default search action
John Bosco Balaguru Rayappan
Person information
- affiliation: SASTRA University, Thanjavur, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j37]Vaishnavi Kumar, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan, Padmapriya Praveenkumar:
Quantum true random number generation on IBM's cloud platform. J. King Saud Univ. Comput. Inf. Sci. 34(8 Part B): 6453-6465 (2022) - 2021
- [j36]Dhivya Ravichandran, Padmapriya Praveenkumar, Sundararaman Rajagopalan, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
ROI-based medical image watermarking for accurate tamper detection, localisation and recovery. Medical Biol. Eng. Comput. 59(6): 1355-1372 (2021) - [j35]Lakshmi Chandrasekaran, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Genetic and chaotic signatures in offspring - an encrypted generation of image family. Multim. Tools Appl. 80(6): 8581-8609 (2021) - [j34]R. Anushiadevi, Padmapriya Praveenkumar, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Uncover the cover to recover the hidden secret - A separable reversible data hiding framework. Multim. Tools Appl. 80(13): 19695-19714 (2021) - [j33]Lakshmi Chandrasekaran, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Sundararaman Rajagopalan, Rengarajan Amirtharajan, Nithya Chidambaram:
Neural-assisted image-dependent encryption scheme for medical image cloud storage. Neural Comput. Appl. 33(12): 6671-6684 (2021) - [j32]R. Santhiya Devi, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan, Padmapriya Praveenkumar:
MUX induced Ring oscillators for encrypted Nano communication via Quantum Dot Cellular Automata. Nano Commun. Networks 27: 100338 (2021) - [j31]Lakshmi Chandrasekaran, Karuppusamy Thenmozhi, C. Venkatesan, A. Seshadhri, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Mutated Cleavages of Images for Stealth Disclosure: A Hopfield Neural Network Attractor (HNNA) Approach. Neural Process. Lett. 53(2): 907-928 (2021) - 2020
- [j30]Rethinam Sivaraman, Sundararaman Rajagopalan, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Ring oscillator as confusion - diffusion agent: a complete TRNG drove image security. IET Image Process. 14(13): 2987-2997 (2020) - [j29]R. Anushiadevi, Padmapriya Pravinkumar, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
A high payload separable reversible data hiding in cipher image with good decipher image quality. J. Intell. Fuzzy Syst. 38(5): 6403-6414 (2020) - [j28]R. Anushiadevi, Padmapriya Praveenkumar, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Reversible data hiding method based on pixel expansion and homomorphic encryption. J. Intell. Fuzzy Syst. 39(3): 2977-2990 (2020) - [j27]Lakshmi Chandrasekaran, Vasudharini Moranam Ravi, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Con(dif)fused voice to convey secret: a dual-domain approach. Multim. Syst. 26(3): 301-311 (2020) - [j26]R. Santhiya Devi, A. R. Nirmal Aravind, J. Christopher Vishal, D. Amritha, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Amirtharajan Rengarajan, Padmapriya Praveenkumar:
Image encryption through RNA approach assisted with neural key sequences. Multim. Tools Appl. 79(17-18): 12093-12124 (2020) - [j25]Lakshmi Chandrasekaran, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Hopfield attractor-trusted neural network: an attack-resistant image encryption. Neural Comput. Appl. 32(15): 11477-11489 (2020) - [j24]Madhurantakam Sasya, K. S. Shalini Devi, Jayanth K. Babu, John Bosco Balaguru Rayappan, Uma Maheswari Krishnan:
Metabolic Syndrome - An Emerging Constellation of Risk Factors: Electrochemical Detection Strategies. Sensors 20(1): 103 (2020) - [j23]Parvathy Arulmozhi, N. Hemavathi, John Bosco Balaguru Rayappan, Pethuru Raj:
ALRC: A Novel Adaptive Linear Regression Based Classification for Grade based Student Learning using Radio Frequency Identification. Wirel. Pers. Commun. 112(4): 2091-2107 (2020) - [j22]Sivaraman Rethinam, Sundararaman Rajagopalan, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Hybrid Random Number Generation Architecture for Mobile Registration Controller: A Reconfigurable Hardware Realization. Wirel. Pers. Commun. 115(1): 239-266 (2020)
2010 – 2019
- 2019
- [j21]Lakshmi Chandrasekaran, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Open hiding for truncating hackers - a block truncation and wavelet approach. Multim. Tools Appl. 78(8): 9951-9969 (2019) - [j20]Sundararaman Rajagopalan, Shriramana Sharma, Sridevi Arumugham, Har Narayan Upadhyay, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
YRBS coding with logistic map - a novel Sanskrit aphorism and chaos for image encryption. Multim. Tools Appl. 78(8): 10513-10541 (2019) - [j19]Siva Janakiraman, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Indicator-based lightweight steganography on 32-bit RISC architectures for IoT security. Multim. Tools Appl. 78(22): 31485-31513 (2019) - [j18]Dhivya Ravichandran, Sundararaman Rajagopalan, Har Narayan Upadhyay, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Encrypted Biography of Biomedical Image - a Pentalayer Cryptosystem on FPGA. J. Signal Process. Syst. 91(5): 475-501 (2019) - [p2]R. Santhiya Devi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan, Padmapriya Praveenkumar:
A Novel Quantum Encryption and Authentication Framework Integrated with IoT. Security, Privacy and Trust in the IoT Environment 2019: 123-150 - [p1]Siva Janakiraman, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, V. Moorthi Paramasivam, Rengarajan Amirtharajan:
Realization of Chaos-Based Private Multiprocessor Network Via USART of Embedded Devices. Handbook of Multimedia Information Security 2019: 323-340 - 2018
- [j17]Lakshmi Chandrasekaran, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Encryption and watermark-treated medical image against hacking disease - An immune convention in spatial and frequency domains. Comput. Methods Programs Biomed. 159: 11-21 (2018) - [j16]Sridevi Arumugham, Sundararaman Rajagopalan, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Networked medical data sharing on secure medium - A web publishing mode for DICOM viewer with three layer authentication. J. Biomed. Informatics 86: 90-105 (2018) - [j15]Siva Janakiraman, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller. Microprocess. Microsystems 56: 1-12 (2018) - [j14]Sundararaman Rajagopalan, Sivaraman R, Har Narayan Upadhyay, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
ON-Chip peripherals are ON for chaos - an image fused encryption. Microprocess. Microsystems 61: 257-278 (2018) - [j13]Padmapriya Praveenkumar, N. Kerthana Devi, Dhivya Ravichandran, Jayapalan Avila, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Transreceiving of encrypted medical image - a cognitive approach. Multim. Tools Appl. 77(7): 8393-8418 (2018) - [j12]Balakrishnan Ramalingam, Dhivya Ravichandran, Arun Adhithiya Annadurai, Rengarajan Amirtharajan, John Bosco Balaguru Rayappan:
Chaos triggered image encryption - a reconfigurable security solution. Multim. Tools Appl. 77(10): 11669-11692 (2018) - [j11]Sundararaman Rajagopalan, Sivaraman Rethinam, Sridevi Arumugham, Har Narayan Upadhyay, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Networked hardware assisted key image and chaotic attractors for secure RGB image communication. Multim. Tools Appl. 77(18): 23449-23482 (2018) - 2017
- [j10]Padmapriya Praveenkumar, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Mojette (d) Secret Image "SEDIH" in an Encrypted Double Image - A Histo Approach. Int. J. Netw. Secur. 19(1): 47-59 (2017) - [j9]Balakrishnan Ramalingam, Rengarajan Amirtharajan, John Bosco Balaguru Rayappan:
Hybrid image crypto system for secure image communication- A VLSI approach. Microprocess. Microsystems 50: 1-13 (2017) - [j8]Padmapriya Praveenkumar, Rengarajan Amirtharajan, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan:
Fusion of confusion and diffusion: a novel image encryption approach. Telecommun. Syst. 65(1): 65-78 (2017) - [j7]Padmapriya Praveenkumar, P. Catherine Priya, Jayapalan Avila, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Tamper Proofing Identification and Authenticated DICOM Image Transmission Using Wireless Channels and CR Network. Wirel. Pers. Commun. 97(4): 5573-5595 (2017) - 2016
- [j6]Dhivya Ravichandran, Padmapriya Praveenkumar, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Chaos based crossover and mutation for securing DICOM image. Comput. Biol. Medicine 72: 170-184 (2016) - [j5]Balakrishnan Ramalingam, Rengarajan Amirtharajan, John Bosco Balaguru Rayappan:
Multiplexed stego path on reconfigurable hardware: A novel random approach. Comput. Electr. Eng. 55: 153-163 (2016) - 2015
- [j4]Padmapriya Praveenkumar, Rengarajan Amirtharajan, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan:
Medical data sheet in safe havens - A tri-layer cryptic solution. Comput. Biol. Medicine 62: 264-276 (2015) - [j3]Padmapriya Praveenkumar, Rengarajan Amirtharajan, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan:
Triple chaotic image scrambling on RGB - a random image encryption approach. Secur. Commun. Networks 8(18): 3335-3345 (2015) - 2013
- [j2]Martin Längkvist, Silvia Coradeschi, Amy Loutfi, John Bosco Balaguru Rayappan:
Fast Classification of Meat Spoilage Markers Using Nanostructured ZnO Thin Films and Unsupervised Feature Learning. Sensors 13(2): 1578-1592 (2013) - 2012
- [j1]Rengarajan Amirtharajan, John Bosco Balaguru Rayappan:
An intelligent chaotic embedding approach to enhance stego-image quality. Inf. Sci. 193: 115-124 (2012) - 2010
- [i1]Rengarajan Amirtharajan, Sandeep Kumar Behera, Motamarri Abhilash Swarup, Mohamed Ashfaaq K, John Bosco Balaguru Rayappan:
Colour Guided Colour Image Steganography. CoRR abs/1010.4007 (2010)
Coauthor Index
aka: Amirtharajan Rengarajan
aka: Padmapriya Pravinkumar
aka: Karuppuswamy Thenmozhi
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint