Volgen
Dr Dipti Kapoor Sarmah
Dr Dipti Kapoor Sarmah
Faculty of EEMCS, Services, Cyber Security and Safety(SCS)
Geverifieerd e-mailadres voor utwente.nl - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Proposed system for data hiding using cryptography and steganography
DK Sarmah, N Bajpai
International Journal of Computer Applications 8 (9), 7-10, 2010
1712010
Improved Cohort Intelligence—A high capacity, swift and secure approach on JPEG image steganography
DKSAJ Kulkarni
Journal of Information Security and Applications 45, 90-106, 2019
362019
JPEG based steganography methods using cohort intelligence with cognitive computing and modified multi random start local search optimization algorithms
DK Sarmah, AJ Kulkarni
Information Sciences 430, 378-396, 2018
352018
Image steganography capacity improvement using cohort intelligence and modified multi-random start local search methods
DK Sarmah, AJ Kulkarni
Arabian Journal for Science and Engineering 43 (8), 3927-3950, 2018
302018
Optimization models in steganography using metaheuristics
DK Sarmah, AJ Kulkarni, A Abraham
Springer International Publishing, 2020
122020
A new horizon in data security by Cryptography & Steganography
DK Sarmah, N Bajpai
International Journal of Computer Science and Information Technology 1 (4 …, 2010
112010
A Survey on the latest development of Machine Learning in Genetic Algorithm and Particle Swarm Optimization
DK Sarmah
Optimization in Machine Learning and Applications, 91-112, 2020
102020
The development of phishing during the COVID-19 pandemic: An analysis of over 1100 targeted domains
R Hoheisel, G van Capelleveen, DK Sarmah, M Junger
Computers & Security 128, 103158, 2023
82023
Cryptography and digital image steganography techniques
DK Sarmah, AJ Kulkarni, A Abraham, DK Sarmah, AJ Kulkarni, ...
Optimization Models in Steganography Using Metaheuristics, 33-48, 2020
62020
Multiphase and multiple encryption
H Kaur, HPS Gill, D Sarmah
2018 IEEE Punecon, 1-8, 2018
62018
The baseline of global consumer cyber security standards for IoT: quality evaluation
KOGDK Sarmah
Journal of Cyber Security Technology 6 (3), 1-26, 2022
5*2022
Heuristics and metaheuristic optimization algorithms
DK Sarmah, AJ Kulkarni, A Abraham, DK Sarmah, AJ Kulkarni, ...
Optimization Models in Steganography Using Metaheuristics, 49-61, 2020
52020
Smart traffic light controlling and violation detection system using digital image processing
BM Gebregeorgis, DK Sarmah
International Journal of Engineering Research 4 (2), 520-529, 2016
52016
Web Application Performance Analysis based on Component Load Testing
C Babbar, N Bajpai, DK Sarmah
International Journal of Technology and Applied Science 2, 22-28, 2011
52011
Cryptography algorithm based on cohort intelligence
DK Sarmah, IR Kale
Proceedings of the 2nd International Conference on Data Engineering and …, 2019
32019
Steganography and steganalysis for digital image enhanced Forensic analysis and recommendations
KD Michaylov, DK Sarmah
Journal of Cyber Security Technology, 1-27, 2024
22024
A story-driven gamified education on USB-based attack
V Rikkers, DK Sarmah
Journal of Computing in Higher Education, 1-25, 2023
22023
Steganalysis on All Approaches/Vulnerability Analysis of Stego Image (s)
DK Sarmah, AJ Kulkarni, A Abraham, DK Sarmah, AJ Kulkarni, ...
Optimization Models in Steganography Using Metaheuristics, 147-161, 2020
22020
Improved Cohort Intelligence Optimization Algorithm (Approach 4)
DK Sarmah, AJ Kulkarni, A Abraham, DK Sarmah, AJ Kulkarni, ...
Optimization Models in Steganography Using Metaheuristics, 123-145, 2020
12020
Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis
I Haverkamp, DK Sarmah
International Journal of Information Security, 1-29, 2024
2024
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20