Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] C. C. Chang, T. S. Chen and L. Z. Chung, “A steganographic method based upon JPEG and quantization table modification”, Information Sciences, vol. 141, 2002, pp. 123-138. [2] Parvinder Singh, Sudhir Batra, H R Sharma, "Message Hidden in 6th and 7th Bit", Proceedings of International Conference on Controls, Automation and Communication System, Dec. 22-24, 2004, Allied Publishers, pp-281- 284. [3] Parvinder Singh, Sudhir Batra, HR Sharma, "Evaluating the Performance of Message Hidden in 1st and 2nd Bit Plane", WSEAS Transactions on Information Science and Applications, issue 8, vol 2, August 2005, pp 1220- 1227. [4] Parvinder Singh, Sudhir Batra, HR Sharma, "Message Hidden in 1st and 2nd Bit Plane", Proceedings of 9th WSEAS International Conference on Computers, Athens, Greece, July 14-16, 2005, pp 1- 5. [5] Parvinder Singh, Sudhir Batra, H R Sharma, "Steganographic Methods Based on Digital Logic", 6th International Conference on Signal Processing, Dallas, USA, March 22-24,2007. [6] Prince Kumar Panjabi, Parvinder Singh, “An Enhanced Data Hiding Approach using Pixel Mapping Method with Optimal Substitution Approach”, International Journal of Computer Applications, vol.74(10), July 2013, pp. 36- 43. [7] Parvinder Singh, Sudhir Batra, HR Sharma, "Hiding Credentials in Biological Images", A & B Research, vol 22(1), Jan 2006, ISSN 0970-1970, pp 22- 25. [8] Sonam Chhikara, Parvinder Singh, “SBHCS: Spike based Histogram Comparison Steganalysis Technique”, International Journal of Computer Applications, vol.75, 2013. [9] Sudhir Batra, Parvinder Singh, “A Class of $ q $- ary 2-IPP Codes”, Journal of Informatics and Mathematical Sciences 5 (2), 65-76. [10] Parvinder Singh, Sudhir Batra, HR Sharma, “A review of digital signatures and status in India”, WSEAS Transactions on Computers 4 (4), 408-410. [11] Jasvinder Kaur, Manoj Duhan, Ashok Kumar, "Digital Logic Embedding Using Single Row." International Journal on Computer Science & Engineering, vol. 3, no. 12 , 2011. [12] Penne baker, William B., and Joan L. Mitchell, "JPEG: Still Image Data Compression Standard", Van Nostrand Reinhold, 1993. [13] H. W. Tseng and C.C. Chang, “Steganography using JPEG- compressed images”, Fourth International Conference on Computer and Information Technology, CIT '04, 14-16 Sept 2004, pp .12-17. [14] Kobayashi, H., Y. Noguchi and H. Kiya (1999), “A method of embedding binary data into JPEG Bitstreams” IEICE Trans. Information and Systems, J83-D-II, 1469–1476.
![]() | V2I808.pdf |