default search action
Bibhudendra Acharya
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Sameer Trivedi, Arkita Dam, Bharathi Chidirala, Bibhudendra Acharya:
Enhancing image watermarking efficiency through advanced deep learning: A novel approach with modified Res-Ception blocks and practical applications in modern scenarios. Digit. Signal Process. 154: 104684 (2024) - [j31]Anju Gedam, Bibhudendra Acharya, Guru Prasad Mishra:
Nanotube TFET Biosensor with High-Frequency FOMs as Sensing Parameter. J. Circuits Syst. Comput. 33(12): 2450218:1-2450218:16 (2024) - [j30]Bharathi Chidirala, Bibhudendra Acharya:
Run length encoding based reversible data hiding scheme in encrypted images. J. Electronic Imaging 33(1) (2024) - [j29]K. Abhimanyu Kumar Patro, Pulkit Singh, Narendra Khatri, Bibhudendra Acharya:
Chaotic multiple-image encryption scheme: a simple and highly efficient solution for diverse applications. J. Electronic Imaging 33(4) (2024) - [j28]Ankita Raghuvanshi, Muskan Budhia, K. Abhimanyu Kumar Patro, Bibhudendra Acharya:
FSR-SPD: an efficient chaotic multi-image encryption system based on flip-shift-rotate synchronous-permutation-diffusion operation. Multim. Tools Appl. 83(19): 57011-57057 (2024) - 2023
- [j27]Pulkit Singh, Rahul Kumar Chaurasiya, Bibhudendra Acharya:
Modelling and optimisation of high-speed KLEIN architectures on FPGA and ASIC platforms for IoT applications. Int. J. Ad Hoc Ubiquitous Comput. 42(4): 207-225 (2023) - [j26]Kaluri Praveen Raja, Pulkit Singh, Zeesha Mishra, Bibhudendra Acharya:
Efficient area and throughput implementations of lightweight Simeck cipher for resource-constrained applications. Int. J. Ad Hoc Ubiquitous Comput. 43(3): 170-182 (2023) - [j25]Shweta Kumari, Zeesha Mishra, Bibhudendra Acharya:
Efficient hardware implementation of SIMECK lightweight block cipher. Int. J. High Perform. Syst. Archit. 11(3): 129-136 (2023) - [j24]Apeksha Kamble, Zeesha Mishra, Bibhudendra Acharya:
Hardware implementations of LBlock and XXTEA lightweight block ciphers for resource-constrained IoT application. Int. J. High Perform. Syst. Archit. 11(3): 169-178 (2023) - [j23]G. Krishna Pranav, Zeesha Mishra, Bibhudendra Acharya, Bijayananda Patnaik:
Efficient low-area, high-frequency hardware implementations of shadow lightweight block ciphers for resource-constrained IoT devices and sensor networks. Int. J. High Perform. Syst. Archit. 11(4): 216-224 (2023) - [j22]K. Abhimanyu Kumar Patro, Bibhudendra Acharya:
An efficient two-level image encryption system using chaotic maps. Int. J. Inf. Comput. Secur. 21(1/2): 35-69 (2023) - [j21]Kaluri Praveen Raja, Zeesha Mishra, Pulkit Singh, Bibhudendra Acharya:
Efficient hardware implementations of lightweight Simeck Cipher for resource-constrained applications. Integr. 88: 343-352 (2023) - [j20]Abhiram Kumar, Pulkit Singh, K. Abhimanyu Kumar Patro, Bibhudendra Acharya:
High-throughput and area-efficient architectures for image encryption using PRINCE cipher. Integr. 90: 224-235 (2023) - [c11]Utpal Das, Bijayananda Patnaik, Bibhudendra Acharya:
ANN Equalizer for Ultra-high Capacity Multiplexed IsOWC system. OCIT 2023: 387-392 - [c10]Bharathi Chidirala, Bibhudendra Acharya:
A Reversible Color Image Watermarking Technique using Zero Difference Pairs. OCIT 2023: 399-404 - [c9]Linga Pallavi, Pulkit Singh, Bijayananda Patnaik, Bibhudendra Acharya:
High frequency architecture of lightweight authenticated cipher ASCON-128 for resource-constrained IoT devices. OCIT 2023: 405-410 - [c8]Nidhi Baurai, Zeesha Mishra, Bijayananda Patnaik, Bibhudendra Acharya:
High frequency architecture of lightweight authenticated cipher ELEPHANT -160 for resource-constrained IoT applications. OCIT 2023: 521-525 - 2022
- [j19]Mohammad Imroze Khan, Bibhudendra Acharya, Rahul Kumar Chaurasiya:
iHearken: Chewing sound signal analysis based food intake recognition system using Bi-LSTM softmax network. Comput. Methods Programs Biomed. 221: 106843 (2022) - [j18]Pulkit Singh, K. Abhimanyu Kumar Patro, Bibhudendra Acharya, Rahul Kumar Chaurasiya:
Efficient hardware architectures of Lilliput lightweight algorithm for image encryption. Int. J. Ad Hoc Ubiquitous Comput. 41(4): 205-220 (2022) - [j17]Shubham Mishra, Zeesha Mishra, Saroj Kumar Panigrahy, Bibhudendra Acharya:
Multistage pipelined architectures of Piccolo cipher for high-speed IoT applications. Int. J. High Perform. Syst. Archit. 11(2): 96-104 (2022) - [j16]Amit Verma, Toshanlal Meenpal, Bibhudendra Acharya:
