Secure and robust digital watermarking on grey level images G RoslineNesaKumari, B VijayaKumar, L Sumalatha, VV Krishna International Journal of Advanced Science and Technology 11, 1-8, 2009 | 47 | 2009 |
A simple block based content watermarking scheme for image authentication and tamper detection L Sumalatha, KG Rosline, KV Vijaya International Journal of Soft Computing and Engineering (IJSCE) 2 (4), 2231-2240, 2012 | 12 | 2012 |
Image retrieval system based on multi feature extraction and its performance assessment GR Nesakumari International Journal of Information Technology 14 (2), 1161-1173, 2022 | 11 | 2022 |
Normalized image watermarking scheme using chaotic system GR Nesakumari, S Maruthuperumal International Journal of Information and Network Security 1 (4), 255, 2012 | 8 | 2012 |
Detection and classification of various pest attacks and infection on plants using RBPN with GA based PSO algorithm K Gangadharan, GRN Kumari, D Dhanasekaran, K Malathi Indonesian Journal of Electrical Engineering and Computer Science (IJEECS …, 2020 | 7 | 2020 |
ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India-Vol I: Hosted by CSI Vishakapatnam Chapter SC Satapathy, PS Avadhani, SK Udgata, S Lakshminarayana Springer Science & Business Media, 2013 | 7 | 2013 |
Classification and Functional Analysis of Major Plant Disease using Various Classifiers in Leaf Images K Gangadharan, GRN Kumari, D Dhanasekaran International Journal of Innovative Technology and Exploring Engineering …, 2019 | 6 | 2019 |
ICT and critical infrastructure SC Satapathy, PS Avadhani, SK Udgata, S Lakshminarayana Proceedings of the 48th Annual Convention of Computer Society of India 1 …, 2013 | 6 | 2013 |
A New Marginal Color Image Water Marking Method based on Logical Operators‖ BV Kumar, MR Mani, GR NesaKumari, DVV Kumar International Journal of Security and Its Applications 3 (4), 1-8, 2009 | 6 | 2009 |
Automatic detection of plant disease and insect attack using effta algorithm K Gangadharan, GRN Kumari, D Dhanasekaran, K Malathi International Journal of Advanced Computer Science and Applications 11 (2), 2020 | 5 | 2020 |
Automatic detection of plant disease and insect attack using effta algorithm K Gangadharan, GRN Kumari, D Dhanasekaran, K Malathi International Journal of Advanced Computer Science and Applications 11 (2), 2020 | 5 | 2020 |
Segment based image retrieval using HSV color space and moment R Tamilkodi, RA Karthika, G RoslineNesaKumari, S Maruthuperumal Emerging ICT for Bridging the Future-Proceedings of the 49th Annual …, 2015 | 5 | 2015 |
Region Based Even Odd Watermarking Method with Fuzzy Wavelet― S Maruthuperumal, GR Nesakumari, DV Vijayakumar International Journal of computer Engineering & Science (IJCES) 2 (8), 2012 | 5 | 2012 |
Review of CBIR Related with Low Level and High Level Features T Kodi, GRN Kumari, SM Perumal International Journal of Synthetic Emotions (IJSE) 7 (1), 27-40, 2016 | 4 | 2016 |
A study of social media data analysis for detecting the effects on human health M Gulhane, T Sajana Turkish Journal of Physiotherapy and Rehabilitation 32 (2), 2015 | 4 | 2015 |
Integrated Normalized Content System for Efficient Watermarking GR Nesakumari, S Rajendran, DV Vijayakumar International Journal of Computer Applications 53 (15), 2012 | 4 | 2012 |
A novel framework for retrieval of image using weighted edge matching algorithm R Tamilkodi, GR Nesakumari Multimedia Tools and Applications 80 (13), 19625-19648, 2021 | 3 | 2021 |
An innovative method of retrieving images through clusters, means and wavelet transformation R Tamilkodi, GRN Kumari, SM Perumal International Journal of Information Technology 11 (4), 697-706, 2019 | 3 | 2019 |
A new approach anticipated for CBIR by means of local and global mean R Tamilkodi, GRN Kumari, SM Perumal J Adv Res Dynamical & Control Systems 9 (1), 2017 | 3 | 2017 |
Generation of An Efficient Digital Watermark Key Based on Honey Comb Polynomial Interpolation Approach G RoslineNesakumari, V Vijayakumar, BVR Reddy International Journal of Computer Network and Information Security 5 (3), 47, 2013 | 3 | 2013 |