Follow
Shiney Thomas
Title
Cited by
Cited by
Year
A Novel Multifactor Authentication System Ensuring Usability and Security
G Mathew, S Thomas
International Journal of Security, Privacy and Trust Management (IJSPTM) 2 (5), 2013
132013
Semantic web based adaptive E-Learning triggered through short message services
J Antony, F Thottupuram, S Thomas, MV John
Computer Science & Education (ICCSE), 2012 7th International Conference …, 2012
72012
A Low Distortion Reversible Data Hiding Technique using Improved PPVO Predictor
N Thomas, S Thomas
International Conference on Emerging Trends in Engineering, Science and …, 2015
42015
Vehicle Counting based on Convolution Neural Network
JM Anil, L Mathews, R Renji, RM Jose, S Thomas
2023 7th International Conference on Intelligent Computing and Control …, 2023
22023
Analysis of image inpainting and object removal methodologies
S Thomas, DJ Mathew
Annual International Conference on Emerging Research Areas on Computing …, 2020
22020
Reversible Watermarking using Image Content Assessment and Histogram Shifting
N Thomas, S Thomas
5th IEEE International Conference on Advances in Computing & Communications …, 2015
22015
Suicidal Ideation Prediction Using Machine Learning
A Benny, VS Aarsha, A Subair, AP Nair, S Thomas
2023 International Conference on Circuit Power and Computing Technologies …, 2023
2023
Speak Out: Turns Your Smartphone into a Microphone
A Saseendran, A Lakshmi, A Jose, G Gopan, S Thomas
Emerging Technologies for Sustainability, 225-230, 2020
2020
Hand gesture keyboard for blind using CNN
S Thomas, D Sunny, J Jaleel, J Raju, F Rahim
AIP Conference Proceedings 2222 (1), 2020
2020
Survey of Performance Enhancing Strategies and Speculative Execution in Hadoop
ST Urmila J
International Conference on Current Research on Embedded, Information and …, 2017
2017
Colour Pass System for User Authentication
AP Biju, A Azad, J Justine, S Thomas
IJSTE - International Journal of Science Technology & Engineering 2 (11), 2016
2016
Fibonacci Based Permutation Tree for 3D Steganography
TM Thomas, S Thomas
International Journal of Research in Computer Application and Information …, 2014
2014
Data Hiding for High Image Quality Based on Local Complexity and Interpolation
NK George, S Thomas
International Journal of Advance Research in Computer Science and Management …, 2014
2014
Instalert - A Path Tracker Mobile Application using GPS
S Jacob, N Thomas, A Jacob, S Thomas
International Conference on Recent Trends in Engineering and Technology …, 2014
2014
An Improvement to Vertex Decimation : Finding Referencing Neighbors for Low Distortion in 3D Steganography
TM Thomas, J Varghese, S Thomas
Control Communication and Computing (ICCC), 2013 International Conference on …, 2013
2013
An Authentication System For Information Security Using Cued Click Point And One Time Session Key
G Mathew, S Thomas
International Journal of Engineering Research and Technology 2 (7), 2580-2586, 2013
2013
Hand Gesture Keyboard for Blind
F Rahim, J Jaleel, J Raju, D Sunny, S Thomas
SURVEY ON FINGERPRINT SPOOFING ATTACKS AND ITS DETECTION METHODS
D Nampoothiri, S Thomas
Survey on Wavelet based ECG Stegnography for Protecting Patients Confidential Information
M Ismail, S Thomas
The system can't perform the operation now. Try again later.
Articles 1–19