155 | -- | 187 | Ruixia Yan, Yuan Jia, Lin Gao. A robust feature points-based screen-shooting resilient watermarking scheme |
188 | -- | 213 | Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher. An image encryption using hybrid grey wolf optimisation and chaotic map |
214 | -- | 235 | Kumari Suniti Singh, Harsh Vikram Singh. Robust watermarking of medical images using SVM and hybrid DWT-SVD |
236 | -- | 257 | Sunil Kumar Patel, Saravanan Chandran, Purushottam Kumar. Secure digital academic certificate verification system using blockchain |
258 | -- | 283 | Xiangning Liang, Pushpendu Kar. Robust and secure file transmission through video streaming using steganography and blockchain |
284 | -- | 321 | Aschalew Tirulo, Siddhartha Chauhan, Kamlesh Dutta. Machine learning and deep learning techniques for detecting and mitigating cyber threats in IoT-enabled smart grids: a comprehensive review |
322 | -- | 337 | Ravi Sheth, Chandresh Parekha. An intelligent approach to classify and detection of image forgery attack (scaling and cropping) using transfer learning |
338 | -- | 360 | Joon Son, Essia Hamouda, Garo Pannosian, Vijay Bhuse. Data dissemination and policy enforcement in multi-level secure multi-domain environments |