Hiding image to video: A new approach of LSB replacement S Singh, G Agarwal International Journal of Engineering Science and Technology 2 (12), 6999-7003, 2010 | 40 | 2010 |
Key classification: a new approach in free text keystroke authentication system S Singh, KV Arya 2011 Third Pacific-Asia Conference on Circuits, Communications and System …, 2011 | 39 | 2011 |
Use of image to secure text message with the help of LSB replacement S Singh, G Agarwal International journal of applied engineering research 1 (2), 200, 2010 | 37 | 2010 |
Some efficient classes of estimators under stratified sampling S Bhushan, A Kumar, S Singh Communications in Statistics-Theory and Methods 52 (6), 1767-1796, 2023 | 33 | 2023 |
Improved hash based approach for secure color image steganography using canny edge detection method S Singh, A Datar International Journal of Computer Science and Network Security (IJCSNS) 15 …, 2015 | 30 | 2015 |
Predicting order lead time for just in time production system using various machine learning algorithms: A case study S Singh, U Soni 2019 9th International Conference on Cloud Computing, Data Science …, 2019 | 29 | 2019 |
Use of Chinese Remainder Theorem to generate random numbers for Cryptography S Singh, G Agarwal International Journal of Applied Engineering Research 1 (2), 168, 2010 | 21 | 2010 |
Intelligent chatbot for prediction and management of stress T Sharma, J Parihar, S Singh 2021 11th International Conference on Cloud Computing, Data Science …, 2021 | 16 | 2021 |
A comparative study of mouse and keystroke based authentication J Handa, S Singh, S Saraswat 2019 9th International Conference on Cloud Computing, Data Science …, 2019 | 15 | 2019 |
Designing a Blockchain-Enabled Methodology for Secure Online Voting System S Singh, A Singh, S Verma, RK Dwivedi 2023 International Conference on Intelligent Data Communication Technologies …, 2023 | 14 | 2023 |
Mouse interaction based authentication system by classifying the distance travelled by the mouse S Singh, DKV Arya International Journal of Computer Applications 17 (1), 45-48, 2011 | 14 | 2011 |
Keystroke dynamics for continuous authentication S Singh 2018 8th International Conference on Cloud Computing, Data Science …, 2018 | 13 | 2018 |
Affect of emotional intelligence on adversity quotient of Indian managers S Singh, T Sharma AIP Conference Proceedings 2016 (1), 2018 | 12 | 2018 |
Integration of sound signature in graphical password authentication system S Singh, G Agarwal International Journal of Computer Applications 12 (9), 11-13, 2011 | 12 | 2011 |
Behavioral Biometrics for Adaptive Authentication in Digital Banking-Guard Against Flawless Privacy SL Sahdev, S Singh, N Kaur, L Siddiqui 2021 International Conference on Innovative Practices in Technology and …, 2021 | 9 | 2021 |
A modified class of log type estimators for population mean using auxiliary information on variables S Bhushan, R Gupta, S Singh, A Kumar International Journal of Applied Engineering Research 15 (6), 612-627, 2020 | 9 | 2020 |
In-Ho Ra, Weizhi Meng, Maninder Kaur, and Gi Hwan Cho." SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain … S Singh International Journal of Distributed Sensor Networks 15 (4), 1550147719844159, 2019 | 9 | 2019 |
Biometric authentication using soft biometric traits R Garg, A Arora, S Singh, S Saraswat 2018 Fifth International Conference on Parallel, Distributed and Grid …, 2018 | 9 | 2018 |
Keyboard invariant biometric authentication P Smriti, S Srivastava, S Singh 2018 4th International Conference on Computational Intelligence …, 2018 | 9 | 2018 |
Pattern construction by extracting user specific features in keystroke authentication system S Singh, M Sinha 2013 4th international conference on computer and communication technology …, 2013 | 7 | 2013 |