Improved artificial neural network with state order dataset estimation for brain cancer cell diagnosis D Indira, RK Ganiya, P Ashok Babu, A Xavier, L Kavisankar, S Hemalatha, ... BioMed Research International 2022, 2022 | 89 | 2022 |
A secure and high capacity image steganography technique UD Acharya, PR Kamath arXiv preprint arXiv:1304.3629, 2013 | 82 | 2013 |
Wavelet transform based steganography technique to hide audio signals in image S Hemalatha, UD Acharya, A Renuka Procedia Computer Science 47, 272-281, 2015 | 79 | 2015 |
A secure color image steganography in transform domain UD Acharya, PR Kamath arXiv preprint arXiv:1304.3313, 2013 | 59 | 2013 |
Machine learning-based secure data acquisition for fake accounts detection in future mobile communication networks B Prabhu Kavin, S Karki, S Hemalatha, D Singh, R Vijayalakshmi, ... Wireless Communications and Mobile Computing 2022, 1-10, 2022 | 28 | 2022 |
Comparison of secure and high capacity color image steganography techniques in RGB and YCbCr domains S Hemalatha, UD Acharya, A Renuka arXiv preprint arXiv:1307.3026, 2013 | 26 | 2013 |
Sentiment analysis of yelp reviews by machine learning S Hemalatha, R Ramathmika 2019 International Conference on Intelligent Computing and Control Systems …, 2019 | 23 | 2019 |
A secure image steganography technique using Integer Wavelet Transform S Hemalatha, A Renuka, UD Acharya, PR Kamath 2012 World Congress on Information and Communication Technologies, 755-758, 2012 | 20 | 2012 |
Novel link establishment communication scheme against selfish attack using node reward with trust level evaluation algorithm in MANET S Hemalatha, PR Kshirsagar, H Manoharan, N Vasantha Gowri, A Vani, ... Wireless Communications and Mobile Computing 2022, 2022 | 16 | 2022 |
Audio data hiding technique using integer wavelet transform S Hemalatha, UD Acharya, A Renuka International Journal of Electronic Security and Digital Forensics 8 (2 …, 2016 | 16 | 2016 |
A secure image steganography technique to hide multiple secret images S Hemalatha, U Dinesh Acharya, A Renuka, PR Kamath Computer Networks & Communications (NetCom) Proceedings of the Fourth …, 2013 | 13 | 2013 |
Comparison between DCT and DWT steganography algorithms J Desai, S Hemalatha, SR Shishira International Journal of Advanced Information Science and Technology (IJAIST …, 2014 | 10 | 2014 |
Audio steganography in discrete wavelet transform domain S Hemalatha, UD Acharya, A Renuka, S Deepthi, KJ Upadhya International Journal of Applied Engineering Research 10 (16), 37544-37549, 2015 | 9 | 2015 |
A survey on augmented reality S Nivedha, S Hemalatha International Research Journal of Engineering and Technology 2 (2), 87-96, 2015 | 8 | 2015 |
A novel colorimage steganography using discrete wavelet transform S Hemalatha, UD Acharya, A Renuka, PR Kamath Proceedings of the Second International Conference on Computational Science …, 2012 | 8 | 2012 |
Enhancing user experience through physical interaction in handheld augmented reality S Nivedha, S Hemalatha 2015 International Conference on Computer Communication and Informatics …, 2015 | 7 | 2015 |
An integer wavelet transform based steganography technique for color images S Hemalatha, DU Acharya, A Renuka, PR Kamath International Journal of Information & Computation Technology 3 (1), 13-24, 2013 | 5 | 2013 |
Shoulder Surfing Attack Trusted Verification–A Survey K Valarmathi, S Hemalatha, P Perumal, D Puthilibai, M Abirami ECS Transactions 107 (1), 16041, 2022 | 4 | 2022 |
Review on cardio vascular disease prediction using machine learning T Kavitha, S Hemalatha, S Mownika, GM Priya, JK Vigashini 2022 International Conference on Computer Communication and Informatics …, 2022 | 4 | 2022 |
Survey on cloud computing security and scheduling T Kavitha, S Hemalatha, TM Saravanan, AK Singh, MI Alam, S Warshi 2022 International Conference on Computer Communication and Informatics …, 2022 | 4 | 2022 |