Title | Authors | Month, Year | Publication details |
---|---|---|---|
Blockchain Based Crowd Funding for Startups | Anand Haridas, Mrudula R., Bavitha B., Clincy Baby, Aswathy M. | May 2020 | International Journal of Scientific Research & Development (IJSRD), vol. 8, issue 3 |
S Chain: A Block Chain System for Small and Medium Sized Enterprises | Anand Haridas, Mrudula R., Clincy Baby | 2020 | International Journal of Current Engineering and Scientific Research Orgnization, vol. 7, issue 2 |
Puzzle Based Highly Secure Steganography | Siva Shankar S. | Feb. 2017 | ICAMMAET Conference |
A Robust Image Encryption in Semantic Content for High Security | Siva Shankar S., Rangarjan Alwar, M. Rajeshkhanna, Rajasekaran S. | Sept. 2016 | International Journal of Control Theory and Applications |
Entity Recognition in Malayalam Using Fuzzy Support Vector Machine | Lakshmy G., Janu R. Panikar, Meera M. | Aug. 2016 | International Conference in Information Science |
Data Hiding in Encrypted Images Using Arnold Transform | Siva Shankar S., A. Rangarajan | Aug. 2016 | ICTACT Journal on Image and Video Processing, vol. 7, issue 1 |
A comparative study in image compression using halftoning based block truncation coding for color image | Meharban M. S., Priya S. | Apr. 2016 | International Journal on Cybernetics and Informatics, vol. 5, issue 2 |
A Review on Image Retrieval Technique | Meharban M. S., S. Priya | Apr. 2016 | Bonfiring International Journal of Advances in Image Processing, vol. 6, issue 2 |
QR Code Security Using Proxy Re-Encryption | Akhil N.V., Athira S., Vijay, Deepa S. Kumar | Mar. 2016 | International Conference on Circuit, Power and Computing Technologies |
A Hybrid Scheme of DDBTC Encoding and CCF, BPF Extraction for Image Retrieval Process with Relevance Feedback | Meharban M. S., S. Priya | Feb. 2016 | International Journal for Engineering and Future Technology, vol. 1, issue 1 |
DSPAA: A Data Sharing Platform with Automated Annotation | Keethana I. P., T. Aby Abahai | Feb. 2016 | Elsevier International Conference on Computational Modeling and Security, vol. 85 |
Secure Two Factor Authentication using QR | Akhil N.V., D. S. Kumar | Jan. 2016 | Joint International Conference ICPCIT 2016 and ICAIECES 2016 |
Color Visual Cryptography Scheme for Natural Image Using Complement Cover and Share Authentication | Dr. R. Ramesh Kumar, S. Chandramathi | Jan. 2016 | Asian Journal of Information Technology |
A survey on selection of efficient web service based on service quality | Arun S., Aravind Srinivas C. V., Johith Sundar, Roshan Sanu | Jan. 2016 | International Journal of Innovative Research in Computer and Communication Engineering, vol. 4, issue 1 |
Notice: Trying to access array offset on value of type null in /home/lb6prgwc0tyh/public_html/ahalia.ac.in/wp-content/themes/esotera/includes/loop.php on line 324