Shodhganga : a reservoir of Indian theses @ INFLIBNET
The Shodhganga@INFLIBNET Centre provides a platform for research students to deposit their Ph.D. theses and make it available to the entire scholarly community in open access.
Browsing by Keyword Data encryption (Computer science)
Showing results 1 to 13 of 13
Upload Date | Title | Researcher | Guide(s) |
16-Feb-2023 | An Extensive Study On Medical Image Security Using Region Based Analysis | Paikaray, Bijay Kumar | Chakravarty, Sujata and Swain, Debabala |
17-Feb-2021 | Design and Analysis of Bilinear Pairing based Cryptosystems | Praveen I | Sethumadhavan M |
27-Jul-2018 | Design and implementation of trust management algorithms for wireless sensor networks | Babu, Shaik Sahil | Naskar, M.K. |
31-Mar-2022 | Design of algorithms for mitigating security attacks in wireless sensor networks | Gautam, Amit Kumar | Kumar,Rakesh |
21-Oct-2015 | Detection of tampering in digital images using feature based hash generation | Mall, Vinod Kumar | Roy, Anil Kumar |
9-Dec-2022 | Development of Copyright Protection and Authentication Schemes with Extended Visual Cryptography | Kukreja, Sonal | Kasana, Singara Singh and Kasana, Geeta |
11-Jan-2023 | Development of new cryptographic systems using diffusion models based on intertwining logistic map coupled map lattice and brownian motion | Sunil Kumar | Singh, Sanjeev |
23-Nov-2021 | DNA cryptography using quantum computing | Goswami, Partha Sarathi | Chatterjee, Abir and Chakraborty, Tamal |
17-Oct-2017 | Investigation of error propagation effect of AES and to find techniques and solution of the problem | Sarkar, Bikramjit | Bhunia, C.T. and Maulik, Ujjwal |
15-Feb-2023 | Robust and Imperceptible Watermarking Techniques for Multimedia Data | Agarwal, Namita | Kumar, Amit and Singh, Pradeep Kumar |
18-Jan-2024 | Security Concerns at Different Phases of Networks through Blockchain Technology | Anju Devi | Amit Kumar |
30-Jul-2020 | Study of Dual Image Watermarking Scheme based on Singular Value Decomposition and Visual Cryptography in Discrete Wavelet Transform | Devi, Bishnulatpam Pushpa | Roy, Sudipta |
21-Nov-2017 | Theory and application of cellular automata for authentication and watermarking | Banerjee (Mukherjee), Monalisa | Ganguli, Niloy and Chaudhuri, Atal |