default search action
Karuppusamy Thenmozhi
Person information
- affiliation: SASTRA Deemed University, Thanjavur, TamilNadu, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Nithya Chidambaram, Karuppusamy Thenmozhi, Pethuru Raj, Rengarajan Amirtharajan:
DNA-chaos governed cryptosystem for cloud-based medical image repository. Clust. Comput. 27(4): 4127-4144 (2024) - 2022
- [j38]V. M. Padmapriya, Karuppusamy Thenmozhi, Padmapriya Praveenkumar, Rengarajan Amirtharajan:
Misconstrued voice on SC-FDMA for secured comprehension - a cooperative influence of DWT and ECC. Multim. Tools Appl. 81(5): 7201-7217 (2022) - 2021
- [j37]K. Revathy, Karuppusamy Thenmozhi, Padmapriya Praveenkumar, Rengarajan Amirtharajan:
Hybrid spectrum management using integrated fuzzy and femtocells in cognitive domain. J. Intell. Fuzzy Syst. 41(6): 6079-6088 (2021) - [j36]Lakshmi Chandrasekaran, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Genetic and chaotic signatures in offspring - an encrypted generation of image family. Multim. Tools Appl. 80(6): 8581-8609 (2021) - [j35]Nithya Chidambaram, Pethuru Raj, Karuppusamy Thenmozhi, Rengarajan Amirtharajan:
A new method for producing 320-bit modified hash towards tamper detection and restoration in colour images. Multim. Tools Appl. 80(15): 23359-23375 (2021) - [j34]Lakshmi Chandrasekaran, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Sundararaman Rajagopalan, Rengarajan Amirtharajan, Nithya Chidambaram:
Neural-assisted image-dependent encryption scheme for medical image cloud storage. Neural Comput. Appl. 33(12): 6671-6684 (2021) - [j33]R. Santhiya Devi, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan, Padmapriya Praveenkumar:
MUX induced Ring oscillators for encrypted Nano communication via Quantum Dot Cellular Automata. Nano Commun. Networks 27: 100338 (2021) - [j32]Lakshmi Chandrasekaran, Karuppusamy Thenmozhi, C. Venkatesan, A. Seshadhri, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Mutated Cleavages of Images for Stealth Disclosure: A Hopfield Neural Network Attractor (HNNA) Approach. Neural Process. Lett. 53(2): 907-928 (2021) - 2020
- [j31]Nithya Chidambaram, Pethuru Raj, Karuppuswamy Thenmozhi, Rengarajan Amirtharajan:
Advanced framework for highly secure and cloud-based storage of colour images. IET Image Process. 14(13): 3143-3153 (2020) - [j30]A. Revathi, C. Jeyalakshmi, Karuppusamy Thenmozhi:
Non-spectral features-based robust speaker independent emotion recognition from speech signal. Int. J. Medical Eng. Informatics 12(5): 500-514 (2020) - [j29]Lakshmi Chandrasekaran, Vasudharini Moranam Ravi, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Con(dif)fused voice to convey secret: a dual-domain approach. Multim. Syst. 26(3): 301-311 (2020) - [j28]R. Santhiya Devi, A. R. Nirmal Aravind, J. Christopher Vishal, D. Amritha, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Amirtharajan Rengarajan, Padmapriya Praveenkumar:
Image encryption through RNA approach assisted with neural key sequences. Multim. Tools Appl. 79(17-18): 12093-12124 (2020) - [j27]V. M. Padmapriya, Karuppusamy Thenmozhi, Padmapriya Praveenkumar, Rengarajan Amirtharajan:
ECC joins first time with SC-FDMA for Mission "security". Multim. Tools Appl. 79(25-26): 17945-17967 (2020) - [j26]Lakshmi Chandrasekaran, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Hopfield attractor-trusted neural network: an attack-resistant image encryption. Neural Comput. Appl. 32(15): 11477-11489 (2020) - [j25]V. M. Padmapriya, Karuppusamy Thenmozhi, Jayapalan Avila, Rengarajan Amirtharajan, Padmapriya Praveenkumar:
Real Time Authenticated Spectrum Access and Encrypted Image Transmission via Cloud Enabled Fusion centre. Wirel. Pers. Commun. 115(3): 2127-2148 (2020)
2010 – 2019
- 2019
- [j24]A. Revathi, C. Jeyalakshmi, Karuppusamy Thenmozhi:
Person authentication using speech as a biometric against play back attacks. Multim. Tools Appl. 78(2): 1569-1582 (2019) - [j23]Lakshmi Chandrasekaran, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Open hiding for truncating hackers - a block truncation and wavelet approach. Multim. Tools Appl. 78(8): 9951-9969 (2019) - [j22]Siva Janakiraman, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Indicator-based lightweight steganography on 32-bit RISC architectures for IoT security. Multim. Tools Appl. 78(22): 31485-31513 (2019) - [j21]Nithya Chidambaram, Pethuru Raj, Karuppusamy Thenmozhi, Sundararaman Rajagopalan, Rengarajan Amirtharajan:
A cloud compatible DNA coded security solution for multimedia file sharing & storage. Multim. Tools Appl. 78(23): 33837-33863 (2019) - [j20]Jayapalan Avila, Prem Savarinathan, Padmapriya Praveenkumar, Thenmozhi Karuppasamy:
