A survey of content based video copy detection using big data P Karthika, P VidhyaSaraswathi KARE, 2017 | 44 | 2017 |
Suppressed K-anonymity multi-factor authentication based schmidt-samoa cryptography for privacy preserved data access in cloud computing KM Prabha, PV Saraswathi Computer Communications 158, 85-94, 2020 | 32 | 2020 |
Digital video copy detection using steganography frame based fusion techniques P Karthika, P VidhyaSaraswathi Proceedings of the International Conference on ISMAC in Computational Vision …, 2019 | 30 | 2019 |
Retracted article: content based satellite image retrieval system using fuzzy clustering PK Kavitha, P Vidhya Saraswathi Journal of Ambient Intelligence and Humanized Computing 12 (5), 5541-5552, 2021 | 28 | 2021 |
IoT using machine learning security enhancement in video steganography allocation for Raspberry Pi P Karthika, P Vidhya Saraswathi Journal of Ambient Intelligence and Humanized Computing 12, 5835-5844, 2021 | 27 | 2021 |
A block cipher algorithm for multimedia content protection with random substitution using binary tree traversal PV Saraswathi, M Venkatesulu Journal of Computer Science 8 (9), 1541, 2012 | 26 | 2012 |
Content based video copy detection using frame based fusion technique P Karthika, P Vidhya Saraswathi Journal of Advanced Research in Dynamical and Control Systems 9 (17), 885-894, 2017 | 25 | 2017 |
Enhanced the Data Hiding in Geometrical image using stego-Crypto techniques with machine laerning BB Sundaram, S Maurya, P Karthika, PV Saraswathi 2021 6th International Conference on Inventive Computation Technologies …, 2021 | 22 | 2021 |
Image security performance analysis for SVM and ANN classification techniques P Karthika, PV Saraswathi International Journal of Recent Technology and Engineering 8 (4S2), 436-442, 2019 | 20 | 2019 |
A survey on medical image encryption PK Kavitha, PV Saraswathi ijsrst. com, 2017 | 16 | 2017 |
Raspberry Pi: A tool for strategic machine learning security allocation in IoT P Karthika, P Vidhya Saraswathi Empowering artificial intelligence through machine learning, 133-141, 2020 | 12 | 2020 |
Tiger hash kerberos biometric blowfish user authentication for secured data access in cloud KM Prabha, PV Saraswathi 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile …, 2018 | 9 | 2018 |
Segmentation for content based satellite image retrieval using fuzzy clustering P Kavitha, PV Saraswathi International Journal of Advanced Science and Technology 29 (9s), 3042-3049, 2020 | 8 | 2020 |
Color image encryption: A new public key cryptosystem based on polynomial equation PK Kavitha, P Vidhya Saraswathi Proceedings of the International Conference on ISMAC in Computational Vision …, 2019 | 8 | 2019 |
A novel stream cipher using pesudo random binary sequence generator for medical image encryption PV Saraswathi, M Venkatesulu 2017 international conference on trends in electronics and informatics (ICEI …, 2017 | 8 | 2017 |
A block cipher based on Boolean matrices using bit level operations PV Saraswathi, M Venkatesulu 2014 IEEE/ACIS 13th International Conference on Computer and Information …, 2014 | 7 | 2014 |
A Secure Image Content Transmission using Discrete Chaotic Chaotic maps MV P.Vidhya Saraswathi Jokull Journal 63 (9), 404-418, 2013 | 6 | 2013 |
Machine Learning Security Allocation in IoT using Raspberry Pi P Karthika, PV Saraswathi Data Security in Internet of Things Based RFID and WSN Systems Applications …, 2020 | 4 | 2020 |
Performance Analysis of Stego-Image Security in Machine Learning VK Sheela, A Nedumaran, PV Saraswathi, P Karthika 2021 Third International Conference on Intelligent Communication …, 2021 | 3 | 2021 |
Machine learning paradigm towards content-based image retrieval on high-resolution satellite images PK Kavitha, PV Saraswathi Int J Innov Technol Explor Eng 9, 2278-3075, 2019 | 3 | 2019 |