An efficient densenet-based deep learning model for malware detection J Hemalatha, SA Roseline, S Geetha, S Kadry, R Damaševičius Entropy 23 (3), 344, 2021 | 181 | 2021 |
Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP AK Sahu, G Swain, M Sahu, J Hemalatha Journal of Information Security and Applications 58, 102808, 2021 | 51 | 2021 |
Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier J Hemalatha, M Sekar, C Kumar, A Gutub, AK Sahu Journal of Information Security and Applications 76, 103541, 2023 | 22 | 2023 |
Edge detection using fast pixel based matching and contours mapping algorithms MA T S Arulananth, P Chinnasamy, J Chinna Babu, Ajmeera Kiran, J Hemalatha PLoS One 18 (8), 2023 | 11 | 2023 |
Enhancing the JPEG image steganography security by RSA and attaining high payload using advanced DCT replacement method and modified quantisation table J Hemalatha, MKK Devi, S Geetha International Journal of Business Intelligence and Data Mining 14 (1-2), 138-154, 2019 | 7 | 2019 |
Data Hiding Using PVD and Improving Security Using RSA AKSBC Hemalatha Jeyaprakash, Kamatchi Kartheeban Journal of Applied Security Research, 1-9, 2021 | 5* | 2021 |
Improving image steganalyser performance through curvelet transform denoising J Hemalatha, MKK Devi, S Geetha Cluster Computing 22, 11821-11839, 2019 | 5 | 2019 |
Cognitive Computing: A Deep View in Architecture, Technologies, and Artificial Intelligence-Based Applications JJ Hemalatha, BS Chokkalingam, V Vivek, S Mohan Principles and Applications of Socio-Cognitive and Affective Computing, 1-14, 2023 | 4 | 2023 |
Comparison of deep learning and random forest for rumor identification in social networks T Manjunath Kumar, R Murugeswari, D Devaraj, J Hemalatha International Conference on Innovative Computing and Communications …, 2020 | 3 | 2020 |
An efficient steganalysis of medical images by using deep learning based discrete scalable alex net convolutionary neural networks classifier J Hemalatha, S Geetha, S Mohan, S Nivetha Journal of Medical Imaging and Health Informatics 11 (10), 2667-2674, 2021 | 2 | 2021 |
Effective image stego intrusion detection system using statistical footprints of the steganogram and fusion of classifiers J Hemalatha, MKK Devi, S Geetha Int. J. Computer Aided Engineering and Technology (Inderscience- Scopus …, 2020 | 2 | 2020 |
A Survey on Recommendation System: Collaborative Filtering S Vairachilai, S Urkude, J Hemalatha Journal of Advanced Research in Dynamical & Control Systems 10 (6), 1850-1857, 2018 | 2 | 2018 |
KNN Based Power Efficiency in Wireless Sensor Networks J Hemalatha, R PalaniKumar, K Ramasamy International Journal of Emerging Technology and Advanced Engineering, ISSN …, 2013 | 2 | 2013 |
Improved multiview biometric object detection for anti spoofing frauds P Asmitha, C Rupa, S Nikitha, J Hemalatha, AK Sahu Multimedia Tools and Applications, 1-17, 2024 | 1 | 2024 |
Stego Detection: Image Steganalysis Using a Novel Hidden Stego Visual Geometry Group–Based CNN Classification SM Hemalatha Jeyaprakasha, Bala Subramanian Chokkalingam , Vivek V JOURNAL OF APPLIED SECURITY RESEARCH, 1-22, 2022 | 1* | 2022 |
Reversible Data Hiding Based on Varying Radix Numeral System DJH J. Hemalatha, S. Geetha, R. Geetha, C. Balasubramanian, Daniela Elena ... Computers, Materials & Continua, 69 (1), 283–300, 2021 | 1* | 2021 |
Secure Multicast Group Communications for IoT Applications using WSN K Kartheeban, J Hemalatha, C Priya, M Venkatesulu 2020 Third International Conference on Smart Systems and Inventive …, 2020 | 1 | 2020 |
Efficient ACO Feature selection algorithm for Image stego anomaly detection based on SPAM features K Kartheeban, J Hemalatha, C Balasubramanian 2019 IEEE International Conference on Clean Energy and Energy Efficient …, 2019 | 1 | 2019 |
Performance Analysis of Image Denoising with Curvelet Transform in Detecting the Stego Noise J Hemalatha, MK Kavitha Devi, S Geetha Innovations in Computer Science and Engineering: Proceedings of the Fifth …, 2019 | 1 | 2019 |
A comparative review of various machine learning approaches for improving the performance of stego anomaly detection H Jeyaprakash, MK KavithaDevi, S Geetha Handbook of Research on Network Forensics and Analysis Techniques, 351-371, 2018 | 1 | 2018 |