An improved invisible watermarking technique for image authentication MM Sathik, SS Sujatha International Journal of Advanced Science and Technology 24, 61-73, 2010 | 61 | 2010 |
A Novel DWT Based Invisible Watermarking Technique for Digital Images. MM Sathik, SS Sujatha Int. Arab. J. e Technol. 2 (3), 167-173, 2012 | 48 | 2012 |
Cloud security: LKM and optimal fuzzy system for intrusion detection in cloud environment SI Shyla, SS Sujatha Journal of Intelligent Systems 29 (1), 1626-1642, 2019 | 32 | 2019 |
A Novel DWT Based Blind Watermarking for Image Authentication. SS Sujatha, MM Sathik Int. J. Netw. Secur. 14 (4), 223-228, 2012 | 24 | 2012 |
Feature based watermarking algorithm by adopting Arnold transform SS Sujatha, M Mohamed Sathik Information and Communication Technologies: International Conference, ICT …, 2010 | 16 | 2010 |
Authentication of digital images by using a semi-fragile watermarking technique MM Sathik, SS Sujatha International Journal of Advanced Research in Computer Science and Software …, 2012 | 14 | 2012 |
Wavelet based blind technique by espousing hankel matrix for robust watermarking MM Sathik, SS Sujatha International Journal of Advanced Science and Technology 26, 57-72, 2011 | 12 | 2011 |
Feature based blind approach for robust watermarking SS Sujatha, MM Sathik 2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING …, 2010 | 7 | 2010 |
Application of Toeplitz matrix in watermarking for image authentication MM Sathik, SS Sujatha 2011 International Conference on Computer, Communication and Electrical …, 2011 | 6 | 2011 |
A novel pixel based blind watermarking algorithm by applying Fibonacci transform SS Sujatha, MM Sathik Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in …, 2010 | 6 | 2010 |
An efficient automatic intrusion detection in cloud using optimized fuzzy inference system SI Shyla, SS Sujatha International Journal of Information Security and Privacy (IJISP) 14 (4), 22-41, 2020 | 4 | 2020 |
Blind Wavelet Based Watermarking Technique for Image Authentication S Sujatha, M Sathik the International Arab Journal of Information Technology 10 (3), 2013 | 2 | 2013 |
A novel linear assorted classification method based association rule mining with spatial data PD Sheena Smart, KK Thanammal, SS Sujatha Sādhanā 46 (1), 7, 2021 | 1 | 2021 |
A study on integrity and authentication using rsa and sha-3 algorithms for secured data communication PM Selvam, SS Sujatha International Journal of Engineering, Science and Mathematics 9 (8), 1-18, 2020 | 1 | 2020 |
A Secure Blind Semi-Fragile Watermarking Technique for Digital Image Authentication. SS Sujatha International Journal of Advanced Research in Computer Science 3 (4), 2012 | 1 | 2012 |
An Improved Optimization Algorithm for Storing Secure Data in Iot Cloud System KS SARASWATHY, SS SUJATHA Purakala with ISSN 0971-2143 is an UGC CARE Journal 31 (14), 1000-1006, 2020 | | 2020 |
Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment SS Sujatha, SI Shyla | | 2019 |
A Novel Technique for Digital Watermarking with Feature Based Disparity Values SS Sujatha, MM Sathik International Journal of Advanced Research in Computer Science 2 (1), 2011 | | 2011 |
Modified authentication process of image transmission using semi-fragile watermarking technique SS Sujatha Kodaikanal, 0 | | |
IEEE Student Chapter National College of Engineering Maruthakulam, Tirunelveli, Tamilnadu, India VKM Raj, R Shriram, K Suganya, V Nagarajan, B Christinal, V Vivek, ... Evaluation 66, 14, 0 | | |