Aditya Kumar Sahu

Orcid: 0000-0003-4257-0688

According to our database1, Aditya Kumar Sahu authored at least 16 papers between 2019 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier.
J. Inf. Secur. Appl., August, 2023

Logistic-map based fragile image watermarking scheme for tamper detection and localization.
Multim. Tools Appl., July, 2023

A Novel and Secure Fake-Modulus Based Rabin-Ӡ Cryptosystem.
Cryptogr., July, 2023

A Study on Content Tampering in Multimedia Watermarking.
SN Comput. Sci., May, 2023

Dual image-based reversible fragile watermarking scheme for tamper detection and localization.
Pattern Anal. Appl., May, 2023

Latest Trends in Deep Learning Techniques for Image Steganography.
Int. J. Digit. Crime Forensics, 2023

Chaotic-Map Based Encryption for 3D Point and 3D Mesh Fog Data in Edge Computing.
IEEE Access, 2023

2022
Local binary pattern-based reversible data hiding.
CAAI Trans. Intell. Technol., December, 2022

Improving grayscale steganography to protect personal information disclosure within hotel services.
Multim. Tools Appl., 2022

High fidelity based reversible data hiding using modified LSB matching and pixel difference.
J. King Saud Univ. Comput. Inf. Sci., 2022

A logistic map based blind and fragile watermarking for tamper detection and localization in images.
J. Ambient Intell. Humaniz. Comput., 2022

False-Positive-Free SVD Based Audio Watermarking with Integer Wavelet Transform.
Circuits Syst. Signal Process., 2022

2021
Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP.
J. Inf. Secur. Appl., 2021

2020
Digital image steganography and steganalysis: A journey of the past three decades.
Open Comput. Sci., 2020

2019
An Optimal Information Hiding Approach Based on Pixel Value Differencing and Modulus Function.
Wirel. Pers. Commun., 2019

Data hiding using adaptive LSB and PVD technique resisting PDH and RS analysis.
Int. J. Electron. Secur. Digit. Forensics, 2019


  Loading...