Themrichon Tuithung

According to our database1, Themrichon Tuithung authored at least 13 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A secure adaptive Hidden Markov Model-based JPEG steganography method.
Multim. Tools Appl., April, 2024

2023
Machine learning enabled network and task management in SDN based Fog architecture.
Comput. Electr. Eng., May, 2023

Improvement of image transmission using chaotic system and elliptic curve cryptography.
Multim. Tools Appl., 2023

2021
Audio Encryption Using Ameliorated ElGamal Public Key Encryption Over Finite Field.
Wirel. Pers. Commun., 2021

A novel minimal distortion-based edge adaptive image steganography scheme using local complexity.
Multim. Tools Appl., 2021

Optimised fuzzy clustering-based resource scheduling and dynamic load balancing algorithm for fog computing environment.
Int. J. Comput. Sci. Eng., 2021

Disaster management using D2D communication with ANFIS genetic algorithm-based CH selection and efficient routing by seagull optimisation.
Int. J. Comput. Sci. Eng., 2021

2020
A local decision making technique for reliable service discovery using D2D communications in disaster recovery networks.
Peer-to-Peer Netw. Appl., 2020

2019
Handwritten Manipuri Meetei-Mayek Classification Using Convolutional Neural Network.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2019

An adaptive color image steganography method using adjacent pixel value differencing and LSB substitution technique.
Cryptologia, 2019

A New Steganography Method Using Integer Wavelet Transform and Least Significant Bit Substitution.
Comput. J., 2019

2016
A novel steganographic method using 8-neighboring PVD (8nPVD) and LSB substitution.
Proceedings of the International Conference on Systems, Signals and Image Processing, 2016

2014
Steganalysis of ±k Steganography based on Noncausal Linear Predictor.
Int. J. Comput. Commun. Control, 2014


  Loading...