Saurabh Agarwal

@andong.ac.kr

Korean Research Fellow
Andong National University



                    

https://researchid.co/srmscet

Computer science researcher with strong problem-solving skills. Working on state-of-the-art technologies related to image forensics, artificial intelligence, and deep learning. A team player with practical knowledge of multi-cultural & diverse teams, seeking a career in research & academics with 10+ years experience in academics and research.

RESEARCH, TEACHING, or OTHER INTERESTS

Computer Vision and Pattern Recognition, Computational Theory and Mathematics, Artificial Intelligence

46

Scopus Publications

333

Scholar Citations

9

Scholar h-index

8

Scholar i10-index

Scopus Publications

  • A systematic scrutiny of artificial intelligence-based air pollution prediction techniques, challenges, and viable solutions
    Meenakshi Malhotra, Savita Walia, Chia-Chen Lin, Inderdeep Kaur Aulakh, and Saurabh Agarwal

    Springer Science and Business Media LLC
    AbstractAir is an essential human necessity, and inhaling filthy air poses a significant health risk. One of the most severe hazards to people’s health is air pollution, and appropriate precautions should be taken to monitor and anticipate its quality in advance. Among all the countries, the air quality in India is decreasing daily, which is a matter of concern to the health department. Many studies use machine learning and Deep learning methods to predict atmospheric pollutant levels, prioritizing accuracy over interpretability. Many research studies confuse researchers and readers about how to proceed with further research. This paper aims to give every detail of the considered air pollutants and brief about the techniques used, their advantages, and challenges faced during pollutant prediction, which leads to a better understanding of the techniques before starting any research related to air pollutant prediction. This paper has given numerous prospective questions on air pollution that piqued the study’s interest. This study discussed various machine and deep learning methods and optimization techniques. Despite all the discussed machine learning and deep learning techniques, the paper concluded that more datasets, better learning techniques, and a variety of suggestions would enhance interpretability while maintaining high accuracy for air pollution prediction. The purpose of this review is also to reveal how a family of neural network algorithms has helped researchers across the globe to predict air pollutant(s).

  • Machine learning optimization of a zero energy building (ZEB) by waste heat recovery in a co-generation system
    Ehsanolah Assareh, Parisa Kazemiani-Najafabadi, Ehsan Amiri Rad, Mohammad Firoozzadeh, Ehsan Farhadi, Saurabh Agarwal, Xiaolin Wang, Mehdi Hosseinzadeh, and Wooguil Pak

    Elsevier BV

  • Enhancing quantum state tomography: utilizing advanced statistical techniques for optimized quantum state reconstructions
    Jenefa Archpaul, Edward Naveen VijayaKumar, Manoranjitham Rajendran, Thompson Stephan, Punitha Stephan, Rishu Chhabra, Saurabh Agarwal, and Wooguil Pak

    Springer Science and Business Media LLC

  • Identifying and resolving conflict in mobile application features through contradictory feedback analysis
    Ishaya Gambo, Rhodes Massenon, Roseline Oluwaseun Ogundokun, Saurabh Agarwal, and Wooguil Pak

    Elsevier BV

  • Radar-Based Target Tracking Using Deep Learning Approaches with Unscented Kalman Filter
    Uwigize Patrick, S. Koteswara Rao, B. Omkar Lakshmi Jagan, Hari Mohan Rai, Saurabh Agarwal, and Wooguil Pak

    MDPI AG
    Machine learning, a rapidly growing field, has attracted numerous researchers for its ability to automatically learn from and make predictions based on data. This manuscript presents an innovative approach to estimating the covariance matrix of noise in radar measurements for target tracking, resulting from collaborative efforts. Traditionally, researchers have assumed that the covariance matrix of noise in sonar measurements is present in the vast majority of literature related to target tracking. On the other hand, this research aims to estimate it by employing deep learning algorithms with noisy measurements in range, bearing, and elevation from radar sensors. This collaborative approach, involving multiple disciplines, provides a more precise and accurate covariance matrix estimate. Additionally, the unscented Kalman filter was combined with the gated recurrent unit, multilayer perceptron, convolutional neural network, and long short-term memory to accomplish the task of 3D target tracking in an airborne environment. The quantification of the results was achieved through the use of Monte Carlo simulations, which demonstrated that the convolutional neural network performed better than any other approach. The system was simulated using a Python program, and the proposed method offers higher accuracy and faster convergence time than conventional target tracking methods. This is a demonstration of the potential that collaboration can have in research.


