Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller S Janakiraman, K Thenmozhi, JBB Rayappan, R Amirtharajan Microprocessors and Microsystems 56, 1-12, 2018 | 73 | 2018 |
Hopfield attractor-trusted neural network: an attack-resistant image encryption C Lakshmi, K Thenmozhi, JBB Rayappan, R Amirtharajan Neural Computing and Applications 32 (15), 11477-11489, 2020 | 64 | 2020 |
OFDM+ CDMA+ Stego= secure communication: a review K Thenmozhi, P Praveenkumar, R Amirtharajan, V Prithiviraj, ... Research Journal of Information Technology 4 (2), 31-46, 2012 | 64 | 2012 |
Regulated OFDM-Role of ECC and ANN: A Review P Praveenkumar, R Amirtharajan, K Thenmozhi, JBB Rayappan Journal of Applied Sciences 12 (4), 301-314, 2012 | 57 | 2012 |
Pixel Forefinger for Gray in Color: A Layer by Layer Stego. S Janakiraman, R Amirtharajan, K Thenmozhi, B Rayappan, JB Balaguru Information Technology Journal 11 (1), 9-19, 2012 | 53 | 2012 |
Medical data sheet in safe havens–A tri-layer cryptic solution P Praveenkumar, R Amirtharajan, K Thenmozhi, JBB Rayappan Computers in biology and medicine 62, 264-276, 2015 | 52 | 2015 |
Firmware for data security: A review S Janakiraman, R Amirtharajan, K Thenmozhi, JBB Rayappan Research Journal of Information Technology 4 (3), 61-72, 2012 | 51 | 2012 |
Encryption and watermark-treated medical image against hacking disease—An immune convention in spatial and frequency domains C Lakshmi, K Thenmozhi, JBB Rayappan, R Amirtharajan Computer Methods and Programs in Biomedicine 159, 11-21, 2018 | 50 | 2018 |
Triple chaotic image scrambling on RGB–a random image encryption approach P Praveenkumar, R Amirtharajan, K Thenmozhi, JBB Rayappan Security and Communication Networks 8 (18), 3335-3345, 2015 | 47 | 2015 |
Secured IIoT against trust deficit-A flexi cryptic approach VM Padmapriya, K Thenmozhi, M Hemalatha, V Thanikaiselvan, ... Multimedia Tools and Applications, 1-28, 2024 | 46 | 2024 |
Neural attractor-based adaptive key generator with DNA-coded security and privacy framework for multimedia data in cloud environments H Mahalingam, P Velupillai Meikandan, K Thenmozhi, KM Moria, ... Mathematics 11 (8), 1769, 2023 | 46 | 2023 |
Steg-OFDM blend for highly secure multi-user communication PPP Kumar, R Amirtharajan, K Thenmozhi, JBB Rayappan 2011 2nd International Conference on Wireless Communication, Vehicular …, 2011 | 46 | 2011 |
Phase for face saving-a multicarrier stego P Praveenkumar, R Amirtharajan, K Thenmozhi, JBB Rayappan Procedia Engineering 30, 790-797, 2012 | 45 | 2012 |
Neural-assisted image-dependent encryption scheme for medical image cloud storage C Lakshmi, K Thenmozhi, JBB Rayappan, S Rajagopalan, R Amirtharajan, ... Neural Computing and Applications 33, 6671-6684, 2021 | 44 | 2021 |
Fusion of confusion and diffusion: a novel image encryption approach P Praveenkumar, R Amirtharajan, K Thenmozhi, JBB Rayappan Telecommunication Systems 65, 65-78, 2017 | 39 | 2017 |
IoT based waste management for smart cities PV Rao, PMA Azeez, SS Peri, V Kumar, RS Devi, A Rengarajan, ... 2020 International conference on computer communication and informatics …, 2020 | 32 | 2020 |
Transreceiving of encrypted medical image–a cognitive approach P Praveenkumar, N Kerthana Devi, D Ravichandran, J Avila, ... Multimedia Tools and Applications 77, 8393-8418, 2018 | 32 | 2018 |
ECC joins first time with SC-FDMA for Mission “security” VM Padmapriya, K Thenmozhi, P Praveenkumar, R Amirtharajan Multimedia Tools and Applications 79 (25), 17945-17967, 2020 | 31 | 2020 |
Rubik's cube blend with logistic map on RGB: A way for image encryption P Praveenkumar, G Ashwin, SPK Agarwal, SN Bharathi, ... Research Journal of Information Technology 6 (3), 207-215, 2014 | 31 | 2014 |
Pixel scattering matrix formalism for Image Encryption–A key scheduled Substitution and Diffusion approach P Praveenkumar, R Amirtharajan, K Thenmozhi, JBB Rayappan AEU-International Journal of Electronics and Communications 69 (2), 562–572, 2014 | 29 | 2014 |