Application of integrated steganography and image compressing techniques for confidential information transmission BK Pandey, D Pandey, S Wairya, G Agarwal, P Dadeech, SR Dogiwal, ... Cyber Security and Network Security, 169-191, 2022 | 43 | 2022 |
Deep learning and particle swarm optimisation-based techniques for visually impaired humans' text recognition and identification BK Pandey, D Pandey, S Wariya, G Aggarwal, R Rastogi Augmented Human Research 6 (1), 14, 2021 | 39 | 2021 |
Hiding Image to video: A new approach of LSB replacement GA Saurabh Singh International Journal of Engineering Science and Technology 2 (12), 6999-7003, 2010 | 38 | 2010 |
Use of image to secure text message with the help of LSB replacement S Singh, G Agarwal International journal of applied engineering research 1 (2), 200, 2010 | 35 | 2010 |
Secure text extraction from complex degraded images by applying steganography and deep learning BK Pandey, D Mane, VKK Nassa, D Pandey, S Dutta, RJM Ventayen, ... Multidisciplinary approach to modern digital steganography, 146-163, 2021 | 32 | 2021 |
Security Attacks, Requirements and Authentication Schemes in VANET GA Amit Goyal, Arun Kumar 2nd International Conference on Issues and Challenges in Intelligent …, 2019 | 30 | 2019 |
A deep neural network-based approach for extracting textual images from deteriorate images BK Pandey, D Pandey, S Wariya, G Agarwal EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 8 …, 2021 | 29 | 2021 |
Network architectures, challenges, security attacks, research domains and research methodologies in VANET: a survey AK Goyal, G Agarwal, AK Tripathi International Journal of Computer Network and Information Security 11 (10 …, 2019 | 25 | 2019 |
Security analysis of graphical passwords over the alphanumeric passwords RSS Gaurav Agarwal, Saurabh Singh International Journal of Pure and Applied Science and Technology 1 (2), 60-66, 2010 | 24 | 2010 |
An advanced morphological component analysis, steganography, and deep learning-based system to transmit secure textual data BK Pandey, D Pandey, S Wairya, G Agarwal International Journal of Distributed Artificial Intelligence (IJDAI) 13 (2 …, 2021 | 23 | 2021 |
“An Enhanced and Secure play fair cipher by Introducing the Frequency of Letters in any plain text MA Gaurav Agarwal, Saurabh Singh Journal of Current Computer Science and Technology 1 (3), 2011 | 18 | 2011 |
Novel hybrid intelligent secure cloud internet of things based disease prediction and diagnosis A Verma, G Agarwal, AK Gupta, M Sain Electronics 10 (23), 3013, 2021 | 13 | 2021 |
Integration of sound signature in graphical password authentication system S Singh, G Agarwal International Journal of Computer Applications 12 (9), 11-13, 2011 | 12 | 2011 |
A nobel generalized fuzzy intelligence-based ant lion optimization for internet of things based disease prediction and diagnosis AK 1. Ankit Verma, Gaurav Agarwal cluster computing, 2022 | 10 | 2022 |
Systemetic Study of VANET: Applications, Challenges, Threats, Attacks, Schemes and Issues in Research AKT 1. Amit Goyal, Gaurav Agarwal Green Computing in Network Security, 33-52, 2022 | 10 | 2022 |
A fuzzy Based Decision Support System for Irrigation process in Precision Agriculture G Agarwal 9th International Conference on System Modelling & Advancement in Research …, 2020 | 9 | 2020 |
Interactive Security of Ransomware with Heuristic Random Bit Generator RKS Rahul Rastogi, Gaurav Agarwal Lecture Notes in Electrical Engineering book series (LNEE, volume 698) 698 …, 2020 | 5* | 2020 |
Connectivity based Handoff scheme for WiMAX C Kumar, RS Shukla, G Agarwal International Journal of Engineering Technology Science and Research IJETSR …, 2017 | 5 | 2017 |
Analysis of knowledge based graphical password authentication G Agarwal, S Singh, A Indian 2011 6th International Conference on Computer Science & Education (ICCSE …, 2011 | 5 | 2011 |
A comparison between public key authority and certification authority for distribution of public key G Agarwal, S Singh International Journal of Computer Science and Information Technologies 1 (5 …, 2010 | 5 | 2010 |