A secure and high capacity image steganography technique UD Acharya, PR Kamath arXiv preprint arXiv:1304.3629, 2013 | 82 | 2013 |
Wavelet transform based steganography technique to hide audio signals in image S Hemalatha, UD Acharya, A Renuka Procedia Computer Science 47, 272-281, 2015 | 74 | 2015 |
A secure color image steganography in transform domain UD Acharya, PR Kamath arXiv preprint arXiv:1304.3313, 2013 | 58 | 2013 |
Improved artificial neural network with state order dataset estimation for brain cancer cell diagnosis D Indira, RK Ganiya, P Ashok Babu, A Xavier, L Kavisankar, S Hemalatha, ... BioMed Research International 2022, 2022 | 39 | 2022 |
Comparison of secure and high capacity color image steganography techniques in RGB and YCbCr domains S Hemalatha, UD Acharya, A Renuka arXiv preprint arXiv:1307.3026, 2013 | 24 | 2013 |
Machine learning-based secure data acquisition for fake accounts detection in future mobile communication networks B Prabhu Kavin, S Karki, S Hemalatha, D Singh, R Vijayalakshmi, ... Wireless Communications and Mobile Computing 2022, 1-10, 2022 | 21 | 2022 |
A secure image steganography technique using Integer Wavelet Transform S Hemalatha, A Renuka, UD Acharya, PR Kamath 2012 World Congress on Information and Communication Technologies, 755-758, 2012 | 20 | 2012 |
Sentiment analysis of yelp reviews by machine learning S Hemalatha, R Ramathmika 2019 International Conference on Intelligent Computing and Control Systems …, 2019 | 18 | 2019 |
Audio data hiding technique using integer wavelet transform S Hemalatha, UD Acharya, A Renuka International Journal of Electronic Security and Digital Forensics 8 (2 …, 2016 | 16 | 2016 |
Novel link establishment communication scheme against selfish attack using node reward with trust level evaluation algorithm in MANET S Hemalatha, PR Kshirsagar, H Manoharan, N Vasantha Gowri, A Vani, ... Wireless Communications and Mobile Computing 2022, 2022 | 15 | 2022 |
A secure image steganography technique to hide multiple secret images S Hemalatha, U Dinesh Acharya, A Renuka, PR Kamath Computer Networks & Communications (NetCom) Proceedings of the Fourth …, 2013 | 13 | 2013 |
Comparison between DCT and DWT steganography algorithms J Desai, S Hemalatha, SR Shishira International Journal of Advanced Information Science and Technology (IJAIST …, 2014 | 10 | 2014 |
A survey on augmented reality S Nivedha, S Hemalatha International Research Journal of Engineering and Technology 2 (2), 87-96, 2015 | 8 | 2015 |
A novel colorimage steganography using discrete wavelet transform S Hemalatha, UD Acharya, A Renuka, PR Kamath Proceedings of the Second International Conference on Computational Science …, 2012 | 8 | 2012 |
Audio steganography in discrete wavelet transform domain S Hemalatha, UD Acharya, A Renuka, S Deepthi, KJ Upadhya International Journal of Applied Engineering Research 10 (16), 37544-37549, 2015 | 7 | 2015 |
Enhancing user experience through physical interaction in handheld augmented reality S Nivedha, S Hemalatha 2015 International Conference on Computer Communication and Informatics …, 2015 | 7 | 2015 |
An integer wavelet transform based steganography technique for color images S Hemalatha, DU Acharya, A Renuka, PR Kamath International Journal of Information & Computation Technology 3 (1), 13-24, 2013 | 5 | 2013 |
A study on integrating IoT Applications with Blockchain G Selvakumar, S Hemalatha 2019 International Conference on Computer Communication and Informatics …, 2019 | 4 | 2019 |
Data hiding in audio signals using wavelet transform with enhanced security S Deepthi, A Renuka, S Hemalatha Computer Science & Information Technology (CS & IT), 2013 | 4 | 2013 |
High quality technique for image steganography using discrete wavelet transform PR Kamath, S Hemalatha, DU Acharya, A Renuka | 4 | 2012 |