default search action
Rengarajan Amirtharajan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j82]Nithya Chidambaram, Karuppusamy Thenmozhi, Pethuru Raj, Rengarajan Amirtharajan:
DNA-chaos governed cryptosystem for cloud-based medical image repository. Clust. Comput. 27(4): 4127-4144 (2024) - [j81]V. Manikandan, Rengarajan Amirtharajan:
Cartesian coordinated adaptive hiding for payload peaking. Multim. Tools Appl. 83(6): 17135-17162 (2024) - [j80]Aashiq Banu S, Adel Ismail Al-Alawi, M. Padmaa, P. Shanmuga Priya, V. Thanikaiselvan, Rengarajan Amirtharajan:
Healthcare with datacare - a triangular DNA security. Multim. Tools Appl. 83(7): 21153-21170 (2024) - [j79]R. Karthiga, Kumaravelu Narasimhan, Ravikumar Chinthaginjala, Rajesh Anbazhagan, Manikandan Chinnusamy, Giovanni Pau, Kumar Satish, Rengarajan Amirtharajan, Mohamed Abbas:
A novel exploratory hybrid deep neural network to predict breast cancer for mammography based on wavelet features. Multim. Tools Appl. 83(24): 65441-65467 (2024) - [j78]L. Gowri, S. Pradeepa, Vamsi Panchada, Rengarajan Amirtharajan:
Enhancing pneumonia detection with masked neural networks: a deep learning approach. Neural Comput. Appl. 36(29): 18433-18444 (2024) - [j77]S. Ramya, Manivannan Doraipandian, Rengarajan Amirtharajan:
SLAKA_CPS: Secured lightweight authentication and key agreement protocol for reliable communication among heterogenous devices in cyber-physical system framework. Peer Peer Netw. Appl. 17(5): 2675-2691 (2024) - [j76]V. Manikandan, Vinoth Raj, Siva Janakiraman, R. Sivaraman, Rengarajan Amirtharajan:
Let wavelet authenticate and tent-map encrypt: a sacred connect against a secret nexus. Soft Comput. 28(9-10): 6839-6853 (2024) - [j75]A. Revathi, N. Sasikaladevi, D. Arunprasanth, Rengarajan Amirtharajan:
A Strategic Approach for Robust Dysarthric Speech Recognition. Wirel. Pers. Commun. 134(4): 2315-2346 (2024) - 2023
- [j74]T. Nirmalraj, S. K. Pandiyan, Rakesh Kumar Karan, R. Sivaraman, Rengarajan Amirtharajan:
Design of Low-Power 10-Transistor Full Adder Using GDI Technique for Energy-Efficient Arithmetic Applications. Circuits Syst. Signal Process. 42(6): 3649-3667 (2023) - [j73]R. Anushiadevi, Rengarajan Amirtharajan:
Separable reversible data hiding in an encrypted image using the adjacency pixel difference histogram. J. Inf. Secur. Appl. 72: 103407 (2023) - [j72]Vinoth Raj, Siva Janakiraman, Rengarajan Amirtharajan:
Reconfigurable color medical image encryptor using hardware accelerated Chao(S)-box triplets. J. Real Time Image Process. 20(2): 27 (2023) - [j71]R. Sivaraman, M. Padmaa, A. Sridevi, Vinoth Raj, Veerappan Manikandan, Janakiraman Siva, Tarunraj Bhogi, Amirtharajan Rengarajan:
Pullikolam assisted medical image watermarking on reconfigurable hardware. Multim. Tools Appl. 82(14): 21193-21203 (2023) - [j70]R. Anushiadevi, Rengarajan Amirtharajan:
Design and development of reversible data hiding- homomorphic encryption & rhombus pattern prediction approach. Multim. Tools Appl. 82(30): 46269-46292 (2023) - [j69]Palmani Duraisamy, Manigandan Nagarajan Santhanakrishnan, Rengarajan Amirtharajan:
Genetic Algorithm Optimized Grey-Box Modelling and Fuzzy Logic Controller for Tail-Actuated Robotic Fish. Neural Process. Lett. 55(8): 11577-11594 (2023) - [j68]Monisha Selvaraj, Ramya Vijay, Rajesh Anbazhagan, Amirtharajan Rengarajan:
Reconfigurable Metasurface: Enabling Tunable Reflection in 6G Wireless Communications. Sensors 23(22): 9166 (2023) - [j67]Dhivya Ravichandran, M. Padmaa, N. Rajagopal, V. Thanikaiselvan, Rengarajan Amirtharajan:
