Follow
Virendra Kumar Yadav
Title
Cited by
Cited by
Year
Traditional and hybrid encryption techniques: a survey
P Dixit, AK Gupta, MC Trivedi, VK Yadav
Networking Communication and Data Knowledge Engineering: Volume 2, 239-248, 2018
782018
Audio steganography techniques: A survey
S Mishra, VK Yadav, MC Trivedi, T Shrimali
Advances in Computer and Computational Sciences: Proceedings of ICCCCS 2016 …, 2018
512018
Detection techniques of DDoS attacks: A survey
P Kamboj, MC Trivedi, VK Yadav, VK Singh
2017 4th IEEE Uttar Pradesh section international conference on electrical …, 2017
512017
Analysis of different text steganography techniques: a survey
S Sharma, A Gupta, MC Trivedi, VK Yadav
2016 Second international conference on computational intelligence …, 2016
452016
A novel approach of bulk data hiding using text steganography
VK Yadav, S Batham
Procedia Computer Science 57, 1401-1410, 2015
452015
Approach to accurate circle detection: Circular Hough Transform and Local Maxima concept
VK Yadav, S Batham, AK Acharya, R Paul
2014 International Conference on Electronics and Communication Systems …, 2014
422014
Hiding large amount of data using a new approach of video steganography
R Paul, AK Acharya, VK Yadav, S Batham
Confluence 2013: The next generation information technology summit (4th …, 2013
382013
Analysis of several image steganography techniques in spatial domain: A survey
MC Trivedi, S Sharma, VK Yadav
Proceedings of the Second International Conference on Information and …, 2016
312016
DDA: an approach to handle DDoS (Ping Flood) attack
VK Yadav, MC Trivedi, BM Mehtre
Proceedings of International Conference on ICT for Sustainable Development …, 2016
252016
Congestion control techniques in MANET: a survey
N Sharma, A Gupta, SS Rajput, VK Yadav
2016 Second international conference on computational intelligence …, 2016
232016
An approach to electronic voting system using UIDAI
VK Yadav, S Batham, M Jain, S Sharma
2014 International conference on electronics and communication systems …, 2014
212014
A New Video Encryption Algorithm Based on Indexed Based Chaotic Sequence
S Batham, AK Acharya, VK Yadav, R Paulo
Confluence 2013: The Next Generation Information Technology Summit (4th …, 2014
192014
Metamorphic cryptography using strength of chaotic sequence and XORing method
MC Trivedi, S Mishra, VK Yadav
Journal of Intelligent & Fuzzy Systems 32 (5), 3365-3375, 2017
162017
ICSECV: An efficient approach of video encryption
S Batham, VK Yadav, AK Mallik
2014 Seventh international conference on contemporary computing (IC3), 425-430, 2014
152014
Zero distortion technique: an approach to image steganography using strength of indexed based chaotic sequence
S Sharma, VK Yadav, S Batham
Security in Computing and Communications: Second International Symposium …, 2014
152014
Metamorphic cryptography considering concept of XOR and chaotic sequence: using video as medium
N Singh, MC Trivedi, VK Yadav, VK Singh
2017 9th international conference on information technology and electrical …, 2017
102017
Trends in digital video steganography: a survey
N Singh, VK Yadav
International Journal of Computer Applications 169 (7), 6-18, 2017
92017
Audio steganography using ZDT: encryption using indexed based chaotic sequence
S Sharma, VK Yadav, MC Trivedi, A Gupta
Proceedings of the Second International Conference on Information and …, 2016
92016
Video Steganography using Concept of DNA Sequence and Index Compression Technique
VKS Pooja Dixit, Munesh Chandra Trivedi, Avdhesh Kumar Gupta, Virendra Kumar ...
International Journal of Engineering and Advanced Technology (IJEAT) 8 (5), 2019
6*2019
Zero Distortion Technique: An approach to image steganography on color images using strength of Chaotic Sequence
Shivani, VK Yadav, S Batham
Proceedings of the 2014 International Conference on Information and …, 2014
62014
The system can't perform the operation now. Try again later.
Articles 1–20