JPEG based steganography methods using cohort intelligence with cognitive computing and modified multi random start local search optimization algorithms DK Sarmah, AJ Kulkarni Information Sciences 430, 378-396, 2018 | 33 | 2018 |
Improved Cohort Intelligence—A high capacity, swift and secure approach on JPEG image steganography DKSAJ Kulkarni Journal of Information Security and Applications 45, 90-106, 2019 | 29 | 2019 |
Image steganography capacity improvement using cohort intelligence and modified multi-random start local search methods DK Sarmah, AJ Kulkarni Arabian Journal for Science and Engineering 43 (8), 3927-3950, 2018 | 29 | 2018 |
Optimization models in steganography using metaheuristics DK Sarmah, AJ Kulkarni, A Abraham Springer International Publishing, 2020 | 11 | 2020 |
A new horizon in data security by Cryptography & Steganography DK Sarmah, N Bajpai International Journal of Computer Science and Information Technology (IJCSIT …, 2010 | 11 | 2010 |
A Survey on the latest development of Machine Learning in Genetic Algorithm and Particle Swarm Optimization DK Sarmah Optimization in Machine Learning and Applications, 91-112, 2020 | 8 | 2020 |
Cryptography and digital image steganography techniques DK Sarmah, AJ Kulkarni, A Abraham, DK Sarmah, AJ Kulkarni, ... Optimization Models in Steganography Using Metaheuristics, 33-48, 2020 | 6 | 2020 |
Multiphase and Multiple Encryption H Kaur, HPS Gill, D Sarmah 2018 IEEE Punecon, 1-8, 2018 | 6 | 2018 |
Web Application Performance Analysis based on Component Load Testing C Babbar, N Bajpai, DK Sarmah International Journal of Technology and Applied Science 2, 22-28, 2011 | 5 | 2011 |
The baseline of global consumer cyber security standards for IoT: quality evaluation KOGDK Sarmah Journal of Cyber Security Technology 6 (3), 1-26, 2022 | 3* | 2022 |
Heuristics and metaheuristic optimization algorithms DK Sarmah, AJ Kulkarni, A Abraham, DK Sarmah, AJ Kulkarni, ... Optimization Models in Steganography Using Metaheuristics, 49-61, 2020 | 3 | 2020 |
Smart traffic light controlling and violation detection system using digital image processing BM Gebregeorgis, DK Sarmah International Journal of Engineering Research 4 (2), 520-529, 2016 | 3 | 2016 |
The development of phishing during the COVID-19 pandemic: An analysis of over 1100 targeted domains R Hoheisel, G Van Capelleveen, DK Sarmah, M Junger Computers & Security 128, 103158, 2023 | 2 | 2023 |
Steganalysis on All Approaches/Vulnerability Analysis of Stego Image (s) DK Sarmah, AJ Kulkarni, A Abraham, DK Sarmah, AJ Kulkarni, ... Optimization Models in Steganography Using Metaheuristics, 147-161, 2020 | 2 | 2020 |
Cryptography algorithm based on cohort intelligence DK Sarmah, IR Kale Proceedings of the 2nd International Conference on Data Engineering and …, 2019 | 2 | 2019 |
Improved Cohort Intelligence Optimization Algorithm (Approach 4) DK Sarmah, AJ Kulkarni, A Abraham, DK Sarmah, AJ Kulkarni, ... Optimization Models in Steganography Using Metaheuristics, 123-145, 2020 | 1 | 2020 |
Online Protection for Children Using a Developed Parental Monitoring Tool Check for updates M Stoev, DK Sarmah Proceedings of Eighth International Congress on Information and …, 2023 | | 2023 |
Evaluating the Merits and Constraints of Cryptography-Steganography Fusion: A Systematic Analysis I Haverkamp, DK Sarmah | | 2023 |
Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks J Tan, DK Sarmah International Symposium on Cyber Security, Cryptology, and Machine Learning …, 2023 | | 2023 |
Online Protection for Children Using a Developed Parental Monitoring Tool M Stoev, DK Sarmah International Congress on Information and Communication Technology, 205-215, 2023 | | 2023 |