A multi-level steganography mechanism using quantum chaos encryption S Dhall, R Sharma, S Gupta Multimedia Tools and Applications 79, 1987-2012, 2020 | 14 | 2020 |
Implementation of MAC unit using booth multiplier & ripple carry adder S Malik, S Dhall International Journal of Applied Engineering Research 7 (11), 358-363, 2012 | 14 | 2012 |
Analysis of traditional and modern image encryption algorithms under realistic ambience A Malik, S Gupta, S Dhall Multimedia Tools and Applications 79 (37), 27941-27993, 2020 | 13 | 2020 |
Analysis of frequency domain watermarking techniques in presence of geometric and simple attacks A Chopra, S Gupta, S Dhall Multimedia Tools and Applications 79 (1), 501-554, 2020 | 13 | 2020 |
An improved bit plane image encryption technique using RC4 and quantum chaotic demeanour A Malik, S Dhall, S Gupta Multimedia Tools and Applications 80 (5), 7911-7937, 2021 | 12 | 2021 |
An in-depth analysis of various steganography techniques S Dhall, B Bhushan, S Gupta International Journal of Security and Its Applications 9 (8), 67-94, 2015 | 12 | 2015 |
A multilevel secure information communication model for healthcare systems P Panwar, S Dhall, S Gupta Multimedia Tools and Applications 80 (5), 8039-8062, 2021 | 10 | 2021 |
Performance comparison of steganography techniques R Sharma, R Ganotra, S Dhall, S Gupta International Journal of Computer Network and Information Security 10 (9), 37-46, 2018 | 9 | 2018 |
Analysis of various cryptography techniques: a survey N Tayal, R Bansal, S Gupta, S Dhall International Journal of Security and Its Applications 10 (8), 59-92, 2016 | 9 | 2016 |
A robust and secure immensely random GAN based image encryption mechanism OD Singh, S Dhall, A Malik, S Gupta Multimedia Tools and Applications 82 (13), 19693-19743, 2023 | 8 | 2023 |
Multilayered highly secure authentic watermarking mechanism for medical applications S Dhall, S Gupta Multimedia Tools and Applications 80 (12), 18069-18105, 2021 | 8 | 2021 |
A hybrid security mechanism based on DCT and visual cryptography for data communication networks Y Jain, G Sharma, G Anand, S Dhall Cyber Security: Proceedings of CSI 2015, 131-142, 2018 | 7 | 2018 |
An improved hybrid mechanism for secure data communication S Dhall, B Bhushan, S Gupta Int J Comput Netw Inf Secur 8 (6), 67, 2016 | 7 | 2016 |
Comparative analysis of steganography technique for information security P Yadav, S Dhall Int. J. Math. Sci. Comput 6 (4), 42-69, 2020 | 6 | 2020 |
Publicly verifiable watermarking scheme for intellectual property protection using quantum Chaos and bit plane complexity slicing G Sharma, S Gupta, S Dhall, CK Nagpal Multimedia Tools and Applications 77 (24), 31737-31762, 2018 | 4 | 2018 |
A robust hybrid steganography mechanism for security in data communication networks N Tayal, S Dhall, S Gupta International Journal of Computer Networks and Applications (IJCNA) 3 (3 …, 2016 | 4 | 2016 |
Quantum based robust and swift hybrid security mechanism S Dhall, S Gupta Multimedia Tools and Applications 81 (30), 43727-43752, 2022 | 1 | 2022 |
A robust multilevel security mechanism against geometric attacks Y Jain, S Dhall, S Gupta 2019 3rd International Conference on Recent Developments in Control …, 2019 | 1 | 2019 |
Performance Evaluation of Spatial and Frequency Domain Techniques under Various Attacks B Chauhan, S Dhall, S Gupta International Journal of Signal Processing, Image Processing and Pattern …, 2018 | 1 | 2018 |
A Comprehensive Analysis of Various Steganography Techniques Under Different Attacks S Dhall, B Kumar, R Chawla IEEE Conference ID 40353, 2017 | 1 | 2017 |