
S. Geetha 0001
Person information
- affiliation: Vellore Institute of Technology, School of Computing Science and Engineering, Chennai, India
- affiliation (former): Thiagarajar College of Engineering, Department of Information Technology, Madurai, India
Other persons with the same name
- S. Geetha — disambiguation page
- S. Geetha 0002
— Institute of Technology, Coimbatore, India
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j29]M. Maheswari, S. Geetha
, S. Selva Kumar
, Marimuthu Karuppiah
, Debabrata Samanta
, YoHan Park
:
PEVRM: Probabilistic Evolution Based Version Recommendation Model for Mobile Applications. IEEE Access 9: 20819-20827 (2021) - 2020
- [j28]S. Abijah Roseline, S. Geetha
, Seifedine Nimer Kadry
, Yunyoung Nam
:
Intelligent Vision-Based Malware Detection and Classification Using Deep Random Forest Paradigm. IEEE Access 8: 206303-206324 (2020) - [j27]J. Hemalatha, M. K. Kavitha Devi, S. Geetha:
Effective image stego intrusion detection system using statistical footprints of the steganogram and fusion of classifiers. Int. J. Comput. Aided Eng. Technol. 13(3): 325-340 (2020) - [j26]R. Geetha
, S. Geetha
:
Embedding electronic patient information in clinical images: an improved and efficient reversible data hiding technique. Multim. Tools Appl. 79(19-20): 12869-12890 (2020)
2010 – 2019
- 2019
- [j25]S. Koteeswaran
, N. Malarvizhi, E. Kannan, S. Sasikala, S. Geetha:
Data mining application on aviation accident data for predicting topmost causes for accidents. Clust. Comput. 22(5): 11379-11399 (2019) - [j24]J. Hemalatha, M. K. Kavitha Devi, S. Geetha
:
Improving image steganalyser performance through curvelet transform denoising. Clust. Comput. 22(5): 11821-11839 (2019) - [j23]M. Maheswari, S. Geetha
, S. Selvakumar:
Adaptable and proficient Hellinger Coefficient Based Collaborative Filtering for recommendation system. Clust. Comput. 22(5): 12325-12338 (2019) - [j22]J. Hemalatha, M. K. Kavitha Devi
, S. Geetha
:
Enhancing the JPEG image steganography security by RSA and attaining high payload using advanced DCT replacement method and modified quantisation table. Int. J. Bus. Intell. Data Min. 14(1/2): 138-154 (2019) - [j21]S. Appavu alias Balamurugan, P. K. A. Chitra, S. Geetha:
Multi label learning approaches for multi species avifaunal occurrence modelling: a case study of south eastern Tamil Nadu. Int. J. Bus. Intell. Data Min. 15(4): 449-477 (2019) - [j20]P. Punithavathi, S. Geetha, Marimuthu Karuppiah
, SK Hafizul Islam
, Mohammad Mehedi Hassan
, Kim-Kwang Raymond Choo
:
A lightweight machine learning-based authentication framework for smart IoT devices. Inf. Sci. 484: 255-268 (2019) - [j19]P. Punithavathi, S. Geetha:
Partial DCT-based cancelable biometric authentication with security and privacy preservation for IoT applications. Multim. Tools Appl. 78(18): 25487-25514 (2019) - [c12]S. Abijah Roseline, G. Hari, S. Geetha
, R. Krishnamurthy:
Vision-Based Malware Detection and Classification Using Lightweight Deep Learning Paradigm. CVIP (2) 2019: 62-73 - 2018
- [j18]S. Geetha, P. Punithavathi, A. Magnus Infanteena, Siva S. Sivatha Sindhu:
A Literature Review on Image Encryption Techniques. Int. J. Inf. Secur. Priv. 12(3): 42-83 (2018) - [j17]S. Subburam, S. Selvakumar, S. Geetha
:
High performance reversible data hiding scheme through multilevel histogram modification in lifting integer wavelet transform. Multim. Tools Appl. 77(6): 7071-7095 (2018) - [c11]S. Abijah Roseline, S. Geetha
:
Intelligent Malware Detection using Oblique Random Forest Paradigm. ICACCI 2018: 330-336 - 2017
- [j16]S. Sasikala, S. Appavu alias Balamurugan, S. Geetha:
A novel adaptive feature selector for supervised classification. Inf. Process. Lett. 117: 25-34 (2017) - [j15]P. Punithavathi
, S. Geetha:
Visual cryptography: A brief survey. Inf. Secur. J. A Glob. Perspect. 26(6): 305-317 (2017) - 2016
- [j14]S. Sasikala, S. Appavu alias Balamurugan, S. Geetha:
A novel memetic algorithm for discovering knowledge in binary and multi class predictions based on support vector machine. Appl. Soft Comput. 49: 407-422 (2016) - [j13]S. Muthuramalingam, N. Karthikeyan, S. Geetha, Siva S. Sivatha Sindhu:
Stego anomaly detection in images exploiting the curvelet higher order statistics using evolutionary support vector machine. Multim. Tools Appl. 75(21): 13627-13661 (2016) - [c10]P. Punithavathi, S. Geetha:
Cancelable Biometric Template Security Using Segment-Based Visual Cryptography. CVIP (1) 2016: 511-521 - [c9]P. Punithavathi, S. Geetha:
Dynamic sectored random projection for cancelable iris template. ICACCI 2016: 711-715 - [c8]R. Geetha
, S. Geetha
:
Multilevel RDH scheme using image interpolation. ICACCI 2016: 1952-1956 - [c7]Dolly Meghani, S. Geetha
:
ECG Steganography to secure patient data in an E-Healthcare System. WIR 2016: 66-70 - 2014
- [j12]C. Balasubramanian, S. Selvakumar, S. Geetha
:
High payload image steganography with reduced distortion using octonary pixel pairing scheme. Multim. Tools Appl. 73(3): 2223-2245 (2014) - [c6]Balasubramanian Chelliah, S. Geetha
:
Enhancing E-Payment Security through Biometric Based Personal Authentication Using Steganography Scheme - B-PASS. SNDS 2014: 461-472 - 2013
- [c5]S. Sasikala, S. Appavu alias Balamurugan, S. Geetha:
RF-SEA-Based Feature Selection for Data Classification in Medical Domain. ICACNI 2013: 599-608 - [c4]S. Sasikala, S. Appavu alias Balamurugan, S. Geetha:
Performance Tuning of PCA by CFS-Shapley Ensemble and Its Application to Medical Diagnosis. PReMI 2013: 53-59 - 2012
- [j11]Siva S. Sivatha Sindhu, S. Geetha, Arputharaj Kannan
:
Decision tree based light weight intrusion detection using a wrapper approach. Expert Syst. Appl. 39(1): 129-141 (2012) - [j10]Siva S. Sivatha Sindhu, S. Geetha, Arputharaj Kannan
:
Evolving optimised decision rules for intrusion detection using particle swarm paradigm. Int. J. Syst. Sci. 43(12): 2334-2350 (2012) - [c3]S. Geetha
, G. Geetha Ramani:
Trust based secure multipath OLSR routing protocol in MANET using fuzzy theory. CCSEIT 2012: 120-125 - 2011
- [j9]S. Geetha, V. Kabilan, S. P. Chockalingam, N. Kamaraj:
Varying radix numeral system based adaptive image steganography. Inf. Process. Lett. 111(16): 792-797 (2011) - [j8]S. Geetha, N. Kamaraj:
MBNS Steganogram Detection and Payload Capacity Estimation Exploiting the Statistical Moments of Entropy Measure. Inf. Secur. J. A Glob. Perspect. 20(2): 78-90 (2011) - 2010
- [j7]S. Geetha, N. Ishwarya, N. Kamaraj:
Audio steganalysis with Hausdorff distance higher order statistics using a rule based decision tree paradigm. Expert Syst. Appl. 37(12): 7469-7482 (2010) - [j6]S. Geetha, Siva S. Sivatha Sindhu, N. Kamaraj:
Passive steganalysis based on higher order image statistics of curvelet transform. Int. J. Autom. Comput. 7(4): 531-542 (2010) - [j5]S. Geetha, N. Ishwarya, N. Kamaraj:
Evolving decision tree rule based system for audio stego anomalies detection based on Hausdorff distance statistics. Inf. Sci. 180(13): 2540-2559 (2010) - [i1]S. Geetha, N. Kamaraj:
Optimized Image Steganalysis through Feature Selection using MBEGA. CoRR abs/1008.2824 (2010)
2000 – 2009
- 2009
- [j4]S. Geetha, Siva S. Sivatha Sindhu, N. Kamaraj:
Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system. Comput. Secur. 28(7): 683-697 (2009) - [j3]Siva S. Sivatha Sindhu, S. Geetha, M. Marikannan, Arputharaj Kannan
:
A neuro-genetic based short-term forecasting framework for network intrusion prediction system. Int. J. Autom. Comput. 6(4): 406 (2009) - [j2]S. Geetha, Siva S. Sivatha Sindhu, N. Kamaraj:
Detection of Stego Anomalies in Images Exploiting the Content Independent Statistical Footprints of the Steganograms. Informatica (Slovenia) 33(1): 25-40 (2009) - [c2]S. Geetha, Siva S. Sivatha Sindhu, V. Kabilan, N. Kamaraj:
High Performance Image Steganalysis Through Stego Sensitive Feature Selection Using MBEGA. NetCoM 2009: 113-118 - 2008
- [j1]S. Geetha, Siva S. Sivatha Sindhu, N. Kamaraj:
Close Color Pair Signature ensemble Adaptive Threshold based Steganalsis for LSB Embedding in Digital Images. Trans. Data Priv. 1(3): 140-161 (2008) - 2006
- [c1]S. Geetha, Siva S. Sivatha Sindhu, Arputharaj Kannan
:
An Active Rule Based Approach to Audio Steganalysis with a Genetic Algorithm. ICDIM 2006: 131-136
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-03-05 22:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint