An approach for attaining content confidentiality on medical images through image encryption with steganography R Bala Krishnan, N Rajesh Kumar, NR Raajan, G Manikandan, ... Wireless Personal Communications, 1-17, 2021 | 14 | 2021 |
Steganographic approach to enhancing secure data communication using contours and clustering G Manikandan, R Bala Krishnan, N Rajesh Kumar, D Narasimhan, ... Multimedia Tools and Applications 77, 32257-32273, 2018 | 10 | 2018 |
An enhanced bishop tour scheme for information hiding BK Raghupathy, NR Kumar, NR Raajan International Journal of Applied Engineering Research 9 (1), 145-151, 2014 | 10 | 2014 |
Secret image communication scheme based on visual cryptography and tetrolet tiling patterns N RajeshKumar, D Yuvaraj, G Manikandan, R Balakrishnan, ... Comput Mater Continua 65 (2), 1283-1301, 2020 | 7 | 2020 |
Reversible data hiding scheme using deep learning and visual cryptography for medical image communication N Rajesh Kumar, R Bala Krishnan, G Manikandan, V Subramaniyaswamy, ... Journal of Electronic Imaging 31 (6), 063028-063028, 2022 | 6 | 2022 |
A steganographic approach for realizing medical data privacy in a distributed environment. G Manikandan, BR Krishnan, RN Kumar, N Sairam, NR Raajan BIOMEDICAL RESEARCH-INDIA 28 (3), 1031-1035, 2017 | 6 | 2017 |
An imperceptible watermarking technique for copyright content using discrete cosine transformation S Parimi, A SaiKrishna, NR Kumar, NR Raajan 2015 International Conference on Circuits, Power and Computing Technologies …, 2015 | 6 | 2015 |
Scrambling Based Riffle Shift on Stego-Image to Channelize the Ensured Data. R Bala Krishnan, MM Anishin Raj, N Rajesh Kumar, B Karthikeyan, ... Intelligent Automation & Soft Computing 32 (1), 2022 | 3 | 2022 |
A reversible visual cryptography technique for color images using Galois field arithmetic. RN Kumar, G Manikandan, BR Krishnan, NR Raajan, N Sairam BIOMEDICAL RESEARCH-INDIA 28 (5), 2036-2039, 2017 | 3 | 2017 |
Generation of divine image-sri yantra B Santhi, NR Kumar, C Bharathy, RB Krishnan Research journal of applied sciences, engineering and technology 4 (14 …, 2012 | 3 | 2012 |
Image security using visual cryptography G Manikandan, R Kumar, N Rajesh Handbook of Research on Computer Vision and Image Processing in the Deep …, 2023 | 2 | 2023 |
An efficient image scrambling technique for medical images using circular filling and LSB substitution N Anusuya, RG Devi, SM Divya, RN Kumar, BR Krishnan, NR Raajan RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES 7 (4 …, 2016 | 2 | 2016 |
Random noise based perturbation approach using pseudo random number generators for achieving privacy in data mining G Manikandan, N Sairam, P Rajendiran, R Balakrishnan, NR Kumar, ... Journal of Computational and Theoretical Nanoscience 12 (12), 5463-5466, 2015 | 2 | 2015 |
Rain prediction using Environmental Data S Meganathan, TR Sivaramakrishnan, RB Krishnan, KN Rajesh Rasayan Journal of Chemistry 8 (1), 56-58, 2015 | 2 | 2015 |
An Intelligent 2D Secret Share Construction using Visual Cryptography for Secure Transmission. NR Kumar, RB Krishnan, G Manikandan, NR Raajan KSII Transactions on Internet & Information Systems 14 (7), 2020 | 1 | 2020 |
Improved Secret Sharing Scheme for Biometric Authentication using Finite Field NR Kumar, RB Krishnan, NR Raajan Int. J. Rec. Tech. Eng 8, 1, 2019 | 1 | 2019 |
New visual secret sharing scheme for gray-level images using diamond theorem correlation pattern structure V Harish, NR Kumar, NR Raajan 2016 International Conference on Circuit, Power and Computing Technologies …, 2016 | 1 | 2016 |
Algorithmic Approach for Spatial Entity and Mining P Govindarajan, R Balakrishnan, R Kumar Handbook of Research on Computer Vision and Image Processing in the Deep …, 2023 | | 2023 |
An Intelligent 8-Queen Placement Approach of Chess Game for Hiding 56-Bit Key of DES Algorithm Over Digital Color Images BK Raghupathy, R Kumar, P Govindarajan, G Manikandan, ... Handbook of Research on Computer Vision and Image Processing in the Deep …, 2023 | | 2023 |
An intrusion detection system approach using conditional random field for detecting attacks on web-based telemedicine system. R NR Biomedical Research (0970-938X) 28 (5), 2017 | | 2017 |