Follow
Dr. Ravi Sheth
Dr. Ravi Sheth
Rashtriya Raksha University
Verified email at rru.ac.in - Homepage
Title
Cited by
Cited by
Year
Secured digital image watermarking with discrete cosine transform and discrete wavelet transform method
RK Sheth, VV Nath
2016 International Conference on Advances in Computing, Communication …, 2016
482016
Analysis and survey of digital watermarking techniques
M Patel, PS Sajja, RK Sheth
International Journal of Advanced Research in Computer Science and Software …, 2013
262013
Digital video forgery detection and authentication technique-A review
A Christian, R Sheth
International Journal of Scientific Research in Science and Technology …, 2016
152016
Secured digital video authentication system
A Christian, R Shelth
International Journal of Scientific Research in Science and Technology 3 (3 …, 2017
62017
A review on 0-day vulnerability testing in web application
P Kumar, RK Sheth
Proceedings of the Second International Conference on Information and …, 2016
62016
Comparative study of digital image forgery detection techniques
KH Hingrajiya, RK Sheth
2021 International Conference on Advance Computing and Innovative …, 2021
52021
An optimized convolution neural network based inter-frame forgery detection model—a multi-feature extraction framework
J Patel, R Sheth
ICTACT J. Image Video Process 12, 2570-2581, 2021
42021
Logical acquisition of iPhone without Jail Breaking
DRSP Parmar, R Sheth
IJSRST, 2018
42018
Passive video forgery detection techniques to detect copy move tampering through feature comparison and RANSAC
J Patel, R Sheth
Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021, 161-177, 2021
32021
Encrypting Data of MongoDB at Application Level
C Pariawala, R Sheth
Advances in Computational Sciences and Technology 10 (5), 1199-1205, 2017
32017
Handwritten character recognition system using chain code and correlation coefficient
R Sheth, NC Chauhan, MM Goyani, KA Mehta
International Conference on Recent Trends in Information Technology and …, 2011
32011
Discover broken authentication and session management vulnerabilities in asp. net web application
RR Sharma, RK Sheth
Int. J. Sci. Res. Sci. Technol. IJSRST 3 (1), 290-293, 2017
22017
Implementation of Digital image watermarking with the comparison between Least Significant Bit and Discrete Cosine Transform method
R Sheth, VV Nath
International Journal of Trend in Research and Development 2 (5), 2013
22013
Secure ASP. NET Web Application by Discovering Broken Authentication and Session Management Vulnerabilities
RR Sharma, RK Sheth
Orient. J. Comput. Sci. Technol. 10 (2), 359-363, 2017
12017
Emerging Security Threats and Challenges in IoT
P Parmar, R Sheth
Internet of Things and Cyber Physical Systems, 51-69, 2022
2022
Memory Acquisition Process for the Linux and Macintosh Based Operating System Using Open-Source Tool
R Sheth, A Shukla
Unleashing the Art of Digital Forensics, 39-52, 2022
2022
Cyber Crime Investigation and Preventing in Reference for Cloud Forensics: A Review
K Bhagariya, R Sheth, MD Dholariya
2021
Forensic Investigation of a Database for Web Application
H Patel, R Sheth, D Dholariya
2021
Histogram of Oriented Gradient-Based Abnormal Weapon Detection and Classification
JR Mangrolia, RK Sheth
Proceedings of International Conference on Communication and Computational …, 2021
2021
Etiological Spectrum of Lower Gastrointestinal Bleeding: Geographical Location Does Matter
SK Sinha, AK Singh
Journal of Digestive Endoscopy 10 (03), 163-165, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20