Brindha Murugan
Orcid: 0000-0002-3952-0674Affiliations:
- National Institute of Technology, Tiruchirappalli, Tamilnadu, India
According to our database1,
Brindha Murugan
authored at least 40 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
REPACA: Robust ECC based privacy-controlled mutual authentication and session key sharing protocol in coalmines application with provable security.
Peer Peer Netw. Appl., November, 2024
Event Triggered Constrained Regulatory Control of Blood Glucose in Type I Diabetes Mellitus Condition.
Autom. Control. Comput. Sci., June, 2024
A novel image denoising algorithm based on least square generative adversarial network.
J. Real Time Image Process., May, 2024
Hierarchical Patch Selection: An Improved Patch Sampling for No Reference Image Quality Assessment.
IEEE Trans. Artif. Intell., February, 2024
Neural Comput. Appl., February, 2024
Secure authentication protocols to resist off-line attacks on authentication data table.
J. Comput. Secur., 2024
2023
Secure IoT-enabled sharing of digital medical records: An integrated approach with reversible data hiding, symmetric cryptosystem, and IPFS.
Internet Things, December, 2023
Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication Protocol for Telecare Medical Information System.
Cyber Secur. Appl., December, 2023
Frontiers Inf. Technol. Electron. Eng., November, 2023
Smart camera with image encryption: a secure solution for real-time monitoring in Industry 4.0.
J. Real Time Image Process., August, 2023
Reconfigurable Architecture for DNA Diffusion Technique-Based Medical Image Encryption.
J. Circuits Syst. Comput., March, 2023
Cryptanalysis and improvement of REAS-TMIS: Resource-efficient authentication scheme for telecare medical information system.
Secur. Priv., 2023
Privacy-preserving transfer learning-based secure quantum image retrieval in encrypted domain for cloud environment.
J. Electronic Imaging, 2023
Evaluation and performance analysis of Chinese remainder theorem and its application to lossless image compression.
J. Ambient Intell. Humaniz. Comput., 2023
2022
SEcure Similar Image Matching (SESIM): An Improved Privacy Preserving Image Retrieval Protocol over Encrypted Cloud Database.
IEEE Trans. Multim., 2022
Secure Covid-19 Electronic Health Records Management for Telediagnosis and Travel Ticket Assistant System Using Cryptographic Approaches.
SN Comput. Sci., 2022
A novel approach for Chaotic image Encryption based on block level permutation and bit-wise substitution.
Multim. Tools Appl., 2022
SafeCom: Robust mutual authentication and session key sharing protocol for underwater wireless sensor networks.
J. Syst. Archit., 2022
A chaos based image encryption algorithm using Rubik's cube and prime factorization process (CIERPF).
J. King Saud Univ. Comput. Inf. Sci., 2022
An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function.
Appl. Intell., 2022
2021
J. Inf. Secur. Appl., 2021
A novel chaotic butterfly network topology based block scrambling and crown graph based bit-wise diffusion for image encryption.
Frontiers Comput. Sci., 2021
Adaptive learning management expert system with evolving knowledge base and enhanced learnability.
Educ. Inf. Technol., 2021
2020
A novel dynamic chaotic image encryption using butterfly network topology based diffusion and decision based permutation.
Multim. Tools Appl., 2020
J. Inf. Secur. Appl., 2020
Privacy preserving cloud based secure digital locker using Paillier based difference function and chaos based cryptosystem.
J. Inf. Secur. Appl., 2020
Improved real-time permission based malware detection and clustering approach using model independent pruning.
IET Inf. Secur., 2020
Analysis of zig-zag scan based modified feedback convolution algorithm against differential attacks and its application to image encryption.
Appl. Intell., 2020
Proceedings of the Machine Learning, Image Processing, Network Security and Data Sciences, 2020
An Edge Detection and Sliding Window Based Approach to Improve Object Localization in YOLOv3.
Proceedings of the Machine Learning, Image Processing, Network Security and Data Sciences, 2020
Detection and Classification of Faults in Photovoltaic System Using Random Forest Algorithm.
Proceedings of the Evolution in Computational Intelligence, 2020
Proceedings of the Evolution in Computational Intelligence, 2020
Proceedings of the Evolution in Computational Intelligence, 2020
2019
Edge detection based boundary box construction algorithm for improving the precision of object detection in YOLOv3.
Proceedings of the 10th International Conference on Computing, 2019
2018
J. Internet Serv. Inf. Secur., 2018
2016
A hybrid image encryption algorithm using chaos and Conway's game-of-life cellular automata.
Secur. Commun. Networks, 2016
Image encryption scheme based on block-based confusion and multiple levels of diffusion.
IET Comput. Vis., 2016
A chaos based image encryption and lossless compression algorithm using hash table and Chinese Remainder Theorem.
Appl. Soft Comput., 2016
2011
ACM SIGSOFT Softw. Eng. Notes, 2011