A steganography algorithm for hiding image in image by improved LSB substitution by minimize detection VK Sharma, V Shrivastava Journal of Theoretical and Applied Information Technology 36 (1), 1-8, 2012 | 111 | 2012 |
Efficient image steganography using graph signal processing VK Sharma, DK Srivastava, P Mathur IET Image Processing 12 (6), 1065-1071, 2018 | 44 | 2018 |
Detection and Classification of ECG Noises using Decomposition on MixedCodebook for Quality Analysis sharma vijay Kumar, Pramendra Healthcare Technology Letters, 2020 | 41 | 2020 |
Highly Secure DWT Steganography Scheme for Encrypted Data Hiding DS Vijay Kumar sharma, Pratistha Mathur Information and Communication Technology for Intelligent Systems 1, 665-674, 2019 | 18* | 2019 |
Secure link establishment method to prevent jelly fish attack in MANET A Thomas, VK Sharma, G Singhal 2015 International Conference on Computational Intelligence and …, 2015 | 17 | 2015 |
Comprehensive data hiding technique for discrete wavelet transform-based image steganography using advance encryption standard VK Sharma, DK Srivastava Computing and Network Sustainability: Proceedings of IRSCNS 2016, 353-360, 2017 | 16 | 2017 |
Hilbert quantum image scrambling and graph signal processing-based image steganography VK Sharma, PC Sharma, H Goud, A Singh Multimedia Tools and Applications 81 (13), 17817-17830, 2022 | 15 | 2022 |
Modified Particle Swarm Optimization Based on Aging Leaders and Challengers Model for Task Scheduling in Cloud Computing SS Shikha Chaudhary,Vijay Kumar Sharma , R. N. Thakur , Amit Rathi ... Mathematical Problems in Engineering 2023, 1-11, 2023 | 14* | 2023 |
DWT-SVD Based Image Steganography Using Threshold Value Encryption Method AZ Jyoti Khandelwal, Vijay Kumar SharmaDilbag Singh Computers, Materials and Continua 72 (2), 3299-3312, 2022 | 11 | 2022 |
A study of steganography based data hiding techniques V Sharma, D Srivastava, P Mathur, V Kumar International Journal of Emerging Research in Management and Technology 6 (4 …, 2017 | 11 | 2017 |
Eliminating cover image requirement in discrete wavelet transform based digital image steganography P Sehgal, VK Sharma International Journal of Computer Applications 68 (3), 2013 | 11 | 2013 |
Overlapped flowers yield detection using computer-based interface A Sharma, VK Sharma, DK Srivastava Perspectives in Science 8, 25-27, 2016 | 10 | 2016 |
A daubechies DWT based image steganography using smoothing operation. VK Sharma, DK Srivastava, P Mathur Int. Arab J. Inf. Technol. 17 (2), 154-161, 2020 | 9 | 2020 |
Improved segmentation technique for underwater images based on k-means and local adaptive thresholding AA Rajeev, S Hiranwal, VK Sharma Information and Communication Technology for Sustainable Development …, 2018 | 8 | 2018 |
Image Watermarking in Frequency Domain using Hu’s Invariant Moments and Firefly Algorithm S Sharma, S Choudhary, VK Sharma, A Goyal, MM Balihar | 7 | 2022 |
Secure Electronic Fund Transfer Model based on Two level Authentication DKS Viiay Kumar Sharma, Pratistha Mathur 2018 Second International Conference on Electronics, Communication and …, 2018 | 7 | 2018 |
Improving the performance of least significant bit substitution steganography against rs steganalysis by minimizing detection probability VK Sharma, V Shrivastava International Journal of Information and Communication Technology Research 1 (4), 2011 | 7 | 2011 |
Biometric Authentication-Based Data Encryption Using ECG Analysis and Diffie–Hellman Algorithm A Bhardwaj, S Chaudhary, VK Sharma Ambient Communications and Computer Systems: RACCCS-2018, 523-532, 2019 | 6 | 2019 |
W-VDSR: Wavelet-based secure image transmission using machine learning VDSR neural network J Khandelwal, VK Sharma Multimedia Tools and Applications 82 (27), 42147-42172, 2023 | 5 | 2023 |
Cardiac signals based methods for recognizing heart disease: A review P Kumar, VK Sharma 2021 Third International Conference on Intelligent Communication …, 2021 | 5 | 2021 |