You are on page 1of 21

References of my thesis

by Balasuyambu Jeyaram

FILE REFERENCES.PDF (133.42K)


T IME SUBMIT T ED 30-JUN-2016 12:50PM WORD COUNT 2784
SUBMISSION ID 687203389 CHARACT ER COUNT 15714
References of my thesis
ORIGINALITY REPORT

72 %
SIMILARIT Y INDEX
59%
INT ERNET SOURCES
66%
PUBLICAT IONS
52%
ST UDENT PAPERS

PRIMARY SOURCES

1
Submitted to SASTRA University
St udent Paper 5%
2
www.maxwellsci.com
Int ernet Source 2%
3
ceser.in
Int ernet Source 2%
4
research.ijcaonline.org
Int ernet Source 1%
5
www.ijitee.org
Int ernet Source 1%
6
www.ijoer.in
Int ernet Source 1%
7
Shin-Chi Lai, , Wen-Ho Juang, Yueh-Shu
Lee, and Sheau-Fang Lei. "High-performance
1%
RDFT design for applications of digital radio
mondiale", 2013 IEEE International
Symposium on Circuits and Systems
(ISCAS2013), 2013.
Publicat ion

8
www.ijcaonline.org
Int ernet Source 1%
9
Jin, J.. "A secret image sharing based on
neighborhood configurations of 2-D cellular
1%
automata", Optics and Laser Technology,
201204
Publicat ion

10
Nandi, Subrata, Satyabrata Roy, Siddhartha
Nath, Sayan Chakraborty, Wahiba Ben
1%
Abdessalem Karaa, and Nilanjan Dey. "1-D
group cellular automata based image
encryption technique", 2014 International
Conference on Control Instrumentation
Communication and Computational
Technologies (ICCICCT), 2014.
Publicat ion

11
Hamid, Nagham; Yahya, Abid; Badlishah
Ahmad, R.; Najim, Dheiaa and Kanaan,
1%
Lubna. "Steganography in image files: A
survey", Australian Journal of Basic &
Applied Sciences, 2013.
Publicat ion

12
onlinelibrary.wiley.com
Int ernet Source 1%
13
www.scialert.net
Int ernet Source 1%
14
Bao, Long, and Yicong Zhou. "Image
encryption: Generating visually meaningful
1%
encrypted images", Information Sciences,
2015.
Publicat ion
15
www.yangsky.com
Int ernet Source 1%
16
Zamani, Samaneh, Mahdi Javanmard, Nima
Jafarzadeh, and Mostafa Zamani. "A novel
1%
image encryption scheme based on hyper
chaotic systems and fuzzy cellular
automata", 2014 22nd Iranian Conference on
Electrical Engineering (ICEE), 2014.
Publicat ion

17
Enayatifar, Rasul, Hossein Javedani Sadaei,
Abdul Hanan Abdullah, Malrey Lee, and
1%
Ismail Fauzi Isnin. "A novel chaotic based
image encryption using a hybrid model of
deoxyribonucleic acid and cellular automata",
Optics and Lasers in Engineering, 2015.
Publicat ion

18
"Image Segmentation Based Visual Security
Evaluation", Proceedings of the 4th ACM
1%
Workshop on Information Hiding and
Multimedia Security - IH&MMSec 16, 2016.
Publicat ion

19
Submitted to Indian Institute of Technology,
Madras
1%
St udent Paper

20
Das, Sudeb, and Malay Kumar Kundu.
"Effective management of medical
1%
information through ROI-lossless fragile
image watermarking technique", Computer
Methods and Programs in Biomedicine, 2013.
Publicat ion

21
Zhu, Hegui, Cheng Zhao, and Xiangde
Zhang. "A novel image encryption
1%
compression scheme using hyper-chaos and
Chinese remainder theorem", Signal
Processing Image Communication, 2013.
Publicat ion

22
Abugharsa, Ahmed Bashir; Hasan Basari,
Abd Samad Bin and Almangush, Hamida. "A
1%
New Image Scrambling Approach using
Block-Based on Shifted Algorithm",
Australian Journal of Basic & Applied
Sciences, 2013.
Publicat ion

23
Submitted to University of Oxford
St udent Paper 1%
24
grail.cba.csuohio.edu
Int ernet Source 1%
25
etheses.dur.ac.uk
Int ernet Source 1%
26
Bao, Long, Yicong Zhou, C. L. Philip Chen,
Sabah A. Jassim, and Eliza Y. Du. "Image
1%
encryption in the wavelet domain", Mobile
Multimedia/Image Processing Security and
Applications 2013, 2013.
Publicat ion

27
www.iaeng.org
Int ernet Source

1%
28
Haeussler, Sybille. "Rethinking biogeoclimatic
ecosystem classification for a changing
1%
world.(Report)", Environmental Reviews,
Annual 2011 Issue
Publicat ion

29
Lavania, Shubham, Palash Sushil Matey, and
V. Thanikaiselvan. "Real-time implementation
1%
of steganography in medical images using
integer wavelet transform", 2014 IEEE
International Conference on Computational
Intelligence and Computing Research, 2014.
Publicat ion

30
Emergence Complexity and Computation,
2016.
1%
Publicat ion

31
Dogaru, Radu, and Ioana Dogaru. "Efficient
and cryptographically secure pseudorandom
1%
number generators based on chains of hybrid
cellular automata maps", 2014 10th
International Conference on Communications
(COMM), 2014.
Publicat ion

32
Submitted to Hsuan Chuang University
St udent Paper 1%
33
Bai, Sen, Gui Bin Zhu, and Xiao Yong Ji.
"Comments on A Novel Image Encryption-
1%
Compression Scheme Using Hyper-Chaos
and Chinese Remainder Theorem", Applied
Mechanics and Materials, 2015.
Publicat ion

34
www.cs.bgu.ac.il
Int ernet Source 1%
35
www.infm.ulst.ac.uk
Int ernet Source 1%
36
thesai.org
Int ernet Source 1%
37
Jean-Philippe Aumasson. "Cryptanalysis of a
Hash Function Based on Norm Form
1%
Equations", Cryptologia, 01/2009
Publicat ion

38
Zhang, Xinpeng, Yanli Ren, Guorui Feng, and
Zhenxing Qian. "Compressing Encrypted
1%
Image Using Compressive Sensing", 2011
Seventh International Conference on
Intelligent Information Hiding and Multimedia
Signal Processing, 2011.
Publicat ion

39
J. Rajski. "Linear independence as evaluation
criterion for two-dimensional test pattern
1%
generators", Proceedings 18th IEEE VLSI
Test Symposium VTEST-00, 2000
Publicat ion

40
Advances in Intelligent Systems and
Computing, 2015.
1%
Publicat ion

41
repository.umac.mo
Int ernet Source 1%
42
Fakhredanesh, Mohammad, Mohammad
Rahmati, and Reza Safabakhsh. "Adaptive
1%
image steganography using contourlet
transform", Journal of Electronic Imaging,
2013.
Publicat ion

43
Ping, Ping, Feng Xu, and Zhi Jian Wang.
"Generating High-Quality Random Numbers
1%
by Next Nearest-Neighbor Cellular
Automata", Advanced Materials Research,
2013.
Publicat ion

44
Submitted to VIT University
St udent Paper 1%
45
Elham Ghasemi. "High Capacity Image
Steganography Based on Genetic Algorithm
1%
and Wavelet Transform", Lecture Notes in
Electrical Engineering, 2012
Publicat ion

46
Siap, I.. "Structure and reversibility of 2D
hexagonal cellular automata", Computers
1%
and Mathematics with Applications, 201112
Publicat ion

47
Submitted to Robert Morris University
St udent Paper 1%
48
192.87.102.43
Int ernet Source 1%
49
www.mdpi.com
Int ernet Source 1%
50
lioneltabourier.fr
Int ernet Source 1%
51
Shinotsuka, Marie, Yiyin Wang, Xiaoli Ma,
and G. Tong Zhou. "Analyzing radio
1%
interferometric positioning systems with
undersampling receivers", EURASIP Journal
on Advances in Signal Processing, 2015.
Publicat ion

52
uncomp.uwe.ac.uk
Int ernet Source 1%
53
"Two-Layer Extreme Learning Machine for
Dimension Reduction", Proceedings in
1%
Adaptation Learning and Optimization, 2016.
Publicat ion

