Zobrazeno 1 - 10
of 38
pro vyhledávání: '"Rainu Nandal"'
Autor:
Meenakshi Malik, Rainu Nandal
Publikováno v:
Materials Today: Proceedings. 80:3762-3768
The concept of DB means “Driver Behaviour” is a detailed analysis of driver pattern or style as to how the vehicle is operated by the driver in different conditions such as environ and dynamics of road conditions. Hence, it has become one of the
Autor:
Nishant Jakhar, Rainu Nandal
Publikováno v:
International Journal of Engineering Trends and Technology. 70:67-75
Publikováno v:
International Journal of Engineering Trends and Technology. 70:97-103
Publikováno v:
Multimedia Tools and Applications.
Publikováno v:
Journal of Intelligent & Fuzzy Systems. 43:3283-3292
In recent years, driver behavior analysis plays a vital role to enhance passenger coverage and management resources in the smart transportation system. The real-world environment possesses the driver principles contains a lot of information like driv
Publikováno v:
Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering). 16
Background: Steganography is the approach of camouflaging the covert object within another cover object. This manuscript suggested a novel steganography approach to conceal the covert data presence. The basic idea behind this is to generate an inform
Autor:
Devvrat Raghuvanshi, Kamaldeep Joshi, Rainu Nandal, Harkesh Sehrawat, Surender Singh, Srishti Singh
Pretext & Motivations: Spatial domain-based image steganography is the stowing away technique in which disguised data is hidden directly inside the pixel intensities of an unclassified image. After a systematic literature review based on the PRISMA f
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fb7dd164b4c305330db549d60de20979
https://doi.org/10.21203/rs.3.rs-2694826/v1
https://doi.org/10.21203/rs.3.rs-2694826/v1
Publikováno v:
Journal of Scientific Research. 66:122-131
This paper proposed a new data hiding technique which uses a blended approach of security. It uses a blend of cryptography and steganography at the same time to provide two layers of security. At first, data is encrypted using Rail Fence cryptography
Publikováno v:
Intelligent Automation & Soft Computing. 32:87-99
Publikováno v:
2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT).