Follow
Renuka A
Renuka A
Professor, Computer Science and Engg. Dept., Manipal University
Verified email at manipal.edu
Title
Cited by
Cited by
Year
A secure and high capacity image steganography technique
UD Acharya, PR Kamath
arXiv preprint arXiv:1304.3629, 2013
822013
Wavelet transform based steganography technique to hide audio signals in image
S Hemalatha, UD Acharya, A Renuka
Procedia Computer Science 47, 272-281, 2015
792015
A secure color image steganography in transform domain
UD Acharya, PR Kamath
arXiv preprint arXiv:1304.3313, 2013
582013
Anaerobic bacteria in clinical specimens–frequent, but a neglected lot: a five year experience at a tertiary care hospital
PA Shenoy, S Vishwanath, A Gawda, S Shetty, R Anegundi, M Varma, ...
Journal of clinical and diagnostic research: JCDR 11 (7), DC44, 2017
432017
Linear models of cumulative distribution function for content-based medical image retrieval
KN Manjunath, A Renuka, UC Niranjan
Journal of medical systems 31, 433-443, 2007
412007
Deep learning based object detection for resource constrained devices: Systematic review, future trends and challenges ahead
V Kamath, A Renuka
Neurocomputing 531, 34-60, 2023
262023
Comparison of secure and high capacity color image steganography techniques in RGB and YCbCr domains
S Hemalatha, UD Acharya, A Renuka
arXiv preprint arXiv:1307.3026, 2013
252013
Cluster based group key management in mobile ad hoc networks
A Renuka, KC Shet
International Journal of Computer Science and Network Security, 9 (4), 42-49, 2009
222009
A secure image steganography technique using Integer Wavelet Transform
S Hemalatha, A Renuka, UD Acharya, PR Kamath
2012 World Congress on Information and Communication Technologies, 755-758, 2012
202012
Hierarchical approach for key management in mobile Ad hoc networks
A Renuka, KC Shet
International Journal of Computer Science and Information Security, 5 (1), 87-95, 2009
192009
Computer-aided system for Leukocyte nucleus segmentation and Leukocyte classification based on nucleus characteristics
S Sapna, A Renuka
International Journal of Computers and Applications 42 (6), 622-633, 2020
172020
Audio data hiding technique using integer wavelet transform
S Hemalatha, UD Acharya, A Renuka
International Journal of Electronic Security and Digital Forensics 8 (2 …, 2016
162016
Techniques for segmentation and classification of leukocytes in blood smear images-a review
S Sapna, A Renuka
2017 IEEE International conference on computational intelligence and …, 2017
142017
Information hiding through dynamic text steganography and cryptography: Computing and informatics
D Bhat, V Krithi, KN Manjunath, S Prabhu, A Renuka
2017 international conference on advances in computing, communications and …, 2017
142017
A secure image steganography technique to hide multiple secret images
S Hemalatha, U Dinesh Acharya, A Renuka, PR Kamath
Computer Networks & Communications (NetCom) Proceedings of the Fourth …, 2013
132013
Adaptive downlink packet scheduling in LTE networks based on queue monitoring
ND Adesh, A Renuka
Wireless Networks 25, 3149-3166, 2019
112019
Performance analysis of the pretrained efficientdet for real-time object detection on raspberry pi
V Kamath, A Renuka
2021 International Conference on Circuits, Controls and Communications …, 2021
102021
Audio steganography in discrete wavelet transform domain
S Hemalatha, UD Acharya, A Renuka, S Deepthi, KJ Upadhya
International Journal of Applied Engineering Research 10 (16), 37544-37549, 2015
92015
Avoiding queue overflow and reducing queuing delay at eNodeB in LTE networks using congestion feedback mechanism
ND Adesh, A Renuka
Computer Communications 146, 131-143, 2019
82019
A novel colorimage steganography using discrete wavelet transform
S Hemalatha, UD Acharya, A Renuka, PR Kamath
Proceedings of the Second International Conference on Computational Science …, 2012
82012
The system can't perform the operation now. Try again later.
Articles 1–20