default search action
S. Geetha 0001
Person information
- affiliation: Vellore Institute of Technology, School of Computing Science and Engineering, Chennai, India
- affiliation (former): Thiagarajar College of Engineering, Department of Information Technology, Madurai, India
Other persons with the same name
- S. Geetha — disambiguation page
- S. Geetha 0002 — Institute of Technology, Coimbatore, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]V. Sharmila, S. Geetha:
Gastro Intestinal Disease Classification Using Hierarchical Spatio Pyramid TranfoNet With PitTree Fusion and Efficient-CondConv SwishNet. IEEE Access 12: 113972-113987 (2024) - [j46]P. K. A. Chitra, S. Appavu alias Balamurugan, S. Geetha, Seifedine Kadry, Jungeun Kim, Keejun Han:
A Novel Framework for Learning and Classifying the Imbalanced Multi-Label Data. Comput. Syst. Sci. Eng. 48(5): 1367-1385 (2024) - [j45]D. Kavitha, S. Geetha, R. Geetha:
An adaptive neuro fuzzy methodology for the diagnosis of prenatal hypoplastic left heart syndrome from ultrasound images. Multim. Tools Appl. 83(10): 30755-30772 (2024) - [j44]D. Kavitha, S. Geetha, R. Geetha, Seifedine Nimer Kadry:
Dynamic neuro fuzzy diagnosis of fetal hypoplastic cardiac syndrome using ultrasound images. Multim. Tools Appl. 83(20): 59317-59333 (2024) - 2023
- [j43]Malathy Jawahar, L. Jani Anbarasi, S. Geetha:
Vision based leather defect detection: a survey. Multim. Tools Appl. 82(1): 989-1015 (2023) - [c15]Vishvesh Pathak, Uma Maheswari Balasubramanian, S. Geetha:
Ensemble Learning Based Social Engineering Fraud Detection Module for Cryptocurrency Transactions. MIKE 2023: 301-311 - 2022
- [j42]S. Geetha, Mansi Parashar, Js Abhishek, Raj Vishal Turaga, Isah Abdullahi Lawal, Seifedine Kadry:
Diabetic Retinopathy Grading with Deep Visual Attention Network. Int. J. Online Biomed. Eng. 18(9): 160-177 (2022) - [j41]G. Suganya, M. Premalatha, S. Geetha, G. Jignesh Chowdary, Seifedine Kadry:
Detection of COVID-19 Cases from Chest X-Rays using Deep Learning Feature Extractor and Multilevel Voting Classifier. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 30(5): 773-793 (2022) - [j40]S. Pradeepkumar Duraisamy, S. Geetha, Xiaochun Cheng, Seifedine Nimer Kadry:
On Shielding Android's Pending Intent from Malware Apps Using a Novel Ownership-Based Authentication. J. Circuits Syst. Comput. 31(13): 2250224:1-2250224:35 (2022) - [j39]Bhargavinath Dornadula, S. Geetha, L. Jani Anbarasi, Seifedine Kadry:
A Survey of COVID-19 Detection From Chest X-Rays Using Deep Learning Methods. Int. J. Data Warehous. Min. 18(1): 1-16 (2022) - [j38]Rajesh Kumar, Geetha Subbiah:
Zero-Day Malware Detection and Effective Malware Analysis Using Shapley Ensemble Boosting and Bagging Approach. Sensors 22(7): 2798 (2022) - [j37]Pradeepkumar Duraisamy Soundrapandian, Geetha Subbiah:
MULBER: Effective Android Malware Clustering Using Evolutionary Feature Selection and Mahalanobis Distance Metric. Symmetry 14(10): 2221 (2022) - [c14]Rajesh Kumar, Geetha Subbiah:
Explainable Machine Learning For Malware Detection Using Ensemble Bagging Algorithms. IC3 2022: 453-460 - 2021
- [j36]M. Maheswari, S. Geetha, S. Selva Kumar, Marimuthu Karuppiah, Debabrata Samanta, YoHan Park:
PEVRM: Probabilistic Evolution Based Version Recommendation Model for Mobile Applications. IEEE Access 9: 20819-20827 (2021) - [j35]S. Abijah Roseline, S. Geetha:
A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks. Comput. Electr. Eng. 92: 107143 (2021) - [j34]J. Hemalatha, S. Abijah Roseline, Subbiah Geetha, Seifedine Nimer Kadry, Robertas Damasevicius:
An Efficient DenseNet-Based Deep Learning Model for Malware Detection. Entropy 23(3): 344 (2021) - [j33]J. Hemalatha, S. Geetha, Sekar Mohan, S. Nivetha:
An Efficient Steganalysis of Medical Images by Using Deep Learning Based Discrete Scalable Alex Net Convolutionary Neural Networks Classifier. J. Medical Imaging Health Informatics 11(10): 2667-2674 (2021) - [j32]Malathy Jawahar, N. K. Chandra Babu, K. Vani, L. Jani Anbarasi, S. Geetha:
Vision based inspection system for leather surface defect detection using fast convergence particle swarm optimization ensemble classifier approach. Multim. Tools Appl. 80(3): 4203-4235 (2021) - [j31]R. Geetha, S. Geetha:
A multi-layered "plus-minus one" reversible data embedding scheme. Multim. Tools Appl. 80(9): 14123-14136 (2021) - [j30]S. Geetha, S. Subburam, S. Selvakumar, Seifedine Nimer Kadry, Robertas Damasevicius:
Steganogram removal using multidirectional diffusion in fourier domain while preserving perceptual image quality. Pattern Recognit. Lett. 147: 197-205 (2021) - 2020
- [j29]S. Abijah Roseline, S. Geetha, Seifedine Nimer Kadry, Yunyoung Nam:
Intelligent Vision-Based Malware Detection and Classification Using Deep Random Forest Paradigm. IEEE Access 8: 206303-206324 (2020) - [j28]J. Hemalatha, M. K. Kavitha Devi, S. Geetha:
Effective image stego intrusion detection system using statistical footprints of the steganogram and fusion of classifiers. Int. J. Comput. Aided Eng. Technol. 13(3): 325-340 (2020) - [j27]R. Geetha, S. Geetha:
Multi-Layered "Plus-Minus one" Reversible Data Embedding Scheme. J. Inf. Hiding Multim. Signal Process. 11(2): 58-69 (2020) - [j26]R. Geetha, S. Geetha:
Embedding electronic patient information in clinical images: an improved and efficient reversible data hiding technique. Multim. Tools Appl. 79(19-20): 12869-12890 (2020)
2010 – 2019
- 2019
- [j25]S. Koteeswaran, Malarvizhi N, E. Kannan, S. Sasikala, S. Geetha:
Data mining application on aviation accident data for predicting topmost causes for accidents. Clust. Comput. 22(5): 11379-11399 (2019) - [j24]J. Hemalatha, M. K. Kavitha Devi, S. Geetha:
Improving image steganalyser performance through curvelet transform denoising. Clust. Comput. 22(5): 11821-11839 (2019) - [j23]M. Maheswari, S. Geetha, S. Selvakumar:
Adaptable and proficient Hellinger Coefficient Based Collaborative Filtering for recommendation system. Clust. Comput. 22(5): 12325-12338 (2019) - [j22]J. Hemalatha, M. K. Kavitha Devi, S. Geetha:
Enhancing the JPEG image steganography security by RSA and attaining high payload using advanced DCT replacement method and modified quantisation table. Int. J. Bus. Intell. Data Min. 14(1/2): 138-154 (2019) - [j21]S. Appavu alias Balamurugan, P. K. A. Chitra, S. Geetha:
Multi label learning approaches for multi species avifaunal occurrence modelling: a case study of south eastern Tamil Nadu. Int. J. Bus. Intell. Data Min. 15(4): 449-477 (2019) - [j20]P. Punithavathi, S. Geetha, Marimuthu Karuppiah, SK Hafizul Islam, Mohammad Mehedi Hassan, Kim-Kwang Raymond Choo:
A lightweight machine learning-based authentication framework for smart IoT devices. Inf. Sci. 484: 255-268 (2019) - [j19]P. Punithavathi, S. Geetha:
Partial DCT-based cancelable biometric authentication with security and privacy preservation for IoT applications. Multim. Tools Appl. 78(18): 25487-25514 (2019) - [c13]S. Abijah Roseline, G. Hari, S. Geetha, R. Krishnamurthy:
Vision-Based Malware Detection and Classification Using Lightweight Deep Learning Paradigm. CVIP (2) 2019: 62-73 - [c12]S. Abijah Roseline, A. D. Sasisri, S. Geetha, C. Balasubramanian:
Towards Efficient Malware Detection and Classification using Multilayered Random Forest Ensemble Technique. ICCST 2019: 1-6 - 2018
- [j18]S. Geetha, P. Punithavathi, A. Magnus Infanteena, Siva S. Sivatha Sindhu:
A Literature Review on Image Encryption Techniques. Int. J. Inf. Secur. Priv. 12(3): 42-83 (2018) - [j17]S. Subburam, S. Selvakumar, S. Geetha:
High performance reversible data hiding scheme through multilevel histogram modification in lifting integer wavelet transform. Multim. Tools Appl. 77(6): 7071-7095 (2018) - [c11]S. Abijah Roseline, S. Geetha:
Intelligent Malware Detection using Oblique Random Forest Paradigm. ICACCI 2018: 330-336 - 2017
- [j16]S. Sasikala, S. Appavu alias Balamurugan, S. Geetha:
A novel adaptive feature selector for supervised classification. Inf. Process. Lett. 117: 25-34 (2017) - [j15]P. Punithavathi, S. Geetha:
Visual cryptography: A brief survey. Inf. Secur. J. A Glob. Perspect. 26(6): 305-317 (2017) - 2016
- [j14]S. Sasikala, S. Appavu alias Balamurugan, S. Geetha:
A novel memetic algorithm for discovering knowledge in binary and multi class predictions based on support vector machine. Appl. Soft Comput. 49: 407-422 (2016) - [j13]S. Muthuramalingam, N. Karthikeyan, S. Geetha, Siva S. Sivatha Sindhu:
Stego anomaly detection in images exploiting the curvelet higher order statistics using evolutionary support vector machine. Multim. Tools Appl. 75(21): 13627-13661 (2016) - [c10]P. Punithavathi, S. Geetha:
Cancelable Biometric Template Security Using Segment-Based Visual Cryptography. CVIP (1) 2016: 511-521 - [c9]P. Punithavathi, S. Geetha:
Dynamic sectored random projection for cancelable iris template. ICACCI 2016: 711-715 - [c8]R. Geetha, S. Geetha:
Multilevel RDH scheme using image interpolation. ICACCI 2016: 1952-1956 - [c7]Dolly Meghani, S. Geetha:
ECG Steganography to secure patient data in an E-Healthcare System. WIR 2016: 66-70 - 2014
- [j12]C. Balasubramanian, S. Selvakumar, S. Geetha:
High payload image steganography with reduced distortion using octonary pixel pairing scheme. Multim. Tools Appl. 73(3): 2223-2245 (2014) - [c6]Balasubramanian Chelliah, S. Geetha:
Enhancing E-Payment Security through Biometric Based Personal Authentication Using Steganography Scheme - B-PASS. SNDS 2014: 461-472 - 2013
- [c5]S. Sasikala, S. Appavu alias Balamurugan, S. Geetha:
RF-SEA-Based Feature Selection for Data Classification in Medical Domain. ICACNI 2013: 599-608 - [c4]S. Sasikala, S. Appavu alias Balamurugan, S. Geetha:
Performance Tuning of PCA by CFS-Shapley Ensemble and Its Application to Medical Diagnosis. PReMI 2013: 53-59 - 2012
- [j11]Siva S. Sivatha Sindhu, S. Geetha, Arputharaj Kannan:
Decision tree based light weight intrusion detection using a wrapper approach. Expert Syst. Appl. 39(1): 129-141 (2012) - [j10]Siva S. Sivatha Sindhu, S. Geetha, Arputharaj Kannan:
Evolving optimised decision rules for intrusion detection using particle swarm paradigm. Int. J. Syst. Sci. 43(12): 2334-2350 (2012) - [c3]S. Geetha, G. Geetha Ramani:
Trust based secure multipath OLSR routing protocol in MANET using fuzzy theory. CCSEIT 2012: 120-125 - 2011
- [j9]S. Geetha, V. Kabilan, S. P. Chockalingam, N. Kamaraj:
Varying radix numeral system based adaptive image steganography. Inf. Process. Lett. 111(16): 792-797 (2011) - [j8]S. Geetha, N. Kamaraj:
MBNS Steganogram Detection and Payload Capacity Estimation Exploiting the Statistical Moments of Entropy Measure. Inf. Secur. J. A Glob. Perspect. 20(2): 78-90 (2011) - 2010
- [j7]S. Geetha, N. Ishwarya, N. Kamaraj:
Audio steganalysis with Hausdorff distance higher order statistics using a rule based decision tree paradigm. Expert Syst. Appl. 37(12): 7469-7482 (2010) - [j6]S. Geetha, Siva S. Sivatha Sindhu, N. Kamaraj:
Passive steganalysis based on higher order image statistics of curvelet transform. Int. J. Autom. Comput. 7(4): 531-542 (2010) - [j5]S. Geetha, N. Ishwarya, N. Kamaraj:
Evolving decision tree rule based system for audio stego anomalies detection based on Hausdorff distance statistics. Inf. Sci. 180(13): 2540-2559 (2010) - [i1]S. Geetha, N. Kamaraj:
Optimized Image Steganalysis through Feature Selection using MBEGA. CoRR abs/1008.2824 (2010)
2000 – 2009
- 2009
- [j4]S. Geetha, Siva S. Sivatha Sindhu, N. Kamaraj:
Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system. Comput. Secur. 28(7): 683-697 (2009) - [j3]Siva S. Sivatha Sindhu, S. Geetha, M. Marikannan, Arputharaj Kannan:
A neuro-genetic based short-term forecasting framework for network intrusion prediction system. Int. J. Autom. Comput. 6(4): 406 (2009) - [j2]S. Geetha, Siva S. Sivatha Sindhu, N. Kamaraj:
Detection of Stego Anomalies in Images Exploiting the Content Independent Statistical Footprints of the Steganograms. Informatica (Slovenia) 33(1): 25-40 (2009) - [c2]S. Geetha, Siva S. Sivatha Sindhu, V. Kabilan, N. Kamaraj:
High Performance Image Steganalysis Through Stego Sensitive Feature Selection Using MBEGA. NetCoM 2009: 113-118 - 2008
- [j1]S. Geetha, Siva S. Sivatha Sindhu, N. Kamaraj:
Close Color Pair Signature ensemble Adaptive Threshold based Steganalsis for LSB Embedding in Digital Images. Trans. Data Priv. 1(3): 140-161 (2008) - 2006
- [c1]S. Geetha, Siva S. Sivatha Sindhu, Arputharaj Kannan:
An Active Rule Based Approach to Audio Steganalysis with a Genetic Algorithm. ICDIM 2006: 131-136
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint