Dr. Rengarajan Amirtharajan
My Social Links

Dr. Rengarajan Amirtharajan

Professor
SASTRA Deemed University, Thanjavur, Tamilnadu, India


Highest Degree
Ph.D. in Information Security from SASTRA Deemed to be University, India

Share this Profile



Advertisement
Event

Biography

Dr. R. Amirtharajan was born in Thanjavur, Tamil Nadu province India, in 1975. He received B.E. degree in Electronics and Communication Engineering from P.S.G. College of Technology, Bharathiyar University, Coimbatore, India in 1997 M.Tech and PhD from SASTRA University Thanjavur, India in 2007 and 2012 respectively. He joined SASTRA University, Thanjavur, Tamil Nadu, India (Previously Shanmugha College of Engineering) as a Lecturer in the Department of Electronics and Communication Engineering since 1997 and is now Associate Professor. His research interests include Image Processing, Information Hiding, Computer Communication and Network Security. So far, he filed one international patent; he has published more than 80 research articles in national and international journals and 18 IEEE conference papers with 4 Best Paper Awards. He also holds the Certificate of Appreciation from IBM in 2009 for Great Mind Challenge, Mentor IBM Academic Initiative Program. Recently, he received the Founder Chancellor Award for the best Ph.D. thesis for 2013 from SASTRA University and he received the SASTRA Anukul Puraskar for Higher Involvement in Research and Education Award for 2011-2012. He serves as a Life Member in CRSI, SSI, IAENG, and IACSIT. He also served as the TPC Member and Review Member for more than 30 IEEE and Springer supported international conferences apart from more than 10 peer reviewed journals. He is also working on funded project in the field of Steganography supported by DRDO, Government of India, New Delhi, India.

Area of Interest:

Computer Sciences
100%
Image Processing
62%
Information Hiding
90%
Computer Communication
75%
Network Security
55%

Research Publications in Numbers

Books
0
Chapters
27
Articles
210
Abstracts
96

Selected Publications

  1. Ramya, S., M. Doraipndian and R. Amirtharajan, 2023. LAPE2D: Lightweight authentication protocol to secure end and edge devices in Iot framework. Wireless Pers. Commun., 131: 2217-2239.
    CrossRef  |  Direct Link  |  
  2. Raj, V., S. Janakiraman and R. Amirtharajan, 2023. Reconfigurable color medical image encryptor using hardware accelerated Chao(S)-box triplets. J. Real-Time Image Process., Vol. 20. 10.1007/s11554-023-01278-8.
    CrossRef  |  Direct Link  |  
  3. Mohanraj, N., K.P. Kathirvelu, R. Balasubramanian, R. Sankaran and R. Amirtharajan, 2023. Design of permanent magnet brushless DC motor drive system for energy recouping in an electric automobile. Arabian J. Sci. Eng., 10.1007/s13369-022-07571-1.
    CrossRef  |  Direct Link  |  
  4. Manikandan, V. and R. Amirtharajan, 2023. Cartesian coordinated adaptive hiding for payload peaking. Multimedia Tools Appl., 10.1007/s11042-023-16208-w.
    CrossRef  |  Direct Link  |  
  5. Mahalingam, H., T. Veeramalai, A.R. Menon, S. Subashanthini and R. Amirtharajan, 2023. Dual-domain image encryption in unsecure medium-a secure communication perspective. Mathematics, Vol. 11. 10.3390/math11020457.
    CrossRef  |  Direct Link  |  
  6. Mahalingam, H., S. Rethinam, S. Janakiraman and A. Rengarajan, 2023. Non-identical inverter rings as an entropy source: NIST-90B-verified TRNG architecture on FPGAs for IoT device integrity. Mathematics, Vol. 11. 10.3390/math11041049.
    CrossRef  |  Direct Link  |  
  7. Mahalingam, H., P.V. Meikandan, K. Thenmozhi, K.M. Moria, C. Lakshmi, N. Chidambaram and R. Amirtharajan, 2023. Neural attractor-based adaptive key generator with DNA-coded security and privacy framework for multimedia data in cloud environments. Mathematics, Vol. 11. 10.3390/math11081769.
    CrossRef  |  Direct Link  |  
  8. Duraisamy, P., M.N. Santhanakrishnan, R. Amirtharajan and S. Ramasamy, 2023. Real-time implementation of deep reinforcement learning controller for speed tracking of robotic fish through data-assisted modeling. Proc. Inst. Mech. Eng., Part C: J. Mech. Eng. Sci., 10.1177/09544062231174127.
    CrossRef  |  Direct Link  |  
  9. Duraisamy, P., M.N. Santhanakrishnan and A. Rengarajan, 2023. Design of deep reinforcement learning controller through data-assisted model for robotic fish speed tracking. J. Bionic Eng., 20: 953-966.
    CrossRef  |  Direct Link  |  
  10. Banu, S.A., A.I. Al-Alawi, M. Padmaa, P.S. Priya, V. Thanikaiselvan and R. Amirtharajan, 2023. Healthcare with datacare-a triangular DNA security. Multimedia Tools Appl., 10.1007/s11042-023-16303-y.
    CrossRef  |  Direct Link  |  
  11. Anushiadevi, R. and R. Amirtharajan, 2023. Design and development of reversible data hiding- homomorphic encryption & rhombus pattern prediction approach. Multimedia Tools Appl., 249: 275-284.
    CrossRef  |  Direct Link  |  
  12. Vijay, R., V. Ramasamy, M. Selvaraj, R. Anbazhagan and A. Rengarajan, 2022. Development of low-profile spectral signature chipless flexible RFID prototype for 5G supply chain IoT applications. Eng. Sci. Technol. Int. J., Vol. 36. 10.1016/j.jestch.2022.101296.
    CrossRef  |  Direct Link  |  
  13. Veerasamy, G., R. Kannan, R. Siddharthan, G. Muralidharan, V. Sivanandam and R. Amirtharajan, 2022. Integration of genetic algorithm tuned adaptive fading memory Kalman filter with model predictive controller for active fault-tolerant control of cement kiln under sensor faults with inaccurate noise covariance. Math. Comput. Simul., 191: 256-277.
    CrossRef  |  Direct Link  |  
  14. Sridevi, A., R. Sivaraman, V. Balasubramaniam, Sreenithi, J. Siva, V. Thanikaiselvan and A. Rengarajan, 2022. On Chaos based duo confusion duo diffusion for colour images. Multimedia Tools Appl., 81: 16987-17014.
    CrossRef  |  Direct Link  |  
  15. Sivaraman, R., N. Adithya, S. Janakiraman and A. Rengarajan, 2022. Beat frequency detection on boolean chaotic oscillator for true random number generation on fpga. In: VLSI, Microwave and Wireless Technologies Brijesh Mishra, Manish Tiwari, Springer Nature Singapore Singapore, pp: 10.
    CrossRef  |  Direct Link  |  
  16. Saravanan, S., K. Ramkumar, K. Adalarasu, V. Sivanandam, S.R. Kumar, S. Stalin and R. Amirtharajan, 2022. A systematic review of artificial intelligence (AI) based approaches for the diagnosis of Parkinson’s disease. Arch. Computat. Methods Eng., 29: 3639-3653.
    CrossRef  |  Direct Link  |  
  17. Revathi, A., N. Sasikaladevi, D. Arunprasanth and R. Amirtharajan, 2022. Robust respiratory disease classification using breathing sounds (RRDCBS) multiple features and models. Neural Comput. Appl., 34: 8155-8172.
    CrossRef  |  Direct Link  |  
  18. Ravichandran, D., M. Padmaa, N. Rajagopal, V. Thanikaiselvan and R. Amirtharajan, 2022. Chaos and dna blended hybrid encryption algorithm for secure image transmission over dct pre-coded OFDM. Wireless Pers. Commun. 10.1007/s11277-022-10152-y.
    CrossRef  |  Direct Link  |  
  19. Ramasamy, V., R. Kannan, G. Muralidharan, R.K. Sidharthan, G. Veerasamy, S. Venkatesh and R. Amirtharajan, 2022. A comprehensive review on advanced process control of cement kiln process with the focus on MPC tuning strategies. J. Process Control, 121: 85-102.
    CrossRef  |  Direct Link  |  
  20. Ramasamy, V., R. Kannan, G. Muralidharan, R.K. Sidharthan and R. Amirtharajan, 2022. Two-tier search space optimisation technique for tuning of explicit plant-model mismatch in model predictive controller for industrial cement kiln process. Math. Comput. Simul., 193: 385-408.
    CrossRef  |  Direct Link  |  
  21. Paul, L.S.J., C. Gracias, A. Desai, V. Thanikaiselvan, S.S. Shanthini and A. Rengarajan, 2022. A novel colour image encryption scheme using dynamic DNA coding, chaotic maps, and SHA-2. Multimedia Tools Appl., 81: 37873-37894.
    CrossRef  |  Direct Link  |  
  22. Padmapriya, V.M., K. Thenmozhi, P. Praveenkumar and R. Amirtharajan, 2022. Misconstrued voice on SC-FDMA for secured comprehension-a cooperative influence of DWT and ECC. Multimedia Tools Appl., 81: 7201-7217.
    CrossRef  |  Direct Link  |  
  23. Manikandan, V. and R. Amirtharajan, 2022. A simple embed over encryption scheme for DICOM images using BÊlban Map. Med. Biol. Eng. Comput., 60: 701-717.
    CrossRef  |  Direct Link  |  
  24. Manikandan, C., A. Gamana, A. Sridevi and R. Amirtharajan, 2022. Design of tri-layer image encryption scheme using calendar month vowel count (CMVC) approach. Multimedia Tools Appl., 81: 10337-10371.
    CrossRef  |  Direct Link  |  
  25. Kumar, V., J.B.B. Rayappan, R. Amirtharajan and P. Praveenkumar, 2022. Quantum true random number generation on IBM's cloud platform. J. King Saud Univ.-Comput. Inf. Sci., 34: 6453-6465.
    CrossRef  |  Direct Link  |  
  26. Karthiga, R., K. Narasimhan and R. Amirtharajan, 2022. Diagnosis of breast cancer for modern mammography using artificial intelligence. Math. Comput. Simul., 202: 316-330.
    CrossRef  |  Direct Link  |  
  27. Arthi, G., V. Thanikaiselvan and R. Amirtharajan, 2022. 4D hyperchaotic map and DNA encoding combined image encryption for secure communication. Multimedia Tools Appl., 81: 15859-15878.
    CrossRef  |  Direct Link  |  
  28. Anushiadevi, R. and R. Amirtharajan, 2022. Separable reversible data hiding in an encrypted image using the adjacency pixel difference histogram. J. Inf. Secur. Appl. Vol. 72. 10.1016/j.jisa.2022.103407.
    CrossRef  |  Direct Link  |  
  29. Aashiqbanu, S., B.K. Murthy, G.B. Sai, G. Sowmya, K. Hemaswitha and R. Amirtharajan, 2022. Telugu DNA for safe delivery: A secured text communication. Wireless Pers. Commun., 127: 2873-2889.
    CrossRef  |  Direct Link  |  
  30. Ravichandran, D., S.A. Banu, B.K. Murthy, V. Balasubramanian, S. Fathima and R. Amirtharajan, 2021. An efficient medical image encryption using hybrid DNA computing and chaos in transform domain. Med. Biol. Eng. Comput., 59: 589-605.
    CrossRef  |  Direct Link  |  
  31. Ravichandran, D., P. Praveenkumar, S. Rajagopalan, J.B.B. Rayappan and R. Amirtharajan, 2021. ROI-based medical image watermarking for accurate tamper detection, localisation and recovery. Med. Biol. Eng. Comput., 59: 1355-1372.
    CrossRef  |  Direct Link  |  
  32. Raj, V., S. Janakiraman, S. Rajagopalan and R. Amirtharajan, 2021. Security analysis of reversible logic cryptography design with LFSR key on 32-bit microcontroller. Microprocess. Microsyst., Vol. 84. 10.1016/j.micpro.2021.104265.
    CrossRef  |  Direct Link  |  
  33. Patel, S., V. Thanikaiselvan, D. Pelusi, B. Nagaraj, R. Arunkumar and R. Amirtharajan, 2021. Colour image encryption based on customized neural network and DNA encoding. Neural Comput. Appl., 33: 14533-14550.
    CrossRef  |  Direct Link  |  
  34. Manikandan, V. and R. Amirtharajan, 2021. On dual encryption with RC6 and combined logistic tent map for grayscale and DICOM. Multimedia Tools Appl., 80: 23511-23540.
    CrossRef  |  Direct Link  |  
  35. Lakshmi, C., K. Thenmozhi, J.B.B. Rayappan, S. Rajagopalan, R. Amirtharajan and N. Chidambaram, 2021. Neural-assisted image-dependent encryption scheme for medical image cloud storage. Neural Comput. Appl., 33: 6671-6684.
    CrossRef  |  Direct Link  |  
  36. Lakshmi, C., K. Thenmozhi, C. Venkatesan, A. Seshadhri, J.B.B. Rayappan and R. Amirtharajan, 2021. Mutated cleavages of images for stealth disclosure: A hopfield neural network attractor (HNNA) approach. Neural Process. Lett., 53: 907-928.
    CrossRef  |  Direct Link  |  
  37. Kathirvelu, K.P., G.G.V. Sandeep, J. Swathi, R. Amirtharajan and R. Balasubramanian, 2021. Design of transformer for wireless power transfer in electric vehicles. Iran J. Sci. Technol. Trans Electr. Eng., 45: 1311-1324.
    CrossRef  |  Direct Link  |  
  38. Chidambaram, N., P. Raj, K. Thenmozhi and R. Amirtharajan, 2021. A new method for producing 320-bit modified hash towards tamper detection and restoration in colour images. Multimedia Tools Appl., 80: 23359-23375.
    CrossRef  |  Direct Link  |  
  39. Banu, S.A. and R. Amirtharajan, 2021. Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data. Front. Inf. Technol. Electron. Eng., 22: 940-956.
    CrossRef  |  Direct Link  |  
  40. Aparna, H., B. Bhumijaa, R. Santhiyadevi, K. Vaishanavi, M. Sathanarayanan, A. Rengarajan, P. Praveenkumar and A.A. Abd El-Latif, 2021. Double layered Fridrich structure to conserve medical data privacy using quantum cryptosystem. J. Inf. Secur. Appl., Vol. 63. 10.1016/j.jisa.2021.102972.
    CrossRef  |  Direct Link  |  
  41. Anushiadevi, R., P. Praveenkumar, J.B.B. Rayappan and R. Amirtharajan, 2021. Uncover the cover to recover the hidden secret-A separable reversible data hiding framework. Multimedia Tools Appl., 80: 19695-19714.
    CrossRef  |  Direct Link  |  
  42. Sivaraman, R., S. Rajagopalan, A. Sridevi, J.B.B. Rayappan, M.P.V. Annamalai and A. Rengarajan, 2019. Metastability-Induced TRNG Architecture on FPGA. Iran. J. Sci. Technol. Trans. Electr. Eng. 10.1007/s40998-019-00234-2.
    CrossRef  |  Direct Link  |  
  43. Ravichandran, D., S. Rajagopalan, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2019. Encrypted biography of biomedical image-a pentalayer cryptosystem on FPGA. J. Signal Process. Syst., 91: 475-501.
    CrossRef  |  Direct Link  |  
  44. Rajagopalan, S., S. Sharma, S. Arumugham, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2019. YRBS coding with logistic map-a novel Sanskrit aphorism and chaos for image encryption. Multimedia Tools Applic., 78: 10513-10541.
    CrossRef  |  Direct Link  |  
  45. Lakshmi, C., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2019. Open hiding for truncating hackers-a block truncation and wavelet approach. Multimedia Tools Applic., 78: 9951-9969.
    CrossRef  |  Direct Link  |  
  46. Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2019. Indicator-based lightweight steganography on 32-bit RISC architectures for IoT security. Multimedia Tools Applic. 10.1007/s11042-019-07960-z.
    CrossRef  |  Direct Link  |  
  47. Guhan, S., S. Arumugham, S. Janakiraman, A. Rengarajan and S. Rajagopalan, 2019. A trio approach satisfying CIA triad for medical image security. Lecture Notes Comput. Vision Biomech., 32: 1109-1121.
    CrossRef  |  Direct Link  |  
  48. Devi, R.S., K. Thenmozhi, J.B.B. Rayappan, R. Amirtharajan and P. Praveenkumar, 2019. Entropy influenced RNA diffused quantum chaos to conserve medical data privacy. Int. J. Theor. Phys., 58: 1937-1956.
    CrossRef  |  Direct Link  |  
  49. Balasubramanian, R., K. Parkavikathirvelu, R. Sankaran and R. Amirtharajan, 2019. Design, simulation and hardware implementation of shunt hybrid compensator using Synchronous Rotating Reference Frame (SRRF)-based control technique. Electronics, Vol. 8, No. 1. 10.3390/electronics8010042.
    CrossRef  |  Direct Link  |  
  50. Arumugham, S., S. Rajagopalan, J.B.B. Rayappan and R. Amirtharajan, 2019. Tamper-resistant secure medical image carrier: An IWT-SVD-chaos-FPGA combination. Arabian J. Sci. Eng., 44: 9561-9580.
    CrossRef  |  Direct Link  |  
  51. Revathy, K., K. Thenmozhi, R. Amirtharajan and P. Praveenkumar, 2018. CR assisted IE guarded authenticated biomedical image transactions. IEEE Photonics J., 10: 1-13.
  52. Ramalingam, B., D. Ravichandran, A.A. Annadurai, A. Rengarajan and J.B.B. Rayappan, 2018. Chaos triggered image encryption-a reconfigurable security solution. Multimedia Tools Applic., 77: 11669-11692.
    CrossRef  |  Direct Link  |  
  53. Rajagopalan, S., S. Rethinam, S. Arumugham, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2018. Networked hardware assisted key image and chaotic attractors for secure RGB image communication. Multimedia Tools Applic., 77: 23449-23482.
    CrossRef  |  Direct Link  |  
  54. Rajagopalan, S., R. Sivaraman, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2018. ONChip peripherals are ON for chaos-an image fused encryption. Microprocessors Microsyst., 61: 257-278.
    CrossRef  |  Direct Link  |  
  55. Praveenkumar, P., N.K. Devi, D. Ravichandran, J. Avila, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2018. Transreceiving of encrypted medical image-A cognitive approach. Multimedia Tools Applic., 77: 8393-8418.
    CrossRef  |  Direct Link  |  
  56. Lakshmi, C., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2018. Encryption and watermark-treated medical image against hacking disease-An immune convention in spatial and frequency domains. Comput. Methods Programs Biomed., 159: 11-21.
    CrossRef  |  Direct Link  |  
  57. Kumari, A., B. Akshaya, B. Umamaheswari, K. Thenmozhi, R. Amirtharajan and P. Praveenkumar, 2018. 3D Lorenz map governs DNA Rule in encrypting DICOM images. Biomed. Pharmacol. J., 11: 897-906.
    CrossRef  |  Direct Link  |  
  58. Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2018. Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller. Microprocessors Microsyst., 56: 1-12.
    CrossRef  |  Direct Link  |  
  59. Dhivya, R., V. Padmapriya, R. Sundararaman, J.B.B. Rayappan and R. Amirtharajan, 2018. Chaos assisted variable bit steganography in transform domain. Electron. Lett., 54: 1332-1334.
    CrossRef  |  Direct Link  |  
  60. Arumugham, S., S. Rajagopalan, J.B.B. Rayappan and R. Amirtharajan, 2018. Networked medical data sharing on secure medium-A web publishing mode for DICOM viewer with three layer authentication. J. Biomed. Inform., 86: 90-105.
    CrossRef  |  Direct Link  |  
  61. Sridevi, R., P. Philominathan, P. Praveenkumar, J.B.B. Rayappan and R. Amirtharajan, 2017. Logistic and standard coupled mapping on pre and post shuffled images: A method of image encryption. Asian J. Sci. Res., 10: 10-23.
    CrossRef  |  Direct Link  |  
  62. Shaik, A., V. Thanikaiselvan and R. Amitharajan, 2017. Data security through data hiding in images: A review. J. Artif. Intell., 10: 1-21.
    CrossRef  |  Direct Link  |  
  63. Revathy, K., K. Thenmozhi, P. Praveenkumar and R. Amirtharajan, 2017. Secured emergency based adaptive batch and fuzzy inference system management in cognitive radio. Asian J. Sci. Res., 10: 70-78.
    CrossRef  |  
  64. Ravichandran, D., P. Praveenkumar, J.B.B. Rayappan and R. Amirtharajan, 2017. DNA chaos blend to secure medical privacy. IEEE Trans. NanoBiosci., 10.1109/TNB.2017.2780881.
    CrossRef  |  Direct Link  |  
  65. Ramalingam, B., D. Ravichandran, A.A. Annadurai, A. Rengarajan and J.B.B. Rayappan, 2017. Chaos triggered image encryption - a reconfigurable security solution. Multimedia Tools Appli., 10.1007/s11042-017-4811-x.
    CrossRef  |  Direct Link  |  
  66. Ramalingam, B., A. Rengarajan and J.B.B. Rayappan, 2017. Hybrid image crypto system for secure image communication: A VLSI approach. Microprocess. Microsyst., 50: 1-13.
    CrossRef  |  Direct Link  |  
  67. Praveenkumar, P., N.K. Devi, D. Ravichandran, J. Avila, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2017. Transreceiving of encrypted medical image - a cognitive approach. Multimedia Tools Appli., 10.1007/s11042-017-4741-7.
    CrossRef  |  Direct Link  |  
  68. Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2017. Mojette (d) secret image “SEDIH” in an encrypted double image: A histo approach. Int. J. Network Secur., 19: 47-59.
    CrossRef  |  Direct Link  |  
  69. Anushiadevi, R., P. Praveenkumar, J.B.B. Rayappan and R. Amirtharajan, 2017. Reversible secret data hiding based on adjacency pixel difference. J. Artif. Intell., 10: 22-31.
    CrossRef  |  Direct Link  |  
  70. Ravichandran, D., P. Praveenkumar, J.B.B. Rayappan and R. Amirtharajan, 2016. Chaos based crossover and mutation for securing DICOM image. Comput. Biol. Med., 72: 170-184.
    CrossRef  |  PubMed  |  Direct Link  |  
  71. Ramalingam, B., R. Amirtharajan and J.B.B. Rayappan, 2016. Multiplexed stego path on reconfigurable hardware: A novel random approach. Comput. Electr. Eng., 10.1016/j.compeleceng.2016.02.010.
    CrossRef  |  Direct Link  |  
  72. Praveenkumar, P., R. Nisha, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2016. Image merger encryptor: A chaotic and chebyshev key approach. Res. J. Inform. Technol., 8: 10-16.
    CrossRef  |  Direct Link  |  
  73. Praveenkumar, P., P. Rajalakshmi, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2016. Horse DNA runs on image: A novel road to image encryption. Res. J. Inform. Technol., 8: 1-9.
    CrossRef  |  Direct Link  |  
  74. Chidambaram, N., P. Raj, K. Thenmozhi and R. Amirtharajan, 2016. Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique. Int. J. Digital Multimedia Broadcast. 10.1155/2016/8789397.
    CrossRef  |  Direct Link  |  
  75. Shanthini, S., R. Balasubramanian, K.P. Kathirvelu and R. Amirtharajan, 2015. Multi fed power electronic transformer for modern power distribution system. Int. J. Appl. Eng. Res., 10: 24113-24124.
  76. Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2015. Triple chaotic image scrambling on RGB: A random image encryption approach. Secur. Commun. Networks. 10.1002/sec.1257.
    CrossRef  |  Direct Link  |  
  77. Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2015. Pixel scattering matrix formalism for image encryption-a key scheduled substitution and diffusion approach. AEU-Int. J. Electron. Commun., 69: 562-572.
    CrossRef  |  Direct Link  |  
  78. Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2015. Medical data sheet in safe havens-a tri-layer cryptic solution. Comput. Biol. Med., 62: 264-276.
    CrossRef  |  Direct Link  |  
  79. Praveenkumar, P., G.U. Priyanga, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2015. Chain of shuffling and chaos: A tied encryptic approach. Asian J. Scient. Res., 8: 359-366.
    CrossRef  |  Direct Link  |  
  80. Kumar, S.S., K.P. Kathirvelu, R. Balasubramanian and R. Amirtharajan, 2015. Design of a PV based zero-voltage switching converter fed DC microgrid. Int. J. Appl. Eng. Res., 10: 22799-22812.
  81. Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2015. Light weight steganography on RISC platform-implementation and analysis. Asian J. Scient. Res., 8: 278-290.
    CrossRef  |  Direct Link  |  
  82. Deenadayalan, R., K.P. Kathirvelu, R. Balasubramanian and R. Amirtharajan, 2015. A distributed control strategy for coordination of an autonomous LVDC system. Int. J. Appl. Eng. Res., 10: 22489-22502.
  83. Venkatesh, V., P. Raj, V. Vaithiyanathan and R. Amirtharajan, 2014. Smarter environments: A compact service-oriented framework for context-awareness. J. Artif. Intell., 7: 145-160.
    CrossRef  |  
  84. Venkatesh, V., P. Raj, V. Vaithiyanathan and R. Amirtharajan, 2014. Biosensors for gas detection: A smart approach towards kitchen security. J. Artif. Intell., 7: 172-181.
    CrossRef  |  
  85. Venkatesh, S., S.R. Warier, K. Ramkumar and R. Amirtharajan, 2014. Model identification and predictive controller design for a nonlinear process. Res. J. Inform. Technol., 6: 178-187.
    CrossRef  |  Direct Link  |  
  86. Thanikaiselvan, V., S. Subashanthini and R. Amirtharajan, 2014. PVD based steganography on scrambled RGB cover images with pixel indicator. J. Artif. Intell., 7: 54-68.
    CrossRef  |  Direct Link  |  
  87. Thanikaiselvan, V., P. Arulmozhivarman, S. Chakrabarty, A. Agarwa, S. Subashanthini and R. Amirtharajan, 2014. Comparative analysis of (5/3) and Haar IWT based steganography. Inform. Technol. J., 13: 2534-2543.
    CrossRef  |  Direct Link  |  
  88. Sivanandam Venkatesh, K. Ramkumar, Rengarajan Amirtharajan 2014. Design of Controllers Based on the Identified Model for the Humidifying Pilot Plant J. Applied Sci., 14: 2530-2535.
    CrossRef  |  
  89. Ramalingam, B., R. Amirtharajan and J.B.B. Rayappan, 2014. Stego on FPGA: An IWT approach. Sci. World J. 10.1155/2014/192512.
    CrossRef  |  Direct Link  |  
  90. Ramalingam, B., R. Amirtharajan and J.B.B. Rayappan, 2014. LCC-LSB-FPGA stego-A reconfigurable security. J. Applied Sci., 14: 2139-2148.
    CrossRef  |  Direct Link  |  
  91. Rajagopalan, S., Y. Ravishankar, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Modeling combo PR generator for Stego Storage Self Test (SSST). Inform. Technol. J., 13: 1936-1944.
    CrossRef  |  Direct Link  |  
  92. Rajagopalan, S., S. Janakiraman, B. Swaminath, H.N. Upadhyay, K. Thenmozhi and R. Amirtharajan, 2014. LabVIEW based PIN hider on ATM cards: A transform domain secret concealment approach. Res. J. Inform. Technol., 6: 154-165.
    CrossRef  |  Direct Link  |  
  93. Rajagopalan, S., P.J.S. Prabhakar, M.S. Kumar, N.V.M. Nikhil, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. MSB based embedding with integrity: An adaptive RGB Stego on FPGA platform. Inform. Technol. J., 13: 1945-1952.
    CrossRef  |  Direct Link  |  
  94. Rajagopalan, S., K. Pravallika, R. Radha, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Stego on song-an amalgam of VI and FPGA for hardware info hide. Inform. Technol. J., 13: 1992-1998.
    CrossRef  |  Direct Link  |  
  95. Rajagopalan, S., H.N. Upadhyay, S. Varadarajan, J.B.B. Rayappan and R. Amirtharajan, 2014. Gyratory assisted info hide-a nibble differencing for message embedding. Inform. Technol. J., 13: 2005-2010.
    CrossRef  |  Direct Link  |  
  96. Rajagopalan, S., H.N. Upadhyay, R. Ragavan, R. Amirtharajan and J.B.B. Rayappan, 2014. Layer router for grayscale stego-A hardware architecture on FPGA and ASIC platforms. J. Sci. Ind. Res., 73: 701-703.
    Direct Link  |  
  97. Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Logic elements consumption analysis of cellular automata based image encryption on FPGA. Res. J. Inform. Technol., 6: 291-307.
    CrossRef  |  Direct Link  |  
  98. Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Galois field proficient product for secure image encryption on FPGA. Res. J. Inform. Technol., 6: 308-324.
    CrossRef  |  Direct Link  |  
  99. Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Dual cellular automata on FPGA: An image encryptors chip. Res. J. Inform. Technol., 6: 223-236.
    CrossRef  |  Direct Link  |  
  100. Raja, L.P., R. Balasubramanian, K.P. Kathirvelu and R. Amirtharajan, 2014. SVPWM based stator oriented non-linear control of induction motor drives. Inform. Technol. J., 13: 2574-2580.
    CrossRef  |  
  101. Praveenkumar, P., R. Hemalatha, R. Uma, K. Madhunisha, K. Thenmozhi and R. Amirtharajan, 2014. Image Zoning→ encryption. Res. J. Inform. Technol., 6: 368-378.
    CrossRef  |  Direct Link  |  
  102. Praveenkumar, P., R. Deepak, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Reversible steganography on OFDM channel: A role of cyclic codes. Inform. Technol. J., 13: 2047-2051.
    CrossRef  |  Direct Link  |  
  103. Praveenkumar, P., R. Amirtharajan, R.S. Janani, K. Thenmozhi and J.B.B. Rayappan, 2014. Multi (Carrier+Modulator) adaptive system-an anti fading stego approach. J. Applied Sci., 14: 1836-1843.
    CrossRef  |  Direct Link  |  
  104. Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Sub carriers carry secret: An absolute stego approach. J. Applied Sci., 14: 1728-1735.
    CrossRef  |  Direct Link  |  
  105. Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Double layer encoded encrypted data on multicarrier channel. J. Applied Sci., 14: 1689-1700.
    CrossRef  |  Direct Link  |  
  106. Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Coded crypted converted hiding (C3H)-a stego channel. J. Applied Sci., 14: 1786-1797.
    CrossRef  |  Direct Link  |  
  107. Praveenkumar, P., P. Rajalakshmi, G.U. Priyanga, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Least significant bit but quantum bit: A Quasi stego. Inform. Technol. J., 13: 2544-2551.
    CrossRef  |  Direct Link  |  
  108. Praveenkumar, P., K. Thenmozhi, T. Parvatha, K. Ganapriya and R. Amirtharajan, 2014. Encrypted RS and cyclic doubles in OFDM-a channel variable approach. Proceedings of the International Conference on Communications and Signal Processing, April 3-5, 2014, Melmaruvathur, India, pp: 232-236.
    CrossRef  |  Direct Link  |  
  109. Praveenkumar, P., K. Thenmozhi, R. Ramya, B.C. Kavitha and R. Amirtharajan, 2014. Race among error control codes in OFDM-role of modulation techniques. Proceedings of the International Conference on Communications and Signal Processing, April 3-5, 2014, Melmaruvathur, India, pp: 237-241.
    CrossRef  |  Direct Link  |  
  110. Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Why information security demands transform domain, compression and encryption? J. Artif. Intell., 7: 136-144.
    CrossRef  |  Direct Link  |  
  111. Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Stego in multicarrier: A phase hidden communication. Inform. Technol. J., 13: 2011-2016.
    CrossRef  |  Direct Link  |  
  112. Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Spread and hide-a stego transceiver. Inform. Technol. J., 13: 2061-2064.
    CrossRef  |  Direct Link  |  
  113. Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Reversible steganography on OFDM channel-a role of RS coding. Inform. Technol. J., 13: 2052-2056.
    CrossRef  |  Direct Link  |  
  114. Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Purposeful error on OFDM: A secret channel. Inform. Technol. J., 13: 1985-1991.
    CrossRef  |  Direct Link  |  
  115. Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Inserted embedding in OFDM channel: A multicarrier stego. Inform. Technol. J., 13: 2017-2021.
    CrossRef  |  Direct Link  |  
  116. Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Data puncturing in OFDM channel: A multicarrier stego. Inform. Technol. J., 13: 2037-2041.
    CrossRef  |  Direct Link  |  
  117. Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Cryptic cover for covered writing: A pre-layered stego. Inform. Technol. J., 13: 2524-2533.
    CrossRef  |  Direct Link  |  
  118. Praveenkumar, P., K. Thenmozhi, J.A. Zami and R. Amirtharajan, 2014. Blend of error control codes in OFDM-effect of channel-A comparative approach. Proceedings of the International Conference on Communications and Signal Processing, April 3-5, 2014, Melmaruvathur, India, pp: 223-226.
    CrossRef  |  Direct Link  |  
  119. Praveenkumar, P., G.S. Hemalatha, B. Reddy, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Secret link through simulink: A stego on OFDM channel. Inform. Technol. J., 13: 1999-2004.
    CrossRef  |  Direct Link  |  
  120. Praveenkumar, P., G. Ashwin, S.P.K. Agarwal, S.N. Bharathi, V.S. Venkatachalam, K. Thenmozhi and R. Amirtharajan, 2014. Rubik's cube blend with logistic map on RGB: A way for image encryption. Res. J. Inform. Technol., 6: 207-215.
    CrossRef  |  Direct Link  |  
  121. Mathiyalagan, G., S. Venkatesh, K. Ramkumar and R. Amirtharajan, 2014. Modeling and simulation of shunt active filter for non linear load. Res. J. Inform. Technol., 6: 216-222.
    CrossRef  |  Direct Link  |  
  122. Lakshmi, C., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Identification of 12+18+206+1 characters of dravidian semmozhi-image processing trip to South India. Inf. Technol. J., 13: 1961-1968.
    CrossRef  |  Direct Link  |  
  123. Kathirvelu, K.P., R. Balasubramanian, O. Apurna and R. Amritharajan, 2014. Fuzzy logic controller based power conversion system fed from fuel cell. J. Applied Sci., 14: 1736-1742.
    CrossRef  |  Direct Link  |  
  124. Janakiraman, S., K.V.S.K. Kumar, R.R.K. Reddy, A. Srinivasulu, R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Humming bird with coloured wings: A feedback security approach. Inform. Technol. J., 13: 2022-2026.
    CrossRef  |  Direct Link  |  
  125. Janakiraman, S., K. Thenmozhi, S. Rajagopalan, H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan, 2014. Space filling curve for data filling: An embedded security approach. Res. J. Inform. Technol., 6: 188-197.
    CrossRef  |  Direct Link  |  
  126. Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Graphical password authentication scheme for embedded platform. J. Artif. Intell., 7: 161-171.
    CrossRef  |  Direct Link  |  
  127. Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Audio fingerprint indicator in embedded platform: A way for hardware steganography. J. Artif. Intell., 7: 82-93.
    CrossRef  |  Direct Link  |  
  128. Janakiraman, S., J. Chakravarthy, B. Radhakrishnan, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Cover as key and key as data: An inborn stego. Inform. Technol. J., 13: 1969-1976.
    CrossRef  |  Direct Link  |  
  129. Balasubramanian, R., K.P. Kathirvelu and R. Amirtharajan, 2014. Analysis of multi level current source inverter: A critic based on various PWM control strategies. Res. J. Inform. Technol., 6: 166-177.
    CrossRef  |  Direct Link  |  
  130. Balasubramanian, R., K.P. Karthirvelu, N. Divya, R. Amirtharajan and S. Palani, 2014. Fuzzy controller based switched boost converter with reduced harmonics for micro grid application. J. Applied Sci., 14: 1928-1935.
    CrossRef  |  Direct Link  |  
  131. Arthishri, K., R. Balasubramanian, P. Kathirvelu, S.P. Simon and R. Amirtharajan, 2014. Maximum power point tracking of photovoltaic generation system using artificial neural network with improved tracking factor. J. Applied Sci., 14: 1858-1864.
    Direct Link  |  
  132. Amirtharajan, R., M.S.K. Karthik, L. Radhika and J.B.B. Rayappan, 2014. Is facebook-a global library? Inf. Technol. J., 13: 2027-2031.
    CrossRef  |  Direct Link  |  
  133. Amirtharajan, R., I. Rosaline, R. Swamy, S. Pavan and R. Sridevi et al., 2014. Cover G for 3 and 4 G-A Stego Product Inf. Technol. J., 13: 1977-1984.
    CrossRef  |  Direct Link  |  
  134. Amirtharajan, R., B.G.P. Reddy, G. Chandramowliswaran, S. Hemamalini, P. Rajalakshmi, G.U. Priyanga and P. Raman, 2014. A novel audio steg for secret communication. Proceedings of the International Conference on Communications and Signal Processing, April 3-5, 2014, Melmaruvathur, pp: 251-254.
    CrossRef  |  Direct Link  |  
  135. Aarthie, N. and R. Amirtharajan, 2014. Image encryption: An information security perceptive. J. Artif. Intell., 7: 123-135.
    CrossRef  |  Direct Link  |  
  136. Venkatesh, V., V. Vaithayanathan, P. Raj, K. Gopalan and R. Amirtharajan, 2013. Envisioning smart hotels through spontaneous device integration. Res. J. Inform. Technol., 5: 226-233.
    CrossRef  |  Direct Link  |  
  137. Venkatesh, V., V. Vaithayanathan, P. Raj, K. Gopalan and R. Amirtharajan, 2013. A smart train using the DPWS-based sensor integration. Res. J. Inform. Technol., 5: 352-362.
    CrossRef  |  Direct Link  |  
  138. Venkatesh, V., V. Vaithayanathan, P. Raj and R. Amirtharajan, 2013. An ambient assisted living for smart home to wealthy life: A short review. Res. J. Inform. Technol., 5: 1-11.
    CrossRef  |  Direct Link  |  
  139. Thanikaiselvan, V., P. Arulmozhivarman, S. Subashanthini and R. Amirtharajan, 2013. Vibrational spectroscopic, first-order hyperpolarizability and HOMO, LUMO studies of 1,2-dichloro-4-nitrobenzene based on Hartree-Fock and DFT calculations. Sci. World J., Vol. 2013. 10.1155/2013/464107.
    CrossRef  |  Direct Link  |  
  140. Thanikaiselvan, V., K. Santosh, D. Manikanta and R. Amirtharajan, 2013. A new steganography algorithm against chi square attack. Res. J. Inform. Technol., 5: 363-372.
    CrossRef  |  Direct Link  |  
  141. Rajagopalan, S., S. Janakiraman, B. Swaminath, H.N. Upadhyay, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2013. LabVIEW based PIN hider on ATM cards-a transform domain secret concealment approach. Proceedings of the International Conference on the Changing Paradigms of Technology and Strategic Management, August 30-31, 2013, Tamilnadu, India -.
  142. Raj, P., V. Venkatesh and R. Amirtharajan, 2013. Envisioning the Cloud-Induced Transformations in the Software Engineering Discipline. In: Software Engineering Frameworks for the Cloud Computing Paradigm, Mahmood, Z. and S. Saeed (Eds.). Springer, London, ISBN: 978-1-4471-5030-5, pp: 25-53.
  143. Raj, P., C. Nithya, A. Parvathy, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2013. Elucidating the robust and resilient cloud security solution approaches. Res. J. Inform. Technol., 5: 442-448.
    CrossRef  |  Direct Link  |  
  144. Praveenkumar, P., S. Naveenbharathi, V.S. Venkatachalam, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2013. Hiding in real for safe guarding reality-a stego perspective. Proceedings of the International Conference on the Changing Paradigms of Technology and Strategic Management, August 30-31, 2013, Tamilnadu, India -.
  145. Praveenkumar, P., R. Archana, R.S. Janani, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2013. It is all hiding-an adaptive stego. Proceedings of the International Conference on the Changing Paradigms of Technology and Strategic Management, August 30-31, 2013, Tamilnadu, India -.
  146. Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2013. OFDM with low PAPR: A novel role of partial transmit sequence. Res. J. Inform. Technol., 5: 35-44.
    CrossRef  |  Direct Link  |  
  147. Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2013. Can we reduce PAPR? OFDM+PTS+SLM+STEGO: A novel approach. Asian J. Sci. Res., 6: 38-52.
    CrossRef  |  Direct Link  |  
  148. Praveenkumar, P., M. Nagadinesh, P. Lakshmi, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2013. Convolution and viterbi EN (DE) coders on OFDM hides, rides and conveys message-A neural STEGO. Proceedings of the International Conference on Computer Communication and Informatics, January 4-6, 2013, Coimbatore, pp: 1-5.
    CrossRef  |  
  149. Praveenkumar, P., K. Thenmozhi, S. Vivekhanandan, J.B.B. Rayappan and R. Amirtharajan, 2013. Intersect embedding on OFDM channel-a stego perspective. Proceedings of the IEEE Conference on Information and Communication Technologies, April 11-12, 2013, JeJu Island, pp: 1211-1214.
    CrossRef  |  Direct Link  |  
  150. Praveenkumar, P., K. Thenmozhi, M.N. Dinesh and R. Amirtharajan, 2013. Fixing, padding and embedding: A modulated stego. Int. J. Eng. Technol., 5: 2257-2261.
    Direct Link  |  
  151. Parvathy, A., B. Rajasekhar, C. Nithya, K. Thenmozhi, J.B.B. Rayappan, R. Amirtharajan and P. Raj, 2013. RFID in cloud environment for Attendance monitoring system. Int. J. Eng. Technol., 5: 3116-3122.
    Direct Link  |  
  152. Nithya, C., A. Parvathy, P. Raj, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2013. Secured client server communication in cloud environment. Int. J. Eng. Technol., 5: 3123-3129.
    Direct Link  |  
  153. Janakiraman, S., S. Rajagopalan, S. Namitha, J.B.B. Rayappan, K. Thenmozhi, H.N. Upadhyay and R. Amirtharajan, 2013. Space filling curve for data filling: An embedded security approach. Proceedings of the International Conference on the Changing Paradigms of Technology and Strategic Management, August 30-31, 2013, Tamilnadu, India -.
  154. Janakiraman, S., S. Rajagopalan, K. Thenmozhi, H.N. Upadhyay and J. Ramanathan et al., 2013. Captivating CODEC Stego (CCS): A cover on camouflage. Res. J. Inform. Technol., 5: 160-170.
    CrossRef  |  Direct Link  |  
  155. Chaitanya, G.M., P. Sandeep and R. Amirtharajan, 2013. A smarter E-currency management system. Res. J. Inform. Technol., 5: 427-434.
    CrossRef  |  Direct Link  |  
  156. Amirtharajan, R., V. Rajesh, P. Archana and J.B.B. Rayappan, 2013. Pixel indicates, standard deviates: A way for random image steganography. Res. J. Inform. Technol., 5: 383-392.
    CrossRef  |  Direct Link  |  
  157. Amirtharajan, R., V. Mahalakshmi, J. Nandhini, R. Kavitha and J.B.B. Rayappan, 2013. Key decided cover for random image steganography. Res. J. Inform. Technol., 5: 171-180.
    CrossRef  |  Direct Link  |  
  158. Amirtharajan, R., S.D. Roy, N. Nesakumar, M. Chandrasekar, R. Sridevi and J.B.B. Rayappan, 2013. Mind game for cover steganography: A refuge. Res. J. Inform. Technol., 5: 137-148.
    CrossRef  |  Direct Link  |  
  159. Amirtharajan, R., S. Sulthana, P.S. Priya, G. Revathi, A.K. Infant and J.B.B. Rayappan, 2013. Seeable visual but not sure of it-A visual cryptographic perspective for TAMIL characters. Int. J. Eng. Technol., 5: 2000-2007.
  160. Amirtharajan, R., S. Sulthana and J.B.B. Rayappan, 2013. Seeing and believing is a threat: A visual cryptography schemes. Res. J. Inform. Technol., 5: 435-441.
    CrossRef  |  Direct Link  |  
  161. Amirtharajan, R., R. Subrahmanyam, J.N. Teja, K.M. Reddy and J.B.B. Rayappan, 2013. Pixel indicated triple layer: A way for random image steganography. Res. J. Inform. Technol., 5: 87-99.
    CrossRef  |  Direct Link  |  
  162. Amirtharajan, R., R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Random abrasion on image for security magnification. Res. J. Inform. Technol., 5: 317-328.
    CrossRef  |  Direct Link  |  
  163. Amirtharajan, R., R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Image hides image: A secret stego tri-layer approach. Res. J. Inform. Technol., 5: 249-255.
    CrossRef  |  Direct Link  |  
  164. Amirtharajan, R., R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Concealed to protect and protect to conceal: A conserved stego image. Res. J. Inform. Technol., 5: 209-217.
    CrossRef  |  Direct Link  |  
  165. Amirtharajan, R., P.S. Priya, G. Revathi, A.K. Infant and J.B.B. Rayappan, 2013. Random hide to hide random-a stego affair encryption for We(e/a)k secret. Proceedings of the IEEE Conference on Information and Communication Technologies, April 11-12, 2013, JeJu Island, pp: 1039-1043.
    CrossRef  |  Direct Link  |  
  166. Amirtharajan, R., P.S. Priya and J.B.B. Rayappan, 2013. Pixel indicated user indicator: A muxed stego. Res. J. Inform. Technol., 5: 73-86.
    CrossRef  |  Direct Link  |  
  167. Amirtharajan, R., P. Muralidharan, R. Rajesh, R. Sridevi and J.B.B. Rayappan, 2013. Short message (service) as key for steganography. Res. J. Inform. Technol., 5: 113-124.
    CrossRef  |  Direct Link  |  
  168. Amirtharajan, R., P. Archana, G. Devipriya, V. Rajesh and J.B.B. Rayappan, 2013. Standard deviation converges for random image steganography. Proceedings of the IEEE Conference on Information and Communication Technologies, April 11-12, 2013, JeJu Island, pp: 1064-1069.
    CrossRef  |  Direct Link  |  
  169. Amirtharajan, R., P. Archana and J.B.B. Rayappan, 2013. Why image encryption for better steganography. Res. J. Inform. Technol., 5: 341-351.
    CrossRef  |  Direct Link  |  
  170. Amirtharajan, R., M.V. Abhiram, G. Revathi, J.B. Reddy, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Rubik's cube: A way for random image steganography. Res. J. Inform. Technol., 5: 329-340.
    CrossRef  |  Direct Link  |  
  171. Amirtharajan, R., K.M. Ashfaaq, A.K. Infant and J.B.B. Rayappan, 2013. High performance pixel indicator for colour image steganography. Res. J. Inform. Technol., 5: 277-290.
    CrossRef  |  Direct Link  |  
  172. Amirtharajan, R., K. Karthikeyan, M. Malleswaran and J.B.B. Rayappan, 2013. Kubera kolam: A way for random image steganography. Res. J. Inform. Technol., 5: 304-316.
    CrossRef  |  Direct Link  |  
  173. Amirtharajan, R., J.H.S. Karthikesh, M.N. Reddy, C.S.H. Kaushik and J.B.B. Rayappan, 2013. Compressed and encrypted secret hides in image for rugged stego. Res. J. Inform. Technol., 5: 234-241.
    CrossRef  |  Direct Link  |  
  174. Amirtharajan, R., G. Devipriya, V. Thanikaiselvan and J.B.B. Rayappan, 2013. High capacity triple plane embedding: A colour stego. Res. J. Inform. Technol., 5: 373-382.
    CrossRef  |  Direct Link  |  
  175. Amirtharajan, R., G. Aishwarya, M.S.K. Karthik, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Bio-hiding for smart swipe card: A secret security. Res. J. Inform. Technol., 5: 100-112.
    CrossRef  |  Direct Link  |  
  176. Amirtharajan, R. and J.B.B. Rayappan, 2013. Steganography-time to time: A review. Res. J. Inform. Technol., 5: 53-66.
    CrossRef  |  Direct Link  |  
  177. Thenmozhi, K., P. Praveenkumar, R. Amirtharajan, V. Prithiviraj, R. Varadarajan and J.B.B. Rayappan, 2012. OFDM+CDMA+Stego = Secure communication: A review. Res. J. Inform. Technol., 4: 31-46.
    CrossRef  |  Direct Link  |  
  178. Thanikaiselvan, V., P. Arulmozhivarman, R. Amirtharajan and J.B.B. Rayappan, 2012. Wavelet Pave the Trio travel for a secret mission: A stego vision. Global Trends Inform. Syst. Software Applic., 270: 212-221.
    CrossRef  |  Direct Link  |  
  179. Thanikaiselvan, V., P. Arulmozhivarman, R. Amirtharajan and J.B.B. Rayappan, 2012. Horse riding and hiding in image for data guarding. Proc. Eng., 30: 36-44.
    CrossRef  |  Direct Link  |  
  180. Thanikaiselvan, V., P. Arulmozhivarman, J.B.B. Rayappan and R. Amirtharajan, 2012. Graceful graph for graceful security-towards a STE (G) Raph. Res. J. Inform. Technol., 4: 220-227.
    CrossRef  |  Direct Link  |  
  181. Thanikaiselvan, V., P. Arulmozhivarman, A. Rengarajan and J.B.B. Rayappan, 2012. Authenticated wireless image sensor secret network: Graph guided steganography. Proceedings of the International Conference on Advances in Engineering, Science and Management, March 30-31, 2012, Nagapattinam, Tamil Nadu, India, pp: 279-284.
    Direct Link  |  
  182. Rajagopalan, S., R. Amirtharajan, H.N. Upadhyay and J.B.B. Rayappan, 2012. Survey and analysis of hardware cryptographic and steganographic systems on FPGA. J. Applied Sci., 12: 201-210.
    CrossRef  |  Direct Link  |  
  183. Praveenkumar, P., R. Amirtharajan, Y. Ravishankar, K. Thenmozhi, J. Bosco and B. Rayappan, 2012. Random and AWGN road for MC-CDMA and CDMA bus to phase hide: A MUX in MUX stego. Proceedings of the International Conference on Computer Communication and Informatics, January 10-12, 2012, Coimbatore, India, pp: 1-6.
    CrossRef  |  Direct Link  |  
  184. Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Regulated OFDM-role of ECC and ANN: A review. J. Applied Sci., 12: 301-314.
    CrossRef  |  Direct Link  |  
  185. Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Phase for face saving-a multicarrier stego. Procedia Eng., 30: 790-797.
    CrossRef  |  Direct Link  |  
  186. Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Pixel forefinger for gray in color: A layer by layer stego. Inform. Technol. J., 11: 9-19.
    CrossRef  |  Direct Link  |  
  187. Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72.
