Evaluation of various LSB based methods of image steganography on GIF file format N Tiwari, DM Shandilya International Journal of Computer Applications 6 (2), 1-4, 2010 | 70 | 2010 |
Effective implementation and avalanche effect of AES A Kumar, N Tiwari International Journal of Security, Privacy and Trust Management (IJSPTM) 1 …, 2012 | 61 | 2012 |
Secure RGB image steganography from pixel indicator to triple algorithm-an incremental growth N Tiwari, M Shandilya International Journal of Security and Its Applications 4 (4), 53-62, 2010 | 61 | 2010 |
Survey of DDoS attacks based on TCP/IP protocol vulnerabilities S Acharya, N Tiwari IOSR Journal of Computer Engineering 18 (3), 68-76, 2016 | 40 | 2016 |
Image encryption using pseudo random number generators AK Banthia, N Tiwari International Journal of Computer Applications 67 (20), 2013 | 29 | 2013 |
Spatial domain image steganography based on security and randomization N Tiwari, M Sandilya, M Chawla International Journal of Advanced Computer Science and Applications 5 (1), 2014 | 21 | 2014 |
Digital watermarking applications, parameter measures and techniques N Tiwari International Journal of Computer Science and Network Security (IJCSNS) 17 …, 2017 | 15 | 2017 |
Different method used in pixel value differencing algorithm T Dhruw, N Tiwari IOSR Journal of Computer Engineering 18, 102-109, 2016 | 14 | 2016 |
Privacy preserving data sharing method for social media platforms S Yadav, N Tiwari PloS one 18 (1), e0280182, 2023 | 9 | 2023 |
Quantum cryptanalytic attacks of symmetric ciphers: A review AK Malviya, N Tiwari, M Chawla Computers and Electrical Engineering 101, 108122, 2022 | 8 | 2022 |
Performance analysis of SHA algorithms (SHA-1 and SHA-192): a review P Garg, N Tiwari International Journal of Computer Technology and Electronics Engineering 2 …, 2012 | 8 | 2012 |
A comprehensive survey of phishing: Mediums, intended targets, attack and defence techniques and a novel taxonomy R Goenka, M Chawla, N Tiwari International Journal of Information Security 23 (2), 819-848, 2024 | 7 | 2024 |
Plant leaf disease classification using deep learning: A survey D Agarwal, M Chawla, N Tiwari 2021 Third International Conference on Inventive Research in Computing …, 2021 | 7 | 2021 |
An image encryption using block based transformation and bit rotation technique A Gupta, N Tiwari, M Chawla, M Shandilya International Journal of Computer Applications 98 (6), 2014 | 7 | 2014 |
Aes security enhancement by using double s-box A Kumar, N Tiwari International Journal of Computer Science and Information Technologies …, 2012 | 6 | 2012 |
EEG-based Emotion Recognition using Transfer Learning Based Feature Extraction and Convolutional Neural Network V Jadhav, N Tiwari, M Chawla ITM Web of Conferences 53, 02011, 2023 | 4 | 2023 |
An efficient and secure data sharing method using asymmetric pairing with shorter ciphertext to enable rapid learning in healthcare S Yadav, N Tiwari Computational Intelligence and Neuroscience 2022 (1), 4788031, 2022 | 4 | 2022 |
Linear approximation of a vectorial Boolean function using quantum computing AK Malviya, N Tiwari Europhysics Letters 132 (4), 40001, 2020 | 4 | 2020 |
Recent advancements in chaos-based image encryption techniques: a review S Yadav, N Tiwari Social Networking and Computational Intelligence: Proceedings of SCI-2018 …, 2020 | 4 | 2020 |
Security effect on AES in terms of avalanche effect by using alternate S-box N Tiwari, A Kumar International Conference on Intelligent Data Communication Technologies and …, 2019 | 4 | 2019 |