Follow
Dr. Vijay Kumar Sharma
Dr. Vijay Kumar Sharma
Assistant Professor manipal university Jaipur Mob: 8963043812
Verified email at jaipur.manipal.edu
Title
Cited by
Cited by
Year
A steganography algorithm for hiding image in image by improved LSB substitution by minimize detection
VK Sharma, V Shrivastava
Journal of Theoretical and Applied Information Technology 36 (1), 1-8, 2012
1112012
Efficient image steganography using graph signal processing
VK Sharma, DK Srivastava, P Mathur
IET Image Processing 12 (6), 1065-1071, 2018
392018
Detection and Classification of ECG Noises using Decomposition on MixedCodebook for Quality Analysis
sharma vijay Kumar, Pramendra
Healthcare Technology Letters, 2020
342020
Highly Secure DWT Steganography Scheme for Encrypted Data Hiding
DS Vijay Kumar sharma, Pratistha Mathur
Information and Communication Technology for Intelligent Systems 1, 665-674, 2019
17*2019
Secure link establishment method to prevent jelly fish attack in MANET
A Thomas, VK Sharma, G Singhal
2015 International Conference on Computational Intelligence and …, 2015
152015
Comprehensive data hiding technique for discrete wavelet transform-based image steganography using advance encryption standard
VK Sharma, DK Srivastava
Computing and Network Sustainability: Proceedings of IRSCNS 2016, 353-360, 2017
142017
Hilbert quantum image scrambling and graph signal processing-based image steganography
VK Sharma, PC Sharma, H Goud, A Singh
Multimedia Tools and Applications 81 (13), 17817-17830, 2022
122022
A daubechies DWT based image steganography using smoothing operation.
VK Sharma, DK Srivastava, P Mathur
Int. Arab J. Inf. Technol. 17 (2), 154-161, 2020
102020
Eliminating cover image requirement in discrete wavelet transform based digital image steganography
P Sehgal, VK Sharma
International Journal of Computer Applications 68 (3), 2013
102013
Improved segmentation technique for underwater images based on k-means and local adaptive thresholding
AA Rajeev, S Hiranwal, VK Sharma
Information and Communication Technology for Sustainable Development …, 2018
82018
A study of steganography based data hiding techniques
V Sharma, D Srivastava, P Mathur, V Kumar
International Journal of Emerging Research in Management and Technology 6 (4 …, 2017
82017
Overlapped flowers yield detection using computer-based interface
A Sharma, VK Sharma, DK Srivastava
Perspectives in Science 8, 25-27, 2016
82016
Improving the performance of least significant bit substitution steganography against rs steganalysis by minimizing detection probability
VK Sharma, V Shrivastava
International Journal of Information and Communication Technology Research 1 (4), 2011
72011
Secure Electronic Fund Transfer Model based on Two level Authentication
DKS Viiay Kumar Sharma, Pratistha Mathur
2018 Second International Conference on Electronics, Communication and …, 2018
62018
Modified Particle Swarm Optimization Based on Aging Leaders and Challengers Model for Task Scheduling in Cloud Computing
SS Shikha Chaudhary,Vijay Kumar Sharma , R. N. Thakur , Amit Rathi ...
Mathematical Problems in Engineering 2023, 1-11, 2023
52023
DWT-SVD Based Image Steganography Using Threshold Value Encryption Method
AZ Jyoti Khandelwal, Vijay Kumar SharmaDilbag Singh
Computers, Materials and Continua 72 (2), 3299-3312, 2022
52022
Image Watermarking in Frequency Domain using Hu’s Invariant Moments and Firefly Algorithm
S Sharma, S Choudhary, VK Sharma, A Goyal, MM Balihar
52022
Biometric Authentication-Based Data Encryption Using ECG Analysis and Diffie–Hellman Algorithm
A Bhardwaj, S Chaudhary, VK Sharma
Ambient Communications and Computer Systems: RACCCS-2018, 523-532, 2019
52019
Performance Improvement In Discrete Wavelet Transform Based Digital Image Steganography By The Use Of Integer Wavelet Transform
V Parul Sehgal
International Journal of Engineering Research & Technology 2 (6), 972-977, 2013
52013
Secure data hiding technique using secret image scrambling
RJ Krishna, A Singh, VS Rathore
2020 4th International Conference on Electronics, Communication and …, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20