Security issues in service model of cloud computing environment BH Krishna, S Kiran, G Murali, RPK Reddy Procedia Computer Science 87, 246-251, 2016 | 82 | 2016 |
An efficient fuzzy technique for detection of brain tumor P Sirisha, CN Raju, RPK Reddy Int. J. Comput. Technol 8 (2), 813-819, 2013 | 21 | 2013 |
Canny scale edge detection RPK Reddy, C Nagaraju, IR Reddy Int J Eng Trends Technol (IJETT). https://doi. org/10.14445/22315381/IJETT …, 2016 | 16 | 2016 |
Text encryption through level based privacy using DNA steganography RPK Reddy, C Nagaraju, N Subramanyam International Journal of Emerging Trends & Technology in Computer Science …, 2014 | 11 | 2014 |
Improved canny edge detection technique using S-membership function RPK Reddy, C Nagaraju Int. J. Eng. Adv. Technol 8 (6), 43-49, 2019 | 10 | 2019 |
Performance of Evaluation for AES with ECC in Cloud Environment H Bommala, S Kiran, M Pujitha, RPK Reddy International Journal of Advanced Networking and Applications 10 (5), 4019-4025, 2019 | 10 | 2019 |
Robust Multi Gradient entropy method for face recognition system for low contrast noisy images C Nagaraju, P PrathapNaidu, RPK Reddy, GS Kumari International Journal of Emerging Trends & Technology in Computer Science …, 2013 | 8 | 2013 |
Protection on sensitive information in cloud—Cryptography algorithms B Harikrishna, S Kiran, RP kumar Reddy 2016 International Conference on Communication and Electronics Systems …, 2016 | 7 | 2016 |
Multiple text encryption, key entrenched, distributed cipher using pairing functions and transposition ciphers BH Krishna, IRS Reddy, S Kiran, RPK Reddy 2016 International Conference on Wireless Communications, Signal Processing …, 2016 | 7 | 2016 |
A novel approach to adopt scrum by an enterprise B Reddaiah, R Pradeep Kumar Reddy, C Nagaraju, V Harsha Sree Artificial Intelligence and Evolutionary Computations in Engineering Systems …, 2016 | 6 | 2016 |
Multi-focus Image Synthesis based on DWT and Texture with Sharpening CR Mohan, S Kiran, RPK Reddy Pezzottaite Journals 4 (4), 1662-1670, 2015 | 6 | 2015 |
A Study on Several Image Synthesis Algorithms CR Mohan, S Kiran, RPK Reddy Pezzottaite Journals 4 (3), 1600-1608, 2015 | 5 | 2015 |
Enciphering using Bit-Wise Logical Operators and Pairing Function with Text Generated Hidden Key B Reddaiah, RPK Reddy, SH Krishna International Journal of Computer Applications 975, 8887, 2015 | 4 | 2015 |
A novel high capacity data embedding image steganography using spiral scan S Kiran, RPK Reddy, N Subramanyan International Journal of Engineering Technology Science and Research 4 (12 …, 2017 | 3 | 2017 |
Low Contrast image Shadow removal by using Fuzzy logic technique RPK Reddy, C Nagaraju Int. J. Pure Appl. Math 114 (10), 55-63, 2017 | 3 | 2017 |
Multi-Stage encryption using Seeded SDES S Kiran, RPK Reddy, JVS Sree, DN Sravanthi International Journal of Advanced Networking and Applications 7 (2), 2694, 2015 | 2 | 2015 |
Multiple text cryptanalysis by using matrix and logical operations IRR Dr SK, Dr RPKR IJETTCS 3 (5), 2014 | 2* | 2014 |
Analysis of in-place matrix rotation of square matrix for information security applications S Kiran, AA Kumar, RPK Reddy, DS Reddy Procedia Computer Science 215, 131-139, 2022 | 1 | 2022 |
Image Steganography Using Random Image S Kiran, R Pradeep Kumar Reddy, N Subramanyan Advances in Decision Sciences, Image Processing, Security and Computer …, 2020 | 1 | 2020 |
Brain Tumor MRI Using Gradient Profile Sharpness RPK Reddy, C Nagaraju International Journal of Advanced Networking and Applications 9 (5), 3557-3562, 2018 | 1 | 2018 |