K. Thenmozhi

ORCID: 0000-0001-9829-0189
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Cellular Automata and Applications
  • Digital Media Forensic Detection
  • Cognitive Radio Networks and Spectrum Sensing
  • PAPR reduction in OFDM
  • Advanced Wireless Communication Techniques
  • Wireless Communication Networks Research
  • User Authentication and Security Systems
  • Advanced Data Compression Techniques
  • IoT and Edge/Fog Computing
  • graph theory and CDMA systems
  • Cryptographic Implementations and Security
  • Quantum Computing Algorithms and Architecture
  • Coding theory and cryptography
  • Healthcare and Environmental Waste Management
  • Power Line Communications and Noise
  • Advanced Authentication Protocols Security
  • Smart Agriculture and AI
  • Wireless Communication Security Techniques
  • DNA and Biological Computing
  • Cloud Data Security Solutions
  • Advanced MIMO Systems Optimization
  • IoT-based Smart Home Systems
  • Municipal Solid Waste Management

SASTRA University
2016-2025

B.S. Abdur Rahman Crescent Institute of Science & Technology
2024

Institute of Engineering
2022

Artificial Intelligence in Medicine (Canada)
2022

Reliance (United Kingdom)
2019

Bharathiar University
2017-2018

Anna University, Chennai
2014

Cloud services offer doctors and data scientists access to medical from multiple locations using different devices (laptops, desktops, tablets, smartphones, etc.). Therefore, cyber threats at rest, in transit when used by applications need be pinpointed prevented preemptively through a host of proven cryptographical solutions. The presented work integrates adaptive key generation, neural-based confusion non-XOR, namely DNA diffusion, which offers more extensive unique key, unpredictable...

10.3390/math11081769 article EN cc-by Mathematics 2023-04-07

Advent of wireless communication technologies, systems providing high data rates have been the watchword for researchers around globe. In their endeavor, they found leitmotivs being answered by a cutting edge technique, Orthogonal Frequency Division Multiplexing (OFDM). OFDM magic mantra is an attractive and proven next generation radio communications to provide up 54Mbps in 5 GHz band supporting both existing technologies like Wi-Fi, WiMAX 3G LTE UMB. It imperative that this widely...

10.1016/j.proeng.2012.01.929 article EN Procedia Engineering 2012-01-01

Abstract Multimedia is ruling the digital era where data storage and transmission have gained huge importance. The refuge of such transfer has been a chief apprehension becomes study in limelight, probably, forever. universal phenomenon to send desired disguise so that only beneficiary can avail it. In this paper, combination space‐filling curve with chaos used for encryption process. Initially, three chaotic sequences were generated using Chua's equations followed by quantification those...

10.1002/sec.1257 article EN Security and Communication Networks 2015-04-22

Soil fertility is an important factor in determining soil quality as it reflects how well the can support plant growth agriculture. sensor and Arduino be used to quickly determine nutrient content of soil. Nitrogen, phosphorus, potassium are all considered source components. These components should measured order much extra added increase crop fertility. detected by using NPK sensors. concentration data help us whether production nutrition deficient or abundant. The samples obtained various...

10.1109/icesc54411.2022.9885371 article EN 2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC) 2022-08-17

In the healthcare sector, e-diagnosis through medical images is essential in a multi-speciality hospital; securing becomes crucial for preserving an individual's privacy e-healthcare applications. So, this paper has proposed novel encryption scheme implemented on reconfigurable hardware. Realising image schemes FPGA hardware platforms offers substantial advantages over software implementations. The image-specific key and Hopfield Neural Network (HNN) carry out diffusion process using...

10.1038/s41598-025-88561-9 article EN cc-by-nc-nd Scientific Reports 2025-02-15

In the constantly changing digital age where instant information sharing is shared globally, content's safe delivery and privacy management have become necessary. Mainly, in multimedia data becomes massive networks, such vital vulnerable. To mitigate vulnerability over public it crucial to develop privacy-preserving algorithms system security schemes that ensure safety, ownership integrity of travels through network. The confusion diffusion strategies are significant enhancing robustness...

10.1038/s41598-025-92752-9 article EN cc-by-nc-nd Scientific Reports 2025-03-14

Our country is facing vast challenges in the environment due to waste generation some of them were: inadequate collection, transport, treatment, and disposal. One important from its inception till can't cope with current systems by an increasing urban population volumes waste, this result on public environmental health pollution. Unhygienic conditions are created flooding dustbins each day. This paper for commenting challenges, barriers, opportunities betterment segregation field management....

10.1109/iccci48352.2020.9104069 article EN 2022 International Conference on Computer Communication and Informatics (ICCCI) 2020-01-01
Coming Soon ...