Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Shima Ramesh Maniyath"'
Autor:
Asisa Kumar Panigrahy, Shima Ramesh Maniyath, Mithileysh Sathiyanarayanan, Mohan Dholvan, T. Ramaswamy, Sudheer Hanumanthakari, N. Arun Vignesh, S. Kanithan, Raghunandan Swain
Publikováno v:
IEEE Access, Vol 12, Pp 10818-10833 (2024)
A robust image encryption process is still one of the most challenging tasks in image security owing to massive degree and sensitivity nature of information in the form of pixels. The hurdles include greater computational difficulty, information loss
Externí odkaz:
https://doaj.org/article/dd64a571cbea46709d0366d43b9d1ed8
Autor:
Asisa Kumar Panigrahy, Shima Ramesh Maniyath, Mithileysh Sathiyanarayanan, Mohan Dholvan, T. Ramaswamy, Sudheer Hanumanthakari, N. Arun Vignesh, S. Kanithan, Raghunandan Swain
Publikováno v:
IEEE Access, Vol 12, Pp 137522-137522 (2024)
Presents corrections to the paper, Corrections to “A Faster and Robust Artificial Neural Network Based Image Encryption Technique With Improved SSIM”.
Externí odkaz:
https://doaj.org/article/5b89a7bf974d4b1fbb081e2afe82b48f
Publikováno v:
Arabian Journal of Geosciences. 14
In this paper, we have proposed a novel deep learning-based underwater image dehazing method. The images taken under water are affected by light transportation properties like refraction, reflection, scattering, and absorption. Deep learning techniqu
Publikováno v:
2021 International Conference on Design Innovations for 3Cs Compute Communicate Control (ICDI3C).
Mental health assessment and intervention are extending from clinic into daily life. Long -term wellbeing monitoring is principle concern for evaluating health status by collecting physical signs through behavioral attributes. Multisensory informatio
Publikováno v:
2021 International Conference on Design Innovations for 3Cs Compute Communicate Control (ICDI3C).
The purpose of this paper is to present research on modelling and algorithms for groundwater detection. The chosen surrogates are the most correlated features for anomaly detection. The algorithm used in this paper is one class support vector, K- Nea
In this study, we propose an innovative image encryption Techniques based on four different image encryption Algorithm. Our methodology integrates scrambling followed by Symmetric and Asymmetric Encryption Techniques, to make the image meaningless or
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::91d20112a6740c32bc5a5cddda532451
https://zenodo.org/record/4089431
https://zenodo.org/record/4089431
Publikováno v:
International Journal of Cloud Computing. 10:144
As the communication technology advanced rapidly in recent times, the need for confidential data communication also arose. Here, a computationally feasible encryption/decryption algorithm is proposed to secure data using DNA sequences. The principal
Autor:
Shima Ramesh Maniyath, Thanikaiselvan
Publikováno v:
Microprocessors and Microsystems. 77:103134
Inspite of progressive growth of cryptography, encrypting sensitive information of an image is still a computationally complex task. After reviewing existing literature, it is now known that security problems are yet not solved and there is an open s
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783319911915
CSOC (3)
CSOC (3)
With significant progress in cryptographic protocols, it has been seen that not all efficient protocols were investigated for encrypting image. At present, we find that existing approaches for image encryption still lacks robustness with respect to f
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8cbd1a85665156541e743a1d4042ad19
https://doi.org/10.1007/978-3-319-91192-2_7
https://doi.org/10.1007/978-3-319-91192-2_7
Autor:
Niveditha M, Pooja R, Prasad Bhat N, Ramachandra Hebbar, Shashank N, Vinod P, Shima Ramesh Maniyath
Publikováno v:
2018 International Conference on Design Innovations for 3Cs Compute Communicate Control (ICDI3C).
Crop diseases are a noteworthy risk to sustenance security, however their quick distinguishing proof stays troublesome in numerous parts of the world because of the non attendance of the important foundation. Emergence of accurate techniques in the f