From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Thenmozhi, Karuppusamy
add a person with the name Thenmozhi, Karuppusamy
 

Другие публикации лиц с тем же именем

Person authentication using speech as a biometric against play back attacks., , и . Multim. Tools Appl., 78 (2): 1569-1582 (2019)Transreceiving of encrypted medical image - a cognitive approach., , , , , , и . Multim. Tools Appl., 77 (7): 8393-8418 (2018)Hybrid spectrum management using integrated fuzzy and femtocells in cognitive domain., , , и . J. Intell. Fuzzy Syst., 41 (6): 6079-6088 (2021)A new method for producing 320-bit modified hash towards tamper detection and restoration in colour images., , , и . Multim. Tools Appl., 80 (15): 23359-23375 (2021)Indicator-based lightweight steganography on 32-bit RISC architectures for IoT security., , , и . Multim. Tools Appl., 78 (22): 31485-31513 (2019)Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique., , , и . Int. J. Digit. Multim. Broadcast., (2016)Realization of Chaos-Based Private Multiprocessor Network Via USART of Embedded Devices., , , , и . Handbook of Multimedia Information Security, Springer, (2019)Hopfield attractor-trusted neural network: an attack-resistant image encryption., , , и . Neural Comput. Appl., 32 (15): 11477-11489 (2020)Image encryption through RNA approach assisted with neural key sequences., , , , , , , и . Multim. Tools Appl., 79 (17-18): 12093-12124 (2020)Open hiding for truncating hackers - a block truncation and wavelet approach., , , и . Multim. Tools Appl., 78 (8): 9951-9969 (2019)