Chaos and DNA Blended Hybrid Encryption Algorithm for Secure Image Transmission over DCT Pre-coded OFDM. Wirel. Pers. Commun. 129(1): 703-727 (2023) - [j66]S. Ramya, Manivannan Doraipandian, Rengarajan Amirtharajan:
LAPE2D: Lightweight Authentication Protocol to Secure End and Edge Devices in Iot Framework. Wirel. Pers. Commun. 131(3): 2217-2239 (2023) - 2022
- [j65]Vaishnavi Kumar, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan, Padmapriya Praveenkumar:
Quantum true random number generation on IBM's cloud platform. J. King Saud Univ. Comput. Inf. Sci. 34(8 Part B): 6453-6465 (2022) - [j64]G. Kapinesh, K. Sachin Kumaran, Konduru Gayatri, Thilak Mohan, V. Thanikaiselvan, S. Subashanthini, Rengarajan Amirtharajan:
New Image Encryption Method using Multiple Chaotic Map Computation and Irregular Diffusion Process. J. Uncertain Syst. 15(3): 2241008:1-2241008:18 (2022) - [j63]Veerappan Manikandan, Rengarajan Amirtharajan:
A simple embed over encryption scheme for DICOM images using Bülban Map. Medical Biol. Eng. Comput. 60(3): 701-717 (2022) - [j62]Gomathi Veerasamy, Kannan Ramkumar, RakeshKumar Siddharthan, Guruprasath Muralidharan, Venkatesh Sivanandam, Rengarajan Amirtharajan:
Integration of genetic algorithm tuned adaptive fading memory Kalman filter with model predictive controller for active fault-tolerant control of cement kiln under sensor faults with inaccurate noise covariance. Math. Comput. Simul. 191: 256-277 (2022) - [j61]Valarmathi Ramasamy, Kannan Ramkumar, Guruprasath Muralidharan, Rakesh Kumar Sidharthan, Rengarajan Amirtharajan:
Two-tier search space optimisation technique for tuning of explicit plant-model mismatch in model predictive controller for industrial cement kiln process. Math. Comput. Simul. 193: 385-408 (2022) - [j60]R. Karthiga, Kumaravelu Narasimhan, Rengarajan Amirtharajan:
Diagnosis of breast cancer for modern mammography using artificial intelligence. Math. Comput. Simul. 202: 316-330 (2022) - [j59]V. M. Padmapriya, Karuppusamy Thenmozhi, Padmapriya Praveenkumar, Rengarajan Amirtharajan:
Misconstrued voice on SC-FDMA for secured comprehension - a cooperative influence of DWT and ECC. Multim. Tools Appl. 81(5): 7201-7217 (2022) - [j58]C. Manikandan, A. Gamana, A. Sridevi, Rengarajan Amirtharajan:
Design of tri-layer image encryption scheme using Calendar Month Vowel Count (CMVC) approach. Multim. Tools Appl. 81(7): 10337-10371 (2022) - [j57]G. Arthi, V. Thanikaiselvan, Rengarajan Amirtharajan:
4D Hyperchaotic map and DNA encoding combined image encryption for secure communication. Multim. Tools Appl. 81(11): 15859-15878 (2022) - [j56]Sridevi Arumugham, R. Sivaraman, Varun Balasubramaniam, Sreenithi, Janakiraman Siva, V. Thanikaiselvan, Amirtharajan Rengarajan:
On Chaos based duo confusion duo diffusion for colour images. Multim. Tools Appl. 81(12): 16987-17014 (2022) - [j55]L. Shane John Paul, Carlton Gracias, Anurag Desai, V. Thanikaiselvan, S. Suba Shanthini, Amirtharajan Rengarajan:
A novel colour image encryption scheme using dynamic DNA coding, chaotic maps, and SHA-2. Multim. Tools Appl. 81(26): 37873-37894 (2022) - [j54]A. Revathi, N. Sasikaladevi, D. Arunprasanth, Rengarajan Amirtharajan:
Robust respiratory disease classification using breathing sounds (RRDCBS) multiple features and models. Neural Comput. Appl. 34(10): 8155-8172 (2022) - [j53]Aashiq Banu S, B. K. Murthy, G. Bindu Sai, Sowmya Gali, Kalluru Hemaswitha, Rengarajan Amirtharajan:
Telugu DNA for Safe Delivery: A Secured Text Communication. Wirel. Pers. Commun. 127(4): 2873-2889 (2022) - 2021
- [j52]H. Aparna, B. Bhumijaa, R. Santhiyadevi, K. Vaishanavi, M. Sathanarayanan, Amirtharajan Rengarajan, Padmapriya Praveenkumar, Ahmed A. Abd El-Latif:
Double layered Fridrich structure to conserve medical data privacy using quantum cryptosystem. J. Inf. Secur. Appl. 63: 102972 (2021) - [j51]Vinoth Raj, Siva Janakiraman, Rengarajan Amirtharajan:
Optimal concurrency on FPGA for lightweight medical image encryption. J. Intell. Fuzzy Syst. 40(6): 10385-10400 (2021) - [j50]R. Anushiadevi, Rengarajan Amirtharajan:
Reversible data hiding in an encrypted image using the homomorphic property of elliptic curve cryptography. J. Intell. Fuzzy Syst. 41(5): 5583-5594 (2021) - [j49]K. Revathy, Karuppusamy Thenmozhi, Padmapriya Praveenkumar, Rengarajan Amirtharajan:
Hybrid spectrum management using integrated fuzzy and femtocells in cognitive domain. J. Intell. Fuzzy Syst. 41(6): 6079-6088 (2021) - [j48]Aashiq Banu S, Rengarajan Amirtharajan:
Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data. Frontiers Inf. Technol. Electron. Eng. 22(7): 940-956 (2021) - [j47]Vinoth Raj, Siva Janakiraman, Sundararaman Rajagopalan, Rengarajan Amirtharajan:
Security analysis of reversible logic cryptography design with LFSR key on 32-bit microcontroller. Microprocess. Microsystems 84: 104265 (2021) - [j46]Dhivya Ravichandran, Aashiq Banu S, B. K. Murthy, Vidhyadharini Balasubramanian, Sherin Fathima, Rengarajan Amirtharajan:
An efficient medical image encryption using hybrid DNA computing and chaos in transform domain. Medical Biol. Eng. Comput. 59(3): 589-605 (2021) - [j45]Dhivya Ravichandran, Padmapriya Praveenkumar, Sundararaman Rajagopalan, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
ROI-based medical image watermarking for accurate tamper detection, localisation and recovery. Medical Biol. Eng. Comput. 59(6): 1355-1372 (2021) - [j44]Lakshmi Chandrasekaran, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Genetic and chaotic signatures in offspring - an encrypted generation of image family. Multim. Tools Appl. 80(6): 8581-8609 (2021) - [j43]R. Anushiadevi, Padmapriya Praveenkumar, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Uncover the cover to recover the hidden secret - A separable reversible data hiding framework. Multim. Tools Appl. 80(13): 19695-19714 (2021) - [j42]Nithya Chidambaram, Pethuru Raj, Karuppusamy Thenmozhi, Rengarajan Amirtharajan:
A new method for producing 320-bit modified hash towards tamper detection and restoration in colour images. Multim. Tools Appl. 80(15): 23359-23375 (2021) - [j41]Veerappan Manikandan, Rengarajan Amirtharajan:
On dual encryption with RC6 and combined logistic tent map for grayscale and DICOM. Multim. Tools Appl. 80(15): 23511-23540 (2021) - [j40]Lakshmi Chandrasekaran, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Sundararaman Rajagopalan, Rengarajan Amirtharajan, Nithya Chidambaram:
Neural-assisted image-dependent encryption scheme for medical image cloud storage. Neural Comput. Appl. 33(12): 6671-6684 (2021) - [j39]Sakshi Patel, V. Thanikaiselvan, Danilo Pelusi, Nagaraj Balakrishnan, Rajendran Arunkumar, Rengarajan Amirtharajan:
Colour image encryption based on customized neural network and DNA encoding. Neural Comput. Appl. 33(21): 14533-14550 (2021) - [j38]R. Santhiya Devi, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan, Padmapriya Praveenkumar:
