Brindha Murugan

Orcid: 0000-0002-3952-0674

Affiliations:
  • National Institute of Technology, Tiruchirappalli, Tamilnadu, India


According to our database1, Brindha Murugan authored at least 38 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Event Triggered Constrained Regulatory Control of Blood Glucose in Type I Diabetes Mellitus Condition.
Autom. Control. Comput. Sci., June, 2024

A novel image denoising algorithm based on least square generative adversarial network.
J. Real Time Image Process., May, 2024

Hierarchical Patch Selection: An Improved Patch Sampling for No Reference Image Quality Assessment.
IEEE Trans. Artif. Intell., February, 2024

Visual regenerative fusion network for pest recognition.
Neural Comput. Appl., February, 2024

Secure authentication protocols to resist off-line attacks on authentication data table.
J. Comput. Secur., 2024

2023
Secure IoT-enabled sharing of digital medical records: An integrated approach with reversible data hiding, symmetric cryptosystem, and IPFS.
Internet Things, December, 2023

Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication Protocol for Telecare Medical Information System.
Cyber Secur. Appl., December, 2023

A multimodal dense convolution network for blind image quality assessment.
Frontiers Inf. Technol. Electron. Eng., November, 2023

Smart camera with image encryption: a secure solution for real-time monitoring in Industry 4.0.
J. Real Time Image Process., August, 2023

Image Encryption Using Chaos Based Heuristic Diffusion.
SN Comput. Sci., May, 2023

Reconfigurable Architecture for DNA Diffusion Technique-Based Medical Image Encryption.
J. Circuits Syst. Comput., March, 2023

Cryptanalysis and improvement of REAS-TMIS: Resource-efficient authentication scheme for telecare medical information system.
Secur. Priv., 2023

Evaluation and performance analysis of Chinese remainder theorem and its application to lossless image compression.
J. Ambient Intell. Humaniz. Comput., 2023

2022
SEcure Similar Image Matching (SESIM): An Improved Privacy Preserving Image Retrieval Protocol over Encrypted Cloud Database.
IEEE Trans. Multim., 2022

Secure Covid-19 Electronic Health Records Management for Telediagnosis and Travel Ticket Assistant System Using Cryptographic Approaches.
SN Comput. Sci., 2022

A novel approach for Chaotic image Encryption based on block level permutation and bit-wise substitution.
Multim. Tools Appl., 2022

SafeCom: Robust mutual authentication and session key sharing protocol for underwater wireless sensor networks.
J. Syst. Archit., 2022

A chaos based image encryption algorithm using Rubik's cube and prime factorization process (CIERPF).
J. King Saud Univ. Comput. Inf. Sci., 2022

An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function.
Appl. Intell., 2022

2021
A secure medical image transmission scheme aided by quantum representation.
J. Inf. Secur. Appl., 2021

A novel chaotic butterfly network topology based block scrambling and crown graph based bit-wise diffusion for image encryption.
Frontiers Comput. Sci., 2021

Adaptive learning management expert system with evolving knowledge base and enhanced learnability.
Educ. Inf. Technol., 2021

2020
A novel dynamic chaotic image encryption using butterfly network topology based diffusion and decision based permutation.
Multim. Tools Appl., 2020

A novel conditional Butterfly Network Topology based chaotic image encryption.
J. Inf. Secur. Appl., 2020

Privacy preserving cloud based secure digital locker using Paillier based difference function and chaos based cryptosystem.
J. Inf. Secur. Appl., 2020

Improved real-time permission based malware detection and clustering approach using model independent pruning.
IET Inf. Secur., 2020

Analysis of zig-zag scan based modified feedback convolution algorithm against differential attacks and its application to image encryption.
Appl. Intell., 2020

A Novel Invisible Watermarking Approach for Double Authentication of Image Content.
Proceedings of the Machine Learning, Image Processing, Network Security and Data Sciences, 2020

An Edge Detection and Sliding Window Based Approach to Improve Object Localization in YOLOv3.
Proceedings of the Machine Learning, Image Processing, Network Security and Data Sciences, 2020

Detection and Classification of Faults in Photovoltaic System Using Random Forest Algorithm.
Proceedings of the Evolution in Computational Intelligence, 2020

Personalised Structure Balance Theory-Based Movie Recommendation System.
Proceedings of the Evolution in Computational Intelligence, 2020

An Unsupervised Searching Scheme over Encrypted Cloud Database.
Proceedings of the Evolution in Computational Intelligence, 2020

2019
Edge detection based boundary box construction algorithm for improving the precision of object detection in YOLOv3.
Proceedings of the 10th International Conference on Computing, 2019

2018
A novel Dynamic Key based chaotic image encryption.
J. Internet Serv. Inf. Secur., 2018

2016
A hybrid image encryption algorithm using chaos and Conway's game-of-life cellular automata.
Secur. Commun. Networks, 2016

Image encryption scheme based on block-based confusion and multiple levels of diffusion.
IET Comput. Vis., 2016

A chaos based image encryption and lossless compression algorithm using hash table and Chinese Remainder Theorem.
Appl. Soft Comput., 2016

2011
Genuine ARP (GARP): a broadcast based stateful authentication protocol.
ACM SIGSOFT Softw. Eng. Notes, 2011


  Loading...