Steganography in images using LSB technique AK Singh, J Singh, HV Singh International Journal of Latest Trends in Engineering and Technology (IJLTET …, 2015 | 53 | 2015 |
A comparative analysis of clustering algorithms S Sikka, J Singh International Journal of Computer Applications 100 (15), 0975-8887, 2014 | 23 | 2014 |
DCT-and DWT-Based Intellectual Property Right Protection in Digital Images SA Kumar, S Juhi, SH Vikram First International Conference on Artificial Intelligence and Cognitive …, 2019 | 7 | 2019 |
Automated pitch-based gender recognition using an adaptive neuro-fuzzy inference system S Lakra, J Singh, AK Singh 2013 International Conference on Intelligent Systems and Signal Processing …, 2013 | 7 | 2013 |
Image Steganography Technique based on Singular Value Decomposition and Discrete Wavelet Transform MS Juhi Singh International Journal of Electrical and Electronics Research 10 (2), 122-125, 2022 | 5 | 2022 |
A Novel Method of high-Capacity Steganography Technique in Double Precision Images J Singh, M Singla 2021 International Conference on Computational Performance Evaluation (ComPE …, 2021 | 5 | 2021 |
Fibonacci Retracement in Stock Market N Sethi, N Bhateja, J Singh, P Mor 5th International Conference on Next Generation Computing Technologies (NGCT …, 2020 | 4 | 2020 |
Web 4.0: An intelligent tool from Web-of-thing to Web-of-thought MJ Singh Journal of Xidian University 14 (5), 5498-5504, 2020 | 3 | 2020 |
Highly Impartible Spatial Domain Steganography in Double Precision Images AK Singh, HV Singh, J Singh 2018 Second International Conference on Inventive Communication and …, 2018 | 3 | 2018 |
Launching WordPress-Blogs and Domains N Sethi, N Bhateja, S Kaushal, J Singh International Journal of Innovative Research in Computer Science …, 2020 | 2 | 2020 |
A parameterized Comparison of Fuzzy Logic, Neural Network and Neuro-Fuzzy System: A Literature juhi singh IJCSMC 5 (5), 478-482, 2016 | 2* | 2016 |
Automated real-time face detection and generated mail system for border security K Tripathi, J Singh, RK Tyagi Emerging Technologies in Data Mining and Information Security: Proceedings …, 2022 | 1 | 2022 |
Crop Disease Prediction Using Deep ConvNet Architecture Technique A Roy, D Sehrawat, J Singh Proceedings of the Third International Conference on Information Management …, 2022 | 1 | 2022 |
Recent Trends in E-Learning Using Web 4.0 J Singh, AK Singh, M Singla Proceedings of the Third International Conference on Information Management …, 2022 | 1 | 2022 |
Blockchain-Enabled Secure Electronic Voting System in India Amber Gautam, Juhi Singh, Neha Bhateja Machine Intelligence and Smart System, 567-577, 2021 | 1* | 2021 |
AI-based voice assistance using AWS L Kumar, K Yadav, J Singh, K Tripathi International Journal of Innovative Research in Computer Science …, 2021 | 1 | 2021 |
3-Axis Hand Gesture Control Robot Using Accelerometer AK Singh, J Singh International Journal of Engineering Technology, Management and Applied …, 2015 | 1 | 2015 |
Enhancing digital information concealment through DWT-based coefficient alteration and steganographic technique J Singh, AK Singh Journal of Discrete Mathematical Sciences & Cryptography 27 (No. 2-A), 283–292, 2024 | | 2024 |
Sustainability in the Age of AI: Exploring Challenges and Innovative Solutions AS Juhi Singh, Aarti Chugh Convergence Strategies for Green Computing and Sustainable Development, 330, 2023 | | 2023 |
LSB based Variable Capacity Data Hiding Approach and Enhanced AES Security with Seam Carving J Singh, M Singla image 10, 11, 2023 | | 2023 |