Остановите войну!
for scientists:
default search action
Satish Chand
- > Home > Persons > Satish Chand
Publications
- 2023
- [j89]Arun Kumar Rai, Hari Om, Satish Chand, Chia-Chen Lin:
High-Capacity Reversible Data Hiding Based on Two-Layer Embedding Scheme for Encrypted Image Using Blockchain. Comput. 12(6): 120 (2023) - [j88]Arun Kumar Rai, Hari Om, Satish Chand, Saurabh Agarwal:
Reversible data hiding in encrypted image using two-pass pixel value ordering. J. Inf. Secur. Appl. 76: 103545 (2023) - [j84]Mahender Kumar, Carsten Maple, Satish Chand:
An efficient and secure identity-based integrity auditing scheme for sensitive data with anti-replacement attack on multi-cloud storage. J. King Saud Univ. Comput. Inf. Sci. 35(9): 101745 (2023) - [j83]Arun Kumar Rai, Hari Om, Satish Chand:
High capacity reversible data hiding in encrypted images using prediction error encoding. Multim. Tools Appl. 82(6): 8345-8358 (2023) - 2022
- [j78]Arun Kumar Rai, Hari Om, Satish Chand:
High-fidelity reversible data hiding technique based on adaptive pairing of prediction errors. Multim. Tools Appl. 81(14): 19637-19653 (2022) - [j76]Mahender Kumar, Satish Chand:
A Provable Secure and Lightweight Smart Healthcare Cyber-Physical System With Public Verifiability. IEEE Syst. J. 16(4): 5501-5508 (2022) - [i3]Mahender Kumar, Satish Chand:
Pairing-Friendly Elliptic Curves: Revisited Taxonomy, Attacks and Security Concern. CoRR abs/2212.01855 (2022) - 2021
- [j74]Deepti Singh, Bijendra Kumar, Samayveer Singh, Satish Chand:
A Secure IoT-Based Mutual Authentication for Healthcare Applications in Wireless Sensor Networks Using ECC. Int. J. Heal. Inf. Syst. Informatics 16(2): 21-48 (2021) - [j72]Mahender Kumar, Satish Chand:
MedHypChain: A patient-centered interoperability hyperledger-based medical healthcare system: Regulation in COVID-19 pandemic. J. Netw. Comput. Appl. 179: 102975 (2021) - [j71]Deepak Sharma, Bijendra Kumar, Satish Chand, Rajiv Ratn Shah:
Uncovering research trends and topics of communities in machine learning. Multim. Tools Appl. 80(6): 9281-9314 (2021) - [j70]Mahender Kumar, Satish Chand:
A Lightweight Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network. IEEE Syst. J. 15(2): 2779-2786 (2021) - [j69]Deepak Sharma, Bijendra Kumar, Satish Chand, Rajiv Ratn Shah:
A Trend Analysis of Significant Topics Over Time in Machine Learning Research. SN Comput. Sci. 2(6): 469 (2021) - [j68]Arun Kumar Rai, Neeraj Kumar, Rajeev Kumar, Hari Om, Satish Chand, Ki-Hyun Jung:
Intra-Block Correlation Based Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling. Symmetry 13(6): 1072 (2021) - [i2]Mahender Kumar, Satish Chand:
Pairing for Greenhorn: Survey and Future Perspective. CoRR abs/2108.12392 (2021) - [i1]Deepak Sharma, Bijendra Kumar, Satish Chand:
Recommending Researchers in Machine Learning based on Author-Topic Model. CoRR abs/2109.02022 (2021) - 2020
- [j66]Devender Kumar, Satish Chand, Bijendra Kumar:
Cryptanalysis and improvement of a user authentication scheme for wireless sensor networks using chaotic maps. IET Networks 9(6): 315-325 (2020) - [j65]Rituraj Soni, Bijendra Kumar, Satish Chand:
Text Region Extraction From Scene Images Using AGF and MSER. Int. J. Image Graph. 20(2): 2050009:1-2050009:23 (2020) - [j64]Mahender Kumar, Satish Chand:
A Secure and Efficient Cloud-Centric Internet-of-Medical-Things-Enabled Smart Healthcare System With Public Verifiability. IEEE Internet Things J. 7(10): 10650-10659 (2020) - [j62]Mahender Kumar, Satish Chand:
SecP2PVoD: a secure peer-to-peer video-on-demand system against pollution attack and untrusted service provider. Multim. Tools Appl. 79(9-10): 6163-6190 (2020) - [j60]Mahender Kumar, Satish Chand, Chittaranjan Padmanabha Katti:
A Secure End-to-End Verifiable Internet-Voting System Using Identity-Based Blind Signature. IEEE Syst. J. 14(2): 2032-2041 (2020) - [j58]Deepti Singh, Bijendra Kumar, Samayveer Singh, Satish Chand:
