Watermarking techniques used in medical images: a survey

SM Mousavi, A Naghsh, SAR Abu-Bakar - Journal of digital imaging, 2014 - Springer
The ever-growing numbers of medical digital images and the need to share them among
specialists and hospitals for better and more accurate diagnosis require that patients' privacy …

Software complexity analysis using halstead metrics

T Hariprasad, G Vidhyagaran, K Seenu… - … on Trends in …, 2017 - ieeexplore.ieee.org
Software Complexity influences inward connections. Higher the multifaceted nature, bigger
the deformities. Programming complexity for any product or a program is hard to discover …

Memory Efficient Multi Key (MEMK) generation scheme for secure transportation of sensitive data over Cloud and IoT devices

C Thirumalai, H Kar - 2017 Innovations in Power and …, 2017 - ieeexplore.ieee.org
A new variant of RSA has been proposed called Memory Efficient Multi Key (MEMK)
generation scheme. For sensitive data, our scheme will aid in exchanging the information …

Heuristic prediction of rainfall using machine learning techniques

C Thirumalai, KS Harsha, ML Deepak… - … on Trends in …, 2017 - ieeexplore.ieee.org
This paper is carried on the heuristic prediction of rainfall using machine learning
techniques. As we know agriculture was the predominant of our country and economy. While …

[PDF][PDF] Review on the memory efficient RSA variants

C Thirumalai - International Journal of Pharmacy and Technology, 2016 - academia.edu
ISSN: 0975-766X CODEN: IJPTFI Available Online through Review Article www.ijptonline.com
REVIEW ON THE MEMORY EFFICIENT RSA Page 1 Chandra Segar Thirumalai*et al. /International …

A joint FED watermarking system using spatial fusion for verifying the security issues of teleradiology

P Viswanathan, PV Krishna - IEEE Journal of Biomedical and …, 2013 - ieeexplore.ieee.org
Teleradiology allows transmission of medical images for clinical data interpretation to
provide improved e-health care access, delivery, and standards. The remote transmission …

Analysis of cost estimation function for facebook web click data

C Thirumalai, KS Sree, H Gannu - … International conference of …, 2017 - ieeexplore.ieee.org
Gephi is an open source tool, used for Data Analysis, Link Analysis, Social Network
Analysis, Biological Network Analysis, Poster Creation. Gephi tool in this project is used for …

Calculating the user-item similarity using Pearson's and cosine correlation

S Nithya, A Srinivasan… - … conference on trends in …, 2017 - ieeexplore.ieee.org
In this paper, we look into three different techniques for computing similarities for obtaining a
recommendation for them. There are a number of different mathematical formulations that …

Protection of the patient data against intentional attacks using a hybrid robust watermarking code

A Nagm, MS Elwan - PeerJ Computer Science, 2021 - peerj.com
The security of patient information is important during the transfer of medical data. A hybrid
spatial domain watermarking algorithm that includes encryption, integrity protection, and …

Evaluating software metrics of gaming applications using code counter tool for C and C++ (CCCC)

C Thirumalai, PA Reddy… - … International conference of …, 2017 - ieeexplore.ieee.org
This article displays the different programming measurements of gaming applications
utilizing the metric device code counter for C and C++. This contains absolutely three …