Follow
Siva J
Siva J
Assistant Professor, ECE, SASTRA University
Verified email at ece.sastra.edu
Title
Cited by
Cited by
Year
Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller
S Janakiraman, K Thenmozhi, JBB Rayappan, R Amirtharajan
Microprocessors and Microsystems 56, 1-12, 2018
722018
Pixel forefinger for gray in color: A layer by layer stego
S Janakiraman, R Amirtharajan, K Thenmozhi, JBB Rayappan
Information Technology Journal 11 (1), 9-19, 2012
532012
FIRMWARE for DATA SECURITY : A REVIEW
JBBR Siva Janakiraman, Rengarajan Amirtharajan, K
Research Journal of Information Technology 4 (3), 61-72, 2012
51*2012
Hide and seek in silicon–Performance analysis of Quad block Equisum Hardware Steganographic systems
S Rajagopalan, S Janakiraman, HN Upadhyay, K Thenmozhi
Procedia Engineering 30, 806-813, 2012
252012
Analyzing the Performance of Diverse LEACH Algorithms for Wireless Sensor Networks
J Anand, JJ Tamilselvi, S Janakiraman
International Journal of Advanced Networking and Applications 4 (3), 1610, 2012
122012
Pixel bit manipulation for encoded hiding - An inherent stego
S Janakiraman, AA Mary, J Chakravarthy, R Amirtharajan, K Thenmozhi, ...
ICCCI 2012, 1-6, 2012
11*2012
Humming bird with coloured wings: A feedback security approach
S Janakiraman, K Kumar, RRK Reddy, A Srinivasulu, R Amirtharajan, ...
Inform. Technol. J 13, 2022-2026, 2014
92014
Cover as key and key as data: An inborn stego
S Janakiraman, J Chakravarthy, B Radhakrishnan, K Thenmozhi, ...
Inform. Technol. J 13, 1969-1976, 2014
82014
Cellular automata+ LFSR+ synthetic image: a trio approach to image encryption
S Rajagopalan, S Rethinam, S Janakiraman, HN Upadhyay, ...
2017 International Conference on Computer Communication and Informatics …, 2017
72017
Space filling curve for data filling: An embedded security approach
JBBRRA Siva Janakiraman, K. Thenmozhi, Sundararaman Rajagopalan, Har Narayan ...
Research Journal of Information Technology 6 (3), 188-197, 2014
7*2014
Reflective code for gray block embedding
S Janakiraman, N Suriya, V Nithiya, B Radhakrishnan, J Ramanathan, ...
International Conference on Pattern Recognition, Informatics and Medical …, 2012
72012
Graphical password authentication scheme for embedded platform
S Janakiraman, K Thenmozhi, JBB Rayappan, R Amirtharajan
J. Artif. Intell 7, 161-171, 2014
62014
Light weight steganography on RISC platform-implementation and analysis
S Janakiraman, K Thenmozhi, JBB Rayappan, R Amirtharajan
Asian Journal of Scientific Research 8 (3), 278-290, 2015
52015
Audio fingerprint indicator in embedded platform: A way for hardware steganography
R Amirtharajan
Journal of Artificial Intelligence 7 (2), 82-93, 2014
52014
Sdr and error correction using convolution encoding with viterbi decoding
SK Vasudevan, S Janakiraman, S Vasudevan
Journal of Emerging Technologies in Web Intelligence 2 (2), 122-130, 2010
42010
A visible watermarking scheme for digital images in frequency domain
DRD Brabin, JJ Tamilselvi, S Janakiraman
International Journal of Advanced Networking and Applications 4 (3), 1635, 2012
32012
Smart bit manipulation for K bit encoded hiding in K-1 pixel bits
S Janakiraman, AA Mary, J Chakravarthy, R Amirtharajan, K Thenmozhi, ...
3rd International Conference on Trendz in Information Sciences & Computing …, 2011
32011
Compiler optimization and plain text pre-processing to hoist the height of HIGHT in AVR platform
S Janakiraman, K Thenmozhi, JBB Rayappan, R Amirtharajan
Res. J. Inform. Technol 6, 356-367, 2014
22014
Numerical password via graphical input—An authentication system on embedded platform
S Janakiraman, KS VS, C Pulluri, S Rajagopalan, K Thenmozhi, ...
2017 International Conference on Computer Communication and Informatics …, 2017
12017
Graphics control on LCD via digital accelerometer—An open maze game
S Janakiraman, C Pulluri, K Thenmozhi, VSK Sri, S Rajagopalan, ...
2017 International Conference on Computer Communication and Informatics …, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20