Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Dhivya Ravichandran"'
Publikováno v:
Wireless Personal Communications. 129:703-727
Autor:
Aashiq Banu S, Sherin Fathima, B K Murthy, Vidhyadharini Balasubramanian, Dhivya Ravichandran, Rengarajan Amirtharajan
Publikováno v:
Medicalbiological engineeringcomputing. 59(3)
In this growing era, a massive amount of digital electronic health records (EHRs) are transferred through the open network. EHRs are at risk of a myriad of security threats, to overcome such threats, encryption is a reliable technique to secure data.
Autor:
Sundararaman Rajagopalan, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan, Padmapriya Praveenkumar, Dhivya Ravichandran
Publikováno v:
Medicalbiological engineeringcomputing. 59(6)
Smart healthcare systems play a vital role in the current era of Internet of Things (IoT) and Cyber-Physical Systems (CPS); i.e. Industry 4.0. Medical data security has become the integral part of smart hospital applications to ensure data privacy an
Autor:
Dhivya Ravichandran, Rengarajan Amirtharajan, Sundararaman Rajagopalan, Har Narayan Upadhyay, John Bosco Balaguru Rayappan
Publikováno v:
Journal of Signal Processing Systems. 91:475-501
Secure transmission of medical information occupies a crucial role in the world of telemedicine applications. Reconfigurable hardware implementation offers several advantages over software implementation especially for real time security applications
Autor:
Padmapriya Praveenkumar, John Bosco Balaguru Rayappan, Dhivya Ravichandran, Rengarajan Amirtharajan
Publikováno v:
IEEE Transactions on NanoBioscience. 16:850-858
In this technological era, it is highly essential to protect the digital medical data from the fraud and forgery as they are transmitted over the public channel. Also with the increased data traffic, it is hard to transmit the entire bulky medical da
Autor:
John Bosco Balaguru Rayappan, Arun Adhithiya Annadurai, Dhivya Ravichandran, Balakrishnan Ramalingam, Amirtharajan Rengarajan
Publikováno v:
Multimedia Tools and Applications. 77:11669-11692
Recently, diverse types of chaotic image encryption algorithms have been explored to meet the high demands in realizing secured real time image sharing applications. In this context, to achieve high sensitivity and superior key space, a multiple chao
Autor:
K. Thenmozhi, Rengarajan Amirtharajan, John Bosco Balaguru Rayappan, N. Kerthana Devi, Padmapriya Praveenkumar, J. Avila, Dhivya Ravichandran
Publikováno v:
Multimedia Tools and Applications. 77:8393-8418
Recently, there is an increasing demand for efficient and secure transreception of medical images in telemedicine applications. Though a fixed spectrum is allocated to each user, most of the time it remains unused by the concerned user. Cognitive Rad
Autor:
Reshma Manavalan, Pallagani Madhuri, Rengarajan Amirtharajan, Dhivya Ravichandran, Suhaasini Malayappan
Publikováno v:
2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN).
The data security assumes a noteworthy job when transmitting the enormous measure of information by means of the web. Encryption assumes a huge task in keeping data unassailable. In this work, an image encryption depending on 3D chaotic map is propos
Autor:
Anushiadevi, Vidhyadharini Balasubramanian, Rengarajan Amirtharajan, Aashiq Banu, Sherin Fathima, Dhivya Ravichandran
Publikováno v:
2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN).
Cybercrimes have increased manifold with the development in recent technologies. Thus security has become a huge concern in this digitalized world. Hence, there is an increasing need for efficient techniques to achieve secure transmission of images o
Autor:
Rengarajan Amirtharajan, Anushiadevi, Sherin Fathima, Aashiq Banu, Vidhyadharini Balasubramanian, Dhivya Ravichandran
Publikováno v:
2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN).
Nowadays, secure transmission of multimedia files has become more significant concern with the evolution of technologies. Cryptography is the well-known technique to safeguard the files from various destructive hacks. In this work, a colour image enc