Follow
Virendra Kumar Yadav
Title
Cited by
Cited by
Year
Traditional and hybrid encryption techniques: a survey
P Dixit, AK Gupta, MC Trivedi, VK Yadav
Networking Communication and Data Knowledge Engineering: Volume 2, 239-248, 2018
822018
Detection techniques of DDoS attacks: A survey
P Kamboj, MC Trivedi, VK Yadav, VK Singh
2017 4th IEEE Uttar Pradesh section international conference on electrical …, 2017
572017
Audio steganography techniques: A survey
S Mishra, VK Yadav, MC Trivedi, T Shrimali
Advances in Computer and Computational Sciences: Proceedings of ICCCCS 2016 …, 2018
532018
Analysis of different text steganography techniques: A survey
S Sharma, A Gupta, MC Trivedi, VK Yadav
2016 Second international conference on computational intelligence …, 2016
482016
A novel approach of bulk data hiding using text steganography
VK Yadav, S Batham
Procedia Computer Science 57, 1401-1410, 2015
482015
Approach to accurate circle detection: Circular Hough Transform and Local Maxima concept
VK Yadav, S Batham, AK Acharya, R Paul
2014 International Conference on Electronics and Communication Systems …, 2014
452014
Hiding large amount of data using a new approach of video steganography
R Paul, AK Acharya, VK Yadav, S Batham
Confluence 2013: The next generation information technology summit (4th …, 2013
412013
Analysis of several image steganography techniques in spatial domain: A survey
MC Trivedi, S Sharma, VK Yadav
Proceedings of the Second International Conference on Information and …, 2016
312016
DDA: an approach to handle DDoS (Ping Flood) attack
VK Yadav, MC Trivedi, BM Mehtre
Proceedings of International Conference on ICT for Sustainable Development …, 2016
272016
An approach to electronic voting system using UIDAI
VK Yadav, S Batham, M Jain, S Sharma
2014 International conference on electronics and communication systems …, 2014
252014
Congestion control techniques in MANET: a survey
N Sharma, A Gupta, SS Rajput, VK Yadav
2016 Second international conference on computational intelligence …, 2016
232016
A New Video Encryption Algorithm Based on Indexed Based Chaotic Sequence
S Batham, AK Acharya, VK Yadav, R Paulo
Confluence 2013: The Next Generation Information Technology Summit (4th …, 2014
192014
Metamorphic cryptography using strength of chaotic sequence and XORing method
MC Trivedi, S Mishra, VK Yadav
Journal of Intelligent & Fuzzy Systems 32 (5), 3365-3375, 2017
162017
ICSECV: an efficient approach of video encryption
S Batham, VK Yadav, AK Mallik
2014 Seventh international conference on contemporary computing (IC3), 425-430, 2014
152014
Zero distortion technique: an approach to image steganography using strength of indexed based chaotic sequence
S Sharma, VK Yadav, S Batham
Security in Computing and Communications: Second International Symposium …, 2014
152014
Metamorphic cryptography considering concept of XOR and chaotic sequence: using video as medium
N Singh, MC Trivedi, VK Yadav, VK Singh
2017 9th international conference on information technology and electrical …, 2017
102017
Trends in digital video steganography: a survey
N Singh, VK Yadav
International Journal of Computer Applications 169 (7), 6-18, 2017
102017
Audio steganography using ZDT: encryption using indexed based chaotic sequence
S Sharma, VK Yadav, MC Trivedi, A Gupta
Proceedings of the Second International Conference on Information and …, 2016
92016
Quantification of Radiomics features of Peritumoral Vasogenic Edema extracted from fluid‐attenuated inversion recovery images in glioblastoma and isolated brain metastasis …
PS Parvaze, R Bhattacharjee, YK Verma, RK Singh, V Yadav, A Singh, ...
NMR in Biomedicine 36 (5), e4884, 2023
7*2023
Comparative evaluation of intracranial oligodendroglioma and astrocytoma of similar grades using conventional and T1-weighted DCE-MRI
M Gupta, A Gupta, V Yadav, SP Parvaze, A Singh, J Saini, R Patir, ...
Neuroradiology, 1-13, 2021
62021
The system can't perform the operation now. Try again later.
Articles 1–20