[PDF][PDF] Chain of shuffling and chaos: A tied encryptic approach

P Praveenkumar, GU Priyanga… - Asian Journal of …, 2015 - researchgate.net
The intellectual growth of computer communication lead to drastic improvement in wireless
technology and shrunken the world into palms of the user which paved the path for the …

[PDF][PDF] Light weight steganography on RISC platform-implementation and analysis

S Janakiraman, K Thenmozhi… - Asian Journal of …, 2015 - academia.edu
The emergence of modern digitization has resulted in versatility to eradicate the divergence
among the forms of information travel flanked by the users. This paper presents a pliable …

Chaotic & partial encrypted image on XOR bus-an unidentified carrier approach

P Praveenkumar, C Swathi… - 2016 International …, 2016 - ieeexplore.ieee.org
In this paper, selective encryption technique has been proposed for reducing encryption
time, where only a subset of data was compressed while satisfying the security issues. Along …

Hungarian sculptured Discrete Gould transformed bit planes-a double puzzled image

P Praveenkumar, L Kala, R Nisha… - 2015 International …, 2015 - ieeexplore.ieee.org
Many possibilities are there that the secret information will be retrieved by an intruder.
Information security is used for secure transmission of information through the …

Competition among interleavers in OFDM-an encrypted modulated modulation approach

P Praveenkumar, K Abinaya… - 2016 International …, 2016 - ieeexplore.ieee.org
Interleaving is a process of making a system efficient by arranging its data in a
noncontiguous manner. It is mostly used in wireless communication and storage systems in …

2π rotated Key2 shuffling and scrambling-a cryptic track

P Praveenkumar, GU Priyanga… - 2015 International …, 2015 - ieeexplore.ieee.org
As science grows threats also gets cultivated along with it. Hence Information security is
emerging as an integral part of growing technology. In order to achieve this we get into the …

Cellular Automata Based Key Stream Generator–A Reconfigurable Hardware Approach

S Rajagopalan, NK Sriram, V Manikandan… - … and Techniques in …, 2019 - Springer
Rapid developments in network-based application demand a special attention to protect the
confidentiality of data. Cryptographic algorithms play a lead role in ensuring confidentiality …

[PDF][PDF] Research Article Horse DNA Runs on Image: A Novel Road to Image Encryption

P Praveenkumar, P Rajalakshmi, K Thenmozhi… - 2016 - academia.edu
As there are formations there will also be every possible ways to obstruct the growth or to
destruct the grown. So the world filled with technologies needs improvisation at every stride …

[PDF][PDF] Research Article Image Merger Encryptor: A Chaotic and Chebyshev Key Approach

P Praveenkumar, R Nisha, K Thenmozhi… - 2016 - researchgate.net
In the rapid development of various expertises, the information can be misplaced, misused
and damaged. To overcome these vulnerabilities, the information security is eminent …

[CITATION][C] Why Information Security Demands Transform Domain, Compression and Encryption?

P Praveenkumar, K Thenmozhi… - Journal of …, 2014 - Asian Network for Scientific …