Follow
Muni Sekhar V
Muni Sekhar V
Vardhaman College of Engineering
Verified email at vardhaman.org - Homepage
Title
Cited by
Cited by
Year
Security-aware software development life cycle (SaSDLC)-processes and tools
AK Talukder, VK Maurya, BG Santhosh, E Jangam, SV Muni, KP Jevitha, ...
2009 IFIP International Conference on Wireless and Optical Communications …, 2009
432009
CNN based Optical Character Recognition and Applications
MS Sarika, N., Sirisala, N., Velpuru
6th International Conference on Inventive Computation Technologies, 666–672, 2021
24*2021
Suraksha: A security designers’ workbench
G Santhosh Babu, VK Maurya, E Jangam, V Muni Sekhar, AK Talukder, ...
Hack. in 2009, 59, 2009
192009
Comparing the Capacity, NCC, and Fidelity of Various Quantization Intervals on DWT
VM Sekhar, KVG Rao, NS Rao, MG Chand
Innovations in Computer Science and Engineering: Proceedings of the Third …, 2016
112016
A Reversible RIE based Watermarking scheme
VM Sekhar, CS Kumar, KVG Rao, NS Rao, M Gopichand
2017 IEEE 7th International Advance Computing Conference (IACC), 925-930, 2017
62017
Comprehensive study of Deep learning based Telugu OCR
MS Velpuru, P Chatterjee, G Tejasree, MR Kumar, SN Rao
2020 Third International Conference on Smart Systems and Inventive …, 2020
52020
Guaranteed Quality of Service in cloud ready application
VM Sekhar, MR Kumar, KV Rao, NS Rao
2013 International Symposium on Computational and Business Intelligence, 24-28, 2013
52013
Improved Qualitative Color Image Steganography based on DWT
V Muni Sekhar, M Naresh Goud, N Arjun
International Journal of Computer Science and Information Technologies 5 (4 …, 2014
42014
Conventional Cloud Application Development: SOA
V Muni Sekhar, KVG Rao, NS Rao
Published in IJAC 2 (3), 108-112, 2011
42011
Laplacian: Reversible data hiding technique
VM Sekhar, CS Kumar
2019 Fifth International Conference on Image Information Processing (ICIIP …, 2019
32019
Content-aware Reversible data hiding: URHS
V Muni Sekhar, PB Reddy, NS Rao
Intelligent Engineering Informatics: Proceedings of the 6th International …, 2018
32018
Enhanced Adaptive Data hiding in DWT
R Sekhar, S Rao, NS Rao
Journal of Computer Engineering 17 (2), 30-40, 2015
32015
Enhanced Adaptive Data hiding in DWT
VM Sekhar, KVG Rao, NS Rao
IOSR Journal of Computer Engineering 17 (2), 30-40, 2015
32015
Success of H1-B VISA Using ANN
T Chatterjee, P., Velpuru, M.S., Jagadeeswari
Advances in Intelligent Systems and Computing, 491–499, 2021
2*2021
An attack on Image authentication: unaltered histogram
CK Muni Sekhar Velpuru, K V Rao, N Sambasiva Rao, R. Sarika
International Journal of Applied Engineering Research 11 (11), 7217-7222, 2016
2016
Reference Cover Image Steganography
DNSR V Muni Sekhar, Dr. K V G Rao
Advances in Computational Sciences and Technology 8 (1), 17-28, 2015
2015
Passive Attack Resistive Key Distribution Scenario: QKD
DNSR V. Muni Sekhar , CH. Sravan Kumar and Dr. KVG Rao
International Journal of Applied Engineering Research 10 (1), 925-935, 2015
2015
IDENTIFICATION OF ATTACK SURFACE IN GRID DEPLOYMENT
MS VELPURU
NATIONAL INSTITUTE OF TECHNOLOGY KARNATAKA SURATHKAL, 2009
2009
Analysis of Crash Recovery Failure Detection with Quality of Services
B Sushma, BVR Krishna, MS Velpruru
A Novel QR Code Watermarking In Digital Media Using DWT
BV SE, V Muni Sekhar
The system can't perform the operation now. Try again later.
Articles 1–20