MUX induced Ring oscillators for encrypted Nano communication via Quantum Dot Cellular Automata. Nano Commun. Networks 27: 100338 (2021) - [j37]Lakshmi Chandrasekaran, Karuppusamy Thenmozhi, C. Venkatesan, A. Seshadhri, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Mutated Cleavages of Images for Stealth Disclosure: A Hopfield Neural Network Attractor (HNNA) Approach. Neural Process. Lett. 53(2): 907-928 (2021) - [c4]Kuchi Yashwanth, Adithya N, Sivaraman R, Siva Janakiraman, Amirtharajan Rengarajan:
Design and Development of Pipelined Computational Unit for High-Speed Processors. ICCCNT 2021: 1-5 - 2020
- [j36]Sundararaman Rajagopalan, Siva Poori, Mukund Narasimhan, Sivaraman Rethinam, Chandrasekar Vallipalayam Kuppusamy, Ramalingam Balasubramanian, Vijaya Moorthi Paramasivam Annamalai, Amirtharajan Rengarajan:
Chua's diode and strange attractor: a three-layer hardware-software co-design for medical image confidentiality. IET Image Process. 14(7): 1354-1365 (2020) - [j35]Rethinam Sivaraman, Sundararaman Rajagopalan, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Ring oscillator as confusion - diffusion agent: a complete TRNG drove image security. IET Image Process. 14(13): 2987-2997 (2020) - [j34]Nithya Chidambaram, Pethuru Raj, Karuppuswamy Thenmozhi, Rengarajan Amirtharajan:
Advanced framework for highly secure and cloud-based storage of colour images. IET Image Process. 14(13): 3143-3153 (2020) - [j33]R. Anushiadevi, Padmapriya Pravinkumar, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
A high payload separable reversible data hiding in cipher image with good decipher image quality. J. Intell. Fuzzy Syst. 38(5): 6403-6414 (2020) - [j32]R. Anushiadevi, Padmapriya Praveenkumar, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Reversible data hiding method based on pixel expansion and homomorphic encryption. J. Intell. Fuzzy Syst. 39(3): 2977-2990 (2020) - [j31]Aashiq Banu S, Rengarajan Amirtharajan:
A robust medical image encryption in dual domain: chaos-DNA-IWT combined approach. Medical Biol. Eng. Comput. 58(7): 1445-1458 (2020) - [j30]Lakshmi Chandrasekaran, Vasudharini Moranam Ravi, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Con(dif)fused voice to convey secret: a dual-domain approach. Multim. Syst. 26(3): 301-311 (2020) - [j29]R. Santhiya Devi, A. R. Nirmal Aravind, J. Christopher Vishal, D. Amritha, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Amirtharajan Rengarajan, Padmapriya Praveenkumar:
Image encryption through RNA approach assisted with neural key sequences. Multim. Tools Appl. 79(17-18): 12093-12124 (2020) - [j28]Sivaraman R, Sundararaman Rajagopalan, Rengarajan Amirtharajan:
FPGA based generic RO TRNG architecture for image confusion. Multim. Tools Appl. 79(19-20): 13841-13868 (2020) - [j27]V. M. Padmapriya, Karuppusamy Thenmozhi, Padmapriya Praveenkumar, Rengarajan Amirtharajan:
ECC joins first time with SC-FDMA for Mission "security". Multim. Tools Appl. 79(25-26): 17945-17967 (2020) - [j26]Aashiq Banu S, Rengarajan Amirtharajan:
Tri-level scrambling and enhanced diffusion for DICOM image cipher- DNA and chaotic fused approach. Multim. Tools Appl. 79(39-40): 28807-28824 (2020) - [j25]Lakshmi Chandrasekaran, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Hopfield attractor-trusted neural network: an attack-resistant image encryption. Neural Comput. Appl. 32(15): 11477-11489 (2020) - [j24]Sivaraman Rethinam, Sundararaman Rajagopalan, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Hybrid Random Number Generation Architecture for Mobile Registration Controller: A Reconfigurable Hardware Realization. Wirel. Pers. Commun. 115(1): 239-266 (2020) - [j23]V. M. Padmapriya, Karuppusamy Thenmozhi, Jayapalan Avila, Rengarajan Amirtharajan, Padmapriya Praveenkumar:
Real Time Authenticated Spectrum Access and Encrypted Image Transmission via Cloud Enabled Fusion centre. Wirel. Pers. Commun. 115(3): 2127-2148 (2020)
2010 – 2019
- 2019
- [j22]Lakshmi Chandrasekaran, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Open hiding for truncating hackers - a block truncation and wavelet approach. Multim. Tools Appl. 78(8): 9951-9969 (2019) - [j21]Sundararaman Rajagopalan, Shriramana Sharma, Sridevi Arumugham, Har Narayan Upadhyay, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
YRBS coding with logistic map - a novel Sanskrit aphorism and chaos for image encryption. Multim. Tools Appl. 78(8): 10513-10541 (2019) - [j20]Siva Janakiraman, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Indicator-based lightweight steganography on 32-bit RISC architectures for IoT security. Multim. Tools Appl. 78(22): 31485-31513 (2019) - [j19]Nithya Chidambaram, Pethuru Raj, Karuppusamy Thenmozhi, Sundararaman Rajagopalan, Rengarajan Amirtharajan:
A cloud compatible DNA coded security solution for multimedia file sharing & storage. Multim. Tools Appl. 78(23): 33837-33863 (2019) - [j18]Dhivya Ravichandran, Sundararaman Rajagopalan, Har Narayan Upadhyay, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Encrypted Biography of Biomedical Image - a Pentalayer Cryptosystem on FPGA. J. Signal Process. Syst. 91(5): 475-501 (2019) - [c3]R. Anushiadevi, Veeramuthu Venkatesh, Rengarajan Amirtharajan:
An Image Mathcrypt - A Flawless Security via Flawed Image. ATIS 2019: 16-31 - [c2]Vinoth Raj, Siva Janakiraman, Sundararaman Rajagopalan, Amirtharajan Rengarajan:
Confused Memory Read Attracts Synthetic Diffusion on the Fly - A Lightweight Image Encryption for IoT Platform. ATIS 2019: 62-73 - [c1]Sundararaman Rajagopalan, Nikhil Krishnaa Sriram, Veerappan Manikandan, Sivaraman Rethinam, Sridevi Arumugham, Siva Janakiraman, Amirtharajan Rengarajan:
Cellular Automata Based Key Stream Generator - A Reconfigurable Hardware Approach. ATIS 2019: 232-242 - [p2]R. Santhiya Devi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan, Padmapriya Praveenkumar:
A Novel Quantum Encryption and Authentication Framework Integrated with IoT. Security, Privacy and Trust in the IoT Environment 2019: 123-150 - [p1]Siva Janakiraman, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, V. Moorthi Paramasivam, Rengarajan Amirtharajan:
Realization of Chaos-Based Private Multiprocessor Network Via USART of Embedded Devices. Handbook of Multimedia Information Security 2019: 323-340 - 2018
- [j17]Lakshmi Chandrasekaran, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Encryption and watermark-treated medical image against hacking disease - An immune convention in spatial and frequency domains. Comput. Methods Programs Biomed. 159: 11-21 (2018) - [j16]Sridevi Arumugham, Sundararaman Rajagopalan, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Networked medical data sharing on secure medium - A web publishing mode for DICOM viewer with three layer authentication. J. Biomed. Informatics 86: 90-105 (2018) - [j15]Siva Janakiraman, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller. Microprocess. Microsystems 56: 1-12 (2018) - [j14]Sundararaman Rajagopalan, Sivaraman R, Har Narayan Upadhyay, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
ON-Chip peripherals are ON for chaos - an image fused encryption. Microprocess. Microsystems 61: 257-278 (2018) - [j13]Padmapriya Praveenkumar, N. Kerthana Devi, Dhivya Ravichandran, Jayapalan Avila, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Transreceiving of encrypted medical image - a cognitive approach. Multim. Tools Appl. 77(7): 8393-8418 (2018) - [j12]Balakrishnan Ramalingam, Dhivya Ravichandran, Arun Adhithiya Annadurai, Rengarajan Amirtharajan, John Bosco Balaguru Rayappan:
Chaos triggered image encryption - a reconfigurable security solution. Multim. Tools Appl. 77(10): 11669-11692 (2018) - [j11]Sundararaman Rajagopalan, Sivaraman Rethinam, Sridevi Arumugham, Har Narayan Upadhyay, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Networked hardware assisted key image and chaotic attractors for secure RGB image communication. Multim. Tools Appl. 77(18): 23449-23482 (2018) - 2017
- [j10]Padmapriya Praveenkumar, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Mojette (d) Secret Image "SEDIH" in an Encrypted Double Image - A Histo Approach. Int. J. Netw. Secur. 19(1): 47-59 (2017) - [j9]Balakrishnan Ramalingam, Rengarajan Amirtharajan, John Bosco Balaguru Rayappan:
Hybrid image crypto system for secure image communication- A VLSI approach. Microprocess. Microsystems 50: 1-13 (2017) - [j8]Padmapriya Praveenkumar, Rengarajan Amirtharajan, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan:
Fusion of confusion and diffusion: a novel image encryption approach. Telecommun. Syst. 65(1): 65-78 (2017) - [j7]Padmapriya Praveenkumar, P. Catherine Priya, Jayapalan Avila, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Tamper Proofing Identification and Authenticated DICOM Image Transmission Using Wireless Channels and CR Network. Wirel. Pers. Commun. 97(4): 5573-5595 (2017) - 2016
- [j6]Dhivya Ravichandran, Padmapriya Praveenkumar, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Chaos based crossover and mutation for securing DICOM image. Comput. Biol. Medicine 72: 170-184 (2016) - [j5]Balakrishnan Ramalingam, Rengarajan Amirtharajan, John Bosco Balaguru Rayappan:
Multiplexed stego path on reconfigurable hardware: A novel random approach. Comput. Electr. Eng. 55: 153-163 (2016) - [j4]Nithya Chidambaram, Pethuru Raj, Karuppusamy Thenmozhi, Rengarajan Amirtharajan:
Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique. Int. J. Digit. Multim. Broadcast. 2016: 8789397:1-8789397:6 (2016) - 2015
- [j3]Padmapriya Praveenkumar, Rengarajan Amirtharajan, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan:
Medical data sheet in safe havens - A tri-layer cryptic solution. Comput. Biol. Medicine 62: 264-276 (2015) - [j2]Padmapriya Praveenkumar, Rengarajan Amirtharajan, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan:
Triple chaotic image scrambling on RGB - a random image encryption approach. Secur. Commun. Networks 8(18): 3335-3345 (2015) - 2012
- [j1]Rengarajan Amirtharajan, John Bosco Balaguru Rayappan:
An intelligent chaotic embedding approach to enhance stego-image quality. Inf. Sci. 193: 115-124 (2012) - 2010
- [i1]Rengarajan Amirtharajan, Sandeep Kumar Behera, Motamarri Abhilash Swarup, Mohamed Ashfaaq K, John Bosco Balaguru Rayappan:
Colour Guided Colour Image Steganography. CoRR abs/1010.4007 (2010)
Coauthor Index
aka: Padmapriya Pravinkumar
aka: Siva Janakiraman
aka: Karuppuswamy Thenmozhi
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint