Follow
Mehak Khurana
Mehak Khurana
The NorthCap University
Verified email at ncuindia.edu
Title
Cited by
Cited by
Year
An asymmetric image encryption based on phase truncated hybrid transform
M Khurana, H Singh
3D Research 8, 1-17, 2017
462017
Secure image encryption technique based on jigsaw transform and chaotic scrambling using digital image watermarking
M Arora, M Khurana
Optical and Quantum Electronics 52 (2), 59, 2020
212020
A spiral-phase rear mounted triple masking for secure optical image encryption based on gyrator transform
M Khurana, H Singh
Recent patents on Computer Science 12 (2), 80-94, 2019
192019
Two level phase retrieval in fractional Hartley domain for secure image encryption and authentication using digital signatures
M Khurana, H Singh
Multimedia Tools and Applications 79 (19), 13967-13986, 2020
172020
Location privacy using homomorphic encryption over cloud
A Rohilla, M Khurana, L Singh
International Journal of Computer Network and Information Security 11 (8), 32, 2017
162017
Asymmetric optical image triple masking encryption based on Gyrator and Fresnel transforms to remove silhouette problem
M Khurana, H Singh
3D Research 9 (3), 38, 2018
152018
Cryptographic security using various encryption and decryption method
R Goyal, M Khurana
International Journal of Mathematical Sciences and Computing (IJMSC) 3 (3), 1-11, 2017
142017
Weighted centroid range free localization algorithm based on IOT
N Sharma, G Chawla, M Khurana
International Journal of Computer Applications 83 (9), 27-30, 2013
132013
Variants of Differential and Linear Cryptanalysis
M Khurana, M Kumari
Cryptology ePrint Archive, 2015
122015
Spiral-phase masked optical image health care encryption system for medical images based on fast Walsh-Hadamard transform for security enhancement
M Khurana, H Singh
International Journal of Healthcare Information Systems and Informatics …, 2018
112018
Multiple iris image encryption using phase retrieval mask, QZ algorithm and umbrella map in hybrid transform domain
P Rakheja, M Khurana
Optical and Quantum Electronics 55 (10), 878, 2023
92023
Security Primitives: Block and Stream Ciphers
MKM Kumari
International Journal of Innovations & Advancement in Computer Science 4 …, 2015
9*2015
Asymmetric optical image triple masking encryption based on gyrator and Fresnel transforms to remove silhouette problem. 3D Res. 9 (38),(2018)
M Khurana, H Singh
Google Scholar Google Scholar Digital Library Digital Library, 2018
82018
Data computation and secure encryption based on gyrator transform using singular value decomposition and randomization
M Khurana, H Singh
Procedia computer science 132, 1636-1645, 2018
82018
Asymmetric optical image encryption using random Hilbert mask based on fast Walsh Hadamard transform
M Khurana, H Singh
2017 International Conference on Computing and Communication Technologies …, 2017
72017
An improvement of Centroid Algorithm based on distance in Wireless Sensor Network
M Khurana, A Payal
International Journal of Smart Sensors and Ad-Hoc Networks 1 (1), 28-32, 2011
72011
Cloud security: the future of data storage
P Bajaj, R Arora, M Khurana, S Mahajan
Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021, 87-98, 2022
62022
Analysis of DV-Hop Localization Algorithm in Wireless Sensor Networks
AP Mehak Khurana
Proceedings of the 5th National Conference; INDIACom-2011, 2011
6*2011
Optical image encryption using Fresnel zone plate mask based on fast Walsh Hadamard transform
M Khurana, H Singh
AIP Conference Proceedings 1953 (1), 2018
52018
Buffer overflow and SQL injection: To remotely attack and access information
M Khurana, R Yadav, M Kumari
Cyber Security: Proceedings of CSI 2015, 301-313, 2018
52018
The system can't perform the operation now. Try again later.
Articles 1–20