Point generation and base point selection in ECC: An overview M Roy, N Deb, AJ Kumar International Journal of Advanced Research in Computer and Communication …, 2014 | 19 | 2014 |
Perceptual hashing scheme using KAZE feature descriptors for combinatorial manipulations M Roy, DM Thounaojam, S Pal Multimedia Tools and Applications, 2022 | 17 | 2022 |
A perceptual hash based blind-watermarking scheme for image authentication M Roy, DM Thounaojam, S Pal Expert Systems with Applications 227, 120237, 2023 | 9 | 2023 |
Various Approaches to perceptual image hashing systems-A Survey* M Roy, DM Thounaojam, S Pal 2023 International Conference on Intelligent Systems, Advanced Computing and …, 2023 | 3 | 2023 |
PIH-mSCM: a modified spiking cortical model for perceptual image hashing and its application to copy detection M Roy, DM Thounaojam, S Pal Multimedia Tools and Applications, 2023 | 2 | 2023 |
A robust medical image zero-watermarking algorithm using Collatz and Fresnelet Transforms P Meesala, M Roy, DM Thounaojam Journal of Information Security and Applications 85, 103855, 2024 | | 2024 |
Pyram: a robust and attack-resistant perceptual image hashing using pyramid histogram of gradients PS Neog, M Roy, T Sangale, N Jain, A Dahal, R Patgiri, DM Thounaojam International Journal of Information Technology, 1-19, 2024 | | 2024 |
BLOCKCHAIN TECHNOLOGY AND ITS APPLICATION IN HEALTHCARE: A SURVEY M Roy Futuristic Trends in Blockchain Applications Volume 3 Book 1 3 (Book 1, Part …, 2024 | | 2024 |
MODIFICATION THE SECURITY OF FLIP PROTOCOL BY CHANGING THE BASE POINT SELECTION N Deb, M Roy International Journal of Computer Science & Information Technology (IJCSIT …, 2017 | | 2017 |
Various Techniques for Activity Recognition: An Overview MR Amar Jyoti Kumar, Nikumani Choudhury International Journal of Emerging Technologies in Computational and Applied …, 2014 | | 2014 |