Renuka A
Renuka A
Professor, Computer Science and Engg. Dept., Manipal University
Verified email at
Cited by
Cited by
A secure and high capacity image steganography technique
UD Acharya, PR Kamath
arXiv preprint arXiv:1304.3629, 2013
Wavelet transform based steganography technique to hide audio signals in image
S Hemalatha, UD Acharya, A Renuka
Procedia Computer Science 47, 272-281, 2015
A secure color image steganography in transform domain
UD Acharya, PR Kamath
arXiv preprint arXiv:1304.3313, 2013
Linear models of cumulative distribution function for content-based medical image retrieval
KN Manjunath, A Renuka, UC Niranjan
Journal of medical systems 31 (6), 433-443, 2007
Anaerobic bacteria in clinical specimens–frequent, but a neglected lot: a five year experience at a tertiary care hospital
PA Shenoy, S Vishwanath, A Gawda, S Shetty, R Anegundi, M Varma, ...
Journal of clinical and diagnostic research: JCDR 11 (7), DC44, 2017
Comparison of secure and high capacity color image steganography techniques in RGB and YCbCr domains
S Hemalatha, UD Acharya, A Renuka
arXiv preprint arXiv:1307.3026, 2013
A secure image steganography technique using Integer Wavelet Transform
S Hemalatha, A Renuka, UD Acharya, PR Kamath
2012 World Congress on Information and Communication Technologies, 755-758, 2012
Cluster based group key management in mobile ad hoc networks
A Renuka, KC Shet
Hierarchical approach for key management in mobile Ad hoc networks
A Renuka, KC Shet
International Journal of Computer Science and Information Security, 5 (1), 87-95, 2009
Audio data hiding technique using integer wavelet transform
S Hemalatha, UD Acharya, A Renuka
International Journal of Electronic Security and Digital Forensics 8 (2 …, 2016
Techniques for segmentation and classification of leukocytes in blood smear images-a review
S Sapna, A Renuka
2017 IEEE International Conference on Computational Intelligence and …, 2017
A secure image steganography technique to hide multiple secret images
S Hemalatha, U Dinesh Acharya, A Renuka, PR Kamath
Computer Networks & Communications (NetCom), 613-620, 2013
Computer-aided system for Leukocyte nucleus segmentation and Leukocyte classification based on nucleus characteristics
S Sapna, A Renuka
International Journal of Computers and Applications 42 (6), 622-633, 2020
Information hiding through dynamic text steganography and cryptography: computing and informatics
D Bhat, V Krithi, KN Manjunath, S Prabhu, A Renuka
2017 international conference on advances in computing, communications and …, 2017
An integer wavelet transform based steganography technique for color images
S Hemalatha, DU Acharya, A Renuka, PR Kamath
International Journal of Information & Computation Technology 3 (1), 13-24, 2013
Adaptive downlink packet scheduling in LTE networks based on queue monitoring
ND Adesh, A Renuka
Wireless Networks 25 (6), 3149-3166, 2019
Audio steganography in discrete wavelet transform domain
S Hemalatha, UD Acharya, A Renuka, S Deepthi, KJ Upadhya
International Journal of Applied Engineering Research 10 (16), 37544-37549, 2015
A novel colorimage steganography using discrete wavelet transform
S Hemalatha, UD Acharya, A Renuka, PR Kamath
Proceedings of the Second International Conference on Computational Science …, 2012
Avoiding queue overflow and reducing queuing delay at eNodeB in LTE networks using congestion feedback mechanism
ND Adesh, A Renuka
Computer Communications 146, 131-143, 2019
Security of medical big data images using decoy technique
US Bhargavi, S Gundibail, KN Manjunath, A Renuka
2019 International Conference on Automation, Computational and Technology …, 2019
The system can't perform the operation now. Try again later.
Articles 1–20