Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Panduranga H. T
@inproceedings{DBLP:conf/iccsp/DKPCRT19, author = {Parameshachari Bidare Divakarachari and Kiran and Rashmi P and Supriya M. C and Rajashekarappa and Panduranga H. T}, editor = {Yulin Wang and Chin{-}Chen Chang}, title = {Controlled partial image encryption based on {LSIC} and chaotic map}, booktitle = {Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, {ICCSP} 2019, Kuala Lumpur, Malaysia, January 19-21, 2019}, pages = {60--63}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3309074.3309107}, doi = {10.1145/3309074.3309107}, timestamp = {Mon, 18 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/DKPCRT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jips/TKS13, author = {Panduranga H. T and Naveen Kumar S. K and Sharath Kumar H. S}, title = {Hardware Software Co-Simulation of the Multiple Image Encryption Technique Using the Xilinx System Generator}, journal = {J. Inf. Process. Syst.}, volume = {9}, number = {3}, pages = {499}, year = {2013}, url = {https://doi.org/10.3745/JIPS.2013.9.3.499}, doi = {10.3745/JIPS.2013.9.3.499}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jips/TKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/KumarPK12, author = {H. S. Sharath Kumar and Panduranga H. T and S. K. Naveen Kumar}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {A Two Stage Combinational Approach for Image Encryption}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {177}, pages = {843--849}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31552-7\_86}, doi = {10.1007/978-3-642-31552-7\_86}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acity/KumarPK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1003-1239, author = {Panduranga H. T and Naveen Kumar S. K}, title = {Hybrid approach for Image Encryption Using {SCAN} Patterns and Carrier Images}, journal = {CoRR}, volume = {abs/1003.1239}, year = {2010}, url = {http://arxiv.org/abs/1003.1239}, eprinttype = {arXiv}, eprint = {1003.1239}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1003-1239.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.