default search action
Gandharba Swain
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Hyder Ali Hingoliwala, Naween Kumar, Anand Nayyar, Gandharba Swain:
Energy-efficient Neuro-fuzzy-based Multi-node Charging Model for WRSNs using Multiple Mobile Charging Vehicles. Comput. Commun. 216: 356-373 (2024) - [j21]Naween Kumar, Damodar Reddy Edla, Dinesh Dash, Gandharba Swain, T. N. Shankar:
Energy-efficient and delay-sensitive-based data gathering technique for multi-hop WSN using path-constraint mobile element. Wirel. Networks 30(1): 77-95 (2024) - 2023
- [j20]S. N. V. J. Devi Kosuru, Anita Pradhan, K. Abdul Basith, Reshma Sonar, Gandharba Swain:
Digital Image Steganography With Error Correction on Extracted Data. IEEE Access 11: 80945-80957 (2023) - [j19]Rajesh Yelchuri, Alaa O. Khadidos, Adil Omar Khadidos, Abdulrhman M. Alshareef, Gandharba Swain, Jatindra Kumar Dash:
Deep Semantic Feature Reduction for Efficient Remote Sensing Image Retrieval. IEEE Access 11: 112787-112803 (2023) - [j18]Erukala Suresh Babu, Mekala Srinivasa Rao, Gandharba Swain, A. Kousar Nikhath, Rajesh Kaluri:
Fog-Sec: Secure end-to-end communication in fog-enabled IoT network using permissioned blockchain system. Int. J. Netw. Manag. 33(5) (2023) - [j17]Anantha Rao Gottimukkala, Naween Kumar, Jatindra Kumar Dash, Gandharba Swain:
Image watermarking based on remainder value differencing and extended Hamming code. J. Electronic Imaging 33(1) (2023) - [c1]G. Naga Nithin, Ashok Kumar Pradhan, Gandharba Swain:
zkHealthChain - Blockchain Enabled Supply Chain in Healthcare Using Zero Knowledge. IFIPIoT (2) 2023: 133-148 - 2022
- [j16]Smita Chaudhari, Gandharba Swain:
Towards Lightweight Provable Data Possession for Cloud Storage Using Indistinguishability Obfuscation. IEEE Access 10: 31607-31625 (2022) - [j15]Snehalata Funde, Gandharba Swain:
Big Data Privacy and Security Using Abundant Data Recovery Techniques and Data Obliviousness Methodologies. IEEE Access 10: 105458-105484 (2022) - [j14]Reshma Sonar, Gandharba Swain:
A hybrid steganography technique based on RR, AQVD, and QVC. Inf. Secur. J. A Glob. Perspect. 31(4): 479-498 (2022) - [j13]Aditya Kumar Sahu, Gandharba Swain:
High fidelity based reversible data hiding using modified LSB matching and pixel difference. J. King Saud Univ. Comput. Inf. Sci. 34(4): 1395-1409 (2022) - [j12]Pramoda Patro, Krishna Kumar, G. Suresh Kumar, Gandharba Swain:
Similarity and wavelet transform based data partitioning and parameter learning for fuzzy neural network. J. King Saud Univ. Comput. Inf. Sci. 34(6 Part B): 3424-3432 (2022) - [j11]Gandharba Swain, Anita Pradhan:
Image Steganography Using Remainder Replacement, Adaptive QVD and QVC. Wirel. Pers. Commun. 123(1): 273-293 (2022) - 2021
- [j10]Reshma Sonar, Gandharba Swain:
Steganography based on quotient value differencing and pixel value correlation. CAAI Trans. Intell. Technol. 6(4): 504-519 (2021) - [j9]Aditya Kumar Sahu, Gandharba Swain, Monalisa Sahu, J. Hemalatha:
Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP. J. Inf. Secur. Appl. 58: 102808 (2021)
2010 – 2019
- 2019
- [j8]Aditya Kumar Sahu, Gandharba Swain:
Data hiding using adaptive LSB and PVD technique resisting PDH and RS analysis. Int. J. Electron. Secur. Digit. Forensics 11(4): 458-476 (2019) - [j7]Aditya Kumar Sahu, Gandharba Swain:
An Optimal Information Hiding Approach Based on Pixel Value Differencing and Modulus Function. Wirel. Pers. Commun. 108(1): 159-174 (2019) - 2018
- [j6]Gandharba Swain:
Digital Image Steganography Using Eight-Directional PVD against RS Analysis and PDH Analysis. Adv. Multim. 2018: 4847098:1-4847098:13 (2018) - [j5]Gandharba Swain:
A data hiding technique by mixing MFPVD and LSB substitution in a pixel. Inf. Technol. Control. 47(4): 714-727 (2018) - [j4]Gandharba Swain:
High Capacity Image Steganography Using Modified LSB Substitution and PVD against Pixel Difference Histogram Analysis. Secur. Commun. Networks 2018: 1505896:1-1505896:14 (2018) - 2017
- [j3]Anita Pradhan, Kolla Raja Sekhar, Gandharba Swain:
Adaptive PVD Steganography Using Horizontal, Vertical, and Diagonal Edges in Six-Pixel Blocks. Secur. Commun. Networks 2017: 1924618:1-1924618:13 (2017) - 2016
- [j2]Gandharba Swain:
Adaptive pixel value differencing steganography using both vertical and horizontal edges. Multim. Tools Appl. 75(21): 13541-13556 (2016) - 2012
- [j1]Gandharba Swain, Saroj Kumar Lenka:
A Novel Approach to RGB Channel Based Image Steganography Technique. Int. Arab. J. e Technol. 2(4): 181-186 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint