<?xml version="1.0"?>
<dblpperson name="Choudhary Shyam Prakash" pid="201/1521" n="10">
<person key="homepages/201/1521" mdate="2017-06-12">
<author pid="201/1521">Choudhary Shyam Prakash</author>
</person>
<r><article key="journals/cee/JaiprakashP25" mdate="2025-03-17">
<author pid="276/5174">Sahani Pooja Jaiprakash</author>
<author pid="201/1521">Choudhary Shyam Prakash</author>
<title>Exploring text-to-image generation models: Applications and cloud resource utilization.</title>
<pages>110194</pages>
<year>2025</year>
<volume>123</volume>
<journal>Comput. Electr. Eng.</journal>
<ee>https://doi.org/10.1016/j.compeleceng.2025.110194</ee>
<url>db/journals/cee/cee123.html#JaiprakashP25</url>
<stream>streams/journals/cee</stream>
</article>
</r>
<r><inproceedings key="conf/mind/PrakashJ24" mdate="2026-02-10">
<author pid="201/1521">Choudhary Shyam Prakash</author>
<author pid="276/5174">Sahani Pooja Jaiprakash</author>
<title>ELA-TransNet: Error Level Enhanced Hybrid Network for Image Forgery Detection.</title>
<pages>475-486</pages>
<year>2024</year>
<booktitle>MIND (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-032-14531-4_40</ee>
<crossref>conf/mind/2024-1</crossref>
<url>db/conf/mind/mind2024-1.html#PrakashJ24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/premi/PrakashJPSP21" mdate="2026-02-01">
<author pid="201/1521">Choudhary Shyam Prakash</author>
<author pid="276/5174">Sahani Pooja Jaiprakash</author>
<author orcid="0000-0002-2980-2635" pid="58/10220">Priyanka</author>
<author pid="382/3643">Ishant Soni</author>
<author pid="382/4030">Virang R. Patel</author>
<title>Blind Image Forgery Detection Using LBP and Statistical Moments.</title>
<pages>12-21</pages>
<year>2021</year>
<booktitle>PReMI</booktitle>
<ee>https://doi.org/10.1007/978-3-031-12700-7_2</ee>
<crossref>conf/premi/2021</crossref>
<url>db/conf/premi/premi2021.html#PrakashJPSP21</url>
<stream>streams/conf/premi</stream>
</inproceedings>
</r>
<r><article key="journals/mta/JaiprakashDPMR20" mdate="2021-07-25">
<author pid="276/5174">Sahani Pooja Jaiprakash</author>
<author orcid="0000-0002-8922-8364" pid="214/1892">Madhavi B. Desai</author>
<author orcid="0000-0002-9305-3472" pid="201/1521">Choudhary Shyam Prakash</author>
<author pid="276/5218">Vipul H. Mistry</author>
<author pid="276/5136">Kishankumar Lalajibhai Radadiya</author>
<title>Low dimensional DCT and DWT feature based model for detection of image splicing and copy-move forgery.</title>
<pages>29977-30005</pages>
<year>2020</year>
<volume>79</volume>
<journal>Multim. Tools Appl.</journal>
<number>39-40</number>
<ee>https://doi.org/10.1007/s11042-020-09415-2</ee>
<url>db/journals/mta/mta79.html#JaiprakashDPMR20</url>
</article>
</r>
<r><article key="journals/iet-ipr/PrakashOM19" mdate="2025-01-19">
<author orcid="0000-0002-9305-3472" pid="201/1521">Choudhary Shyam Prakash</author>
<author pid="06/5384">Hari Om</author>
<author orcid="0000-0003-3879-2800" pid="167/6815">Sushila Maheshkar</author>
<title>Authentication of medical images using passive approach.</title>
<pages>2420-2427</pages>
<year>2019</year>
<volume>13</volume>
<journal>IET Image Process.</journal>
<number>13</number>
<ee>https://doi.org/10.1049/iet-ipr.2018.6035</ee>
<ee>https://www.wikidata.org/entity/Q127411323</ee>
<url>db/journals/iet-ipr/iet-ipr13.html#PrakashOM19</url>
</article>
</r>
<r><article key="journals/mta/PrakashPOM19" mdate="2025-01-19">
<author orcid="0000-0002-9305-3472" pid="201/1521">Choudhary Shyam Prakash</author>
<author pid="246/5892">Prajwal Pralhad Panzade</author>
<author pid="06/5384">Hari Om</author>
<author orcid="0000-0003-3879-2800" pid="167/6815">Sushila Maheshkar</author>
<title>Detection of copy-move forgery using AKAZE and SIFT keypoint extraction.</title>
