Professional Documents
Culture Documents
by Balasuyambu Jeyaram
72 %
SIMILARIT Y INDEX
59%
INT ERNET SOURCES
66%
PUBLICAT IONS
52%
ST UDENT PAPERS
PRIMARY SOURCES
1
Submitted to SASTRA University
St udent Paper 5%
2
www.maxwellsci.com
Int ernet Source 2%
3
ceser.in
Int ernet Source 2%
4
research.ijcaonline.org
Int ernet Source 1%
5
www.ijitee.org
Int ernet Source 1%
6
www.ijoer.in
Int ernet Source 1%
7
Shin-Chi Lai, , Wen-Ho Juang, Yueh-Shu
Lee, and Sheau-Fang Lei. "High-performance
1%
RDFT design for applications of digital radio
mondiale", 2013 IEEE International
Symposium on Circuits and Systems
(ISCAS2013), 2013.
Publicat ion
8
www.ijcaonline.org
Int ernet Source 1%
9
Jin, J.. "A secret image sharing based on
neighborhood configurations of 2-D cellular
1%
automata", Optics and Laser Technology,
201204
Publicat ion
10
Nandi, Subrata, Satyabrata Roy, Siddhartha
Nath, Sayan Chakraborty, Wahiba Ben
1%
Abdessalem Karaa, and Nilanjan Dey. "1-D
group cellular automata based image
encryption technique", 2014 International
Conference on Control Instrumentation
Communication and Computational
Technologies (ICCICCT), 2014.
Publicat ion
11
Hamid, Nagham; Yahya, Abid; Badlishah
Ahmad, R.; Najim, Dheiaa and Kanaan,
1%
Lubna. "Steganography in image files: A
survey", Australian Journal of Basic &
Applied Sciences, 2013.
Publicat ion
12
onlinelibrary.wiley.com
Int ernet Source 1%
13
www.scialert.net
Int ernet Source 1%
14
Bao, Long, and Yicong Zhou. "Image
encryption: Generating visually meaningful
1%
encrypted images", Information Sciences,
2015.
Publicat ion
15
www.yangsky.com
Int ernet Source 1%
16
Zamani, Samaneh, Mahdi Javanmard, Nima
Jafarzadeh, and Mostafa Zamani. "A novel
1%
image encryption scheme based on hyper
chaotic systems and fuzzy cellular
automata", 2014 22nd Iranian Conference on
Electrical Engineering (ICEE), 2014.
Publicat ion
17
Enayatifar, Rasul, Hossein Javedani Sadaei,
Abdul Hanan Abdullah, Malrey Lee, and
1%
Ismail Fauzi Isnin. "A novel chaotic based
image encryption using a hybrid model of
deoxyribonucleic acid and cellular automata",
Optics and Lasers in Engineering, 2015.
Publicat ion
18
"Image Segmentation Based Visual Security
Evaluation", Proceedings of the 4th ACM
1%
Workshop on Information Hiding and
Multimedia Security - IH&MMSec 16, 2016.
Publicat ion
19
Submitted to Indian Institute of Technology,
Madras
1%
St udent Paper
20
Das, Sudeb, and Malay Kumar Kundu.
"Effective management of medical
1%
information through ROI-lossless fragile
image watermarking technique", Computer
Methods and Programs in Biomedicine, 2013.
Publicat ion
21
Zhu, Hegui, Cheng Zhao, and Xiangde
Zhang. "A novel image encryption
1%
compression scheme using hyper-chaos and
Chinese remainder theorem", Signal
Processing Image Communication, 2013.
Publicat ion
22
Abugharsa, Ahmed Bashir; Hasan Basari,
Abd Samad Bin and Almangush, Hamida. "A
1%
New Image Scrambling Approach using
Block-Based on Shifted Algorithm",
Australian Journal of Basic & Applied
Sciences, 2013.