54
ijcsi.org
Int ernet Source 1%
55
Submitted to King's College
St udent Paper 1%
56
maxwellsci.com
Int ernet Source 1%
57
eprints-phd.biblio.unitn.it
Int ernet Source 1%
58
ijarece.org
Int ernet Source 1%
59
Submitted to Auburn University
St udent Paper 1%
60
Advances in Intelligent Systems and
Computing, 2014.
1%
Publicat ion

61
web.lib.uoc.gr
Int ernet Source 1%
62
upetd.up.ac.za
Int ernet Source 1%
63
Submitted to Indian School of Mines
St udent Paper 1%
64
Lecture Notes in Computer Science, 2012.
Publicat ion 1%
65
Submitted to Institute of Graduate Studies,
UiTM
1%
St udent Paper

66
Ping, Ping, Feng Xu, and Zhi-Jian Wang.
"Image encryption based on non-affine and
1%
balanced cellular automata", Signal
Processing, 2014.
Publicat ion

67
Jin, Jun. "An image encryption based on
elementary cellular automata", Optics and
1%
Lasers in Engineering, 2012.
Publicat ion
68
Submitted to Laureate Higher Education
Group
1%
St udent Paper

69
Submitted to Istanbul Ticaret niversitesi
St udent Paper 1%
70
annales.umcs.lublin.pl
Int ernet Source 1%
71
Siap, Irfan; Akin, Hasan and Uguz, Selman.
"2-D Reversible Cellular Automata with
1%
Nearest and Prolonged Next Nearest
Neighborhoods under Periodic Boundary",
European Journal of Pure & Applied
Mathematics, 2013.
Publicat ion

72
Submitted to Kyungpook National University
St udent Paper 1%
73
del Rey, A. M., G. R. Sanchez, and A. de la
Villa Cuenca. "A protocol to encrypt digital
1%
images using chaotic maps and memory
cellular automata", Logic Journal of IGPL,
2015.
Publicat ion

74
Advances in Intelligent Systems and
Computing, 2013.
1%
Publicat ion

75
Balachandran, Athira, M. Ganesan, and E. P.
Sumesh. "Daubechies algorithm for highly
1%
accurate ECG feature extraction", 2014
International Conference on Green
Computing Communication and Electrical
Engineering (ICGCCEE), 2014.
Publicat ion

76
Shyong Jian Shyu. "Threshold Secret Image
Sharing by Chinese Remainder Theorem",
1%
2008 IEEE Asia-Pacific Services Computing
Conference, 12/2008
Publicat ion

77
Submitted to University of Houston System
St udent Paper 1%
78
Rosin, Paul L., and Xianfang Sun.
"CELLULAR AUTOMATA AS A TOOL FOR
<1%
IMAGE PROCESSING", Series in Computer
Vision, 2011.
Publicat ion

79
Wang, C.M.. "A high quality steganographic
method with pixel-value differencing and
<1%
modulus function", The Journal of Systems &
Software, 200801
Publicat ion

80
Submitted to Murdoch University
St udent Paper <1%
81
www.csit.carleton.ca
Int ernet Source <1%
82
repositorio.ufu.br
Int ernet Source <1%
"Mobile Application Verification: A Systematic
Mapping Study", Lecture Notes in Computer
<1%
83
Science, 2015.
Publicat ion

84
www.mecs-press.org
Int ernet Source <1%
85
Ronald Rivest. "The invertibility of the XOR
of rotations of a binary word", International
<1%
Journal of Computer Mathematics, 2010
Publicat ion

86
airccj.org
Int ernet Source <1%
87
www.ejtp.com
Int ernet Source <1%
88
Khan, A.R.. "Text compression using two-
dimensional cellular automata", Computers
<1%
and Mathematics with Applications, 199903
Publicat ion

89
www.shodor.org
Int ernet Source <1%
90
Cellular Automata and Cooperative Systems,
1993.
<1%
Publicat ion

EXCLUDE QUOT ES OFF EXCLUDE MAT CHES OFF


EXCLUDE OFF
BIBLIOGRAPHY

You might also like