S. Geetha

Orcid: 0000-0002-6850-9423

Affiliations:
  • Vellore Institute of Technology, School of Computing Science and Engineering, Chennai, India
  • Thiagarajar College of Engineering, Department of Information Technology, Madurai, India (former)


According to our database1, S. Geetha authored at least 57 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An adaptive neuro fuzzy methodology for the diagnosis of prenatal hypoplastic left heart syndrome from ultrasound images.
Multim. Tools Appl., March, 2024

2023
Vision based leather defect detection: a survey.
Multim. Tools Appl., 2023

Ensemble Learning Based Social Engineering Fraud Detection Module for Cryptocurrency Transactions.
Proceedings of the Mining Intelligence and Knowledge Exploration, 2023

2022
MULBER: Effective Android Malware Clustering Using Evolutionary Feature Selection and Mahalanobis Distance Metric.
Symmetry, 2022

Zero-Day Malware Detection and Effective Malware Analysis Using Shapley Ensemble Boosting and Bagging Approach.
Sensors, 2022

On Shielding Android's Pending Intent from Malware Apps Using a Novel Ownership-Based Authentication.
J. Circuits Syst. Comput., 2022

Detection of COVID-19 Cases from Chest X-Rays using Deep Learning Feature Extractor and Multilevel Voting Classifier.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2022

Explainable Machine Learning For Malware Detection Using Ensemble Bagging Algorithms.
Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing, 2022

2021
Steganogram removal using multidirectional diffusion in fourier domain while preserving perceptual image quality.
Pattern Recognit. Lett., 2021

Vision based inspection system for leather surface defect detection using fast convergence particle swarm optimization ensemble classifier approach.
Multim. Tools Appl., 2021

An Efficient Steganalysis of Medical Images by Using Deep Learning Based Discrete Scalable Alex Net Convolutionary Neural Networks Classifier.
J. Medical Imaging Health Informatics, 2021

An Efficient DenseNet-Based Deep Learning Model for Malware Detection.
Entropy, 2021

A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks.
Comput. Electr. Eng., 2021

PEVRM: Probabilistic Evolution Based Version Recommendation Model for Mobile Applications.
IEEE Access, 2021

2020
Embedding electronic patient information in clinical images: an improved and efficient reversible data hiding technique.
Multim. Tools Appl., 2020

Multi-Layered "Plus-Minus one" Reversible Data Embedding Scheme.
J. Inf. Hiding Multim. Signal Process., 2020

Effective image stego intrusion detection system using statistical footprints of the steganogram and fusion of classifiers.
Int. J. Comput. Aided Eng. Technol., 2020

Intelligent Vision-Based Malware Detection and Classification Using Deep Random Forest Paradigm.
IEEE Access, 2020

2019
Partial DCT-based cancelable biometric authentication with security and privacy preservation for IoT applications.
Multim. Tools Appl., 2019

A lightweight machine learning-based authentication framework for smart IoT devices.
Inf. Sci., 2019

Enhancing the JPEG image steganography security by RSA and attaining high payload using advanced DCT replacement method and modified quantisation table.
Int. J. Bus. Intell. Data Min., 2019

Multi label learning approaches for multi species avifaunal occurrence modelling: a case study of south eastern Tamil Nadu.
Int. J. Bus. Intell. Data Min., 2019

Adaptable and proficient Hellinger Coefficient Based Collaborative Filtering for recommendation system.
Clust. Comput., 2019

Data mining application on aviation accident data for predicting topmost causes for accidents.
Clust. Comput., 2019

Improving image steganalyser performance through curvelet transform denoising.
Clust. Comput., 2019

Towards Efficient Malware Detection and Classification using Multilayered Random Forest Ensemble Technique.
Proceedings of the 2019 International Carnahan Conference on Security Technology, 2019

Vision-Based Malware Detection and Classification Using Lightweight Deep Learning Paradigm.
Proceedings of the Computer Vision and Image Processing - 4th International Conference, 2019

2018
High performance reversible data hiding scheme through multilevel histogram modification in lifting integer wavelet transform.
Multim. Tools Appl., 2018

A Literature Review on Image Encryption Techniques.
Int. J. Inf. Secur. Priv., 2018

Intelligent Malware Detection using Oblique Random Forest Paradigm.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

2017
Visual cryptography: A brief survey.
Inf. Secur. J. A Glob. Perspect., 2017

A novel adaptive feature selector for supervised classification.
Inf. Process. Lett., 2017

2016
Stego anomaly detection in images exploiting the curvelet higher order statistics using evolutionary support vector machine.
Multim. Tools Appl., 2016

A novel memetic algorithm for discovering knowledge in binary and multi class predictions based on support vector machine.
Appl. Soft Comput., 2016

ECG Steganography to secure patient data in an E-Healthcare System.
Proceedings of the WIR '16: Women in Research 2016, Indore India, March, 2016, 2016

Dynamic sectored random projection for cancelable iris template.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Multilevel RDH scheme using image interpolation.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Cancelable Biometric Template Security Using Segment-Based Visual Cryptography.
Proceedings of International Conference on Computer Vision and Image Processing, 2016

2014
High payload image steganography with reduced distortion using octonary pixel pairing scheme.
Multim. Tools Appl., 2014

Enhancing E-Payment Security through Biometric Based Personal Authentication Using Steganography Scheme - B-PASS.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

2013
Performance Tuning of PCA by CFS-Shapley Ensemble and Its Application to Medical Diagnosis.
Proceedings of the Pattern Recognition and Machine Intelligence, 2013

RF-SEA-Based Feature Selection for Data Classification in Medical Domain.
Proceedings of the Intelligent Computing, 2013

2012
Evolving optimised decision rules for intrusion detection using particle swarm paradigm.
Int. J. Syst. Sci., 2012

Decision tree based light weight intrusion detection using a wrapper approach.
Expert Syst. Appl., 2012

Trust based secure multipath OLSR routing protocol in MANET using fuzzy theory.
Proceedings of the Second International Conference on Computational Science, 2012

2011
MBNS Steganogram Detection and Payload Capacity Estimation Exploiting the Statistical Moments of Entropy Measure.
Inf. Secur. J. A Glob. Perspect., 2011

Varying radix numeral system based adaptive image steganography.
Inf. Process. Lett., 2011

2010
Evolving decision tree rule based system for audio stego anomalies detection based on Hausdorff distance statistics.
Inf. Sci., 2010

Passive steganalysis based on higher order image statistics of curvelet transform.
Int. J. Autom. Comput., 2010

Audio steganalysis with Hausdorff distance higher order statistics using a rule based decision tree paradigm.
Expert Syst. Appl., 2010

Optimized Image Steganalysis through Feature Selection using MBEGA
CoRR, 2010

2009
Detection of Stego Anomalies in Images Exploiting the Content Independent Statistical Footprints of the Steganograms.
Informatica (Slovenia), 2009

A neuro-genetic based short-term forecasting framework for network intrusion prediction system.
Int. J. Autom. Comput., 2009

Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system.
Comput. Secur., 2009

High Performance Image Steganalysis Through Stego Sensitive Feature Selection Using MBEGA.
Proceedings of the First International Conference on Networks and Communications, 2009

2008
Close Color Pair Signature ensemble Adaptive Threshold based Steganalsis for LSB Embedding in Digital Images.
Trans. Data Priv., 2008

2006
An Active Rule Based Approach to Audio Steganalysis with a Genetic Algorithm.
Proceedings of the First IEEE International Conference on Digital Information Management (ICDIM), 2006


  Loading...