Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Sonam Chhikara"'
Autor:
Rohit Mittal, Geeta Rani, Vibhakar Pathak, Sonam Chhikara, Vijaypal Singh Dhaka, Eugenio Vocaturo, Ester Zumpano
Publikováno v:
Computers, Vol 12, Iss 12, p 250 (2023)
The automation industry faces the challenge of avoiding interference with obstacles, estimating the next move of a robot, and optimizing its path in various environments. Although researchers have predicted the next move of a robot in linear and non-
Externí odkaz:
https://doaj.org/article/5ae27313f99c4ee184ad7de1cf5780d7
Autor:
Sonam Chhikara, Rajeev Kumar
Publikováno v:
Multimedia Tools and Applications. 82:13595-13615
Autor:
Sonam Chhikara, Nidhi Kundu
Publikováno v:
2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS).
Autor:
Sonam Chhikara, Rajeev Kumar
Publikováno v:
Multimedia Tools and Applications. 80:31865-31885
We propose a hybrid grasshopper optimizer to reduce the size of the feature set in the steganalysis process using information theory and other stochastic optimization techniques. This paper results from the stagnancy of local minima and slow converge
Autor:
Rajeev Kumar, Sonam Chhikara
Publikováno v:
Acta Cybernetica. 24:593-612
Steganography hides the data within a media file in an imperceptible way. Steganalysis exposes steganography by using detection measures. Traditionally, Steganalysis revealed steganography by targeting perceptible and statistical properties which res
Publikováno v:
International Journal of Computer Applications. 96:30-35
this paper, the proposed work is about to store the patient information in the medical image itself that can be a CT scan or the MRI image. Medical records are extremely sensitive patient information and require uncompromising security during both st
Autor:
Parvinder Singh, Sonam Chhikara
Publikováno v:
International Journal of Computer Applications. 75:39-44
is the art of secretly transferring of data and steganalysis is the art of detecting that hidden data embedded in cover media. In the past years many powerful and robust methods of steganography and steganalysis have been reported in the literature.