  • Image operator forensics and sequence estimation using robust deep neural network
    Saurabh Agarwal and Ki-Hyun Jung

    Springer Science and Business Media LLC

  • Developing a multivariate time series forecasting framework based on stacked autoencoders and multi-phase feature
    Dilip Kumar Sharma, Ravi Prakash Varshney, Saurabh Agarwal, Amel Ali Alhussan, and Hanaa A. Abdallah

    Elsevier BV

  • Forensic analysis and detection using polycolor model binary pattern for colorized images
    Saurabh Agarwal and Ki-Hyun Jung

    Springer Science and Business Media LLC


  • A Fast and Efficient 191-bit Elliptic Curve Cryptographic Processor Using a Hybrid Karatsuba Multiplier for IoT Applications
    Sumit Singh Dhanda, Brahmjit Singh, Chia-Chen Lin, Poonam Jindal, Deepak Panwar, Tarun Kumar Sharma, Saurabh Agarwal, and Wooguil Pak

    Institute of Electrical and Electronics Engineers (IEEE)
    The most widely used asymmetric cipher is ECC. It can be applied to IoT applications to offer various security services. However, a wide range of sectors have been investigated for applying ECC. The field of elliptic curve cryptographic processors for GF (2191) has received less attention. This study presents a low-resource, high-efficiency architecture for a 191-bit ECC processor. This design uses a novel hybrid Karatsuba multiplier for the multiplication of finite fields. For GF (2191), the Quad-Itoh-Tsuji algorithm has been altered to provide a small-size inversion unit. PlanAhead software synthesizes the CPU, which is then implemented on several Xilinx FPGAs. With savings in slice consumption ranging from 16 to 43 percent, the implemented design is the most restricted compared to the current designs. Compared to previously published designs, it is 3.8–1000 times faster. The elliptic curve scalar multiplication on the Virtex-7 FPGA is computed in $7.24~\\mu $ s. Additionally, the proposed design achieves savings in area-time products of 77 to 90 percent. It may be beneficial for IoT edge devices. It utilizes 3120 mW of power for the operation. A state-of-the-art comparison based on the figure of merit (FoM) reveals that the proposed design outclasses the newest designs by a large margin. It also exhibits a throughput of 138.121 Kbps.

  • Enhancing User Trust and Interpretability in AI-Driven Feature Request Detection for Mobile App Reviews: An Explainable Approach
    Ishaya Gambo, Rhodes Massenon, Chia-Chen Lin, Roseline Oluwaseun Ogundokun, Saurabh Agarwal, and Wooguil Pak

    Institute of Electrical and Electronics Engineers (IEEE)
    Mobile app developers struggle to prioritize updates by identifying feature requests within user reviews. While machine learning models can assist, their complexity often hinders transparency and trust. This paper presents an explainable Artificial Intelligence (AI) approach that combines advanced explanation techniques with engaging visualizations to address this issue. Our system integrates a bidirectional Long Short-Term Memory (BiLSTM) model with attention mechanisms, enhanced by Local Interpretable Model-agnostic Explanations (LIME) and SHapley Additive exPlanations (SHAP). We evaluate this approach on a diverse dataset of 150,000 app reviews, achieving an F1 score of 0.82 and 89% accuracy, significantly outperforming baseline Support Vector Machine (F1: 0.66) and Convolutional Neural Network (CNN) (F1: 0.72) models. Our empirical user studies with developers demonstrate that our explainable approach improves trust (27%) when explanations are provided and correct interpretation (73%). The system’s interactive visualizations allowed developers to validate predictions, with over 80% overlap between model-highlighted phrases and human annotations for feature requests. These findings highlight the importance of integrating explainable AI into real-world software engineering workflows. The paper’s results and future directions provide a promising approach for feature request detection in app reviews to create more transparent, trustworthy, and effective AI systems.


  • A cohesive forgery detection for splicing and copy-paste in digital images
    Saurabh Agarwal, Savita Walia, and Ki-Hyun Jung

    Springer Science and Business Media LLC

  • Exploring Symmetry in Digital Image Forensics Using a Lightweight Deep-Learning Hybrid Model for Multiple Smoothing Operators
    Saurabh Agarwal and Ki-Hyun Jung

    MDPI AG
    Digital images are widely used for informal information sharing, but the rise of fake photos spreading misinformation has raised concerns. To address this challenge, image forensics is employed to verify the authenticity and trustworthiness of these images. In this paper, an efficient scheme for detecting commonly used image smoothing operators is presented while maintaining symmetry. A new lightweight deep-learning network is proposed, which is trained with three different optimizers to avoid downsizing to retain critical information. Features are extracted from the activation function of the global average pooling layer in three trained deep networks. These extracted features are then used to train a classification model with an SVM classifier, resulting in significant performance improvements. The proposed scheme is applied to identify averaging, Gaussian, and median filtering with various kernel sizes in small-size images. Experimental analysis is conducted on both uncompressed and JPEG-compressed images, showing superior performance compared to existing methods. Notably, there are substantial improvements in detection accuracy, particularly by 6.50% and 8.20% for 32 × 32 and 64 × 64 images when subjected to JPEG compression at a quality factor of 70.

  • Detecting Images in Two-Operator Series Manipulation: A Novel Approach Using Transposed Convolution and Information Fusion
    Saurabh Agarwal, Dae-Jea Cho, and Ki-Hyun Jung

    MDPI AG
    Digital image forensics is a crucial emerging technique, as image editing tools can modify them easily. Most of the latest methods can determine whether a specific operator has edited an image. These methods are suitable for high-resolution uncompressed images. In practice, more than one operator is used to modify image contents repeatedly. In this paper, a reliable scheme using information fusion and deep network networks is presented to recognize manipulation operators and the operator’s series on two operators. A transposed convolutional layer improves the performance of low-resolution JPEG compressed images. In addition, a bottleneck technique is utilized to extend the number of transposed convolutional layers. One average pooling layer is employed to preserve the optimal information flow and evade the overfitting concern among the layers. Moreover, the presented scheme can detect two operator series with various factors without including them in training. The experimental outcomes of the suggested scheme are encouraging and better than the existing schemes due to the availability of sufficient statistical evidence.

  • High-Pass-Kernel-Driven Content-Adaptive Image Steganalysis Using Deep Learning
    Saurabh Agarwal, Hyenki Kim, and Ki-Hyun Jung

    MDPI AG
    Digital images cannot be excluded as part of a popular choice of information representation. Covert information can be easily hidden using images. Several schemes are available to hide covert information and are known as steganography schemes. Steganalysis schemes are applied on stego-images to assess the strength of steganography schemes. In this paper, a new steganalysis scheme is presented to detect stego-images. Predefined kernels guide the set of a conventional convolutional layer, and the tight cohesion provides completely guided training. The learning rate of convolutional layers with predefined kernels is higher than the global learning rate. The higher learning rate of the convolutional layers with predefined kernels assures adaptability according to network training, while still maintaining the basic attributes of high-pass kernels. The Leaky ReLU layer is exploited against the ReLU layer to boost the detection performance. Transfer learning is applied to enhance detection performance. The deep network weights are initialized using the weights of the trained network from high-payload stego-images. The strength of the proposed scheme is verified on the HILL, Mi-POD, S-UNIWARD, and WOW content-adaptive steganography schemes. The results are overwhelming and better than the existing steganalysis schemes.

  • Reversible data hiding in encrypted image using two-pass pixel value ordering
    Arun Kumar Rai, Hari Om, Satish Chand, and Saurabh Agarwal

    Elsevier BV

  • Median filtering detection using optimal multi-direction threshold on higher-order difference pixels
    Saurabh Agarwal and Ki-Hyun Jung

    Springer Science and Business Media LLC

  • Enhancing Low-Pass Filtering Detection on Small Digital Images Using Hybrid Deep Learning
    Saurabh Agarwal and Ki-Hyun Jung

    MDPI AG
    Detecting image manipulation is essential for investigating the processing history of digital images. In this paper, a novel scheme is proposed to detect the use of low-pass filters in image processing. A new convolutional neural network with a reasonable size was designed to identify three types of low-pass filters. The learning experiences of the three solvers were combined to enhance the detection ability of the proposed approach. Global pooling layers were employed to protect the information loss between the convolutional layers, and a new global variance pooling layer was introduced to improve detection accuracy. The extracted features from the convolutional neural network were mapped to the frequency domain to enrich the feature set. A leaky Rectified Linear Unit (ReLU) layer was discovered to perform better than the traditional ReLU layer. A tri-layered neural network classifier was employed to classify low-pass filters with various parameters into two, four, and ten classes. As detecting low-pass filtering is relatively easy on large-dimension images, the experimental environment was restricted to small images of 30 × 30 and 60 × 60 pixels. The proposed scheme achieved 80.12% and 90.65% detection accuracy on ten categories of images compressed with JPEG and a quality factor 75 on 30 × 30 and 60 × 60 images, respectively.

  • Sarcasm Detection over Social Media Platforms Using Hybrid Ensemble Model with Fuzzy Logic
    Dilip Kumar Sharma, Bhuvanesh Singh, Saurabh Agarwal, Nikhil Pachauri, Amel Ali Alhussan, and Hanaa A. Abdallah

    MDPI AG
    A figurative language expression known as sarcasm implies the complete contrast of what is being stated with what is meant, with the latter usually being rather or extremely offensive, meant to offend or humiliate someone. In routine conversations on social media websites, sarcasm is frequently utilized. Sentiment analysis procedures are prone to errors because sarcasm can change a statement’s meaning. Analytic accuracy apprehension has increased as automatic social networking analysis tools have grown. According to preliminary studies, the accuracy of computerized sentiment analysis has been dramatically decreased by sarcastic remarks alone. Sarcastic expressions also affect automatic false news identification and cause false positives. Because sarcastic comments are inherently ambiguous, identifying sarcasm may be difficult. Different individual NLP strategies have been proposed in the past. However, each methodology has text contexts and vicinity restrictions. The methods are unable to manage various kinds of content. This study suggests a unique ensemble approach based on text embedding that includes fuzzy evolutionary logic at the top layer. This approach involves applying fuzzy logic to ensemble embeddings from the Word2Vec, GloVe, and BERT models before making the final classification. The three models’ weights assigned to the probability are used to categorize objects using the fuzzy layer. The suggested model was validated on the following social media datasets: the Headlines dataset, the “Self-Annotated Reddit Corpus” (SARC), and the Twitter app dataset. Accuracies of 90.81%, 85.38%, and 86.80%, respectively, were achieved. The accuracy metrics were more accurate than those of earlier state-of-the-art models.

  • FakedBits- Detecting Fake Information on Social Platforms using Multi-Modal Features
    D. Sharma, Bhuvanesh Singh, Saurabh Agarwal, Hyunsung Kim and Raj Sharma

    Korean Society for Internet Information (KSII)

  • Development of Chatbot Retrieving Fact-Based Information Using Knowledge Graph
    Raghav Dayal, Parv Nangia, Surbhi Vijh, Sumit Kumar, Saurabh Agarwal, and Shivank Saxena

    Springer Nature Singapore

  • Data Sovereignty Provision Blockchain for Remote Healthcare Service
    Hyunho Ryu, Hyunsung Kim, Saurabh Agarwal, Dilip Kumar Sharma, Beaton Kapito, and Patrick Ali

    IEEE
    Remote healthcare services provide more opportunities for communication between doctors and patients, strengthening their relationships and improving patient satisfaction and loyalty. However, those services face specific security and privacy challenges that constrain growth. Furthermore, patients’ information is scattered in several hospitals with various formats, which does not provide the data sovereignty of patients. Data sovereignty is a way for any service to control or regain its data. This paper proposes a privacy-preserving blockchain for remote healthcare services to solve these issues. There is only one database of patient electronic health records in our data structure, and various hospitals could use it. The proposed data structure keeps the patient’s electronic health records and the doctor’s diagnosis and prescription data separate. Each entity in our system has different access rights to its role. The proposed system is based on some security primitives, including pseudonym policy, delegation, data encryption, and digital signature, depending on the privacy requirements. The proposed blockchain could be a solution against the previous centralized system and provide remote healthcare services’ data sovereignty, privacy, and security.

  • Identification of Content-Adaptive Image Steganography Using Convolutional Neural Network Guided by High-Pass Kernel
    Saurabh Agarwal and Ki-Hyun Jung

    MDPI AG
    Digital images are very popular and commonly used for hiding crucial data. In a few instances, image steganography is misused for communicating with improper data. In this paper, a robust deep neural network is proposed for the identification of content-adaptive image steganography schemes. Multiple novel strategies are applied to improve detection performance. Two non-trainable convolutional layers is used to guide the proposed CNN with fixed kernels. Thirty-one kernels are used in both non-trainable layers, of which thirty are high-pass kernels and one is the neutral kernel. The layer-specific learning rate is applied for each layer. ReLU with customized thresholding is applied to achieve better performance. In the proposed method, image down-sampling is not performed; only the global average pooling layer is considered in the last part of the network. The experimental results are verified on BOWS2 and BOSSBase image sets. Content-adaptive steganography schemes, such as HILL, Mi-POD, S-UNIWARD, and WOW, are considered for generating the stego images with different payloads. In experimental analysis, the proposed scheme is compared with some of the latest schemes, where the proposed scheme outperforms other state-of-the-art techniques in the most cases.

RECENT SCHOLAR PUBLICATIONS

  • Machine learning optimization of a zero energy building (ZEB) by waste heat recovery in a co-generation system
    E Assareh, P Kazemiani-Najafabadi, EA Rad, M Firoozzadeh, E Farhadi, ...
    Energy and Buildings 323, 114711 2024

  • Mobile app review analysis for crowdsourcing of software requirements: a mapping study of automated and semi-automated tools
    R Massenon, I Gambo, RO Ogundokun, EA Ogundepo, S Srivastava, ...
    PeerJ Computer Science 10, e2401 2024

  • A systematic scrutiny of artificial intelligence-based air pollution prediction techniques, challenges, and viable solutions
    M Malhotra, S Walia, CC Lin, IK Aulakh, S Agarwal
    Journal of Big Data 11 (1), 142 2024

  • A fast and efficient 191-bit Elliptic Curve Cryptographic Processor using a Hybrid Karatsuba Multiplier for IoT Applications
    SS Dhanda, B Singh, CC Lin, P Jindal, D Panwar, TK Sharma, S Agarwal, ...
    IEEE Access 2024

  • Enhancing quantum state tomography: Utilizing advanced statistical techniques for optimized quantum state reconstructions
    J Archpaul, EN VijayaKumar, M Rajendran, T Stephan, P Stephan, ...
    Journal of the Korean Physical Society 85 (8), 677-690 2024

  • Radar-Based Target Tracking Using Deep Learning Approaches with Unscented Kalman Filter
    U Patrick, SK Rao, BOL Jagan, HM Rai, S Agarwal, W Pak
    Applied Sciences 14 (18), 8332 2024

  • Identifying and resolving conflict in mobile application features through contradictory feedback analysis
    I Gambo, R Massenon, RO Ogundokun, S Agarwal, W Pak
    Heliyon 10 (17) 2024

  • Enhancing user trust and interpretability in AI-driven feature request detection for mobile app reviews: an explainable approach
    I Gambo, R Massenon, CC Lin, RO Ogundokun, S Agarwal, W Pak
    IEEE Access 2024

  • Digital image steganalysis using entropy driven deep neural network
    S Agarwal, KH Jung
    Journal of Information Security and Applications 84, 103799 2024

  • Image operator forensics and sequence estimation using robust deep neural network
    S Agarwal, KH Jung
    Multimedia Tools and Applications 83 (16), 47431-47454 2024

  • Developing a multivariate time series forecasting framework based on stacked autoencoders and multi-phase feature
    DK Sharma, RP Varshney, S Agarwal, AA Alhussan, HA Abdallah
    Heliyon 10 (7) 2024

  • Forensic analysis and detection using polycolor model binary pattern for colorized images
    S Agarwal, KH Jung
    Multimedia Tools and Applications 83 (14), 41683-41702 2024

  • A cohesive forgery detection for splicing and copy-paste in digital images
    S Agarwal, S Walia, KH Jung
    Multimedia Tools and Applications, 1-17 2024

  • IoT-Based Automatic Water Quality Monitoring System with Optimized Neural Network.
    AB AM, S Agarwal, H Kim, P Stephan, T Stephan
    KSII Transactions on Internet & Information Systems 18 (1) 2024

  • Exploring Symmetry in Digital Image Forensics Using a Lightweight Deep-Learning Hybrid Model for Multiple Smoothing Operators
    S Agarwal, KH Jung
    Symmetry 15 (12), 2096 2023

  • High-Pass-Kernel-Driven Content-Adaptive Image Steganalysis Using Deep Learning
    S Agarwal, H Kim, KH Jung
    Mathematics 11 (20), 4322 2023

  • Detecting Images in Two-Operator Series Manipulation: A Novel Approach Using Transposed Convolution and Information Fusion
    S Agarwal, DJ Cho, KH Jung
    Symmetry 15 (10), 1898 2023

  • A survey of detection and mitigation for fake images on social media platforms
    DK Sharma, B Singh, S Agarwal, L Garg, C Kim, KH Jung
    Applied Sciences 13 (19), 10980 2023

  • Reversible data hiding in encrypted image using two-pass pixel value ordering
    AK Rai, H Om, S Chand, S Agarwal
    Journal of Information Security and Applications 76, 103545 2023

