Folgen
Virendra Kumar Yadav
Virendra Kumar Yadav
Bestätigte E-Mail-Adresse bei cbme.iitd.ac.in - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Traditional and hybrid encryption techniques: a survey
P Dixit, AK Gupta, MC Trivedi, VK Yadav
Networking Communication and Data Knowledge Engineering: Volume 2, 239-248, 2018
912018
Audio steganography techniques: A survey
S Mishra, VK Yadav, MC Trivedi, T Shrimali
Advances in Computer and Computational Sciences: Proceedings of ICCCCS 2016 …, 2018
762018
Detection techniques of DDoS attacks: A survey
P Kamboj, MC Trivedi, VK Yadav, VK Singh
2017 4th IEEE Uttar Pradesh section international conference on electrical …, 2017
592017
Analysis of different text steganography techniques: a survey
S Sharma, A Gupta, MC Trivedi, VK Yadav
2016 Second international conference on computational intelligence …, 2016
492016
A novel approach of bulk data hiding using text steganography
VK Yadav, S Batham
Procedia Computer Science 57, 1401-1410, 2015
482015
Approach to accurate circle detection: Circular Hough Transform and Local Maxima concept
VK Yadav, S Batham, AK Acharya, R Paul
2014 International Conference on Electronics and Communication Systems …, 2014
472014
Hiding large amount of data using a new approach of video steganography
R Paul, AK Acharya, VK Yadav, S Batham
Confluence 2013: The next generation information technology summit (4th …, 2013
412013
Analysis of several image steganography techniques in spatial domain: A survey
MC Trivedi, S Sharma, VK Yadav
Proceedings of the Second International Conference on Information and …, 2016
332016
DDA: an approach to handle DDoS (Ping Flood) attack
VK Yadav, MC Trivedi, BM Mehtre
Proceedings of International Conference on ICT for Sustainable Development …, 2016
292016
Congestion control techniques in MANET: a survey
N Sharma, A Gupta, SS Rajput, VK Yadav
2016 Second international conference on computational intelligence …, 2016
242016
An approach to electronic voting system using UIDAI
VK Yadav, S Batham, M Jain, S Sharma
2014 International conference on electronics and communication systems …, 2014
242014
A New Video Encryption Algorithm Based on Indexed Based Chaotic Sequence
S Batham, AK Acharya, VK Yadav, R Paulo
Confluence 2013: The Next Generation Information Technology Summit (4th …, 2014
192014
Metamorphic cryptography using strength of chaotic sequence and XORing method
MC Trivedi, S Mishra, VK Yadav
Journal of Intelligent & Fuzzy Systems 32 (5), 3365-3375, 2017
162017
ICSECV: an efficient approach of video encryption
S Batham, VK Yadav, AK Mallik
2014 Seventh international conference on contemporary computing (IC3), 425-430, 2014
152014
Zero distortion technique: an approach to image steganography using strength of indexed based chaotic sequence
S Sharma, VK Yadav, S Batham
Security in Computing and Communications: Second International Symposium …, 2014
152014
Quantification of Radiomics features of Peritumoral Vasogenic Edema extracted from fluid‐attenuated inversion recovery images in glioblastoma and isolated brain metastasis …
PS Parvaze, R Bhattacharjee, YK Verma, RK Singh, V Yadav, A Singh, ...
NMR in Biomedicine 36 (5), e4884, 2023
12*2023
Comparative evaluation of intracranial oligodendroglioma and astrocytoma of similar grades using conventional and T1-weighted DCE-MRI
M Gupta, A Gupta, V Yadav, SP Parvaze, A Singh, J Saini, R Patir, ...
Neuroradiology, 1-13, 2021
102021
Metamorphic cryptography considering concept of XOR and chaotic sequence: using video as medium
N Singh, MC Trivedi, VK Yadav, VK Singh
2017 9th international conference on information technology and electrical …, 2017
102017
Trends in digital video steganography: a survey
N Singh, VK Yadav
International Journal of Computer Applications 169 (7), 6-18, 2017
102017
Audio steganography using ZDT: encryption using indexed based chaotic sequence
S Sharma, VK Yadav, MC Trivedi, A Gupta
Proceedings of the Second International Conference on Information and …, 2016
92016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20