Follow
Dr.G.Rosline Nesa Kumari
Dr.G.Rosline Nesa Kumari
Bharath Institue of Higher Education and Research
No verified email
Title
Cited by
Cited by
Year
Secure and robust digital watermarking on grey level images
G RoslineNesaKumari, B VijayaKumar, L Sumalatha, VV Krishna
International Journal of Advanced Science and Technology 11, 1-8, 2009
472009
A simple block based content watermarking scheme for image authentication and tamper detection
L Sumalatha, KG Rosline, KV Vijaya
International Journal of Soft Computing and Engineering (IJSCE) 2 (4), 2231-2240, 2012
122012
Image retrieval system based on multi feature extraction and its performance assessment
GR Nesakumari
International Journal of Information Technology 14 (2), 1161-1173, 2022
112022
Normalized image watermarking scheme using chaotic system
GR Nesakumari, S Maruthuperumal
International Journal of Information and Network Security 1 (4), 255, 2012
82012
Detection and classification of various pest attacks and infection on plants using RBPN with GA based PSO algorithm
K Gangadharan, GRN Kumari, D Dhanasekaran, K Malathi
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS …, 2020
72020
ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India-Vol I: Hosted by CSI Vishakapatnam Chapter
SC Satapathy, PS Avadhani, SK Udgata, S Lakshminarayana
Springer Science & Business Media, 2013
72013
Classification and Functional Analysis of Major Plant Disease using Various Classifiers in Leaf Images
K Gangadharan, GRN Kumari, D Dhanasekaran
International Journal of Innovative Technology and Exploring Engineering …, 2019
62019
ICT and critical infrastructure
SC Satapathy, PS Avadhani, SK Udgata, S Lakshminarayana
Proceedings of the 48th Annual Convention of Computer Society of India 1 …, 2013
62013
A New Marginal Color Image Water Marking Method based on Logical Operators‖
BV Kumar, MR Mani, GR NesaKumari, DVV Kumar
International Journal of Security and Its Applications 3 (4), 1-8, 2009
62009
Automatic detection of plant disease and insect attack using effta algorithm
K Gangadharan, GRN Kumari, D Dhanasekaran, K Malathi
International Journal of Advanced Computer Science and Applications 11 (2), 2020
52020
Automatic detection of plant disease and insect attack using effta algorithm
K Gangadharan, GRN Kumari, D Dhanasekaran, K Malathi
International Journal of Advanced Computer Science and Applications 11 (2), 2020
52020
Segment based image retrieval using HSV color space and moment
R Tamilkodi, RA Karthika, G RoslineNesaKumari, S Maruthuperumal
Emerging ICT for Bridging the Future-Proceedings of the 49th Annual …, 2015
52015
Region Based Even Odd Watermarking Method with Fuzzy Wavelet―
S Maruthuperumal, GR Nesakumari, DV Vijayakumar
International Journal of computer Engineering & Science (IJCES) 2 (8), 2012
52012
Review of CBIR Related with Low Level and High Level Features
T Kodi, GRN Kumari, SM Perumal
International Journal of Synthetic Emotions (IJSE) 7 (1), 27-40, 2016
42016
A study of social media data analysis for detecting the effects on human health
M Gulhane, T Sajana
Turkish Journal of Physiotherapy and Rehabilitation 32 (2), 2015
42015
Integrated Normalized Content System for Efficient Watermarking
GR Nesakumari, S Rajendran, DV Vijayakumar
International Journal of Computer Applications 53 (15), 2012
42012
A novel framework for retrieval of image using weighted edge matching algorithm
R Tamilkodi, GR Nesakumari
Multimedia Tools and Applications 80 (13), 19625-19648, 2021
32021
An innovative method of retrieving images through clusters, means and wavelet transformation
R Tamilkodi, GRN Kumari, SM Perumal
International Journal of Information Technology 11 (4), 697-706, 2019
32019
A new approach anticipated for CBIR by means of local and global mean
R Tamilkodi, GRN Kumari, SM Perumal
J Adv Res Dynamical & Control Systems 9 (1), 2017
32017
Generation of An Efficient Digital Watermark Key Based on Honey Comb Polynomial Interpolation Approach
G RoslineNesakumari, V Vijayakumar, BVR Reddy
International Journal of Computer Network and Information Security 5 (3), 47, 2013
32013
The system can't perform the operation now. Try again later.
Articles 1–20