All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Journal of Global Research in Computer Sciences : Citations & Metrics Report

Important citations (766)
image Puspasari s. steganography application for efficient documentation of palembang cultural objects. in2016 international conference on computer communication and informatics (iccci) 2016 jan 7 (pp. 1-5). ieee.
image Job d, paul v. image steganography technique using sudoku puzzle and ecc algorithm for secured data transmission. journal of theoretical & applied information technology. 2014 aug 20;66(1).
image Mishra s, dastidar a. hybrid image encryption and decryption using cryptography and watermarking technique for high security applications. in2018 international conference on current trends towards converging technologies (icctct) 2018 mar 1 (pp. 1-5). ieee.
image Singhal v, yadav d, bandil dk. steganography and steganalysis: a review. international journal of electronics and computer science engineering, pp399-404. 2012.
image Singh i, raina jp. advance scheme for secret data hiding system using hop field & lsb. international journal of computer trends and technology (ijctt)–volume. 2013 jul;4:16-23.
image Job d, paul v. an efficient video steganography technique for secured data transmission. in2016 international conference on data mining and advanced computing (sapience) 2016 mar 16 (pp. 298-305). ieee.
image Nosrati m, karimi r, nosrati h, nosrati a. taking a brief look at steganography: methods and approaches. journal of american science. 2011;7(6).
image Seyyedi sa, sadykhov rk. digital image steganography concept and evaluation. international journal of computer applications. 2013 jan 1;66(5).
image Tsai se, liu kc, yang sm. an efficient image watermarking method based on fast discrete cosine transform algorithm. mathematical problems in engineering. 2017 aug 16;2017.
image Dutta h, das rk, nandi s, prasanna sm. an overview of digital audio steganography. iete technical review. 2020 nov 1;37(6):632-50.
image Ishengoma fr. the art of data hiding with reed-solomon error correcting codes. arxiv preprint arxiv:1411.4790. 2014 nov 18.
image Hamed g, marey m, el-sayed sa, tolba mf. comparative study for various dna based steganography techniques with the essential conclusions about the future research. in2016 11th international conference on computer engineering & systems (icces) 2016 dec 20 (pp. 220-225). ieee.
image Nosrati m, karimi r, nosrati h, nosrati a. embedding stego-text in cover images using linked list concepts and lsb technique. journal of american science. 2011 oct;7(6):97-100.
image Hariri m, karimi r, nosrati m. an introduction to steganography methods. world applied programming. 2011 aug;1(3):191-5.
image Mirzaei f, faridafshin m, movafeghi a, faghihi r. automated defect detection of weldments and castings using canny, sobel and gaussian filter edge detectors: a comparison study. tehran, iran.[google scholar]. 2017.
image Iqbal m, munggaran lc. backup strategy for it disaster recovery plan using active data guard and netbackup.
image Triningsih a, supriyono h. aplikasi data mining berbasis web menggunakan metode k-means clustering untuk pengelompokan penjualan terlaris produk kacamata.
image Govender p, sivakumar v. investigating diffuse irradiance variation under different cloud conditions in durban, using k-means clustering. journal of energy in southern africa. 2019 aug;30(3):22-32.
image Sensuse di, purwandari b, rahayu p. defining e-portofolio factor for competency certification using fuzzy delphi method. turkish online journal of educational technology-tojet. 2018 apr;17(2):25-33.
image Saffie na, rasmani ka. fuzzy delphi method: issues and challenges. in2016 international conference on logistics, informatics and service sciences (liss) 2016 jul 24 (pp. 1-7). ieee.