Follow
Raja Sekhar Krovi
Raja Sekhar Krovi
Koneru Lakshmaiah Education Foundation
Verified email at kluniversity.in
Title
Cited by
Cited by
Year
Performance evaluation parameters of image steganography techniques
KR Pradhan, A., Sahu, A.K., Swain, G., Sekhar
International Conference on Research Advances in Integrated Navigation …, 2016
115*2016
Digital Image Steganography Using LSB Substitution, PVD, and EMD
G Pradhan, A., Sekhar, K.R., Swain
Mathematical Problems in Engineering 8 (1804953), 1804953, 2018
60*2018
Adaptive PVD steganography using horizontal, vertical, and diagonal edges in six-pixel blocks
G Pradhan, A., Sekhar, K.R., Swain
Security and Communication Networks 1924618 (8), 1924618, 2017
50*2017
Digital image steganography based on seven way pixel value differencing
G Pradhan, A., Raja Sekhar, Krovi., Swain
Indian Journal of Science and Technology 9 (37), 88557, 2016
412016
An Empirical Study of Routing Attacks in Mobile Ad-hoc Networks
D Aluvala, S., Sekhar, K.R., Vodnala
Procedia Computer Science 92, 554-561, 2016
332016
A novel technique for node authentication in mobile ad hoc networks
DV Srinivas Aluvala, Dr. K. Raja Sekhar
Recent Trends in Engineering and Material Sciences 8 (September 2016), 680-682, 2016
30*2016
Redactable blockchain and it’s implementation in bitcoin
K Rajasekhar, SH Yalavarthy, S Mullapudi, M Gowtham
International Journal of Engineering & Technology 7 (1), 401-405, 2018
202018
Machine learning approach of hybrid KSVN algorithm to detect DDoS attack in VANET
N Kadam, RS Krovi
International Journal of Advanced Computer Science and Applications 12 (7), 2021
172021
User activity monitoring using keylogger
K Venkatesh, R., Raja Sekhar
Asian Journal of Information Technology 15 (23), 4758-4762, 2016
16*2016
Study on improving the network life time maximazation for wireless sensor network using cross layer approach
K Bhandari, R.R., Raja Sekhar
International Journal of Electrical and Computer Engineering 6 (6), 3080-3086, 2016
82016
A fabric architecture towards block chain application using hyper ledger
M Haseeb, M., Raja Sekhar, Krovi., Spandana, Y.V., Syam
International Journal of Engineering and Technology(UAE) 7 (2), 83-85, 2018
72018
Digital image steganography combining lsb substitution with five way PVD in 2×3 pixel blocks
G Pradhan, A., Raja Sekhar, K., Swain
International Journal of Pharmacy and Technology 8 (4), 22051-22061, 2016
72016
Secure and congestion free routing techniques in vehicular Ad-Hoc Network (VANET)
KR Kadam, N.N., Sekhar
International Journal of Recent Technology and Engineering 8 (1 Special …, 2019
62019
An integrated approach towards vulnerability assessment & penetration testing for a web application
P Siva Prasad, K., Raja Sekhar, K., Rajarajeswari
International Journal of Engineering and Technology(UAE) 7 (2.32 Special …, 2018
62018
Verification of pattern unlock and gait behavioural authentication through a machine learning approach
GK Chaitanya, K Raja Sekhar
International Journal of Intelligent Unmanned Systems 10 (1), 48-64, 2022
52022
Image steganography using add-sub based QVD and side match
A Pradhan, KR Sekhar, G Swain
Digital Media Steganography, 81-97, 2020
52020
Cloud environment: A review on dynamic resource allocation schemes
PP Nayudu, KR Sekhar
Int J Appl Eng Res 13 (6), 4568-4575, 2018
52018
Analysis of security threats and issues in MANETs
S Aluvala, K Sekhar, D Vodnala
International Journal on Advanced Computer Theory and Engineering (IJACTE …, 2015
52015
Secure system of attack patterns towards application security metric derivation
KR Sekhar, LSS Reddy, UJ Kameswari
International Journal of Computer Applications 53 (1), 11-18, 2012
52012
Secure federated learning architecture for fuzzy classifier in healthcare environment
S Vishwakarma, RS Goswami, PP Nayudu, KR Sekhar, PRR Arnepalli, ...
Soft Computing, 1-12, 2023
42023
The system can't perform the operation now. Try again later.
Articles 1–20