Detecting and Mitigating Selfish Primary Users in Cognitive Radio. Wirel. Pers. Commun. 109(2): 1021-1031 (2019) - [p1]Siva Janakiraman, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, V. Moorthi Paramasivam, Rengarajan Amirtharajan:
Realization of Chaos-Based Private Multiprocessor Network Via USART of Embedded Devices. Handbook of Multimedia Information Security 2019: 323-340 - 2018
- [j19]Lakshmi Chandrasekaran, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Encryption and watermark-treated medical image against hacking disease - An immune convention in spatial and frequency domains. Comput. Methods Programs Biomed. 159: 11-21 (2018) - [j18]Karuppusamy Thenmozhi, M. Rajesh Babu:
Survey of various methods for diagnostic signatures for cutaneous melanoma from genetic and imaging data. Int. J. Bus. Intell. Data Min. 13(1/2/3): 40-51 (2018) - [j17]Siva Janakiraman, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller. Microprocess. Microsystems 56: 1-12 (2018) - [j16]Padmapriya Praveenkumar, N. Kerthana Devi, Dhivya Ravichandran, Jayapalan Avila, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Transreceiving of encrypted medical image - a cognitive approach. Multim. Tools Appl. 77(7): 8393-8418 (2018) - 2017
- [j15]Padmapriya Praveenkumar, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Mojette (d) Secret Image "SEDIH" in an Encrypted Double Image - A Histo Approach. Int. J. Netw. Secur. 19(1): 47-59 (2017) - [j14]Padmapriya Praveenkumar, Rengarajan Amirtharajan, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan:
Fusion of confusion and diffusion: a novel image encryption approach. Telecommun. Syst. 65(1): 65-78 (2017) - [j13]Padmapriya Praveenkumar, P. Catherine Priya, Jayapalan Avila, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Tamper Proofing Identification and Authenticated DICOM Image Transmission Using Wireless Channels and CR Network. Wirel. Pers. Commun. 97(4): 5573-5595 (2017) - 2016
- [j12]Nithya Chidambaram, Pethuru Raj, Karuppusamy Thenmozhi, Rengarajan Amirtharajan:
Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique. Int. J. Digit. Multim. Broadcast. 2016: 8789397:1-8789397:6 (2016) - [j11]Bakkiam David Deebak, Rajappa Muthaiah, Karuppuswamy Thenmozhi, Pitchai Iyer Swaminathan:
Analyzing secure key authentication and key agreement protocol for promising features of IP multimedia subsystem using IP multimedia server-client systems. Multim. Tools Appl. 75(4): 2111-2143 (2016) - [j10]Bakkiam David Deebak, Rajappa Muthaiah, Karuppuswamy Thenmozhi, Pitchai Iyer Swaminathan:
Analyzing three-party authentication and key agreement protocol for real time IP multimedia server-client systems. Multim. Tools Appl. 75(10): 5795-5817 (2016) - 2015
- [j9]Padmapriya Praveenkumar, Rengarajan Amirtharajan, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan:
Medical data sheet in safe havens - A tri-layer cryptic solution. Comput. Biol. Medicine 62: 264-276 (2015) - [j8]Padmapriya Praveenkumar, Rengarajan Amirtharajan, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan:
Triple chaotic image scrambling on RGB - a random image encryption approach. Secur. Commun. Networks 8(18): 3335-3345 (2015) - [j7]Jayapalan Avila, Karuppusamy Thenmozhi:
Authentication scheme to combat a primary user emulation attack against cognitive radio users. Secur. Commun. Networks 8(18): 4242-4253 (2015) - [j6]Bakkiam David Deebak, Rajappa Muthaiah, Karuppusamy Thenmozhi, Pitchai Iyer Swaminathan:
Evaluating Three Party Authentication and Key Agreement Protocols Using IP Multimedia Server-Client Systems. Wirel. Pers. Commun. 81(1): 77-99 (2015) - [j5]Bakkiam David Deebak, Rajappa Muthaiah, Karuppuswamy Thenmozhi, Pitchai Iyer Swaminathan:
Analyzing Threefold Schemes for Enhancing Communication Channel Efficiencies Using IP Multimedia Server-Client Systems for LTE Networks. Wirel. Pers. Commun. 84(3): 2079-2118 (2015) - [j4]Bakkiam David Deebak, Rajappa Muthaiah, Karuppuswamy Thenmozhi, Pitchai Iyer Swaminathan:
A Dynamic-Identity Based Multimedia Server Client Authentication Scheme for Tele-Care Multimedia Medical Information System. Wirel. Pers. Commun. 85(1): 241-261 (2015) - 2013
- [j3]Rajappa Muthaiah, Bakkiam David Deebak, Karuppusamy Thenmozhi, Pitchai Iyer Swaminathan:
Interoperation Key Schema for Social Media Tools in IP Multimedia Subsystem. J. Commun. 8(11): 730-737 (2013) - [j2]Bakkiam David Deebak, Rajappa Muthaiah, Karuppusamy Thenmozhi, Pitchai Iyer Swaminathan:
IP Multimedia Subsystem - An Intrusion Detection System. Smart Comput. Rev. 3(1): 1-13 (2013) - [j1]M. Hemalatha, V. Prithiviraj, S. Jayalalitha, Karuppusamy Thenmozhi:
Space Diversity Knotted with WiMAX- A Way for Undistorted and Anti-Corruptive Channel. Wirel. Pers. Commun. 71(4): 3023-3032 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint