Separable reversible data hiding in an encrypted image using the adjacency pixel difference histogram R Anushiadevi, R Amirtharajan Journal of Information Security and Applications 72, 103407, 2023 | 29 | 2023 |
Uncover the cover to recover the hidden secret-a separable reversible data hiding framework R Anushiadevi, P Praveenkumar, JBB Rayappan, R Amirtharajan Multimedia Tools and Applications 80, 19695-19714, 2021 | 17 | 2021 |
Reversible data hiding method based on pixel expansion and homomorphic encryption R Anushiadevi, P Praveenkumar, JBB Rayappan, R Amirtharajan Journal of Intelligent & Fuzzy Systems 39 (3), 2977-2990, 2020 | 16 | 2020 |
Design and development of reversible data hiding-homomorphic encryption & rhombus pattern prediction approach R Anushiadevi, R Amirtharajan Multimedia Tools and Applications 82 (30), 46269-46292, 2023 | 14 | 2023 |
A high payload separable reversible data hiding in cipher image with good decipher image quality R Anushiadevi, P Pravinkumar, JBB Rayappan, R Amirtharajan Journal of Intelligent & Fuzzy Systems 38 (5), 6403-6414, 2020 | 11 | 2020 |
Seeable visual but not sure of it R Amirtharajan, JBB Rayappan IEEE-International Conference On Advances In Engineering, Science And …, 2012 | 9 | 2012 |
Reversible data hiding in an encrypted image using the homomorphic property of elliptic curve cryptography R Anushiadevi, R Amirtharajan Journal of Intelligent & Fuzzy Systems 41 (5), 5583-5594, 2021 | 6 | 2021 |
An Efficient Algorithm For Clustering Intrusion Alert D Adelina Josephine, R Anushiadevi, TR Lakshminarayanan | 6* | 2012 |
An intelligent framework for heart disease prediction deep learning-based ensemble Method V Venkatesh, P Rai, KA Reddy, S Praba, R Anushiadevi 2022 International Conference on Computer, Power and Communications (ICCPC …, 2022 | 5 | 2022 |
A smart framework through the Internet of Things and machine learning for precision agriculture V Venkatesh, P Raj, RA Devi Advances in Computers 127, 279-306, 2022 | 5 | 2022 |
Histogram technique with pixel indicator for high fidelity steganography V Meiamai, A Minu, R Anushia Devi International Journal of Engineering and Technology 5 (3), 2134-2137, 2013 | 5 | 2013 |
Anushiadevi. R2, Meena. y2, Kalpana. y2 and John Bosco Balaguru “Seeable Visual But Not Sure of It” IEEE-International Conference On Advances In Engineering R Amirtharajan Science And Management (ICAESM-2012) March 30, 31, 2012 | 5 | 2012 |
A precision-based diagnostic model ADOBE-accurate detection of breast cancer using logistic regression approach V Venkatesh, MM Anishin Raj, K Mohamed Sajith, R Anushiadevi, ... Journal of Intelligent & Fuzzy Systems 39 (6), 8419-8426, 2020 | 4 | 2020 |
Reversible secret data hiding based on adjacency pixel difference R Anushiadevi, P Praveenkumar, JBB Rayappan, R Amirtharajan J Artif Intel 10, 22-31, 2017 | 3 | 2017 |
An intelligent traffic management system based on the Internet of Things for detecting rule violations V Venkatesh, P Raj, R Anushiadevi, KA Reddy 2023 International Conference on Advances in Computing, Communication and …, 2023 | 2 | 2023 |
Cloud-based Dempster-Shafer theory (CDST) for precision-centric activity recognition in smarter environments V Venkatesh, P Raj, T Suriya Praba, R Anushiadevi Data Engineering and Communication Technology: Proceedings of 3rd ICDECT …, 2020 | 2 | 2020 |
An image mathcrypt-a flawless security via flawed image R Anushiadevi, V Venkatesh, R Amirtharajan Applications and Techniques in Information Security: 10th International …, 2019 | 2 | 2019 |
Image hides image: A secret stego tri-layer approach R Amirtharajan, R Anushiadevi, V Meena, V Kalpana, JBB Rayappan Research Journal of Information Technology 5 (2), 249-255, 2013 | 2 | 2013 |
Demystifying next-generation cyber-physical healthcare systems V Venkatesh, P Raj, SAP Kumar, RA Devi cyber-physical systems and industry 4.0, 149-175, 2022 | 1 | 2022 |
Privacy-preserving authentication scheme using reduced-advanced encryption standard for vehicular ad hoc network S Sharon, T Suriya Praba, R Anushiadevi, V Venkatesh Applications and Techniques in Information Security: 10th International …, 2019 | 1 | 2019 |