Follow
Namita Tiwari
Namita Tiwari
Verified email at manit.ac.in
Title
Cited by
Cited by
Year
Evaluation of various LSB based methods of image steganography on GIF file format
N Tiwari, DM Shandilya
International Journal of Computer Applications 6 (2), 1-4, 2010
692010
Secure RGB image steganography from pixel indicator to triple algorithm-an incremental growth
N Tiwari, M Shandilya
International Journal of Security and Its Applications 4 (4), 53-62, 2010
612010
Effective implementation and avalanche effect of AES
A Kumar, N Tiwari
International Journal of Security, Privacy and Trust Management (IJSPTM) 1 …, 2012
602012
Survey of DDoS attacks based on TCP/IP protocol vulnerabilities
S Acharya, N Tiwari
IOSR Journal of Computer Engineering 18 (3), 68-76, 2016
382016
Image encryption using pseudo random number generators
AK Banthia, N Tiwari
International Journal of Computer Applications 67 (20), 2013
292013
Spatial domain image steganography based on security and randomization
N Tiwari, M Sandilya, M Chawla
International Journal of Advanced Computer Science and Applications 5 (1), 2014
212014
Digital watermarking applications, parameter measures and techniques
N Tiwari
International Journal of Computer Science and Network Security (IJCSNS) 17 …, 2017
152017
Different method used in pixel value differencing algorithm
T Dhruw, N Tiwari
IOSR Journal of Computer Engineering 18, 102-109, 2016
132016
Privacy preserving data sharing method for social media platforms
S Yadav, N Tiwari
PloS one 18 (1), e0280182, 2023
82023
Performance analysis of SHA algorithms (SHA-1 and SHA-192): a review
P Garg, N Tiwari
International Journal of Computer Technology and Electronics Engineering 2 …, 2012
82012
Quantum cryptanalytic attacks of symmetric ciphers: A review
AK Malviya, N Tiwari, M Chawla
Computers and Electrical Engineering 101, 108122, 2022
72022
An image encryption using block based transformation and bit rotation technique
A Gupta, N Tiwari, M Chawla, M Shandilya
International Journal of Computer Applications 98 (6), 2014
72014
Aes security enhancement by using double s-box
A Kumar, N Tiwari
International Journal of Computer Science and Information Technologies …, 2012
62012
Plant leaf disease classification using deep learning: A survey
D Agarwal, M Chawla, N Tiwari
2021 Third International Conference on Inventive Research in Computing …, 2021
52021
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy
R Goenka, M Chawla, N Tiwari
International Journal of Information Security 23 (2), 819-848, 2024
42024
An Efficient and Secure Data Sharing Method Using Asymmetric Pairing with Shorter Ciphertext to Enable Rapid Learning in Healthcare
S Yadav, N Tiwari
Computational Intelligence and Neuroscience 2022, 2022
42022
Linear approximation of a vectorial Boolean function using quantum computing
AK Malviya, N Tiwari
Europhysics Letters 132 (4), 40001, 2020
42020
Security effect on AES in terms of avalanche effect by using alternate S-box
N Tiwari, A Kumar
International Conference on Intelligent Data Communication Technologies and …, 2019
42019
Image encryption using block shuffling and affine transform: A review
H Somani, N Tiwari, M Chawla, M Shandilya
International Journal of Computer Applications 95 (19), 2014
42014
Effective implementation and evaluation of AES in Matlab
A Kumar, N Tiwari
Advances in Computing and Information Technology: Proceedings of the Second …, 2012
42012
The system can't perform the operation now. Try again later.
Articles 1–20