A new approach for video steganography based on randomization and parallelization KB Sudeepa, K Raju, RK HS, G Aithal Procedia Computer Science 78, 483-490, 2016 | 37 | 2016 |
A survey on key (s) and keyless image encryption techniques KHS Ranjan, SSP Fathimath, G Aithal, S Shetty Cybernetics and Information Technologies 17 (4), 134-164, 2017 | 18 | 2017 |
Enhanced security system using symmetric encryption and visual cryptography RK HS, PK HR, KB Sudeepa, G Aithal International Journal of Advances in Engineering & Technology 6 (3), 1211-1219, 2013 | 16 | 2013 |
A novel scheme for lossless authenticated multiple secret images sharing using polynomials and extended visual cryptography K Bhat, UK Reddy KR, R Kumar HS, D Mahto IET Information Security 15 (1), 13-22, 2021 | 12 | 2021 |
Different clinical parameters to diagnose glaucoma disease: a review TC Manjunath, D Lamani, S Chandrappa, RK HS International Journal of Computer Applications 115 (23), 2015 | 12 | 2015 |
Segmentation of retinal nerve fiber layer in optical coherence tomography (OCT) images using statistical region merging technique for glaucoma screening DL Chandrappa, D Lamani, S Jagadeesha, R Kumar International Journal of Computer Applications 128 (10), 32-35, 2015 | 6 | 2015 |
A novel method to recognize object in Images using Convolution Neural Networks RK HS, D Bhat 2019 International Conference on Intelligent Computing and Control Systems …, 2019 | 3 | 2019 |
Selective area encryption using machine learning technique S Kelur, RK HS, K Raju 2019 Innovations in Power and Advanced Computing Technologies (i-PACT) 1, 1-7, 2019 | 2 | 2019 |
Cheat immune visual cryptography for secure transmission of images HS Ranjan Kumar, AL Sampath Kini, BG Deeksha Int. J. Eng. Adv. Technol 8 (4), 1175-1181, 2019 | 2 | 2019 |
Predicting Sales In Supermarkets M Shetty N, V Nawada N, K Pai K, R Kumar H S International Research Journal of Engineering and Technology (IRJET) 5 (3 …, 2018 | 2 | 2018 |
Different Clinical Parameters to Diagnose Glaucoma Disease: A Review D Lamani, S Chandrappa, HS Ranjan Kumar International Journal of Computer Applications, 0975-8887, 0 | 2 | |
Group Key Management using Asynchronous Cipher System Based on XOR Vector Space and Pseudo Random Number Generation for Fog Environment. RK HS, G Aithal, S Shetty International Journal on Electrical Engineering & Informatics 15 (3), 2023 | | 2023 |
Insights on Effectiveness of Secure Multicast Communication Scheme in Future Wireless Network HSR Kumar, G Aithal, S Shetty International Journal of Advanced Trends in Computer Science and Engineering …, 2019 | | 2019 |
Multicast Communication using Different Group Key Managements R Kumar H S, G Aithal, S Shetty International Journal of Recent Technology and Engineering 8 (2), 2317-2328, 2019 | | 2019 |
Image encryption based on pixel transposition and Lehmer Pseudo random number generation KHS Ranjan, SSP Fathimath, G Aithal, S Shetty 2017 2nd IEEE International Conference on Recent Trends in Electronics …, 2017 | | 2017 |
Year of Publication: 2015 S Chandrappa, D Lamani, S Jagadeesha, RK HS | | 2015 |
An Architectural Design Proposal to Implement Li-Fi Framework VP Devidas, AS Rao, HS Ranjan Kumar | | |