Renuka A
Renuka A
Professor, Computer Science and Engg. Dept., Manipal University
Verified email at manipal.edu
TitleCited byYear
A secure and high capacity image steganography technique
UD Acharya, PR Kamath
arXiv preprint arXiv:1304.3629, 2013
582013
A secure color image steganography in transform domain
UD Acharya, PR Kamath
arXiv preprint arXiv:1304.3313, 2013
492013
Wavelet transform based steganography technique to hide audio signals in image
S Hemalatha, UD Acharya, A Renuka
Procedia Computer Science 47, 272-281, 2015
432015
Linear models of cumulative distribution function for content-based medical image retrieval
KN Manjunath, A Renuka, UC Niranjan
Journal of medical systems 31 (6), 433-443, 2007
262007
Cluster based group key management in mobile ad hoc networks
A Renuka, KC Shet
222009
Hierarchical approach for key management in mobile Ad hoc networks
A Renuka, KC Shet
International Journal of Computer Science and Information Security, 5 (1), 87-95, 2009
172009
A secure image steganography technique using Integer Wavelet Transform
S Hemalatha, A Renuka, UD Acharya, PR Kamath
2012 World Congress on Information and Communication Technologies, 755-758, 2012
142012
Comparison of secure and high capacity color image steganography techniques in RGB and YCbCr domains
S Hemalatha, UD Acharya, A Renuka
arXiv preprint arXiv:1307.3026, 2013
132013
Anaerobic bacteria in clinical specimens–frequent, but a neglected lot: a five year experience at a tertiary care hospital
PA Shenoy, S Vishwanath, A Gawda, S Shetty, R Anegundi, M Varma, ...
Journal of clinical and diagnostic research: JCDR 11 (7), DC44, 2017
92017
A secure image steganography technique to hide multiple secret images
S Hemalatha, UD Acharya, A Renuka, PR Kamath
Computer Networks & Communications (NetCom), 613-620, 2013
92013
A novel colorimage steganography using discrete wavelet transform
S Hemalatha, UD Acharya, A Renuka, PR Kamath
Proceedings of the Second International Conference on Computational Science …, 2012
82012
Audio data hiding technique using integer wavelet transform
S Hemalatha, UD Acharya, A Renuka
International Journal of Electronic Security and Digital Forensics 8 (2 …, 2016
62016
An integer wavelet transform based steganography technique for color images
S Hemalatha, DU Acharya, A Renuka, PR Kamath
International Journal of Information & Computation Technology 3 (1), 13-24, 2013
62013
High quality technique for image steganography using discrete wavelet transform
PR Kamath, S Hemalatha, DU Acharya, A Renuka
42012
High capacity video steganography technique in transform domain
S Hemalatha, UD Acharya, A Renuka
Pertanika J. Sci. Technol 24 (2), 411-422, 2016
22016
Data Hiding in audio signals using wavelet transform with enhanced security
S Deepthi, A Renuka, S Hemalatha
Natarajan Meghanathan: ITCSE, ICDIP, ICAIT–2013, 137-146, 2013
22013
Key management using k-dimensional trees
A Renuka, KC Shet
2008 16th International Conference on Advanced Computing and Communications …, 2008
22008
Information hiding through dynamic text steganography and cryptography: Computing and informatics
D Bhat, V Krithi, KN Manjunath, S Prabhu, A Renuka
2017 International Conference on Advances in Computing, Communications and …, 2017
12017
Avoiding queue overflow and reducing queuing delay at eNodeB in LTE networks using congestion feedback mechanism
ND Adesh, A Renuka
Computer Communications 146, 131-143, 2019
2019
Adaptive downlink packet scheduling in LTE networks based on queue monitoring
ND Adesh, A Renuka
Wireless Networks 25 (6), 3149-3166, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20