    CrossRef  |  Direct Link  |  
  188. Janakiraman, S., N. Suriya, V. Nithiya, B. Radhakrishnan, J. Ramanathan and R. Amirtharajan, 2012. Reflective code for gray block embedding. Proceedings of the International Conference on Pattern Recognition, Informatics and Medical Engineering, March 21-23, 2012, Salem, Tamilnadu, India, pp: 215-220.
    CrossRef  |  
  189. Janakiraman, S., A.A. Mary, J. Chakravarthy, R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Pixel bit manipulation for encoded hiding-An inherent stego. Proceedings of the International Conference on Computer Communication and Informatics, January 10-12, 2012, Coimbatore, India, pp: 1-6.
    Direct Link  |  
  190. Amirtharajan, R., V. Mahalakshmi, N. Sridharan, M. Chandrasekar and J.B.B. Rayappan, 2012. Modulation of hiding intensity by channel intensity-Stego by pixel commando. Proceedings of the International Conference on Computing, Electronics and Electrical Technologies, March 21-22, 2012, Kumaracoil, pp: 1067-1072.
    CrossRef  |  
  191. Amirtharajan, R., R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2012. Seeable visual but not sure of it. Proceedings of the IEEE-International Conference on Advances in Engineering, Science and Management, March 30-31, 2012, Nagapattinam, Tamil Nadu, India, pp: 388-393.
  192. Amirtharajan, R., K. Ramkrishnan, M.V. Krishna, J. Nandhini and J.B.B. Rayappan, 2012. Who decides hiding capacity? I, the pixel intensity. Proceedings of the International Conference on Recent Advances in Computing and Software Systems, April 25-27, 2012, Chennai, India, pp: 71-76.
    CrossRef  |  Direct Link  |  
  193. Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576.
    CrossRef  |  Direct Link  |  
  194. Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139.
    CrossRef  |  Direct Link  |  
  195. Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595.
    CrossRef  |  Direct Link  |  
  196. Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439.
    CrossRef  |  Direct Link  |  
  197. Amirtharajan, R. and J.B.B. Rayappan, 2012. An intelligent chaotic embedding approach to enhance stego-image quality. Inform. Sci., 193: 115-124.
    CrossRef  |  Direct Link  |  
  198. Thenmozhi, K., V.K. Konakalla, S.P.P. Vabbilisetty and R. Amirtharajan, 2011. Space Time Frequency coded (STF) OFDM for broadband wireless communication systems. J. Theor. Applied Inform. Technol., 3: 53-59.
    Direct Link  |  
  199. Thanikaiselvan, V., S. Kumar, N. Neelima and R. Amirtharajan, 2011. Data battle on the digital field between horse cavalry and interlopers. J. Theor. Applied Inform. Technol., 29: 85-91.
    Direct Link  |  
  200. Thanikaiselvan, V., P. Arulmozhivarman, R. Amirtharajan and J.B.B. Rayappan, 2011. Wave (let) decide choosy pixel embedding for stego. Proceedings of the International Conference on Computer, Communication and Electrical Technology, March 18-19, 2011, India, pp: 157-162.
    CrossRef  |  Direct Link  |  
  201. Padmaa, M., Y. Venkataramani and R. Amirtharajan, 2011. Stego on 2n: 1 Platform for users and embedding. Inform. Technol. J., 10: 1896-1907.
    CrossRef  |  Direct Link  |  
  202. Kumar, P.P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2011. Steg-OFDM blend for highly secure multi-user communication. Proceedings of the 2nd International Conference on Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, February 28-March 3, 2011, Chennai, India, pp: 1-5.
    CrossRef  |  
  203. Janakiraman, S., A.A. Mary, J. Chakravarthy, R. Amirtharajan, K. Thenmozhi, J. Bosco and B. Rayappan, 2011. Smart bit manipulation for K bit encoded hiding in K-1 pixel bits. Proceedings of the 3rd International Conference on Trendz in Information Sciences and Computing, December 8-9, 2011, Chennai, India, pp: 79-84.
    CrossRef  |  
  204. Amirtharajan, R., R.R. Subrahmanyam, P.J.S. Prabhakar, R. Kavitha and J.B.B. Rayappan, 2011. MSB over hides LSB: A dark communication with integrity. Proceedings of the IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application, December 12-14, 2011, Bangalore, Karnataka, India, pp: 1-6.
    CrossRef  |  
  205. Amirtharajan, R. and R.J.B. Balaguru, 2011. Covered CDMA multi-user writing on spatially divided image. Proceedings of the 2nd International Conference on Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, February 28-March 3, 2011, Chennai, India, pp: 1-5.
    CrossRef  |  
  206. Amirtharajan, R., V.A. Murarisetty and R.J.B. Balaguru, 2010. Binary in binary for secret writing: A cryptic's cousin approach. Int. J. Comput. Applic., 5: 41-47.
    Direct Link  |  
  207. Amirtharajan, R., V. Ganesan, R. Jithamanyu and J.B.B. Rayappan, 2010. An invisible communication for secret sharing against transmission error: A steganography perspective. Universal J. Comput. Sci. Eng. Technol., 1: 117-121.
    Direct Link  |  
  208. Amirtharajan, R., S.K. Behera, M.A. Swarup, K.M. Ashfaaq and J.B.B. Rayappan, 2010. Colour guided colour image steganography. Universal J. Comput. Sci. Eng. Technol., 1: 16-23.
    Direct Link  |  
  209. Amirtharajan, R., R.J.B. Balaguru and G. Vivek, 2010. Design and analysis of prototype hardware for secret sharing using 2-D image processing. Int. J. Comput. Applic., 4: 17-22.
    Direct Link  |  
  210. Amirtharajan, R., R. Akila and P. Deepikachowdavarapu, 2010. A comparative analysis of image steganography. Int. J. Comput. Applic., 2: 41-47.
    Direct Link  |  
  211. Amirtharajan, R., K. Thenmozhi and R.J.B. Balaguru, 2010. Multi carrier steg against omni attacks. Int. J. Comput. Applic., 5: 35-40.
    Direct Link  |  
  212. Amirtharajan, R., K. Nathella and J. Harish, 2010. Info hide: A cluster cover approach. Int. J. Comput. Applic., 3: 11-18.
    Direct Link  |  
  213. Amirtharajan, R., G. Aishwarya, M. Rameshbabu and J.B.B. Rayappan, 2010. Optimum pixel and bit location for colour image stego-a distortion resistant approach. Int. J. Comput. Appl., 10: 17-24.
    CrossRef  |  Direct Link  |  
  214. Amirtharajan, R., D. Adharsh, V. Vignesh and R.J.B. Balaguru, 2010. PVD blend with pixel indicator-OPAP composite for high fidelity steganography. Int. J. Comput. Applic., 7: 31-37.
    CrossRef  |  Direct Link  |  
  215. Amirtharajan, R., B. Bose, S. Imadabathuni, J. Bosco and B. Rayappan, 2010. Security building at the line of control for image stego. Int. J. Comput. Applic., 12: 46-53.
    CrossRef  |  Direct Link  |  
  216. Amirtharajan, R. and R.J.B. Balaguru, 2010. Constructive role of SFC and RGB fusion versus destructive intrusion. Int. J. Comput. Appl., 1: 30-36.
    CrossRef  |  Direct Link  |  
  217. Amirtharajan, R. and R.J.B. Balaguru, 2009. Tri-layer stego for enhanced security-a keyless random approach. Proceedings of the IEEE International Conference on Internet Multimedia Services Architecture and Applications, December 9-11, 2009, Bangalore, India, pp: 1-6.
    CrossRef  |  Direct Link  |