Evaluating Authentication Schemes for Real-Time Data in Wireless Sensor Network. Wirel. Pers. Commun. 114(1): 629-655 (2020) - [j57]Mahender Kumar, Satish Chand:
Escrow-Less Identity-Based Signature Scheme with Outsourced Protection in Cloud Computing. Wirel. Pers. Commun. 114(4): 3115-3136 (2020) - 2019
- [j56]Rituraj Soni, Bijendra Kumar, Satish Chand:
Text detection and localization in natural scene images based on text awareness score. Appl. Intell. 49(4): 1376-1405 (2019) - [j55]Devender Kumar, Satish Chand, Bijendra Kumar:
Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. J. Ambient Intell. Humaniz. Comput. 10(2): 641-660 (2019) - [j54]Mahender Kumar, Satish Chand:
ESKI-IBE: Efficient and secure key issuing identity-based encryption with cloud privacy centers. Multim. Tools Appl. 78(14): 19753-19786 (2019) - [j53]Rajeev Kumar, Satish Chand, Samayveer Singh:
An optimal high capacity reversible data hiding scheme using move to front coding for LZW codes. Multim. Tools Appl. 78(16): 22977-23001 (2019) - [j52]Rituraj Soni, Bijendra Kumar, Satish Chand:
Optimal feature and classifier selection for text region classification in natural scene images using Weka tool. Multim. Tools Appl. 78(22): 31757-31791 (2019) - [j50]Deepti Singh, Bijendra Kumar, Samayveer Singh, Satish Chand:
SMAC-AS: MAC Based Secure Authentication Scheme for Wireless Sensor Network. Wirel. Pers. Commun. 107(2): 1289-1308 (2019) - [c7]Mahender Kumar, Satish Chand:
A Pairing-Less Identity-Based Blind Signature with Message Recovery Scheme for Cloud-Assisted Services. Inscrypt 2019: 419-434 - 2018
- [j49]Rajeev Kumar, Satish Chand, Samayveer Singh:
A reversible data hiding scheme using pixel location. Int. Arab J. Inf. Technol. 15(4): 763-768 (2018) - [j48]Manju, Satish Chand, Bijender Kumar:
Target coverage heuristic based on learning automata in wireless sensor networks. IET Wirel. Sens. Syst. 8(3): 109-115 (2018) - [j47]Manju, Satish Chand, Bijendra Kumar:
Genetic algorithm-based meta-heuristic for target coverage problem. IET Wirel. Sens. Syst. 8(4): 170-175 (2018) - [j45]Rajeev Kumar, Satish Chand, Samayveer Singh:
A reversible high capacity data hiding scheme using combinatorial strategy. Int. J. Multim. Intell. Secur. 3(2): 146-161 (2018) - [j44]Devender Kumar, Satish Chand, Bijendra Kumar:
A PKC-based user authentication scheme without smart card. J. Intell. Fuzzy Syst. 35(5): 5379-5390 (2018) - [j43]Rajeev Kumar, Satish Chand, Samayveer Singh:
An Improved Histogram-Shifting-Imitated reversible data hiding based on HVS characteristics. Multim. Tools Appl. 77(11): 13445-13457 (2018) - 2017
- [j42]Rajeev Kumar, Satish Chand:
A novel high capacity reversible data hiding scheme based on pixel intensity segmentation. Multim. Tools Appl. 76(1): 979-996 (2017) - [j41]Samayveer Singh, Satish Chand, Bijendra Kumar:
Multilevel heterogeneous network model for wireless sensor networks. Telecommun. Syst. 64(2): 259-277 (2017) - [j40]Manju, Satish Chand, Bijendra Kumar:
Selective α-Coverage Based Heuristic in Wireless Sensor Networks. Wirel. Pers. Commun. 97(1): 1623-1636 (2017) - 2016
- [j39]Samayveer Singh, Satish Chand, Rajeev Kumar, Aruna Malik, Bijendra Kumar:
NEECP: Novel energy-efficient clustering protocol for prolonging lifetime of WSNs. IET Wirel. Sens. Syst. 6(5): 151-157 (2016) - [j38]Manju, Satish Chand, Bijender Kumar:
Maximising network lifetime for target coverage problem in wireless sensor networks. IET Wirel. Sens. Syst. 6(6): 192-197 (2016) - [j37]Rajeev Kumar, Satish Chand:
A reversible high capacity data hiding scheme using pixel value adjusting feature. Multim. Tools Appl. 75(1): 241-259 (2016) - [j36]Saurabh Agarwal, Satish Chand, Nikolay Skarbnik:
