Rajesh Kumar Tiwari

According to our database1, Rajesh Kumar Tiwari authored at least 17 papers between 2010 and 2021.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
An Efficient Public Auditing Scheme for Cloud Storage with Secure Access Control and Resistance Against DOS Attack by Iniquitous TPA.
Wirel. Pers. Commun., 2021

2016
A novel approach for hiding secret data in program files.
Int. J. Inf. Comput. Secur., 2016

Detection of glare in night photography.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

Routing Protocol for Wireless Sensor Networks Using Swarm Intelligence-ACO with ECPSOA.
Proceedings of the 2016 International Conference on Information Technology, 2016

2014
A secure and timestamp-based communication scheme for cloud environment.
Int. J. Electron. Secur. Digit. Forensics, 2014

2013
A Novel Watermarking Scheme for Secure Relational Databases.
Inf. Secur. J. A Glob. Perspect., 2013

A Novel approach for Hybrid Database
CoRR, 2013

Addressing Security Challenges in Cloud Computing.
CoRR, 2013

2012
High capacity and secured methodologies for steganography.
Int. J. Electron. Secur. Digit. Forensics, 2012

Some New Methodologies for Image Hiding using Steganographic Techniques
CoRR, 2012

2011
A Novel Methodology for Data Hiding in PDF Files.
Inf. Secur. J. A Glob. Perspect., 2011

Microsoft Excel File: A Steganographic Carrier File.
Int. J. Digit. Crime Forensics, 2011

Microsoft Power Point Files: A Secure Steganographic Carrier.
Int. J. Digit. Crime Forensics, 2011

Hiding Secret Information in Movie Clip: A Steganographic Approach
CoRR, 2011

2010
Secure image transmission using steganographic methodologies.
Int. J. Multim. Intell. Secur., 2010

A new methodology for data coding and embedding for high-capacity transmitting.
Int. J. Electron. Secur. Digit. Forensics, 2010

Some new methodologies for secured data coding and transmission.
Int. J. Electron. Secur. Digit. Forensics, 2010


  Loading...