Data security in cloud computing using steganography: a review AY AlKhamese, WR Shabana, IM Hanafy 2019 International conference on innovative trends in computer engineering …, 2019 | 35 | 2019 |
A Novel Approach to Human Iris Recognition And Verification Framework Using Machine Learning Algorithm S Davuluri, S Kilaru, V Boppana, MV Rao, KN Rao, SS Vellela 2023 6th International Conference on Contemporary Computing and Informatics …, 2023 | 31 | 2023 |
Multi scale image fusion through Laplacian Pyramid and deep learning on thermal images DR Kishore, N Syeda, D Suneetha, CS Kumari, GSP Ghantasala Annals of the Romanian Society for Cell Biology 25 (4), 3728-3734, 2021 | 22 | 2021 |
Data hiding using Fibonacci EDGE based steganography for cloud data D Suneetha, RK Kumar Int J Appl Eng Res 12 (16), 5565-5569, 2017 | 10 | 2017 |
Enhancement of Security for Cloud Data Using Partition-Based Steganography D Suneetha, R Kiran Kumar Proceedings of the 2nd International Conference on Data Engineering and …, 2019 | 5 | 2019 |
Anomaly Detection in Real-Time Videos Using Match Subspace System and Deep Belief Networks DR Kishore, D Suneetha, GSP Ghantasala, BR Sankar Multimedia Computing Systems and Virtual Reality, 151-170, 2022 | 3 | 2022 |
A novel approach for data security in cloud environment using image segmentation and image steganography R Kiran Kumar, D Suneetha Information Systems Design and Intelligent Applications: Proceedings of …, 2019 | 3 | 2019 |
Enhancement in Data Security Using DNA Cryptography DR Kishore, D Suneetha, GGS Praddep Soft Computing and Signal Processing: Proceedings of 2nd ICSCSP 2, 63-70, 2019 | 3* | 2019 |
A Compression Algorithm for DNA Palindrome Compression Technique D Suneetha, DR Kishore, PN Babu ITM Web of Conferences 32, 03006, 2020 | 2 | 2020 |
Data security model using artificial neural networks and database fragmentation in cloud environment D Suneetha, DR Kishore, GGS Pradeep Int. J. Recent Technol. Eng 8 (2), 5972-5975, 2019 | 2 | 2019 |
A secure steganography approach for cloud data using ann along with private key embedding RK Kumar, D Suneetha International Journal of Computer Science and Information Security (IJCSIS …, 2018 | 2 | 2018 |
Intrusion detection model based on differential evolution M Sailaja, RK Kumar, PSR Murty International Journal of Computer Applications 36 (6), 2011 | 2 | 2011 |
A new approach in cloud environment to improve data security using multiple bits D Suneetha, D Rathna Kishore, P Narendra Babu, P Chinna Babu Soft Computing and Signal Processing: Proceedings of 3rd ICSCSP 2020, Volume …, 2022 | 1 | 2022 |
Deep Convolutional Neural Network-based Image Steganography Technique for Audio-Image Hiding Algorithm DR Kishore, D Suneetha, PN Babu, P Chinababu IJEAT 9 (4), 2187-2189, 2020 | 1 | 2020 |
Skin Type Profiling through Computer Vision and Nearest Neighbor Methods for Targeted Skincare Recommendations YN Rao, LK Paleti, S Davuluri, V Boppana, JD Tiruveedhula, V Gogineni, ... Skin 28 (4s), 2025 | | 2025 |
A new enhancement in LSB-based image steganography using seven segment display pattern D Suneetha, S Nahidha, CS Kumari AIP Conference Proceedings 2796 (1), 2023 | | 2023 |
A Novel Approach for Data Security for Cloud Data using Image Steganography and Genetic Algorithms. M Seshubhavan, D Suneetha, SA Varma Grenze International Journal of Engineering & Technology (GIJET) 4 (3), 2018 | | 2018 |
Data Hiding using Cascading Feed Forward Network Prime Number Edge based Steganography. DR Kishore, D Suneetha Grenze International Journal of Engineering & Technology (GIJET) 4 (3), 2018 | | 2018 |
Performance Evaluation of Queue Based Job Sheduling Algorithms for Cloud Computing S Davuluri, L Kawitha International Journal of Research 2 (3), 99-101, 2015 | | 2015 |
Burr Type III Software Reliability Assessment Using SPC-An Order Statistics Approach K Sobhana, DRS Prasad, RK Kumar International Journal of Advance Research in Science and Engineering, 0 | | |