A chaos based image encryption and lossless compression algorithm using hash table and Chinese Remainder Theorem M Brindha, NA Gounden Applied Soft Computing 40, 379-390, 2016 | 105 | 2016 |
Image encryption scheme based on block‐based confusion and multiple levels of diffusion B Murugan, AG Nanjappa Gounder IET Computer Vision 10 (6), 593-602, 2016 | 61 | 2016 |
An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function CM Kumar, R Vidhya, M Brindha Applied Intelligence 52 (3), 2556-2585, 2022 | 57 | 2022 |
Privacy preserving transparent supply chain management through Hyperledger Fabric MB Deebthik Ravi, Sashank Ramachandran, Raahul Vignesh, Vinod Ramesh Falmari Blockchain: Research and Applications, 2022 | 57 | 2022 |
A Chaos based Image Encryption Algorithm using Rubik's cube and Prime Factorization process (CIERPF) MB R. Vidhya Journal of King Saud University - Computer and Information Sciences, 2020 | 38 | 2020 |
A SECURE MEDICAL IMAGE TRANSMISSION SCHEME AIDED BY QUANTUM REPRESENTATION MB T. Janani Journal of Information Security and Applcations 59, 2021 | 31 | 2021 |
Edge detection based boundary box construction algorithm for improving the precision of object detection in YOLOv3 ST Blue, M Brindha 2019 10th International Conference on Computing, Communication and …, 2019 | 29 | 2019 |
A hybrid image encryption algorithm using chaos and Conway's game‐of‐life cellular automata B Murugan, AG Nanjappa Gounder, S Manohar Security and Communication Networks 9 (7), 634-651, 2016 | 23 | 2016 |
Privacy preserving cloud based secure digital locker using Paillier based difference function and chaos based cryptosystem VR Falmari, M Brindha Journal of Information Security and Applications 53, 102513, 2020 | 22 | 2020 |
SEcure Similar Image Matching (SESIM): An Improved Privacy Preserving Image Retrieval Protocol over Encrypted Cloud Database MB T Janani IEEE Transactions on Multimedia, 2021 | 18 | 2021 |
Improved real‐time permission based malware detection and clustering approach using model independent pruning J Thiyagarajan, A Akash, B Murugan IET Information Security 14 (5), 531-541, 2020 | 18 | 2020 |
Adaptive learning management expert system with evolving knowledge base and enhanced learnability BM Shwetha Sridharan, Deepti Saravanan, Akshaya Kesarimangalam Srinivasan Education and Information Technologies, 2021 | 17 | 2021 |
Confidentiality, integrity and authentication of DICOM medical images M Brindha 2018 2nd International Conference on Inventive Systems and Control (ICISC …, 2018 | 16 | 2018 |
Privacy preserving biometric authentication using chaos on remote untrusted server VR Falmari, M Brindha Measurement 177, 109257, 2021 | 15 | 2021 |
A Novel Conditional Butterfly Network Topology based Chaotic Image Encryption MB R. Vidhya Journal of Information Security and Applications, 2020 | 15 | 2020 |
Secure similar image search and copyright protection over encrypted medical image databases T Janani, Y Darak, M Brindha Irbm 42 (2), 83-93, 2021 | 14 | 2021 |
Analysis of zig-zag scan based modified feedback convolution algorithm against differential attacks and its application to image encryption R Vidhya, M Brindha, NA Gounden Journal of Applied Intelligence, 2020 | 13 | 2020 |
A chaotic image encryption scheme with complex diffusion matrix for plain image sensitivity J Thiyagarajan, B Murugan, AGN Gounder SJEE 16 (2), 247-265, 2019 | 12 | 2019 |
A secure image encryption algorithm based on a Parametric Switching Chaotic System NAG R. Vidhya, M. Brindha Chinese Journal of Physics, 2019 | 12 | 2019 |
A Novel Dynamic Chaotic Image Encryption using Butterfly Network Topology based Diffusion and Decision based Permutation RV M Brindha Multimedia Tools and Applications, 2020 | 11 | 2020 |