default search action
K. Abhimanyu Kumar Patro
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]K. Abhimanyu Kumar Patro, Pulkit Singh, Narendra Khatri, Bibhudendra Acharya:
Chaotic multiple-image encryption scheme: a simple and highly efficient solution for diverse applications. J. Electronic Imaging 33(4) (2024) - [j10]Ankita Raghuvanshi, Muskan Budhia, K. Abhimanyu Kumar Patro, Bibhudendra Acharya:
FSR-SPD: an efficient chaotic multi-image encryption system based on flip-shift-rotate synchronous-permutation-diffusion operation. Multim. Tools Appl. 83(19): 57011-57057 (2024) - 2023
- [j9]Sachikanta Dash, Sasmita Padhy, S. Anjali Devi, Savya Sachi, K. Abhimanyu Kumar Patro:
An efficient Intra-Inter pixel encryption scheme to secure healthcare images for an IoT environment. Expert Syst. Appl. 231: 120622 (2023) - [j8]K. Abhimanyu Kumar Patro, Bibhudendra Acharya:
An efficient two-level image encryption system using chaotic maps. Int. J. Inf. Comput. Secur. 21(1/2): 35-69 (2023) - [j7]Abhiram Kumar, Pulkit Singh, K. Abhimanyu Kumar Patro, Bibhudendra Acharya:
High-throughput and area-efficient architectures for image encryption using PRINCE cipher. Integr. 90: 224-235 (2023) - [c2]Dhandapani Muralibalakrishnan Sujan, Akshat Singh, K. Abhimanyu Kumar Patro:
A Fast Image Encryption Scheme for Diverge Applications Using Chaotic Index Swapping Confusion-Diffusion. OCIT 2023: 665-670 - [c1]Ansh Sodhani, Nikhil R. Pandit, K. Abhimanyu Kumar Patro:
A Secure and Efficient Multi-Key Image-Based Bit-Level Colour Image Encryption System Using Chaotic Maps. OCIT 2023: 671-676 - 2022
- [j6]Pulkit Singh, K. Abhimanyu Kumar Patro, Bibhudendra Acharya, Rahul Kumar Chaurasiya:
Efficient hardware architectures of Lilliput lightweight algorithm for image encryption. Int. J. Ad Hoc Ubiquitous Comput. 41(4): 205-220 (2022) - [j5]Sachikanta Dash, Sasmita Padhy, Bodhisatwa Parija, T. Rojashree, K. Abhimanyu Kumar Patro:
A Simple and Fast Medical Image Encryption System Using Chaos-Based Shifting Techniques. Int. J. Inf. Secur. Priv. 16(1): 1-24 (2022) - 2020
- [j4]K. Abhimanyu Kumar Patro, Ayushi Soni, Pradeep Kumar Netam, Bibhudendra Acharya:
Multiple grayscale image encryption using cross-coupled chaotic maps. J. Inf. Secur. Appl. 52: 102470 (2020) - [j3]K. Abhimanyu Kumar Patro, Bibhudendra Acharya:
A novel multi-dimensional multiple image encryption technique. Multim. Tools Appl. 79(19-20): 12959-12994 (2020)
2010 – 2019
- 2019
- [j2]K. Abhimanyu Kumar Patro, Bibhudendra Acharya:
An efficient colour image encryption scheme based on 1-D chaotic maps. J. Inf. Secur. Appl. 46: 23-41 (2019) - 2018
- [j1]K. Abhimanyu Kumar Patro, Bibhudendra Acharya:
Secure multi-level permutation operation based multiple colour image encryption. J. Inf. Secur. Appl. 40: 111-133 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-11 00:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint