Sign in
T. N. Shankar
Publication Activity (10 Years)
Years Active: 2012-2024
Publications (10 Years): 7
Top Topics
Data Gathering
Illumination Invariant
Imaging Conditions
Colour Constancy
Top Venues
Wirel. Networks
Multim. Tools Appl.
Int. J. Electron. Secur. Digit. Forensics
ICCCNT
</>
Publications
</>
Naween Kumar
,
Damodar Reddy Edla
,
Dinesh Dash
,
Gandharba Swain
,
T. N. Shankar
Energy-efficient and delay-sensitive-based data gathering technique for multi-hop WSN using path-constraint mobile element.
Wirel. Networks
30 (1) (2024)
Sasmita Padhy
,
Sachikanta Dash
,
T. N. Shankar
,
Venubabu Rachapudi
,
Sandeep Kumar
,
Anand Nayyar
A hybrid crypto-compression model for secure brain mri image transmission.
Multim. Tools Appl.
83 (8) (2024)
K. Abdul Basith
,
T. N. Shankar
Hybrid state analysis with improved firefly optimized linear congestion models of WSNs for DDOS & CRA attacks.
PeerJ Comput. Sci.
8 (2022)
S. Karimulla Basha
,
T. N. Shankar
Fuzzy logic based forwarder selection for efficient data dissemination in VANETs.
Wirel. Networks
27 (3) (2021)
P. N. R. L. Chandra Sekhar
,
T. N. Shankar
Splicing forgery localisation using colour illumination inconsistencies.
Int. J. Electron. Secur. Digit. Forensics
13 (3) (2021)
P. N. R. L. Chandra Sekhar
,
T. N. Shankar
Effective splicing localization based on noise level inconsistencies.
J. Intell. Fuzzy Syst.
41 (5) (2021)
P. N. R. L. Chandra Sekhar
,
T. N. Shankar
An Object-Based Detection of Splicing Forgery using Color Illumination Inconsistencies.
ICCCNT
(2021)
T. N. Shankar
,
Gadadhar Sahoo
,
S. Niranjan
Cryptography with fast point multiplication by using ASCII codes and its implementation.
Int. J. Commun. Networks Distributed Syst.
10 (3) (2013)
T. N. Shankar
,
Gadadhar Sahoo
,
S. Niranjan
Using the Digital Signature of a Fingerprint by an Elliptic Curve Cryptosystem for Enhanced Authentication.
Inf. Secur. J. A Glob. Perspect.
21 (5) (2012)
T. N. Shankar
,
Gadadhar Sahoo
,
S. Niranjan
Steganographic manipulations with elliptic curve cryptography.
Int. J. Electron. Secur. Digit. Forensics
4 (4) (2012)