Human Body Pose Distance Image Analysis for Action Recognition. Int. J. Pattern Recognit. Artif. Intell. 36(7): 2255012:1-2255012:20 (2022) - 2021
- [j15]Amit Verma, Toshanlal Meenpal, Bibhudendra Acharya:
Multiperson interaction recognition in images: A body keypoint based feature image analysis. Comput. Intell. 37(1): 461-483 (2021) - [j14]Zeesha Mishra, Bibhudendra Acharya:
Efficient hardware implementation of TEA, XTEA and XXTEA lightweight ciphers for low resource IoT applications. Int. J. High Perform. Syst. Archit. 10(2): 80-88 (2021) - [j13]Piyush Modi, Pulkit Singh, Bibhudendra Acharya:
Effective hardware architectures for LED and PRESENT ciphers for resource-constrained applications. Int. J. High Perform. Syst. Archit. 10(2): 89-104 (2021) - [j12]Zeesha Mishra, Bibhudendra Acharya:
High throughput novel architectures of TEA family for high speed IoT and RFID applications. J. Inf. Secur. Appl. 61: 102906 (2021) - [j11]Zeesha Mishra, Pallab Kumar Nath, Bibhudendra Acharya:
Corrigendum to High throughput unified architecture of LEA algorithm for image encryption' Microprocessors and Microsystems Vol 78 (2020) 1-10. Microprocess. Microsystems 85: 104309 (2021) - 2020
- [j10]Nivedita Shrivastava, Pulkit Singh, Bibhudendra Acharya:
Efficient hardware implementations of QTL cipher for RFID applications. Int. J. High Perform. Syst. Archit. 9(1): 1-10 (2020) - [j9]Gandu Ramu, Zeesha Mishra, Pulkit Singh, Bibhudendra Acharya:
Performance optimised architectures of Piccolo block cipher for low resource IoT applications. Int. J. High Perform. Syst. Archit. 9(1): 49-57 (2020) - [j8]K. Abhimanyu Kumar Patro, Ayushi Soni, Pradeep Kumar Netam, Bibhudendra Acharya:
Multiple grayscale image encryption using cross-coupled chaotic maps. J. Inf. Secur. Appl. 52: 102470 (2020) - [j7]Zeesha Mishra, Bibhudendra Acharya:
High throughput and low area architectures of secure IoT algorithm for medical image encryption. J. Inf. Secur. Appl. 53: 102533 (2020) - [j6]Zeesha Mishra, Pallab Kumar Nath, Bibhudendra Acharya:
High throughput unified architecture of LEA algorithm for image encryption. Microprocess. Microsystems 78: 103214 (2020) - [j5]K. Abhimanyu Kumar Patro, Bibhudendra Acharya:
A novel multi-dimensional multiple image encryption technique. Multim. Tools Appl. 79(19-20): 12959-12994 (2020)
2010 – 2019
- 2019
- [j4]Vijay Kumar Sharma, Kamala Kanta Mahapatra, Bibhudendra Acharya:
Visual object tracking based on discriminant DCT features. Digit. Signal Process. 95 (2019) - [j3]Pulkit Singh, Bibhudendra Acharya, Rahul Kumar Chaurasiya:
A comparative survey on lightweight block ciphers for resource constrained applications. Int. J. High Perform. Syst. Archit. 8(4): 250-270 (2019) - [j2]K. Abhimanyu Kumar Patro, Bibhudendra Acharya:
An efficient colour image encryption scheme based on 1-D chaotic maps. J. Inf. Secur. Appl. 46: 23-41 (2019) - 2018
- [j1]K. Abhimanyu Kumar Patro, Bibhudendra Acharya:
Secure multi-level permutation operation based multiple colour image encryption. J. Inf. Secur. Appl. 40: 111-133 (2018) - 2011
- [c7]Mohammad Imroze Khan, Bibhudendra Acharya, Shrish Verma:
Comparison between different illumination independent change detection techniques. ICCCS 2011: 347-350 - [c6]Bibhudendra Acharya, S. Sachin Sunder, M. Thiruvenkatam, Aneesh K. Sajan:
Image encryption using index based chaotic sequence, M sequence and gold sequence. ICCCS 2011: 541-544 - [c5]Bibhudendra Acharya, Nikhil Thomas, D. R. Kavin Arasu, N. Vishnu Prasad:
Encryption and decryption of informative image by key image using modified Hill cipher technique based on non-invertible matrices. ICCCS 2011: 606-609 - [c4]Aniruddha Kanhe, Bibhudendra Acharya, R. B. Deshmukh:
Design and Implementation of the Low Power 0.64mW, 380 KHz Continuous Time Sigma Delta ADC. ICETET 2011: 280-283 - 2010
- [c3]Bibhudendra Acharya, Mukul Dhar Sharma, Sourabh Tiwari, Vinay Kumar Minz:
Privacy protection of biometric traits using modified hill cipher with involutory key and robust cryptosystem. Biometrics Technology 2010: 242-247
2000 – 2009
- 2008
- [c2]Bibhudendra Acharya, Sarat Kumar Patra, Ganapati Panda:
Image Encryption by Novel Cryptosystem Using Matrix Transformation. ICETET 2008: 77-81 - [c1]Ratnakar Dash, Rutuparna Panda, Bibhudendra Acharya, Banshidhar Majhi:
Novel Adaptive B-Spline Filter for Hybrid Echo Cancellation. ICIIS 2008: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint