default search action
Maroti Deshmukh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j17]Maroti Deshmukh, Arjun Singh Rawat:
Image and object encryption using multiplicative cipher and K-means clustering algorithm. Int. J. Appl. Cryptogr. 4(3/4): 195-204 (2024) - [j16]Maroti Deshmukh, Arjun Singh Rawat:
Secure key exchange protocol using graph and trusted third party. Int. J. Commun. Networks Distributed Syst. 30(4): 393-412 (2024) - [j15]Sandeep Chand Kumain, Maroti Deshmukh, Maheep Singh:
Extended Diffie-Hellman protocol based on exponential and multiplication operations over modular arithmetic. Int. J. Commun. Networks Distributed Syst. 30(4): 486-499 (2024) - [j14]Bhawana Parihar, Arjun Singh Rawat, Maroti Deshmukh:
A survey on counting-based secret sharing schemes for resource-constrained environments: techniques, security, challenges, and future directions. J. Supercomput. 80(12): 17633-17687 (2024) - [j13]Maroti Deshmukh, Kanchan Bisht, Arjun Singh Rawat:
Deterministic Rabin Cryptosystem Using Cubic Congruence and Chinese Remainder Theorem. Wirel. Pers. Commun. 137(3): 1663-1684 (2024) - 2023
- [j12]Arjun Singh Rawat, Maroti Deshmukh, Maheep Singh:
A novel multi secret image sharing scheme for different dimension secrets. Multim. Tools Appl. 82(23): 35183-35219 (2023) - [j11]Arjun Singh Rawat, Maroti Deshmukh, Maheep Singh:
Natural share-based lightweight (n, n) single secret image sharing scheme using LSB stuffing for medical images. J. Supercomput. 79(17): 19138-19167 (2023) - [j10]Dinesh Pande, Arjun Singh Rawat, Maroti Deshmukh, Maheep Singh:
Single Secret Sharing Scheme Using Chinese Remainder Theorem, Modified Shamir's Scheme and XOR Operation. Wirel. Pers. Commun. 130(2): 957-985 (2023) - 2021
- [j9]Kanchan Bisht, Maroti Deshmukh:
A novel approach for multilevel multi-secret image sharing scheme. J. Supercomput. 77(10): 12157-12191 (2021) - 2020
- [j8]Arjun Singh Rawat, Maroti Deshmukh:
Tree and elliptic curve based efficient and secure group key agreement protocol. J. Inf. Secur. Appl. 55: 102599 (2020) - [j7]Mayank Gupta, Manu Gupta, Maroti Deshmukh:
Single secret image sharing scheme using neural cryptography. Multim. Tools Appl. 79(17-18): 12183-12204 (2020) - [j6]Ayushi Agarwal, Maroti Deshmukh, Maheep Singh:
Object detection framework to generate secret shares. Multim. Tools Appl. 79(33-34): 24685-24706 (2020) - 2019
- [j5]Maroti Deshmukh, Neeta Nain, Mushtaq Ahmed:
Secret sharing scheme based on binary trees and Boolean operation. Knowl. Inf. Syst. 60(3): 1377-1396 (2019) - [j4]Tejas Duseja, Maroti Deshmukh:
Image compression and encryption using chinese remainder theorem. Multim. Tools Appl. 78(12): 16727-16753 (2019) - 2018
- [j3]Mohit Rajput, Maroti Deshmukh, Neeta Nain, Mushtaq Ahmed:
Securing Data Through Steganography and Secret Sharing Schemes: Trapping and Misleading Potential Attackers. IEEE Consumer Electron. Mag. 7(5): 40-45 (2018) - [j2]Maroti Deshmukh, Neeta Nain, Mushtaq Ahmed:
Efficient and secure multi secret sharing schemes based on boolean XOR and arithmetic modulo. Multim. Tools Appl. 77(1): 89-107 (2018) - 2017
- [j1]Maroti Deshmukh, Neeta Nain, Mushtaq Ahmed:
A novel approach for sharing multiple color images by employing Chinese Remainder Theorem. J. Vis. Commun. Image Represent. 49: 291-302 (2017)
Conference and Workshop Papers
- 2023
- [c9]Arvind Kumar Vishwakarma, Maroti Deshmukh:
An Intelligent Image Fire Detection Approach Based On Deep Convolutional Neural Network. ICCCNT 2023: 1-6 - 2020
- [c8]Ajay Malik, Abhishek Singh, Maroti Deshmukh:
Classification of Imbalanced Data Using Decision Tree and Bayesian Classifier. AICV 2020: 458-466 - 2019
- [c7]Snigdha Agarwal, Ayushi Agarwal, Maroti Deshmukh:
Denoising Images with Varying Noises Using Autoencoders. CVIP (2) 2019: 3-14 - 2018
- [c6]Piyush Kumar, Maroti Deshmukh, Abhimanyu Kumar:
A novel pitch based voice recognition model (PVRM). RAIT 2018: 1-4 - 2017
- [c5]Maroti Deshmukh, Manoj Kumar Balwant:
Generating Cancelable Palmprint Templates Using Local Binary Pattern and Random Projection. SITIS 2017: 203-209 - 2016
- [c4]Maroti Deshmukh, Neeta Nain, Mushtaq Ahmed:
An (n, n)-Multi Secret Image Sharing Scheme Using Boolean XOR and Modular Arithmetic. AINA 2016: 690-697 - [c3]Mohit Rajput, Maroti Deshmukh, Neeta Nain:
A Novel Approach for Concealing Image by Utilizing the Concept of Secret Sharing Scheme and Steganography. ICIT 2016: 51-56 - [c2]Maroti Deshmukh, Neeta Nain, Mushtaq Ahmed:
A Novel Approach of an (n, n) Multi-Secret Image Sharing Scheme Using Additive Modulo. CVIP (1) 2016: 149-158 - [c1]Maroti Deshmukh, Neeta Nain, Mushtaq Ahmed:
Enhanced Modulo Based Multi Secret Image Sharing Scheme. ICISS 2016: 212-224
Informal and Other Publications
- 2016
- [i1]Mohit Rajput, Maroti Deshmukh:
A Technique to Share Multiple Secret Images. CoRR abs/1611.09261 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-18 00:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint