• Home
  • Archives
Register Login
    Flag icon
  1. Home
  2. Archives
  3. Volume 80
  4. Issue 16
This website uses cookies

We use cookies to personalize your content and to analyze our traffic. We do not share information about your use of our site with any of our partners including Google Scholar, Web of Science and affiliated journals.

By continuing to use our website, you consent to our use of cookies.

Issue 16 of Volume 80

A Visual Cryptography based Watermarking Scheme Incorporating the Concepts of Homogeneity Analysis and Singular Value Decomposition

Authors: Priyanka Singh, Suneeta Agarwal

Multilevel Image based Data Security using Combined Approach of Lsb_Dct Watermarking

Authors: Ranjeet Kumar Singh, Deepak Gupta, Santosh Kumar Singh

Relational Data Leakage Detection using Fake Object and Allocation Strategies

Authors: Jaymala Chavan, Priyanka Desai

A Literature Survey on Black Hole Attacks on AODV Protocol in MANET

Authors: Ravi Kant, Sunil Gupta, Harsh Khatter

A Novel Symmetric Key Cryptography using Multiple Random Secret Keys

Authors: A. S. N. Chakravarthy, T. Anjikumar

Comparative Analysis of Low Power Sequential Elements

Authors: T Prabhulingam Goud, Eliyaz Mohammed

Adaptive PI Controllers for Doubly Fed Induction Generator using B-spline Artificial Neural Networks

Authors: Ruben Tapia-O., Omar Aguilar M., Abel Garcia-B., Omar J. Santos-S.

Enhancing ATM Security using Fingerprint and GSM Technology

Authors: V. Padmapriya, S. Prakasam

Journal platform powered by
PhDFocus®
A to Z of Journal Management
API powered by
Web of Science™
PhDFocus® is compliant with United States Education Policy. A part of Foundation of Computer Science. © PhDFocus 2009 - 2025
About PhDFocus®
  • Contact Us
  • FAQ
  • Documentation
  • Privacy
  • Terms
  • Return & Refund