Back close
Publications
OR Operation Based Deterministic Extended Visual Cryptography Using Complementary Cover Images

Citation : Praveen, K., G. Indhu,M. Sethumadhavan., OR Operation Based Deterministic Extended Visual Cryptograp ...

Publisher :Springer

Publications
Fraud Detection in Medical Insurance Claim with Privacy Preserving Data Publishing in TLS-N Using Blockchain

Citation : Mohan, Thanusree, Praveen, K., Fraud Detection in Medical Insurance Claim with Privacy Preserving Da ...

Publisher :Springer

Publications
Data Obfuscation Using Secret Sharing

Citation : Sidhardhan, Manasa, Praveen, K., Data Obfuscation Using Secret Sharing, ICAICR 2019, Communications ...

Publisher :Springer

Publications
PUF Authentication using Visual Secret Sharing Scheme

Citation : Naveen, Devarapalli, Praveen, K., PUF Authentication using Visual Secret Sharing Scheme, ICACCS 2019 ...

Publisher :IEEE

Publications
Variant of Nearest Neighborhood Fingerprint Storage System by Reducing Redundancies

Citation : Anjana, K., Praveen, K., et al., Variant of Nearest Neighborhood Fingerprint Storage System by Reduc ...

Publisher :Springer

Publications
Preserving the Privacy of Audio File Using Ideal Secret Sharing Scheme with Cloud Storage

Citation : Mohan, Meghna Ashoka, T. V. Jayakumar, Praveen, K., Preserving the Privacy of Audio File Using Ideal ...

Publisher :Springer

Publications
Application of Visual Cryptography Scheme in Software Watermarking

Citation : R. M. Jacob, Praveen, K., Amritha. P.P., Application of Visual Cryptography Scheme in Software Water ...

Publisher :IEEE

Publications
Towards the Detection of Phishing Attacks

Citation : Athulya. A.A., Praveen, K., Towards the Detection of Phishing Attacks, ICOEI 2020, IEEE Xplore.

Publisher :IEEE

Publications
Role Mining in Distributed Firewall Using Matrix Factorization Methods

Citation : Aravind. D. D., Praveen, K., Role Mining in Distributed Firewall Using Matrix Factorization Methods, ...

Publisher :IEEE

Publications
Application of Secret Sharing Scheme in Software Watermarking

Citation : Aiswarya K.K., Praveen, K., Amritha P.P., Sethumadhavan M., Application of Secret Sharing Scheme in ...

Publisher :Springer

Publications
Dynamic Watermarking Using Python AST

Citation : V. Vivekananthan, Praveen, K., M. Sethumadhavan., Dynamic Watermarking Using Python AST, Proceedings ...

Publisher :Springer

Publications
(t, k, n)-Deterministic Extended Visual Secret Sharing Scheme Using Combined Boolean Operations

Citation : L. Chandana Priya, Praveen, K., (t, k, n)-Deterministic Extended Visual Secret Sharing Scheme Using ...

Publisher :Springer

Admissions Apply Now