<pages>23535-23558</pages>
<year>2019</year>
<volume>78</volume>
<journal>Multim. Tools Appl.</journal>
<number>16</number>
<ee>https://doi.org/10.1007/s11042-019-7629-x</ee>
<ee>https://www.wikidata.org/entity/Q127943521</ee>
<url>db/journals/mta/mta78.html#PrakashPOM19</url>
</article>
</r>
<r><article key="journals/jifs/PrakashMM18" mdate="2024-08-04">
<author orcid="0000-0002-9305-3472" pid="201/1521">Choudhary Shyam Prakash</author>
<author orcid="0000-0003-3879-2800" pid="167/6815">Sushila Maheshkar</author>
<author pid="57/8467">Vikas Maheshkar</author>
<title>Detection of copy-move image forgery with efficient block representation and discrete cosine transform.</title>
<pages>5241-5253</pages>
<year>2018</year>
<volume>35</volume>
<journal>J. Intell. Fuzzy Syst.</journal>
<number>5</number>
<ee>https://doi.org/10.3233/JIFS-169808</ee>
<url>db/journals/jifs/jifs35.html#PrakashMM18</url>
</article>
</r>
<r><article key="journals/mta/PrakashKMM18" mdate="2025-01-19">
<author orcid="0000-0002-9305-3472" pid="201/1521">Choudhary Shyam Prakash</author>
<author orcid="0000-0003-1562-7829" pid="65/6522">Avinash Kumar</author>
<author orcid="0000-0003-3879-2800" pid="167/6815">Sushila Maheshkar</author>
<author pid="57/8467">Vikas Maheshkar</author>
<title>An integrated method of copy-move and splicing for image forgery detection.</title>
<pages>26939-26963</pages>
<year>2018</year>
<volume>77</volume>
<journal>Multim. Tools Appl.</journal>
<number>20</number>
<ee>https://doi.org/10.1007/s11042-018-5899-3</ee>
<ee>https://www.wikidata.org/entity/Q130049372</ee>
<url>db/journals/mta/mta77.html#PrakashKMM18</url>
</article>
</r>
<r><article key="journals/ijmdem/PrakashM17" mdate="2024-08-04">
<author pid="201/1521">Choudhary Shyam Prakash</author>
<author orcid="0000-0003-3879-2800" pid="167/6815">Sushila Maheshkar</author>
<title>Copy-Move Forgery Detection Using DyWT.</title>
<pages>1-9</pages>
<year>2017</year>
<volume>8</volume>
<journal>Int. J. Multim. Data Eng. Manag.</journal>
<number>2</number>
<ee>https://doi.org/10.4018/IJMDEM.2017040101</ee>
<url>db/journals/ijmdem/ijmdem8.html#PrakashM17</url>
</article>
</r>
<r><inproceedings key="conf/cvip/PrakashM16" mdate="2024-08-04">
<author orcid="0000-0002-9305-3472" pid="201/1521">Choudhary Shyam Prakash</author>
<author orcid="0000-0003-3879-2800" pid="167/6815">Sushila Maheshkar</author>
<title>Detection Algorithm for Copy-Move Forgery Based on Circle Block.</title>
<pages>355-364</pages>
<year>2016</year>
<booktitle>CVIP (2)</booktitle>
<ee>https://doi.org/10.1007/978-981-10-2107-7_32</ee>
<crossref>conf/cvip/2016-2</crossref>
<url>db/conf/cvip/cvip2016-2.html#PrakashM16</url>
</inproceedings>
</r>
<coauthors n="12" nc="1">
<co c="0"><na f="d/Desai:Madhavi_B=" pid="214/1892">Madhavi B. Desai</na></co>
<co c="0"><na f="j/Jaiprakash:Sahani_Pooja" pid="276/5174">Sahani Pooja Jaiprakash</na></co>
<co c="0"><na f="k/Kumar:Avinash" pid="65/6522">Avinash Kumar</na></co>
<co c="0"><na f="m/Maheshkar:Sushila" pid="167/6815">Sushila Maheshkar</na></co>
<co c="0"><na f="m/Maheshkar:Vikas" pid="57/8467">Vikas Maheshkar</na></co>
<co c="0"><na f="m/Mistry:Vipul_H=" pid="276/5218">Vipul H. Mistry</na></co>
<co c="0"><na f="o/Om:Hari" pid="06/5384">Hari Om</na></co>
<co c="0"><na f="p/Panzade:Prajwal_Pralhad" pid="246/5892">Prajwal Pralhad Panzade</na></co>
<co c="0"><na f="p/Patel:Virang_R=" pid="382/4030">Virang R. Patel</na></co>
<co c="0"><na f="p/Priyanka:" pid="58/10220">Priyanka</na></co>
<co c="0"><na f="r/Radadiya:Kishankumar_Lalajibhai" pid="276/5136">Kishankumar Lalajibhai Radadiya</na></co>
<co c="0"><na f="s/Soni:Ishant" pid="382/3643">Ishant Soni</na></co>
</coauthors>
</dblpperson>

