Evaluation of various LSB based methods of image steganography on GIF file format N Tiwari, DM Shandilya International Journal of Computer Applications 6 (2), 1-4, 2010 | 69 | 2010 |
Secure RGB image steganography from pixel indicator to triple algorithm-an incremental growth N Tiwari, M Shandilya International Journal of Security and Its Applications 4 (4), 53-62, 2010 | 61 | 2010 |
Effective implementation and avalanche effect of AES A Kumar, N Tiwari International Journal of Security, Privacy and Trust Management (IJSPTM) 1 …, 2012 | 60 | 2012 |
Survey of DDoS attacks based on TCP/IP protocol vulnerabilities S Acharya, N Tiwari IOSR Journal of Computer Engineering 18 (3), 68-76, 2016 | 38 | 2016 |
Image encryption using pseudo random number generators AK Banthia, N Tiwari International Journal of Computer Applications 67 (20), 2013 | 29 | 2013 |
Spatial domain image steganography based on security and randomization N Tiwari, M Sandilya, M Chawla International Journal of Advanced Computer Science and Applications 5 (1), 2014 | 21 | 2014 |
Digital watermarking applications, parameter measures and techniques N Tiwari International Journal of Computer Science and Network Security (IJCSNS) 17 …, 2017 | 15 | 2017 |
Different method used in pixel value differencing algorithm T Dhruw, N Tiwari IOSR Journal of Computer Engineering 18, 102-109, 2016 | 13 | 2016 |
Privacy preserving data sharing method for social media platforms S Yadav, N Tiwari PloS one 18 (1), e0280182, 2023 | 8 | 2023 |
Performance analysis of SHA algorithms (SHA-1 and SHA-192): a review P Garg, N Tiwari International Journal of Computer Technology and Electronics Engineering 2 …, 2012 | 8 | 2012 |
Quantum cryptanalytic attacks of symmetric ciphers: A review AK Malviya, N Tiwari, M Chawla Computers and Electrical Engineering 101, 108122, 2022 | 7 | 2022 |
An image encryption using block based transformation and bit rotation technique A Gupta, N Tiwari, M Chawla, M Shandilya International Journal of Computer Applications 98 (6), 2014 | 7 | 2014 |
Aes security enhancement by using double s-box A Kumar, N Tiwari International Journal of Computer Science and Information Technologies …, 2012 | 6 | 2012 |
Plant leaf disease classification using deep learning: A survey D Agarwal, M Chawla, N Tiwari 2021 Third International Conference on Inventive Research in Computing …, 2021 | 5 | 2021 |
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy R Goenka, M Chawla, N Tiwari International Journal of Information Security 23 (2), 819-848, 2024 | 4 | 2024 |
An Efficient and Secure Data Sharing Method Using Asymmetric Pairing with Shorter Ciphertext to Enable Rapid Learning in Healthcare S Yadav, N Tiwari Computational Intelligence and Neuroscience 2022, 2022 | 4 | 2022 |
Linear approximation of a vectorial Boolean function using quantum computing AK Malviya, N Tiwari Europhysics Letters 132 (4), 40001, 2020 | 4 | 2020 |
Security effect on AES in terms of avalanche effect by using alternate S-box N Tiwari, A Kumar International Conference on Intelligent Data Communication Technologies and …, 2019 | 4 | 2019 |
Image encryption using block shuffling and affine transform: A review H Somani, N Tiwari, M Chawla, M Shandilya International Journal of Computer Applications 95 (19), 2014 | 4 | 2014 |
Effective implementation and evaluation of AES in Matlab A Kumar, N Tiwari Advances in Computing and Information Technology: Proceedings of the Second …, 2012 | 4 | 2012 |