A novel steganography method for image based on Huffman Encoding R Das, T Tuithung 2012 3rd National Conference on Emerging Trends and Applications in Computer …, 2012 | 124 | 2012 |
A short survey on image steganography and steganalysis techniques YJ Chanu, T Tuithung, KM Singh 2012 3rd National Conference on Emerging Trends and Applications in Computer …, 2012 | 90 | 2012 |
Image steganography and steganalysis: A survey YJ Chanu, KM Singh, T Tuithung International Journal of Computer Applications 52 (2), 2012 | 61 | 2012 |
Simulation based analysis of adhoc routing protocol in urban and highway scenario of VANET PK Singh, K Lego, T Tuithung International Journal of Computer Applications 12 (10), 42-49, 2011 | 56 | 2011 |
Two-phase malicious web page detection scheme using misuse and anomaly detection S Yoo, S Kim, A Choudhary, OP Roy, T Tuithung International Journal of Reliable Information and Assurance 2 (1), 1-9, 2014 | 39 | 2014 |
A novel minimal distortion-based edge adaptive image steganography scheme using local complexity: (BEASS) D Laishram, T Tuithung Multimedia Tools and Applications 80 (1), 831-854, 2021 | 34 | 2021 |
Cryptanalysis of multimedia encryption using elliptic curve cryptography MS Khoirom, DS Laiphrakpam, T Themrichon Optik 168, 370-375, 2018 | 34 | 2018 |
A survey on digital image steganography: current trends and challenges D Laishram, T Tuithung proceedings of 3rd international conference on internet of things and …, 2018 | 32 | 2018 |
An adaptive color image steganography method using adjacent pixel value differencing and LSB substitution technique M Kalita, T Tuithung, S Majumder Cryptologia 43 (5), 414-437, 2019 | 29 | 2019 |
A novel steganographic method using 8-neighboring PVD (8nPVD) and LSB substitution M Kalita, T Tuithung 2016 International Conference on Systems, Signals and Image Processing …, 2016 | 24 | 2016 |
A new steganography method using integer wavelet transform and least significant bit substitution M Kalita, T Tuithung, S Majumder The Computer Journal 62 (11), 1639-1655, 2019 | 23 | 2019 |
A robust steganographic method based on singular value decomposition YJ Chanu, KM Singh, T Tuithung Int. J. Inf. Comput. Technol 4 (7), 717-726, 2014 | 22 | 2014 |
A comparative study of steganography algorithms of spatial and transform domain M Kalita, T Tuithung International Journal of Computer Applications 975, 8887, 2016 | 17 | 2016 |
Audio encryption using ameliorated ElGamal public key encryption over finite field MS Khoirom, DS Laiphrakpam, T Tuithung Wireless Personal Communications 117, 809-823, 2021 | 16 | 2021 |
Handwritten Manipuri Meetei-Mayek classification using convolutional neural network K Nongmeikapam, K Wahengbam, ON Meetei, T Tuithung ACM Transactions on Asian and Low-Resource Language Information Processing …, 2019 | 15 | 2019 |
Robust perceptual image hashing using SIFT and SVD KM Singh, A Neelima, T Tuithung, KM Singh Current Science 117 (8), 1340-1344, 2019 | 12 | 2019 |
Fog computing: an enhanced performance analysis emulation framework for IoT with load balancing smart gateway architecture B Sarma, G Kumar, R Kumar, T Tuithung 2019 International Conference on Communication and Electronics Systems …, 2019 | 12 | 2019 |
Increasing the effectiveness of handwritten Manipuri Meetei-Mayek character recognition using multiple-HOG-feature descriptors K Nongmeikapam, WK Kumar, ON Meetei, T Tuithung Sādhanā 44 (5), 104, 2019 | 12 | 2019 |
A human face detection method based on connected component analysis S Borah, S Konwar, T Tuithung, R Rathi 2014 International Conference on Communication and Signal Processing, 1205-1208, 2014 | 12 | 2014 |
Steganography Technique based on SVD YJ Chanu, KM Singh, T Tuithung International Journal of Research in Engineering and Technology (IJRET) 6 …, 2012 | 10 | 2012 |