A secure and high capacity image steganography technique UD Acharya, PR Kamath arXiv preprint arXiv:1304.3629, 2013 | 84 | 2013 |
Wavelet transform based steganography technique to hide audio signals in image S Hemalatha, UD Acharya, A Renuka Procedia Computer Science 47, 272-281, 2015 | 81 | 2015 |
Deep learning based object detection for resource constrained devices: Systematic review, future trends and challenges ahead V Kamath, A Renuka Neurocomputing 531, 34-60, 2023 | 75 | 2023 |
A secure color image steganography in transform domain UD Acharya, PR Kamath arXiv preprint arXiv:1304.3313, 2013 | 60 | 2013 |
Anaerobic bacteria in clinical specimens–frequent, but a neglected lot: a five year experience at a tertiary care hospital PA Shenoy, S Vishwanath, A Gawda, S Shetty, R Anegundi, M Varma, ... Journal of clinical and diagnostic research: JCDR 11 (7), DC44, 2017 | 48 | 2017 |
Linear models of cumulative distribution function for content-based medical image retrieval KN Manjunath, A Renuka, UC Niranjan Journal of medical systems 31, 433-443, 2007 | 42 | 2007 |
Comparison of secure and high capacity color image steganography techniques in RGB and YCbCr domains S Hemalatha, UD Acharya, A Renuka arXiv preprint arXiv:1307.3026, 2013 | 28 | 2013 |
Cluster based group key management in mobile ad hoc networks A Renuka, KC Shet International Journal of Computer Science and Network Security, 9 (4), 42-49, 2009 | 22 | 2009 |
A secure image steganography technique using Integer Wavelet Transform S Hemalatha, A Renuka, UD Acharya, PR Kamath 2012 World Congress on Information and Communication Technologies, 755-758, 2012 | 20 | 2012 |
Hierarchical approach for key management in mobile Ad hoc networks A Renuka, KC Shet International Journal of Computer Science and Information Security, 5 (1), 87-95, 2009 | 19 | 2009 |
Performance analysis of the pretrained efficientdet for real-time object detection on raspberry pi V Kamath, A Renuka 2021 International Conference on Circuits, Controls and Communications …, 2021 | 18 | 2021 |
Computer-aided system for Leukocyte nucleus segmentation and Leukocyte classification based on nucleus characteristics S Sapna, A Renuka International Journal of Computers and Applications 42 (6), 622-633, 2020 | 18 | 2020 |
Audio data hiding technique using integer wavelet transform S Hemalatha, UD Acharya, A Renuka International Journal of Electronic Security and Digital Forensics 8 (2 …, 2016 | 16 | 2016 |
Techniques for segmentation and classification of leukocytes in blood smear images-a review S Sapna, A Renuka 2017 IEEE International conference on computational intelligence and …, 2017 | 14 | 2017 |
Information hiding through dynamic text steganography and cryptography: Computing and informatics D Bhat, V Krithi, KN Manjunath, S Prabhu, A Renuka 2017 international conference on advances in computing, communications and …, 2017 | 14 | 2017 |
A secure image steganography technique to hide multiple secret images S Hemalatha, U Dinesh Acharya, A Renuka, PR Kamath Computer Networks & Communications (NetCom) Proceedings of the Fourth …, 2013 | 13 | 2013 |
Adaptive downlink packet scheduling in LTE networks based on queue monitoring ND Adesh, A Renuka Wireless Networks 25, 3149-3166, 2019 | 11 | 2019 |
Avoiding queue overflow and reducing queuing delay at eNodeB in LTE networks using congestion feedback mechanism ND Adesh, A Renuka Computer Communications 146, 131-143, 2019 | 10 | 2019 |
Audio steganography in discrete wavelet transform domain S Hemalatha, UD Acharya, A Renuka, S Deepthi, KJ Upadhya International Journal of Applied Engineering Research 10 (16), 37544-37549, 2015 | 10 | 2015 |
A novel colorimage steganography using discrete wavelet transform S Hemalatha, UD Acharya, A Renuka, PR Kamath Proceedings of the Second International Conference on Computational Science …, 2012 | 8 | 2012 |