Search Results - "Kumar Morampudi, Mahesh"

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    A Systematic Review on Blockchain-Enabled Internet of Vehicles (BIoV): Challenges, Defenses, and Future Research Directions by Surapaneni, Praneetha, Bojjagani, Sriramulu, Bharathi, V. C., Kumar Morampudi, Mahesh, Kumar Maurya, Anup, Khurram Khan, Muhammad

    Published in IEEE access (2024)
    “…In the field of vehicular communication, the Internet of Vehicles (IoV) serves as a new era that guarantees increased connectivity, efficiency, and safety. The…”
    Get full text
    Journal Article
  2. 2

    Image Description Generator using Residual Neural Network and Long Short-Term Memory by Morampudi, Mahesh Kumar, Gonthina, Nagamani, Bhaskar, Nuthanakanti, Reddy, V. Dinesh

    Published in Computer science journal of Moldova (01-04-2023)
    “…Human beings can describe scenarios and objects in a picture through vision easily whereas performing the same task with a computer is a complicated one…”
    Get full text
    Journal Article
  3. 3

    SviaB: Secure and verifiable multi‐instance iris remote authentication using blockchain by Morampudi, Mahesh Kumar, Prasad, Munaga V. N. K., Raju Undi, Surya Narayana

    Published in IET biometrics (01-01-2022)
    “…Homomorphic encryption (HE) is the most widely explored research area in the construction of privacy‐preserving biometric authentication systems because of its…”
    Get full text
    Journal Article
  4. 4

    Privacy-preserving bimodal authentication system using Fan-Vercauteren scheme by Morampudi, Mahesh Kumar, Sandhya, Mulagala, Dileep, Mulagala

    Published in Optik (Stuttgart) (01-03-2023)
    “…The requirement of a person to be available during the authentication made the biometric authentication to be used in abundant applications over password or…”
    Get full text
    Journal Article
  5. 5

    Multi-instance cancelable iris authentication system using triplet loss for deep learning models by Sandhya, Mulagala, Morampudi, Mahesh Kumar, Pruthweraaj, Indragante, Garepally, Pranay Sai

    Published in The Visual computer (01-04-2023)
    “…Many government and commercial organizations are using biometric authentication systems instead of a password or token-based authentication systems. They are…”
    Get full text
    Journal Article
  6. 6

    A discrete cosine transform-based intelligent image steganography scheme using quantum substitution box by Maurya, Sonam, Nandu, Nainil, Patel, Tanay, Reddy, V. Dinesh, Tiwari, Sushil, Morampudi, Mahesh Kumar

    Published in Quantum information processing (10-05-2023)
    “…Everyday dealing with enormous amounts of sensitive data requires its protection and communication over the insecure network. The field of ‘Steganography’…”
    Get full text
    Journal Article
  7. 7

    Detection of Diabetic Retinopathy (DR) Severity from Fundus Photographs: An Ensemble Approach Using Weighted Average by Sandhya, Mulagala, Morampudi, Mahesh Kumar, Grandhe, Rushali, Kumari, Richa, Banda, Chandanreddy, Gonthina, Nagamani

    “…Diabetic retinopathy is a common diabetic disease that affects the retina and can result to blindness if not treated initially. Deep learning (DL)-based models…”
    Get full text
    Journal Article
  8. 8

    Secure and verifiable iris authentication system using fully homomorphic encryption by Morampudi, Mahesh Kumar, Prasad, Munaga V.N.K., Verma, Mridula, Raju, U.S.N.

    Published in Computers & electrical engineering (01-01-2021)
    “…With the escalated usage of a biometric authentication system (BAS), template protection for biometrics attracted research interest in recent years. The…”
    Get full text
    Journal Article
  9. 9

    Privacy-preserving iris authentication using fully homomorphic encryption by Morampudi, Mahesh Kumar, Prasad, Munaga V. N. K., Raju, U. S. N.

    Published in Multimedia tools and applications (01-07-2020)
    “…Rapid advancement in technology has led to the use of biometric authentication in every field. In particular, from the past few years, iris recognition systems…”
    Get full text
    Journal Article
  10. 10

    Privacy-preserving and verifiable multi-instance iris remote authentication using public auditor by Morampudi, Mahesh Kumar, Prasad, Munaga V. N. K., Raju, U. S. N.

    “…Homomorphic Encryption (HE) is the most widely explored research area to construct privacy-preserving biometric authentication systems due to its advantages…”
    Get full text
    Journal Article
  11. 11

    Reliable and privacy-preserving multi-instance iris verification using Paillier homomorphic encryption and one-digit checksum by Morampudi, Mahesh Kumar, Gonthina, Nagamani, Bojjagani, Sriramulu, Sharma, Neeraj Kumar, Veeraiah, Duggineni

    Published in Signal, image and video processing (01-06-2024)
    “…The utilization of a biometric authentication system (BAS) for reliable automatic human recognition has increased exponentially in recent years over…”
    Get full text
    Journal Article
  12. 12

    Enhanced resource provisioning and migrating virtual machines in heterogeneous cloud data center by Vemula, Dinesh Reddy, Morampudi, Mahesh Kumar, Maurya, Sonam, Abdul, Ashu, Hussain, Md. Muzakkir, Kavati, Ilaiah

    “…Data centers have become an indispensable part of modern computing infrastructures. It becomes necessary to manage cloud resources efficiently to reduce those…”
    Get full text
    Journal Article
  13. 13

    Multi-instance iris remote authentication using private multi-class perceptron on malicious cloud server by Morampudi, Mahesh Kumar, Veldandi, Sowmya, Prasad, Munaga V. N. K., Raju, U. S. N.

    “…In recent years, biometric authentication system ( BAS ) has become the most promising and popular authentication system in identity management. Due to its…”
    Get full text
    Journal Article
  14. 14

    Analyzing Student Performance in Programming Education Using Classification Techniques by Morampudi, Mahesh Kumar, Gonthina, Nagamani, Reddy, V. Dinesh, Rao, Katta Subba

    “…Programming Skills play a crucial role in any computer engineering student's life to apply the concepts in solving any real world problem as well to crack a…”
    Get full text
    Conference Proceeding