Securing compressed video streams using RC4 encryption scheme SS Giradkar, A Bhattacharya 2015 Global Conference on Communication Technologies (GCCT), 640-644, 2015 | 16 | 2015 |
Revealing image forgery through image manipulation detection J Charpe, A Bhattacharya 2015 Global Conference on Communication Technologies (GCCT), 723-727, 2015 | 9 | 2015 |
Brain computer interface using EEG signals A Bhattacharya, DNG Bawane, SM Nirkhi GHRCE, Nagpur, 0 | 9* | |
Secure data pixels for binary host images using edge-adaptive grid technique S Khan, A Bhattacharya 2015 Global Conference on Communication Technologies (GCCT), 691-695, 2015 | 1 | 2015 |
Face identification methodologies in videos D Yadav, A Bhattacharya 2015 Global Conference on Communication Technologies (GCCT), 733-738, 2015 | 1 | 2015 |
Generic Algorithm for Image Tampering Detection Based on Claimant Suspect Decision Rule DN Pande, ARB Patil, AS Bhattacharya International Journal of Science, Engineering and Computer Technology 4 (4 …, 2014 | 1 | 2014 |
Detection of Image Tampering over Diverse information Security Schemata: A State-of-the-Art DN Pande, ARB Patil, AS Bhattacharya International Journal of Computer Applications 89 (2), 2014 | 1 | 2014 |
Missing Value Evaluation in SQL Queries: A Survey S Mule, A Bhattacharya | | 2017 |
Privacy-Preserving Mining of Outsourced Transaction Databases for Association Rules Generation Using Paillier Encryption CC Khandate, A Bhattacharya | | 2017 |
Confidentiality storage of fingerprints by orientation and minutiae S Kapre, A Bhattacharya 2015 Global Conference on Communication Technologies (GCCT), 739-744, 2015 | | 2015 |
A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams SS Giradkar, A Bhattacharya | | 2011 |
Methodologies and Techniques for Network Transmission with Security and Corrective Control SS Kankapure, SJ Karale, A Bhattacharya | | |
BENDER DECOMPOSITION FOR TRANSMISSION NETWORK PLANNING WITH SECURITY AND CORRECTIVE CONTROLS SS Kankapure, SJ Karale, A Bhattacharya | | |
Survey on Different Data Hiding Methods For Binary Host Images SA Khan, A Bhattacharya | | |
A Survey on Distributed Networ Services Using SSO for Secure Mechanism SB Pandey, SP Chhaware, A Bhattacharya | | |
Survey of Fingerprint Matching Techniques for Privacy Protection S Kapre, A Bhattacharya | | |
A Survey on Feature Analysis and Classification for Image Annotation using Saliency Map S Suryawanshi, A Bhattacharya International Journal on Recent and Innovation Trends in Computing and …, 0 | | |