Open Access
ARTICLE
K. Sundara Krishnan1,*, Syed Suhaila1, S. P. Raja2
1 Department of CSE, Alagappa Chettiar Government College of Engineering and Technology, Karaikudi, 630003, India
2 School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, 632014, India
* Corresponding Author: K. Sundara Krishnan. Email:
Intelligent Automation & Soft Computing 2022, 33(2), 1081-1101. https://doi.org/10.32604/iasc.2022.024023
Received 30 September 2021; Accepted 08 November 2021; Issue published 08 February 2022
View
Download
Like
An Effective Approach of Secured Medical Image Transmission Using Encryption Method
Ranu Gupta, Rahul Pachauri, Ashutosh...Improved Teaching-Learning-Based Optimization Algorithm for Modeling NOX Emissions of a Boiler
Xia Li, Peifeng Niu, Jianping...Reversible Data Hiding in Classification-Scrambling Encrypted-Image Based on Iterative Recovery
Yuyu Chen, Bangxu Yin, Hongjie...A Highly Effective DPA Attack Method Based on Genetic Algorithm
Shuaiwei Zhang, Xiaoyuan Yang,...A New Encryption-then-Compression Scheme on Gray Images Using the Markov Random Field
Chuntao Wang, Yang Feng, Tianzheng...