  • Median filtering detection using optimal multi-direction threshold on higher-order difference pixels
    S Agarwal, KH Jung
    Multimedia Tools and Applications 82 (20), 30875-30893 2023

MOST CITED SCHOLAR PUBLICATIONS

  • Image forgery detection using multi scale entropy filter and local phase quantization
    S Agarwal, S Chand
    International journal of image, graphics and signal processing 7 (10), 78 2015
    Citations: 50

  • Sarcasm detection over social media platforms using hybrid auto-encoder-based model
    DK Sharma, B Singh, S Agarwal, H Kim, R Sharma
    Electronics 11 (18), 2844 2022
    Citations: 39

  • Automatic rice disease detection and assistance framework using deep learning and a Chatbot
    S Jain, R Sahni, T Khargonkar, H Gupta, OP Verma, TK Sharma, ...
    Electronics 11 (14), 2110 2022
    Citations: 35

  • Sarcasm detection over social media platforms using hybrid ensemble model with fuzzy logic
    DK Sharma, B Singh, S Agarwal, N Pachauri, AA Alhussan, HA Abdallah
    Electronics 12 (4), 937 2023
    Citations: 28

  • Image forgery detection using co-occurrence-based texture operator in frequency domain
    S Agarwal, S Chand
    Progress in Intelligent Computing Techniques: Theory, Practice, and 2018
    Citations: 25

  • Using xai for deep learning-based image manipulation detection with shapley additive explanation
    S Walia, K Kumar, S Agarwal, H Kim
    Symmetry 14 (8), 1611 2022
    Citations: 16

  • A survey of detection and mitigation for fake images on social media platforms
    DK Sharma, B Singh, S Agarwal, L Garg, C Kim, KH Jung
    Applied Sciences 13 (19), 10980 2023
    Citations: 12

  • Image forgery detection using Markov features in undecimated wavelet transform
    S Agarwal, S Chand
    2016 Ninth International Conference on Contemporary Computing (IC3), 1-6 2016
    Citations: 12

  • TD-DNN: A time decay-based deep neural network for recommendation system
    G Jain, T Mahara, SC Sharma, S Agarwal, H Kim
    Applied Sciences 12 (13), 6398 2022
    Citations: 9

  • Median filtering forensics based on optimum thresholding for low-resolution compressed images
    S Agarwal, KH Jung
    Multimedia Tools and Applications 81 (5), 7047-7062 2022
    Citations: 9

  • Blind forensics of images using higher order local binary pattern
    S Agarwal, S Chand
    Journal of Applied Security Research 13 (2), 209-222 2018
    Citations: 8

  • SPAM revisited for median filtering detection using higher‐order difference
    S Agarwal, S Chand, N Skarbnik
    Security and Communication Networks 9 (17), 4089-4102 2016
    Citations: 8

  • Steganalysis of context-aware image steganography techniques using convolutional neural network
    S Agarwal, C Kim, KH Jung
    Applied Sciences 12 (21), 10793 2022
    Citations: 7

  • Forensic analysis of colorized grayscale images using local binary pattern
    S Agarwal, D Sharma, KH Jung
    2020 10th International Conference on Cloud Computing, Data Science 2020
    Citations: 7

  • Texture operator based image splicing detection hybrid technique
    S Agarwal, S Chand
    2016 Second International Conference on Computational Intelligence 2016
    Citations: 7

  • Reversible data hiding in encrypted image using two-pass pixel value ordering
    AK Rai, H Om, S Chand, S Agarwal
    Journal of Information Security and Applications 76, 103545 2023
    Citations: 5

  • FakedBits-Detecting Fake Information on Social Platforms using Multi-Modal Features.
    DK Sharma, B Singh, S Agarwal, H Kim, R Sharma
    KSII Transactions on Internet & Information Systems 17 (1) 2023
    Citations: 5

  • Image Forensics Using Non-Reducing Convolutional Neural Network for Consecutive Dual Operators
    SH Cho, S Agarwal, SJ Koh, KH Jung
    Applied Sciences 12 (14), 7152 2022
    Citations: 5

  • Identification of content-adaptive image steganography using convolutional neural network guided by high-pass kernel
    S Agarwal, KH Jung
    Applied Sciences 12 (22), 11869 2022
    Citations: 4

  • HSB-SPAM: an efficient image filtering detection technique
    S Agarwal, KH Jung
    Applied Sciences 11 (9), 3749 2021
    Citations: 4