Methods and systems for digital image security SS Agaian, D Akopian, RC Cherukuri, JP Perez, BM Rodriguez, ... US Patent 7,965,861, 2011 | 41 | 2011 |
Key dependent covert communication system using fibonacci p-codes SS Agaian, RC Cherukuri, RR Sifuentes 2007 IEEE International Conference on System of Systems Engineering, 1-5, 2007 | 17 | 2007 |
A new secure adaptive steganographic algorithm using Fibonacci numbers SS Agaian, RC Cherukuri, R Sifuentes 2006 IEEE region 5 conference, 125-129, 2006 | 17 | 2006 |
Methods and systems for digital image security SS Agaian, D Akopian, RC Cherukuri, JP Perez, BM Rodriguez, ... US Patent 8,369,568, 2013 | 13 | 2013 |
Selective object encryption for privacy protection Y Zhou, K Panetta, R Cherukuri, S Agaian Mobile multimedia/image processing, security, and applications 2009 7351 …, 2009 | 13 | 2009 |
T-order statistics and secure adaptive steganography SS Agaian, RR Sifuentes, R Cherukuri Mathematical Methods in Pattern and Image Analysis 5916, 91-100, 2005 | 12 | 2005 |
Logical transform based encryption for multimedia systems SS Agaian, RGR Rudraraju, RC Cherukuri 2010 IEEE International Conference on Systems, Man and Cybernetics, 1953-1957, 2010 | 11 | 2010 |
Two New M-Sequence-Based Data Hiding Algorithms SS Agaian, IB Gurevich, RC Cherukuri, EA Metlitski Pattern Recognition and Image Analysis (Advances in Mathematical Theory and …, 2005 | 8 | 2005 |
Run length based steganography for binary images SS Agaian, RC Cherukuri Pattern Recognition and Machine Intelligence: First International Conference …, 2005 | 8 | 2005 |
New normalized expansions for redundant number systems: adaptive data hiding techniques RC Cherukuri, SS Agaian Multimedia on Mobile Devices 2010 7542, 50-61, 2010 | 7 | 2010 |
Securing provenance data with secret sharing mechanism: Model perspective KP Kumar, RC Cherukuri 2019 International Conference on Data Science and Communication (IconDSC), 1-6, 2019 | 5 | 2019 |
Secured electronic transactions using visual encryption: An E-commerce instance KP Kumar, RC Cherukuri 2018 International Conference on Inventive Research in Computing …, 2018 | 4 | 2018 |
Secure and robust steganographic algorithm for binary images SS Agaian, R Cherukuri Signal Processing, Sensor Fusion, and Target Recognition XV 6235, 514-523, 2006 | 4 | 2006 |
A new JPEG-based steganographic algorithm for mobile devices SS Agaian, RC Cherukuri, EC Schneider, GB White Mobile Multimedia/Image Processing for Military and Security Applications …, 2006 | 4 | 2006 |
Key dependent covert communication system for audio signals RC Cherukuri, SS Agaian, CVC Atluri 2007 IEEE International Conference on Systems, Man and Cybernetics, 3356-3360, 2007 | 3 | 2007 |
Two algorithms for compressing noise like signals SS Agaian, R Cherukuri, D Akopian Signal Processing, Sensor Fusion, and Target Recognition XIV 5809, 472-481, 2005 | 3 | 2005 |
Secure provenance-based communication using visual encryption KP Kumar, RC Cherukuri International Journal of Innovative Computing and Applications 10 (3-4), 194-206, 2019 | 2 | 2019 |
Switching theory-based steganographic system for JPEG images RC Cherukuri, SS Agaian Mobile Multimedia/Image Processing for Military and Security Applications …, 2007 | 2 | 2007 |
The secured data provenance: Background and application oriented analysis KP Kumar, RC Cherukuri 2016 IEEE International Conference on Recent Trends in Electronics …, 2016 | 1 | 2016 |
Secure steganography designed for mobile platforms SS Agaian, R Cherukuri, RR Sifuentes Mobile Multimedia/Image Processing for Military and Security Applications …, 2006 | 1 | 2006 |