130 results on '"Sahu, Aditya Kumar"'
Search Results
2. Secure and Imperceptible Frequency-Based Watermarking for Medical Images
3. Robust medical and color image cryptosystem using array index and chaotic S-box
4. Operations strategy at Kaspians Cafe
5. Opposing agents evolve the research: a decade of digital forensics
6. Influence of Gold-Selenium Precursor Ratio on Synthesis and Structural Stability of {\alpha}- and {\beta}-AuSe
7. A systematic review on behavioral biases affecting individual investment decisions
8. Digital to quantum watermarking: A journey from past to present and into the future
9. Robust data hiding method based on frequency coefficient variance in repetitive compression
10. Logistic-map based fragile image watermarking scheme for tamper detection and localization
11. Advancements in artificial intelligence for biometrics: A deep dive into model-based gait recognition techniques
12. Multimodal imputation-based stacked ensemble for prediction and classification of air quality index in Indian cities
13. A novel medical steganography technique based on Adversarial Neural Cryptography and digital signature using least significant bit replacement
14. Dual image-based reversible fragile watermarking scheme for tamper detection and localization
15. Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier
16. Pixel recurrence based image watermarking for block based integrity verification
17. Machine Learning-Based Method for Recognition of Paddy Leaf Diseases
18. A novel image compression method using wavelet coefficients and Huffman coding
19. A Study on Content Tampering in Multimedia Watermarking
20. False-Positive-Free SVD Based Audio Watermarking with Integer Wavelet Transform
21. Improving grayscale steganography to protect personal information disclosure within hotel services
22. A logistic map based blind and fragile watermarking for tamper detection and localization in images
23. Review of: "A Security Framework for the Mobile Application Using Color Barcode"
24. Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP
25. Envisioning the future of behavioral decision-making: A systematic literature review of behavioral reasoning theory
26. Review of: "Exploding AI-Generated Deepfakes and Misinformation: A Threat to Global Concern in the 21st Century"
27. Digital image steganography and steganalysis: A journey of the past three decades
28. Shadow Image Based Reversible Data Hiding Using Addition and Subtraction Logic on the LSB Planes
29. Impact of organizational politics on employee outcomes: a systematic literature review
30. An improved method for high hiding capacity based on LSB and PVD
31. List of contributors
32. An Optimal Information Hiding Approach Based on Pixel Value Differencing and Modulus Function
33. Digital Image Steganography Using Bit Flipping
34. A Novel and Secure Fake-Modulus Based Rabin-Ӡ Cryptosystem
35. Enhancing Cloud Communication Security: A Blockchain-Powered Framework with Attribute-Aware Encryption
36. Reversible Image Steganography Using Dual-Layer LSB Matching
37. Impact of organizational politics on employee outcomes: a systematic literature review.
38. Image watermarking and tamper detection based on modulus operator and logistic map
39. Secure Reversible Data Hiding Using Block-Wise Histogram Shifting
40. Latest Trends in Deep Learning Techniques for Image Steganography
41. Local-Ternary-Pattern-Based Associated Histogram Equalization Technique for Cervical Cancer Detection
42. Chaotic-Map Based Encryption for 3D Point and 3D Mesh Fog Data in Edge Computing
43. Influence of Gold-Selenium Precursor Ratio on Synthesis and Structural Stability of α- and β-AuSe
44. Logistic-map based fragile image watermarking scheme for tamper detection and localization
45. Frekans Alanı Görüntü Steganografisine Dayalı Veri Gizleme
46. A Novel n-Rightmost Bit Replacement Image Steganography Technique
47. Pixel Overlapping Image Steganography Using PVD and Modulus Function
48. Performance analysis of various image steganography techniques
49. Local binary pattern‐based reversible data hiding
50. Yoga Pose Monitoring System using Deep Learning
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.