scheme Based on Difference of Pixel Values in Integer Wavelet Transform Domain
25. A Secure Image Watermarking Technique Using Chinese Remainder Theorem in Integer Wavelet Transformation Domain
26. An IWT Based Reversible Watermarking Scheme Using Lagrange Interpolation Polynomial
27. A New Reversible Data Hiding Scheme by Altering Interpolated Pixels Exploiting Neighbor Mean Interpolation (NMI)
28. Single Image Fog Removal Using WLS Smoothing Filter Combining CLAHE with DWT
29. Voronoi Diagrams Based Digital Tattoo for Multimedia Data Protection
30. An Innovative Active Queue Management Model Through Threshold Adjustment Using Queue Size
31. Enhancing DSR Routing Protocol to Predict Optimal Path Using Dragonfly and Artificial Bee Colony Algorithm in MANET
32. Application of Dynamic Weight with Distance to Reduce Packet Loss in RED Based Algorithm
33. Comparative Analysis of Bio-inspired Dragonfly and Honeybee Algorithm-Based Routing Protocols with the Ant Colony Algorithm for MANET
34. Dual Image Based Watermarking Scheme Using Quorum Function
35. A Novel Congestion Control Algorithm Using Buffer Occupancy RED
36. Application of fuzzy logic based GA and PSO to solve 4D multi-item transportation problem for substitute and complementary items
37. Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic
38. Reversible data hiding scheme exploiting center folding with fuzzy weight strategy
39. Two-layers robust data hiding scheme for highly compressed image exploiting AMBTC with difference expansion
40. Robust data hiding scheme through distinct keypoint selection exploiting modified Bilateral-Laplacian SIFT with encoding pipeline
41. Superpixel based robust reversible data hiding scheme exploiting Arnold transform with DCT and CA
42. Weighted Matrix-Based Random Data Hiding Scheme Within a Pair of Interpolated Image
43. Robust Watermarking Scheme for Compressed Image Through DCT Exploiting Superpixel and Arnold Transform
44. Multi-Sensor Tracking Simulator Design and Its Challenges
45. Multiple Radar Data Fusion to Improve the Accuracy in Position Measurement Based on K-Means Algorithm
46. Review of: "The Vertex-Edge Locating Roman Domination of Some Graphs"
47. Semantic Similarity and Word-Net Based Web News Classification
48. A New Repeated Pixel Value Difference-Based Steganographic Scheme with Overlapped Pixel
49. Center-Symmetric Local Binary Pattern-Based Image Authentication Using Local and Global Features Vector
50. Data Hiding Based on Decagon-Shaped Shell
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.