Publicat ion
23
Submitted to University of Oxford
St udent Paper 1%
24
grail.cba.csuohio.edu
Int ernet Source 1%
25
etheses.dur.ac.uk
Int ernet Source 1%
26
Bao, Long, Yicong Zhou, C. L. Philip Chen,
Sabah A. Jassim, and Eliza Y. Du. "Image
1%
encryption in the wavelet domain", Mobile
Multimedia/Image Processing Security and
Applications 2013, 2013.
Publicat ion
27
www.iaeng.org
Int ernet Source
1%
28
Haeussler, Sybille. "Rethinking biogeoclimatic
ecosystem classification for a changing
1%
world.(Report)", Environmental Reviews,
Annual 2011 Issue
Publicat ion
29
Lavania, Shubham, Palash Sushil Matey, and
V. Thanikaiselvan. "Real-time implementation
1%
of steganography in medical images using
integer wavelet transform", 2014 IEEE
International Conference on Computational
Intelligence and Computing Research, 2014.
Publicat ion
30
Emergence Complexity and Computation,
2016.
1%
Publicat ion
31
Dogaru, Radu, and Ioana Dogaru. "Efficient
and cryptographically secure pseudorandom
1%
number generators based on chains of hybrid
cellular automata maps", 2014 10th
International Conference on Communications
(COMM), 2014.
Publicat ion
32
Submitted to Hsuan Chuang University
St udent Paper 1%
33
Bai, Sen, Gui Bin Zhu, and Xiao Yong Ji.
"Comments on A Novel Image Encryption-
1%
Compression Scheme Using Hyper-Chaos
and Chinese Remainder Theorem", Applied
Mechanics and Materials, 2015.
Publicat ion
34
www.cs.bgu.ac.il
Int ernet Source 1%
35
www.infm.ulst.ac.uk
Int ernet Source 1%
36
thesai.org
Int ernet Source 1%
37
Jean-Philippe Aumasson. "Cryptanalysis of a
Hash Function Based on Norm Form
1%
Equations", Cryptologia, 01/2009
Publicat ion
38
Zhang, Xinpeng, Yanli Ren, Guorui Feng, and
Zhenxing Qian. "Compressing Encrypted
1%
Image Using Compressive Sensing", 2011
Seventh International Conference on
Intelligent Information Hiding and Multimedia
Signal Processing, 2011.
Publicat ion
39
J. Rajski. "Linear independence as evaluation
criterion for two-dimensional test pattern
1%
generators", Proceedings 18th IEEE VLSI
Test Symposium VTEST-00, 2000
Publicat ion
40
Advances in Intelligent Systems and
Computing, 2015.
1%
Publicat ion
41
repository.umac.mo
Int ernet Source 1%
42
Fakhredanesh, Mohammad, Mohammad
Rahmati, and Reza Safabakhsh. "Adaptive
1%
image steganography using contourlet
transform", Journal of Electronic Imaging,
2013.
Publicat ion
43
Ping, Ping, Feng Xu, and Zhi Jian Wang.
"Generating High-Quality Random Numbers
1%
by Next Nearest-Neighbor Cellular
Automata", Advanced Materials Research,
2013.
Publicat ion
44
Submitted to VIT University
St udent Paper 1%
45
Elham Ghasemi. "High Capacity Image
Steganography Based on Genetic Algorithm
1%
and Wavelet Transform", Lecture Notes in
Electrical Engineering, 2012
Publicat ion
46
Siap, I.. "Structure and reversibility of 2D
hexagonal cellular automata", Computers
1%
and Mathematics with Applications, 201112
Publicat ion
47
Submitted to Robert Morris University
St udent Paper 1%
48
192.87.102.43
Int ernet Source 1%
49
www.mdpi.com
Int ernet Source 1%
50
lioneltabourier.fr
Int ernet Source 1%
51
Shinotsuka, Marie, Yiyin Wang, Xiaoli Ma,
and G. Tong Zhou. "Analyzing radio
1%
interferometric positioning systems with
undersampling receivers", EURASIP Journal
on Advances in Signal Processing, 2015.
Publicat ion
52
uncomp.uwe.ac.uk
Int ernet Source 1%
53
"Two-Layer Extreme Learning Machine for
Dimension Reduction", Proceedings in
1%
Adaptation Learning and Optimization, 2016.
