A high capacity text steganography scheme based on LZW compression and color coding A Malik, G Sikka, HK Verma Engineering Science and Technology, an International Journal 20 (1), 72-79, 2017 | 100 | 2017 |
Outlier detection of data in wireless sensor networks using kernel density estimation VSK Samparthi, HK Verma International Journal of Computer Applications 5 (7), 28-32, 2010 | 70 | 2010 |
Comprehensive survey on petya ransomware attack JS Aidan, HK Verma, LK Awasthi 2017 International conference on next generation computing and information …, 2017 | 69 | 2017 |
Performance analysis of RC6, Twofish and Rijndael block cipher algorithms HK Verma, RK Singh International Journal of Computer Applications 42 (16), 1-7, 2012 | 60 | 2012 |
Optimized fuzzy logic based framework for effort estimation in software development V Sharma, HK Verma arXiv preprint arXiv:1004.3270, 2010 | 59 | 2010 |
A reversible data hiding scheme for interpolated images based on pixel intensity range A Malik, G Sikka, HK Verma Multimedia Tools and Applications 79, 18005-18031, 2020 | 53 | 2020 |
Simulation modeling of cloud computing for smart grid using CloudSim S Mehmi, HK Verma, AL Sangal Journal of Electrical Systems and Information Technology 4 (1), 159-172, 2017 | 53 | 2017 |
A hybrid approach for image security by combining encryption and steganography JK Saini, HK Verma 2013 IEEE second international conference on image information processing …, 2013 | 53 | 2013 |
Security for wireless sensor network S Singh, HK Verma International Journal on Computer Science and Engineering 3 (6), 2393-2399, 2011 | 51 | 2011 |
An image interpolation based reversible data hiding scheme using pixel value adjusting feature A Malik, G Sikka, HK Verma Multimedia Tools and Applications 76, 13025-13046, 2017 | 45 | 2017 |
An AMBTC compression based data hiding scheme using pixel value adjusting strategy A Malik, G Sikka, HK Verma Multidimensional Systems and Signal Processing 29, 1801-1818, 2018 | 44 | 2018 |
Image interpolation based high capacity reversible data hiding scheme A Malik, G Sikka, HK Verma Multimedia Tools and Applications 76, 24107-24123, 2017 | 44 | 2017 |
An intelligent and energy-efficient wireless body area network to control coronavirus outbreak N Bilandi, HK Verma, R Dhir Arabian Journal for Science and Engineering 46 (9), 8203-8222, 2021 | 43 | 2021 |
A static feature selection-based android malware detection using machine learning techniques A Sangal, HK Verma 2020 International conference on smart electronics and communication (ICOSEC …, 2020 | 39 | 2020 |
A high payload data hiding scheme based on modified AMBTC technique A Malik, G Sikka, HK Verma Multimedia Tools and Applications 76, 14151-14167, 2017 | 38 | 2017 |
Classification of diabetes using Naive Bayes and support vector machine as a technique S Gupta, HK Verma, D Bhardwaj Operations Management and Systems Engineering: Select Proceedings of CPIE …, 2021 | 36 | 2021 |
A detailed study of an internet of things (Iot) A Malik, AT Magar, H Verma, M Singh, P Sagar International Journal of Scientific and Technology Research 8 (12), 2989-2994, 2019 | 33 | 2019 |
Performance evaluation of RC6, blowfish, DES, IDEA, CAST-128 block ciphers K Aggarwal, JK Saini, HK Verma International Journal of Computer Applications 68 (25), 2013 | 33 | 2013 |
Robustness of the digital image watermarking techniques against brightness and rotation attack HK Verma, AN Singh, R Kumar arXiv preprint arXiv:0909.3554, 2009 | 33 | 2009 |
Handling imprecision in inputs using fuzzy logic to predict effort in software development HK Verma, V Sharma 2010 IEEE 2nd International Advance Computing Conference (IACC), 436-442, 2010 | 32 | 2010 |