SPAM revisited for median filtering detection using higher-order difference. Secur. Commun. Networks 9(17): 4089-4102 (2016) - [j35]Samayveer Singh, Satish Chand, Bijendra Kumar:
Energy Efficient Clustering Protocol Using Fuzzy Logic for Heterogeneous WSNs. Wirel. Pers. Commun. 86(2): 451-475 (2016) - [c5]Saurabh Agarwal, Satish Chand:
Image forgery detection using Markov features in undecimated wavelet transform. IC3 2016: 1-6 - 2014
- [j33]Satish Chand, Samayveer Singh, Bijendra Kumar:
Heterogeneous HEED Protocol for Wireless Sensor Networks. Wirel. Pers. Commun. 77(3): 2117-2139 (2014) - [c4]Samayveer Singh, Satish Chand, Bijendra Kumar:
A stage-4 heterogeneous network model in WSNs. ICACCI 2014: 2191-2195 - 2013
- [c1]Samayveer Singh, Satish Chand, Bijendra Kumar:
3-Tier Heterogeneous Network Model for Increasing Lifetime in Three Dimensional WSNs. QSHINE 2013: 238-247 - 2010
- [j28]Satish Chand, Hari Om:
Efficient staircase scheme with seamless channel transition mechanism. Comput. Networks 54(3): 462-474 (2010) - 2009
- [j24]Satish Chand, Bijendra Kumar, Hari Om:
Segmented patching broadcasting protocol for video data. Comput. Commun. 32(4): 679-684 (2009) - [j23]Satish Chand, Hari Om:
Storage space estimation for videos using fading channels. Digit. Signal Process. 19(2): 287-296 (2009) - [j19]Satish Chand, Bijendra Kumar, Hari Om:
Video Data Delivery using Slotted Patching. J. Netw. Comput. Appl. 32(3): 660-665 (2009) - 2008
- [j16]Satish Chand, Bijendra Kumar, Hari Om:
Patching-based broadcasting scheme for video services. Comput. Commun. 31(10): 1970-1978 (2008) - [j14]Satish Chand, Hari Om:
Phase estimation in data channelization for video transmitting. Multidimens. Syst. Signal Process. 19(2): 247-256 (2008) - [j13]Satish Chand, Hari Om:
Efficient utilization of buffer storage in conservative staircase broadcasting scheme. IEEE Trans. Consumer Electron. 54(3): 1360-1368 (2008) - 2007
- [j12]Satish Chand, Hari Om:
Modeling of Buffer Storage in Video Transmission. IEEE Trans. Broadcast. 53(4): 774-779 (2007) - [j11]Satish Chand, Hari Om:
Geometrico-Harmonic Data Broadcasting and Receiving Scheme for Popular Videos. IEEE Trans. Circuits Syst. Video Technol. 17(1): 16-25 (2007) - [j10]Hari Om, Satish Chand:
Geometrico-Harmonic Broadcasting Scheme With Continuous Redundancy. IEEE Trans. Multim. 9(2): 410-419 (2007) - 2006
- [j9]Satish Chand, Hari Om:
Generalized conservative staircase data broadcasting protocol for video-on-demand. IEEE Trans. Consumer Electron. 52(2): 363-370 (2006) - [j8]Satish Chand, Hari Om:
Seamless channel transition for cautious harmonic scheme in video data broadcasting. IEEE Trans. Consumer Electron. 52(3): 719-725 (2006) - [j7]Satish Chand, Bijendra Kumar, Hari Om:
Request based data delivery in video-on-demand services. IEEE Trans. Consumer Electron. 52(4): 1318-1324 (2006) - 2005
- [j6]Satish Chand, Hari Om:
Modified polyharmonic data broadcasting scheme for popular videos. IEEE Trans. Consumer Electron. 51(4): 1153-1158 (2005) - [j5]Satish Chand, Hari Om:
Seamless channel transition using Bespoke broadcasting scheme for video-on-demand service. IEEE Trans. Consumer Electron. 51(4): 1313-1318 (2005) - 2003
- [j4]Satish Chand, Hari Om:
Bespoke data broadcasting scheme for popular videos. IEEE Trans. Consumer Electron. 49(1): 193-197 (2003) - [j3]Satish Chand, Hari Om:
Buffer evaluation in variable bandwidth channelization for videos. IEEE Trans. Consumer Electron. 49(2): 354-358 (2003) - [j2]Satish Chand, Hari Om:
Modified bespoke data broadcasting scheme for popular videos. IEEE Trans. Consumer Electron. 49(4): 1378-1382 (2003) - 2002
- [j1]Satish Chand, Hari Om:
Modified staircase data broadcasting scheme for popular videos. IEEE Trans. Broadcast. 48(4): 274-280 (2002)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-16 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint