Secured digital image watermarking with discrete cosine transform and discrete wavelet transform method RK Sheth, VV Nath 2016 International Conference on Advances in Computing, Communication …, 2016 | 48 | 2016 |
Analysis and survey of digital watermarking techniques M Patel, PS Sajja, RK Sheth International Journal of Advanced Research in Computer Science and Software …, 2013 | 26 | 2013 |
Digital video forgery detection and authentication technique-A review A Christian, R Sheth International Journal of Scientific Research in Science and Technology …, 2016 | 15 | 2016 |
Secured digital video authentication system A Christian, R Shelth International Journal of Scientific Research in Science and Technology 3 (3 …, 2017 | 6 | 2017 |
A review on 0-day vulnerability testing in web application P Kumar, RK Sheth Proceedings of the Second International Conference on Information and …, 2016 | 6 | 2016 |
Comparative study of digital image forgery detection techniques KH Hingrajiya, RK Sheth 2021 International Conference on Advance Computing and Innovative …, 2021 | 5 | 2021 |
An optimized convolution neural network based inter-frame forgery detection model—a multi-feature extraction framework J Patel, R Sheth ICTACT J. Image Video Process 12, 2570-2581, 2021 | 4 | 2021 |
Logical acquisition of iPhone without Jail Breaking DRSP Parmar, R Sheth IJSRST, 2018 | 4 | 2018 |
Passive video forgery detection techniques to detect copy move tampering through feature comparison and RANSAC J Patel, R Sheth Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021, 161-177, 2021 | 3 | 2021 |
Encrypting Data of MongoDB at Application Level C Pariawala, R Sheth Advances in Computational Sciences and Technology 10 (5), 1199-1205, 2017 | 3 | 2017 |
Handwritten character recognition system using chain code and correlation coefficient R Sheth, NC Chauhan, MM Goyani, KA Mehta International Conference on Recent Trends in Information Technology and …, 2011 | 3 | 2011 |
Discover broken authentication and session management vulnerabilities in asp. net web application RR Sharma, RK Sheth Int. J. Sci. Res. Sci. Technol. IJSRST 3 (1), 290-293, 2017 | 2 | 2017 |
Implementation of Digital image watermarking with the comparison between Least Significant Bit and Discrete Cosine Transform method R Sheth, VV Nath International Journal of Trend in Research and Development 2 (5), 2013 | 2 | 2013 |
Secure ASP. NET Web Application by Discovering Broken Authentication and Session Management Vulnerabilities RR Sharma, RK Sheth Orient. J. Comput. Sci. Technol. 10 (2), 359-363, 2017 | 1 | 2017 |
Emerging Security Threats and Challenges in IoT P Parmar, R Sheth Internet of Things and Cyber Physical Systems, 51-69, 2022 | | 2022 |
Memory Acquisition Process for the Linux and Macintosh Based Operating System Using Open-Source Tool R Sheth, A Shukla Unleashing the Art of Digital Forensics, 39-52, 2022 | | 2022 |
Cyber Crime Investigation and Preventing in Reference for Cloud Forensics: A Review K Bhagariya, R Sheth, MD Dholariya | | 2021 |
Forensic Investigation of a Database for Web Application H Patel, R Sheth, D Dholariya | | 2021 |
Histogram of Oriented Gradient-Based Abnormal Weapon Detection and Classification JR Mangrolia, RK Sheth Proceedings of International Conference on Communication and Computational …, 2021 | | 2021 |
Etiological Spectrum of Lower Gastrointestinal Bleeding: Geographical Location Does Matter SK Sinha, AK Singh Journal of Digestive Endoscopy 10 (03), 163-165, 2019 | | 2019 |