Publicat ion
54
ijcsi.org
Int ernet Source 1%
55
Submitted to King's College
St udent Paper 1%
56
maxwellsci.com
Int ernet Source 1%
57
eprints-phd.biblio.unitn.it
Int ernet Source 1%
58
ijarece.org
Int ernet Source 1%
59
Submitted to Auburn University
St udent Paper 1%
60
Advances in Intelligent Systems and
Computing, 2014.
1%
Publicat ion
61
web.lib.uoc.gr
Int ernet Source 1%
62
upetd.up.ac.za
Int ernet Source 1%
63
Submitted to Indian School of Mines
St udent Paper 1%
64
Lecture Notes in Computer Science, 2012.
Publicat ion 1%
65
Submitted to Institute of Graduate Studies,
UiTM
1%
St udent Paper
66
Ping, Ping, Feng Xu, and Zhi-Jian Wang.
"Image encryption based on non-affine and
1%
balanced cellular automata", Signal
Processing, 2014.
Publicat ion
67
Jin, Jun. "An image encryption based on
elementary cellular automata", Optics and
1%
Lasers in Engineering, 2012.
Publicat ion
68
Submitted to Laureate Higher Education
Group
1%
St udent Paper
69
Submitted to Istanbul Ticaret niversitesi
St udent Paper 1%
70
annales.umcs.lublin.pl
Int ernet Source 1%
71
Siap, Irfan; Akin, Hasan and Uguz, Selman.
"2-D Reversible Cellular Automata with
1%
Nearest and Prolonged Next Nearest
Neighborhoods under Periodic Boundary",
European Journal of Pure & Applied
Mathematics, 2013.
Publicat ion
72
Submitted to Kyungpook National University
St udent Paper 1%
73
del Rey, A. M., G. R. Sanchez, and A. de la
Villa Cuenca. "A protocol to encrypt digital
1%
images using chaotic maps and memory
cellular automata", Logic Journal of IGPL,
2015.
Publicat ion
74
Advances in Intelligent Systems and
Computing, 2013.
1%
Publicat ion
75
Balachandran, Athira, M. Ganesan, and E. P.
Sumesh. "Daubechies algorithm for highly
1%
accurate ECG feature extraction", 2014
International Conference on Green
Computing Communication and Electrical
Engineering (ICGCCEE), 2014.
Publicat ion
76
Shyong Jian Shyu. "Threshold Secret Image
Sharing by Chinese Remainder Theorem",
1%
2008 IEEE Asia-Pacific Services Computing
Conference, 12/2008
Publicat ion
77
Submitted to University of Houston System
St udent Paper 1%
78
Rosin, Paul L., and Xianfang Sun.
"CELLULAR AUTOMATA AS A TOOL FOR
<1%
IMAGE PROCESSING", Series in Computer
Vision, 2011.
Publicat ion
79
Wang, C.M.. "A high quality steganographic
method with pixel-value differencing and
<1%
modulus function", The Journal of Systems &
Software, 200801
Publicat ion
80
Submitted to Murdoch University
St udent Paper <1%
81
www.csit.carleton.ca
Int ernet Source <1%
82
repositorio.ufu.br
Int ernet Source <1%
"Mobile Application Verification: A Systematic
Mapping Study", Lecture Notes in Computer
<1%
83
Science, 2015.
Publicat ion
84
www.mecs-press.org
Int ernet Source <1%
85
Ronald Rivest. "The invertibility of the XOR
of rotations of a binary word", International
<1%
Journal of Computer Mathematics, 2010
Publicat ion
86
airccj.org
Int ernet Source <1%
87
www.ejtp.com
Int ernet Source <1%
88
Khan, A.R.. "Text compression using two-
dimensional cellular automata", Computers
<1%
and Mathematics with Applications, 199903
Publicat ion
89
www.shodor.org
Int ernet Source <1%
90
Cellular Automata and Cooperative Systems,
1993.
<1%
Publicat ion