All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.
Journal of Global Research in Computer Sciences : Citations & Metrics Report
Articles published in Journal of Global Research in Computer Sciences have been cited by esteemed scholars and scientists all around the world.
Journal of Global Research in Computer Sciences has got h-index 30, which means every article in Journal of Global Research in Computer Sciences has got 30 average citations.
Following are the list of articles that have cited the articles published in Journal of Global Research in Computer Sciences .
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
Total published articles
32
41
28
16
17
20
20
8
4
20
47
132
167
182
Research, Review articles and Editorials
5
11
11
13
0
0
0
0
4
12
47
129
156
182
Research communications, Review communications, Editorial communications, Case reports and Commentary
21
26
18
3
17
20
20
8
0
8
0
0
0
0
Conference proceedings
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Citations received as per Google Scholar, other indexing platforms and portals
202
297
357
355
362
378
415
432
431
353
276
174
112
52
Journal total citations count
3761
Journal impact factor
14.81
Journal 5 years impact factor
17.33
Journal cite score
16.70
Journal h-index
30
Journal h-index since 2019
19
Journal Impact Factor 2020 formula
IF= Citations(y)/{Publications(y-1)+ Publications(y-2)}
Y= Year
Citescorey = Citationsy + Citationsy-1 + Citationsy-2 + Citations y-3 / Published articlesy + Published articlesy-1 + Published articlesy-2 + Published articles y-3
Important citations (766)
Noroozi e, daud sm, sabouhi a. a security enhanced robust image hiding algorithm from digital signature.
Tsai se, liu kc, yang sm. an efficient image watermarking method based on fast discrete cosine transform algorithm. mathematical problems in engineering. 2017 aug 16;2017.
Rampaul d, patial rk, kumar d. detection of dos attack in vanets. indian journal of science and technology. 2016 dec 28;9(47):1-6.
Yadav d, agrawal m, arora a. performance evaluation of lsb and lsd in steganography. in2014 5th international conference-confluence the next generation information technology summit (confluence) 2014 sep 25 (pp. 515-520). ieee.
Ray am, sarkar a, obaid aj, pandiaraj s. iot security using steganography. inmultidisciplinary approach to modern digital steganography 2021 (pp. 191-210). igi global.
Kelarestaghi kb, foruhandeh m, heaslip k, gerdes r. survey on vehicular ad hoc networks and its access technologies security vulnerabilities and countermeasures. arxiv preprint arxiv:1903.01541. 2019 mar 4.
Sundari m, revathi pb, sumesh s. secure communication using digital watermarking with encrypted text hidden in an image. ininternational symposium on security in computing and communication 2015 aug 10 (pp. 247-255). springer, cham.
Parkinson s, ward p, wilson k, miller j. cyber threats facing autonomous and connected vehicles: future challenges. ieee transactions on intelligent transportation systems. 2017 mar 6;18(11):2898-915.
Bhowmik s, bhaumik ak. a new approach in color image steganography with high level of perceptibility and security. in2016 international conference on intelligent control power and instrumentation (icicpi) 2016 oct 21 (pp. 283-286). ieee.
Fernandes k, gupta ar, panchal p, mangrulkar r. application of steganography for secure data transmission using lossless compression. inmultidisciplinary approach to modern digital steganography 2021 (pp. 279-305). igi global.
Sohag sa, islam mk, islam mb. a novel approach for image steganography using dynamic substitution and secret key. american journal of engineering research (ajer). 2013;2(9):118-26.
Kaur s, jindal s. image steganography using hybrid edge detection and first component alteration technique. international journal of hybrid information technology. 2013;6(5):59-66.
Noroozi e. dynamic hashing technique for bandwidth reduction in image transmission (doctoral dissertation, universiti teknologi malaysia).
Prajapati ha, chitaliya dn. secured and robust dual image steganography: a survey. international journal of innovative research in computer and communication engineering. 2015 jan;3(1):534-42.
Seyyedi sa, sadykhov rk. comparison of digital image steganography methods. ininformatics 2016 sep 27 (no. 1, pp. 66-75).
Dhawan s, gupta r. comparative analysis of domains of technical steganographic techniques. in2019 6th international conference on computing for sustainable global development (indiacom) 2019 mar 13 (pp. 885-889). ieee.
Rahmadani r, hutahaean hd. implementation of pohlig-hellman algorithm and steganography combination of first of file (fof) and end of file (eof) for file security: implementation of pohlig-hellman algorithm and steganography combination of first of file (fof) and end of file (eof) for file security. jurnal mantik. 2020 may 1;4(1):14-9.
Seyedi sa. comparison of steganographic methods in images. informatics. 2016 sep 27 (1): 66-75.
Ciptaningtyas ht, anggoro r, fadhillah mb. text steganography on sundanese script using improved line shift coding. in2018 international electronics symposium on knowledge creation and intelligent computing (ies-kcic) 2018 oct 29 (pp. 254-261). ieee.
Ciptaningtyas ht, anggoro r, fadhillah mb. text steganography on sundanese script using improved line shift coding. in2018 international electronics symposium on knowledge creation and intelligent computing (ies-kcic) 2018 oct 29 (pp. 254-261). ieee.