A novel hash based least significant bit (2-3-3) image steganography in spatial domain GR Manjula, A Danti arXiv preprint arXiv:1503.03674, 2015 | 54 | 2015 |
Secured data hiding of invariant sized secrete image based on discrete and hybrid wavelet transform A Danti, GR Manjula 2012 IEEE International Conference on Computational Intelligence and …, 2012 | 10 | 2012 |
DNA based steganography using 2-3-3 technique RB Sushma, MV Namitha, GR Manjula, S Johar, GS Hiriyanna 2019 International Conference on Data Science and Communication (IconDSC), 1-6, 2019 | 7 | 2019 |
Video steganography: a survey of techniques and methodologies M GR, S RB Proceedings of the International Conference on Smart Data Intelligence …, 2021 | 5 | 2021 |
Image stitching using correlation method S Johar, GR Manjula, MV Namita Imperial J. Interdiscip. Res 3, 282-290, 2017 | 5 | 2017 |
Embedding multiple images in a single image using Bit Plane Complexity Segmentation (BPCS) steganography GR Manujala, A Danti Asian Journal of Mathematics and Computer Research 2 (3), 136-142, 2015 | 5 | 2015 |
Video steganography using convolutional neural network and temporal residual method F Aiman, GR Manjula International Journal of Computer Applications 178, 24-29, 2019 | 4 | 2019 |
AN INNOVATIVE APPROACH FOR VIDEO STEGANOGRAPHY USING STATISTICAL FEATURES IN ROUND-LSB GRM Ajit Danti International Journal of Engineering Applied Sciences and Technology 1 (8 …, 2016 | 2 | 2016 |
Interfering sensed input classification model using assimilated whale optimization and deep Q-learning for remote patient monitoring S Johar, GR Manjula Biomedical Signal Processing and Control 93, 106202, 2024 | 1 | 2024 |
StegVRN: Enhancing Quality of Video Steganography Using CNN-Based Object Selection RB Sushma, GR Manjula SN Computer Science 5 (2), 227, 2024 | 1 | 2024 |
Live Audio Steganography Using LSBWAB to Covertly Communicate Secret Data MV Namitha, GR Manjula 2023 International Conference on Recent Advances in Information Technology …, 2023 | 1 | 2023 |
Survey of Various Machine Learning Techniques for Analyzing IoMT-Based Remote Patient Monitoring System S Johar, GR Manjula International Conference on Advances in Data Science and Computing …, 2022 | 1 | 2022 |
Steganography using Randomized Index Channel with Arnold Cat Map Encryption A Danti, GR Manjula, RB Sushma Proceedings of International conference on “Emerging Research in computing …, 2014 | 1 | 2014 |
Data Encryption by Excluding Repetitive Character in Cipher Text A Danti, R Nayak International Journal Of Innovationsin Engineering And Technology (IJIET) 2 …, 2013 | 1 | 2013 |
StegAbb: A cover-generating text steganographic tool using GPT-3 language modeling for covert communication across SDRs MV Namitha, GR Manjula, MC Belavagi IEEE Access, 2024 | | 2024 |
An Adaptive Steganography Approach for Live Video Streams Based on Edge Analysis and Frame Variability RB Sushma, GR Manjula 2023 International Conference on Recent Advances in Information Technology …, 2023 | | 2023 |
A Survey on Audio Stream Steganography Techniques N MV, M GR Proceedings of the International Conference on Smart Data Intelligence …, 2021 | | 2021 |
Hiding of Text Tunes in Video DMGR Sushma R B International Journal of Emerging Technology and Advanced Engineering 10 (8 …, 2020 | | 2020 |
Hybrid Selective Steganography MGR Sushma R B International Journal of Advanced Research and Publications (IJARP) 1 (Issue …, 2017 | | 2017 |
Edge based video steganography with RSA Algorithm GRM Sushma International Journal of Emerging Technology and Advanced Engineering 7 (7), 2017 | | 2017 |