Implementation of ElGamal Elliptic Curve Cryptography over prime field using C D Boruah, M Saikia International Conference on Information Communication and Embedded Systems …, 2014 | 29 | 2014 |
Hiding secret image in video V Thakur, M Saikia 2013 International Conference on Intelligent Systems and Signal Processing …, 2013 | 23 | 2013 |
A novel partial image encryption using chaotic logistic map N Hazarika, M Saikia 2014 International Conference on Signal Processing and Integrated Networks …, 2014 | 22 | 2014 |
A wavelet based partial image encryption using chaotic logistic map N Hazarika, S Borah, M Saikia 2014 IEEE international conference on advanced communications, control and …, 2014 | 20 | 2014 |
Survey on block matching algorithms for motion estimation HA Choudhury, M Saikia 2014 International Conference on Communication and Signal Processing, 036-040, 2014 | 18 | 2014 |
Coded fingerprinting based watermarking to resist collusion attacks and trace colluders M Saikia, S Majumder, TS Das, MA Hussain, SK Sarkar 2010 International Conference on Advances in Computer Engineering, 120-124, 2010 | 17 | 2010 |
An FPGA implementation of chaos based image encryption and its performance analysis B Baruah, M Saikia IJCSN-International Journal of Computer Science and Network 5 (5), 2016 | 13 | 2016 |
Nature inspired algorithms (NIA) for efficient video compression–A brief study HA Choudhury, N Sinha, M Saikia Engineering Science and Technology, an International Journal 23 (3), 507-526, 2020 | 11 | 2020 |
Block matching algorithms for motion estimation: a performance-based study HA Choudhury, M Saikia Advances in Communication and Computing, 149-160, 2015 | 11 | 2015 |
Comparative study of block matching algorithms HA Choudhury, M Saikia International Journal of Advanced Computational Engineering and Networking 1 …, 2013 | 11 | 2013 |
Chaotic map based image encryption in spatial domain: a brief survey M Saikia, B Baruah Proceedings of the First International Conference on Intelligent Computing …, 2017 | 10 | 2017 |
A review on desirable measures for good Key Pre-distribution Scheme in wireless sensor network M Saikia, I Acharjamayum, MA Hussain 2015 International Conference on Green Computing and Internet of Things …, 2015 | 10 | 2015 |
A cloud based secure voting system using homomorphic encryption for android platform M Ranjan, AH Mondal, M Saikia International Journal of Electrical and Computer Engineering (IJECE) 6 (6 …, 2016 | 9 | 2016 |
Multiple Encryption using ECC and its Time Complexity Analysis‖ V Kumar, R Kumar, MA Barbhuiya, M Saikia International Journal of Computer Engineering In Research Trends 3 (11), 568-572, 2016 | 9 | 2016 |
A review on applications of multimedia encryption M Saikia, SJ Bora, MA Hussain national conference on Network Security-issues, challenges and Techniques, 30-33, 2012 | 9 | 2012 |
Spread spectrum embedding of colluder traceable codeword in multimedia M Saikia, S Majumder 2011 Second International Conference on Emerging Applications of Information …, 2011 | 8 | 2011 |
Improving the performance of key pre-distribution scheme in sensor network using clustering of combinatorics M Saikia, MA Hussain 2016 International Conference on Computing, Communication and Automation …, 2016 | 7 | 2016 |
Reduced three steps logarithmic search for motion estimation HA Choudhury, M Saikia International Conference on Information Communication and Embedded Systems …, 2014 | 7 | 2014 |
Combinatorial group based approach for key pre-distribution scheme in wireless sensor network M Saikia, MA Hussain 2017 International Conference on Computing, Communication and Automation …, 2017 | 6 | 2017 |
Secure energy aware multi-path routing with key management in wireless sensor network M Saikia, UK Das, MA Hussain 2017 4th international conference on signal processing and integrated …, 2017 | 5 | 2017 |