Author(s)
|
Title of Paper
|
Journal
|
Volume (No.)
|
Page numbers
|
Year
|
Impact Factor of the Journal
(Optional)
|
C. Nandhini, M. Brindha |
Hierarchical Patch Selection: An Improved Patch Sampling for No Reference Image Quality Assessment |
IEEE Transactions on Artificial Intelligence |
|
|
2023 |
|
M Devipriya, M Brindha |
Image Encryption Using Chaos Based Heuristic Diffusion |
SN Computer Science |
Vol. 4 |
|
2023 |
1.2 |
Janani Thiyagarajan, M. Brindha |
A Privacy Preserving Transfer Learning based Secure Quantum Image Retrieval in Encrypted Domain for Cloud Environment |
Journal of Electronic Imaging, SPIE |
Vol. 32, No. 3 |
|
2023 |
|
C Madan Kumar, Ruhul Amin, M Brindha |
Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication Protocol for Telecare Medical Information System |
Cyber Security and applications, Elsevier |
Vol. 1 |
|
2023 |
|
M Devipriya, M Brindha |
Reconfigurable architecture for image encryption using three-layer artificial neural network |
IETE Journal of Research |
|
|
2022 |
|
M Devipriya, M Brindha |
Reconfigurable architecture for DNA diffusion technique based medical image encryption |
Journal of Circuits, Systems, and Computers, World scientific |
Vol. 32, No. 4 |
2350065 |
2023 |
|
C Madan Kumar, Ruhul Amin, M Brindha |
Cryptanalysis and Improvement of REAS-TMIS: Resource-Efficient Authentication Scheme for Telecare Medical Information System |
Security and Privacy, Wiley |
Vol. 6, No. 1 |
|
2023 |
|
C. Nandhini, M. Brindha |
Transfer learning based SSD model for helmet and multiple rider detection |
International Journal of Information Technology, Springer |
Vol. 15 |
565–576 |
2023 |
|
C Madan Kumar, Ruhul Amin, M Brindha |
SafeCom: Robust Mutual Authentication and Session Key Sharing Protocol for Underwater Wireless sensor networks |
Journal of systems architecture, Elsevier |
Vol. 130 |
102650 |
2022 |
5.836 |
Vinod Ramesh Falmari, Seokbum Ko, M Brindha |
Secure Covid-19 Electronic Health Records Management for Telediagnosis and Travel Ticket Assistant System Using Cryptographic Approaches |
SN Computer science |
Vol. 3 |
403 |
2022 |
1.2 |
Devipriya Manivannan, M Brindha
|
Image encryption using modified perfect shuffle-based bit-level permutation and learning with errors-based diffusion for IoT devices
|
Computers and Electrical Engineering
|
Vol. 100
|
107954
|
2022
|
4.152
|
Devipriya Manivannan, M Brindha
|
Secure Image Cloud Storage Using Homomorphic Password Authentication with ECC-Based Cryptosystem
|
Advances in Systems Science and Applications
|
Vol. 22
|
92-116
|
2022
|
1.2
|
M.Brindha Deebthik Ravi, Sashank Ramachandran, Raahul Vignesh, Vinod Ramesh Falmari
|
Privacy-preserving transparent supply chain management through Hyperledger Fabric
|
Blockchain: Research and Applications
|
Vol. 3
|
100072
|
2022
|
|
R. Vidhya, M. Brindha
|
A novel approach for Chaotic image Encryption based on block level permutation and bit-wise substitution
|
Multimedia Tools and Applications
|
Vol. 81
|
3735–3772
|
2022
|
2.757
|
C Madan Kumar, R Vidhya, M Brindha
|
An efficient chaos-based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function
|
Journal of Applied Intelligence
|
Vol. 52
|
2556–2585
|
2022
|
5.086
|
Vinod Ramesh Falmari, M Brindha
|
Privacy-preserving biometric authentication using Chaos on a remote untrusted server
|
Journal of Measurement
|
Vol. 177
|
109257
|
2021
|
3.927
|
T Janani, Y Darak, M Brindha
|
Secure similar image search and copyright protection over encrypted medical image databases
|
IRBM
|
Vol. 42, Issue 2
|
83-93
|
2021
|
1.856
|
R. Vidhya, M. Brindha
|
Evaluation and performance analysis of Chinese remainder theorem and its application to lossless image compression
|
Journal of Ambient Intelligence and Humanized Computing
|
|
|
2021
|
7.104
|
T. Janani, M. Brindha
|
Secure Similar Image Matching (SESIM): An Improved Privacy-Preserving Image Retrieval Protocol over Encrypted Cloud Database
|
IEEE Transactions on Multimedia
|
|
|
2021
|
6.513
|
Shwetha Sridharan, Deepti Saravanan, Akshaya Kesarimangalam Srinivasan, M. Brindha
|
Adaptive learning management expert system with evolving knowledge base and enhanced learnability
|
Education and Information Technologies
|
Vol. 26
|
5895–5916
|
2021
|
2.917
|
T. Janani, M. Brindha
|
A secure medical image transmission scheme aided by quantum representation
|
Journal of Information Security and Applications
|
Vol. 59
|
102832
|
2021
|
3.872
|
J Thiyagarajan, A Akash, Brindha Murugan
|
Improved real-time permission-based malware detection and clustering approach using model-independent pruning
|
IET Information Security
|
Vol. 14, Issue 6
|
531-541
|
2020
|
1.068
|
Vinod Ramesh Falmari, M Brindha
|
Privacy-preserving cloud-based secure digital locker using Paillier-based difference function and chaos-based cryptosystem
|
Journal of Information Security and Applications
|
Vol. 53
|
102513
|
2020
|
3.872
|
R Vidhya, M.Brindha
|
A Novel Dynamic Chaotic Image Encryption using Butterfly Network Topology-based Diffusion and Decision-based Permutation
|
Multimedia Tools and Applications
|
Vol. 79
|
30281–30310
|
2020
|
2.757
|
R Vidhya, M.Brindha, N.Ammasai Gounden
|
Analysis of zig-zag scan-based modified feedback convolution algorithm against differential attacks and its application to image encryption
|
Journal of Applied Intelligence
|
Vol. 50
|
3101–3124
|
2020
|
5.086
|
R Vidhya, M.Brindha
|
A novel Chaotic Butterfly Network Topology-based block Scrambling and Crown Graph-based Bit-wise Diffusion for Image Encryption
|
Frontiers of Computer Science
|
Vol. 15
|
|
2021
|
2.061
|
R Vidhya, M.Brindha
|
A Novel Conditional Butterfly Network Topology-based Chaotic Image Encryption
|
Journal of Information Security and Applications
|
Vol. 52
|
102484
|
2020
|
3.872
|
R Vidhya, M.Brindha
|
A chaos-based image encryption algorithm using Rubik’s cube and prime factorization process (CIERPF)
|
Journal of King Saud University - Computer and Information Sciences
|
|
|
2020
|
13.473
|
R Vidhya, M.Brindha & N.Ammasai Gounden
|
A secure image encryption algorithm based on a parametric switching chaotic system
|
Chinese Journal of Physics
|
Vol. 62
|
26-42
|
2019
|
3.237
|
J Thiyagarajan, B Murugan, NGA Gounden
|
A chaotic image encryption scheme with a complex diffusion matrix for plain image sensitivity
|
Serbian Journal of Electrical Engineering
|
Vol. 16, Issue 2
|
247-265
|
2019
|
0.547
|
R Vidhya, M Brindha
|
A novel Dynamic Key-based chaotic image encryption.
|
J. Internet Serv. Inf. Secure.
|
Vol. 8, Issue 1
|
46-55
|
2018
|
|
M.Brindha & N.Ammasai Gounden
|
Chaos-based image encryption andlossless compression algorithm using a hash table and the Chinese Remainder Theorem
|
Applied Soft Computing (Elsevier)
|
Vol. 40
|
379-390
|
2016
|
6.725
|
M.Brindha & N.Ammasai Gounden
|
Image encryption scheme based on block-based confusion and multiple levels of
diffusion
|
IET Computer Vision
|
Vol.10,
Issue.6
|
593- 602
|
2016
|
1.516
|
M.Brindha,
N. Ammasai Gounden. And M. Sriram
|
hybrid image encryption algorithm using chaos and Conway's game-of-life cellular automata
|
Security and Communication Networks (Wiley)
|
Vol.9, No.7
|
634-651
|
2015
|
1.791
|
S.Subash Dangol, S.Selvakumar and
M.Brindha
|
Genuine ARP(GARP) - A Broadcast-based Stateful Authentication Protocol
|
ACM. Sig soft Software Engineering Notes
|
Vol.36, No.4
|
1-10
|
2011
|
|