Biometrics security using steganography C Kant, R Nath, S Chaudhary International Journal of Security 2 (1), 1-5, 2008 | 48 | 2008 |
Attacks on biometric systems: an overview R Jain, C Kant International Journal of Advances in Scientific Research 1 (07), 283-288, 2015 | 47 | 2015 |
Reducing process-time for fingerprint identification system C Kant, R Nath International Journals of Biometric and Bioinformatics 3 (1), 1-9, 2009 | 46 | 2009 |
Security issues on cloud computing H Shah, SS Anandane arXiv preprint arXiv:1308.5996, 2013 | 42* | 2013 |
Enhanced security architecture for cloud data security C Kant, Y Sharma International journal of advanced research in computer science and software …, 2013 | 42 | 2013 |
CNN based on overlapping pooling method and multi-layered learning with SVM & KNN for American cotton leaf disease recognition K Prashar, R Talwar, C Kant 2019 International Conference on Automation, Computational and Technology …, 2019 | 40 | 2019 |
Fake face recognition using fusion of thermal imaging and skin elasticity C Kant, N Sharma IJCSC 4 (1), 65-72, 2013 | 29 | 2013 |
An effective hybrid encryption algorithm for ensuring cloud data security V Goyal, C Kant Big Data Analytics: Proceedings of CSI 2015, 195-210, 2018 | 27 | 2018 |
Biometrics security concerns N Dahiya, C Kant 2012 Second International Conference on Advanced Computing & Communication …, 2012 | 25 | 2012 |
A Novel approach for securing biometric template S Malhotra, C Kant International journal of advanced research in computer science and software …, 2013 | 22 | 2013 |
A watermarking based approach for protection of templates in multimodal biometric system C Kant, S Chaudhary Procedia Computer Science 167, 932-941, 2020 | 21 | 2020 |
A multimodal approach to improve the performance of biometric system C Kant BVICA M's International Journal of Information Technology 7 (2), 891, 2015 | 19 | 2015 |
A multimodal biometric system based on finger knuckle print, fingerprint, and palmprint traits C Kant, S Chaudhary Innovations in Computational Intelligence and Computer Vision: Proceedings …, 2021 | 13 | 2021 |
Association rule mining: An overview N Sharma, CK Verma International Journal of Computer Science and Communication 5, 10-15, 2014 | 12 | 2014 |
Modeling morphometric and geomorphological parameters of mountainous river basin for water resource management using remote sensing and GIS approach C Kant, G Kumar, RS Meena Modeling Earth Systems and Environment 9 (2), 2151-2163, 2023 | 11 | 2023 |
Robust automatic cotton crop disease recognition (ACDR) method using the hybrid feature descriptor with SVM K Prashar, R Talwar, C Kant 4th 2016 International Conference on Computing on sustainable Global …, 2017 | 11 | 2017 |
Fake face detection based on skin elasticity C Kant, N Sharma International journal of advanced research in computer science and software …, 2013 | 10 | 2013 |
FKP and Iris based multimodal biometric system using PCA with NFNN S Singh, C Kant Proceedings of International Conference on Sustainable Computing in Science …, 2019 | 9 | 2019 |
Load Balancing in cloud computing M Berwal, C Kant Int. J. Comput. Sci. Commun 6, 52-58, 2015 | 8 | 2015 |
Face and age recognition using three-dimensional discrete wavelet transform and rotational local binary pattern with radial basis function support vector machine method Sonal, A Singh, C Kant International Journal of Electrical Engineering & Education 60 (2_suppl …, 2023 | 7 | 2023 |