Security-aware software development life cycle (SaSDLC)-processes and tools AK Talukder, VK Maurya, BG Santhosh, E Jangam, SV Muni, KP Jevitha, ... 2009 IFIP International Conference on Wireless and Optical Communications …, 2009 | 43 | 2009 |
CNN based Optical Character Recognition and Applications MS Sarika, N., Sirisala, N., Velpuru 6th International Conference on Inventive Computation Technologies, 666–672, 2021 | 24* | 2021 |
Suraksha: A security designers’ workbench G Santhosh Babu, VK Maurya, E Jangam, V Muni Sekhar, AK Talukder, ... Hack. in 2009, 59, 2009 | 19 | 2009 |
Comparing the Capacity, NCC, and Fidelity of Various Quantization Intervals on DWT VM Sekhar, KVG Rao, NS Rao, MG Chand Innovations in Computer Science and Engineering: Proceedings of the Third …, 2016 | 11 | 2016 |
A Reversible RIE based Watermarking scheme VM Sekhar, CS Kumar, KVG Rao, NS Rao, M Gopichand 2017 IEEE 7th International Advance Computing Conference (IACC), 925-930, 2017 | 6 | 2017 |
Comprehensive study of Deep learning based Telugu OCR MS Velpuru, P Chatterjee, G Tejasree, MR Kumar, SN Rao 2020 Third International Conference on Smart Systems and Inventive …, 2020 | 5 | 2020 |
Guaranteed Quality of Service in cloud ready application VM Sekhar, MR Kumar, KV Rao, NS Rao 2013 International Symposium on Computational and Business Intelligence, 24-28, 2013 | 5 | 2013 |
Improved Qualitative Color Image Steganography based on DWT V Muni Sekhar, M Naresh Goud, N Arjun International Journal of Computer Science and Information Technologies 5 (4 …, 2014 | 4 | 2014 |
Conventional Cloud Application Development: SOA V Muni Sekhar, KVG Rao, NS Rao Published in IJAC 2 (3), 108-112, 2011 | 4 | 2011 |
Laplacian: Reversible data hiding technique VM Sekhar, CS Kumar 2019 Fifth International Conference on Image Information Processing (ICIIP …, 2019 | 3 | 2019 |
Content-aware Reversible data hiding: URHS V Muni Sekhar, PB Reddy, NS Rao Intelligent Engineering Informatics: Proceedings of the 6th International …, 2018 | 3 | 2018 |
Enhanced Adaptive Data hiding in DWT VM Sekhar, KVG Rao, NS Rao IOSR Journal of Computer Engineering 17 (2), 30-40, 2015 | 3 | 2015 |
Success of H1-B VISA Using ANN T Chatterjee, P., Velpuru, M.S., Jagadeeswari Advances in Intelligent Systems and Computing, 491–499, 2021 | 2* | 2021 |
An attack on Image authentication: unaltered histogram CK Muni Sekhar Velpuru, K V Rao, N Sambasiva Rao, R. Sarika International Journal of Applied Engineering Research 11 (11), 7217-7222, 2016 | | 2016 |
Reference Cover Image Steganography DNSR V Muni Sekhar, Dr. K V G Rao Advances in Computational Sciences and Technology 8 (1), 17-28, 2015 | | 2015 |
Passive Attack Resistive Key Distribution Scenario: QKD DNSR V. Muni Sekhar , CH. Sravan Kumar and Dr. KVG Rao International Journal of Applied Engineering Research 10 (1), 925-935, 2015 | | 2015 |
IDENTIFICATION OF ATTACK SURFACE IN GRID DEPLOYMENT MS VELPURU NATIONAL INSTITUTE OF TECHNOLOGY KARNATAKA SURATHKAL, 2009 | | 2009 |
Analysis of Crash Recovery Failure Detection with Quality of Services B Sushma, BVR Krishna, MS Velpruru | | |
A Novel QR Code Watermarking In Digital Media Using DWT BV SE, V Muni Sekhar | | |