Security improvisation in image steganography using DES MK Ramaiya, N Hemrajani, AK Saxena 2013 3rd IEEE International Advance Computing Conference (IACC), 1094-1099, 2013 | 77 | 2013 |
Digital watermarking using DWT and DES N Tiwari, MK Ramaiya, M Sharma 2013 3rd IEEE International Advance Computing Conference (IACC), 1100-1102, 2013 | 31 | 2013 |
Nail color and texture analysis for disease detection V Sharma, M Ramaiya International Journal of Bio-Science and Bio-Technology 7 (5), 351-358, 2015 | 24 | 2015 |
Improved detection of 1-2-4 lsb steganography and rsa cryptography in color and grayscale images S Goyal, M Ramaiya, D Dubey 2015 International Conference on Computational Intelligence and …, 2015 | 22 | 2015 |
Improvisation of Security aspect in Steganography applying DES MK Ramaiya, N Hemrajani, AK Saxena 2013 International Conference on Communication Systems and Network …, 2013 | 20 | 2013 |
A survey: On association rule mining JK Jain, N Tiwari, M Ramaiya International Journal of Engineering Research and Applications 3 (1), 2065-2069, 2013 | 20 | 2013 |
Secured steganography approach using AES M Ramaiya, N Hemrajani, AK Saxena International Journal of Computer Science Engineering and Information …, 2013 | 16 | 2013 |
Advanced model for improving IoT security using blockchain technology C Chauhan, MK Ramaiya 2022 4th International Conference on Smart Systems and Inventive Technology …, 2022 | 10 | 2022 |
Mining positive and negative association rules from frequent and infrequent pattern using improved genetic algorithm JK Jain, N Tiwari, M Ramaiya 2013 5th International Conference and Computational Intelligence and …, 2013 | 7 | 2013 |
Digital security using watermarking techniques via discrete wavelet transform M Ramaiya, R Mishra, B SRCEM, MP India NCSI-2012, 2012 | 7 | 2012 |
Improvisation of security aspect of steganographic system by applying RSA algorithm MK Ramaiya, D Goyal, N Hemrajani International Journal of Advanced Computer Science and Applications 7 (7), 2016 | 6 | 2016 |
A novel safe and efficient smart card authentication scheme using hash function A Singhal, M Ramaiya Engineering Universe for Scientific Research and Management 7 (1), 1-6, 2015 | 6 | 2015 |
Improving IoT security using elliptic curve integrated encryption scheme with primary structure-based block chain technology C Chauhan, MK Ramaiya, AS Rajawat, SB Goyal, C Verma, MS Raboaca Procedia Computer Science 215, 488-498, 2022 | 4 | 2022 |
Image Stenography: Self Extraction Mechnanism MK Ramaiya, N Hemrajani, AK Saxena, M Sharma UACEE International Journal of Advances in Computer Science and its …, 0 | 4 | |
Brain MRI segmentation using canny edge detection technique V Rajput, N Tiwari, M Ramaiya Brain 4 (2), 2017 | 3 | 2017 |
Image segmentation based on moments and color map S Ashtputre, M Sharma, M Ramaiya 2013 International Conference on Communication Systems and Network …, 2013 | 3 | 2013 |
A Novel Technique For Tampering Detection N Tiwari, N Hemrajani, MK Ramaiya International Journal of Computer Science Engineering and Information …, 0 | 3 | |
DATA HIDING IN IMAGE USING CRYPTOGRAPHY AND STEGANOGRAPHY: AN INVESTIGATION. MK Ramaiya, D Goyal, N Hemrajani International Journal of Advanced Research in Computer Science 8 (7), 2017 | 2 | 2017 |
A Survey Work on Digital Watermarking R Saxena, N Tiwari, MK Ramaiya International Journal of Latest Technology in Engineering, Management …, 2015 | 2 | 2015 |
Image mosaicing method by using sift and grid based MK Ramaiya, N Tiwari, N Hemrajani, P Bhatnagar Int. J. Latest Technol. Eng. Manag. Appl. Sci 3, 332-337, 2014 | 2 | 2014 |