Point generation and base point selection in ECC: An overview M Roy, N Deb, AJ Kumar International Journal of Advanced Research in Computer and Communication …, 2014 | 18 | 2014 |
Perceptual hashing scheme using KAZE feature descriptors for combinatorial manipulations M Roy, DM Thounaojam, S Pal Multimedia Tools and Applications, 2022 | 15 | 2022 |
A perceptual hash based blind-watermarking scheme for image authentication M Roy, DM Thounaojam, S Pal Expert Systems with Applications 227, 120237, 2023 | 6 | 2023 |
PIH-mSCM: a modified spiking cortical model for perceptual image hashing and its application to copy detection M Roy, DM Thounaojam, S Pal Multimedia Tools and Applications, 2023 | 1 | 2023 |
Various Approaches to perceptual image hashing systems-A Survey* M Roy, DM Thounaojam, S Pal 2023 International Conference on Intelligent Systems, Advanced Computing and …, 2023 | 1 | 2023 |
BLOCKCHAIN TECHNOLOGY AND ITS APPLICATION IN HEALTHCARE: A SURVEY M Roy Futuristic Trends in Blockchain Applications Volume 3 Book 1 3 (Book 1, Part …, 2024 | | 2024 |
MODIFICATION THE SECURITY OF FLIP PROTOCOL BY CHANGING THE BASE POINT SELECTION N Deb, M Roy International Journal of Computer Science & Information Technology (IJCSIT …, 2017 | | 2017 |
Various Techniques for Activity Recognition: An Overview MR Amar Jyoti Kumar, Nikumani Choudhury International Journal of Emerging Technologies in Computational and Applied …, 2014 | | 2014 |