| Author(s) | Title of Paper | Journal | Volume (No.) | Page numbers | Year | Impact Factor of the Journal (Optional) | 
		
			| C. Nandhini, M. Brindha | Hierarchical Patch Selection: An Improved Patch Sampling for No Reference Image Quality Assessment | IEEE Transactions on Artificial Intelligence |  |  | 2023 |  | 
		
			| M Devipriya, M Brindha | Image Encryption Using Chaos Based Heuristic Diffusion | SN Computer Science | Vol. 4 |  | 2023 | 1.2 | 
		
			| Janani Thiyagarajan, M. Brindha | A Privacy Preserving Transfer Learning based Secure Quantum Image Retrieval in Encrypted Domain for Cloud Environment | Journal of Electronic Imaging, SPIE | Vol. 32, No. 3 |  | 2023 |  | 
		
			| C Madan Kumar, Ruhul Amin, M Brindha | Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication Protocol for Telecare Medical Information System | Cyber Security and applications, Elsevier | Vol. 1 |  | 2023 |  | 
		
			| M Devipriya, M Brindha | Reconfigurable architecture for image encryption using three-layer artificial neural network | IETE Journal of Research |  |  | 2022 |  | 
		
			| M Devipriya, M Brindha | Reconfigurable architecture for DNA diffusion technique based medical image encryption | Journal of Circuits, Systems, and Computers, World scientific | Vol. 32, No. 4 | 2350065 | 2023 |  | 
		
			| C Madan Kumar, Ruhul Amin, M Brindha | Cryptanalysis and Improvement of REAS-TMIS: Resource-Efficient Authentication Scheme for Telecare Medical Information System | Security and Privacy, Wiley | Vol. 6, No. 1 |  | 2023 |  | 
		
			| C. Nandhini, M. Brindha | Transfer learning based SSD model for helmet and multiple rider detection | International Journal of Information Technology, Springer | Vol. 15 | 565–576 | 2023 |  | 
		
			| C Madan Kumar, Ruhul Amin, M Brindha | SafeCom: Robust Mutual Authentication and Session Key Sharing Protocol for Underwater Wireless sensor networks | Journal of systems architecture, Elsevier | Vol. 130 | 102650 | 2022 | 5.836 | 
		
			| Vinod Ramesh Falmari, Seokbum Ko, M Brindha | Secure Covid-19 Electronic Health Records Management for Telediagnosis and Travel Ticket Assistant System Using Cryptographic Approaches | SN Computer science | Vol. 3 | 403 | 2022 | 1.2 | 
		
			| Devipriya Manivannan, M Brindha | Image encryption using modified perfect shuffle-based bit-level permutation and learning with errors-based diffusion for IoT devices | Computers and Electrical Engineering | Vol. 100 | 107954 | 2022 | 4.152 | 
		
			| Devipriya Manivannan, M Brindha | Secure Image Cloud Storage Using Homomorphic Password Authentication with ECC-Based Cryptosystem | Advances in Systems Science and Applications | Vol. 22 | 92-116 | 2022 | 1.2 | 
		
			| M.Brindha Deebthik Ravi, Sashank Ramachandran, Raahul Vignesh, Vinod Ramesh Falmari | Privacy-preserving transparent supply chain management through Hyperledger Fabric | Blockchain: Research and Applications | Vol. 3 | 100072 | 2022 |   | 
		
			| R. Vidhya, M. Brindha | A novel approach for Chaotic image Encryption based on block level permutation and bit-wise substitution | Multimedia Tools and Applications | Vol. 81  | 3735–3772 | 2022 | 2.757 | 
		
			| C Madan Kumar, R Vidhya, M Brindha | An efficient chaos-based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function | Journal of Applied Intelligence | Vol. 52 | 2556–2585 | 2022 | 5.086 | 
		
			| Vinod Ramesh Falmari, M Brindha | Privacy-preserving biometric authentication using Chaos on a remote untrusted server | Journal of Measurement | Vol. 177 | 109257 | 2021 | 3.927 | 
		
			| T Janani, Y Darak, M Brindha | Secure similar image search and copyright protection over encrypted medical image databases | IRBM | Vol. 42, Issue 2 | 83-93 | 2021 | 1.856 | 
		
			| R. Vidhya, M. Brindha | Evaluation and performance analysis of Chinese remainder theorem and its application to lossless image compression | Journal of Ambient Intelligence and Humanized Computing |   |   | 2021 | 7.104 | 
		
			| T. Janani, M. Brindha | Secure Similar Image Matching (SESIM): An Improved Privacy-Preserving Image Retrieval Protocol over Encrypted Cloud Database | IEEE Transactions on Multimedia |   |   | 2021 | 6.513 | 
		
			| Shwetha Sridharan, Deepti Saravanan, Akshaya Kesarimangalam Srinivasan, M. Brindha | Adaptive learning management expert system with evolving knowledge base and enhanced learnability | Education and Information Technologies | Vol. 26 |  5895–5916 | 2021 | 2.917 | 
		
			| T. Janani, M. Brindha | A secure medical image transmission scheme aided by quantum representation | Journal of Information Security and Applications | Vol. 59 | 102832 | 2021 | 3.872 | 
		
			| J Thiyagarajan, A Akash, Brindha Murugan | Improved real-time permission-based malware detection and clustering approach using model-independent pruning | IET Information Security | Vol. 14, Issue 6 | 531-541 | 2020 | 1.068 | 
		
			| Vinod Ramesh Falmari, M Brindha | Privacy-preserving cloud-based secure digital locker using Paillier-based difference function and chaos-based cryptosystem | Journal of Information Security and Applications | Vol. 53 | 102513 | 2020 | 3.872 | 
		
			| R Vidhya, M.Brindha | A Novel Dynamic Chaotic Image Encryption using Butterfly Network Topology-based Diffusion and Decision-based Permutation | Multimedia Tools and Applications | Vol. 79 | 30281–30310 | 2020 | 2.757 | 
		
			| R Vidhya, M.Brindha, N.Ammasai Gounden | Analysis of zig-zag scan-based modified feedback convolution algorithm against differential attacks and its application to image encryption | Journal of Applied Intelligence | Vol. 50 |  3101–3124 | 2020 | 5.086 | 
		
			| R Vidhya, M.Brindha | A novel Chaotic Butterfly Network Topology-based block Scrambling and Crown Graph-based Bit-wise Diffusion for Image Encryption | Frontiers of Computer Science | Vol. 15 |   | 2021 | 2.061 | 
		
			| R Vidhya, M.Brindha | A Novel Conditional Butterfly Network Topology-based Chaotic Image Encryption | Journal of Information Security and Applications | Vol. 52 | 102484 | 2020 | 3.872 | 
		
			| R Vidhya, M.Brindha | A chaos-based image encryption algorithm using Rubik’s cube and prime factorization process (CIERPF) | Journal of King Saud University - Computer and Information Sciences |   |   | 2020 | 13.473 | 
		
			| R Vidhya, M.Brindha & N.Ammasai Gounden | A secure image encryption algorithm based on a parametric switching chaotic system | Chinese Journal of Physics   | Vol. 62 | 26-42 | 2019 | 3.237 | 
		
			| J Thiyagarajan, B Murugan, NGA Gounden   | A chaotic image encryption scheme with a complex diffusion matrix for plain image sensitivity   | Serbian Journal of Electrical Engineering | Vol. 16, Issue 2 | 247-265 | 2019 | 0.547 | 
		
			| R Vidhya, M Brindha | A novel Dynamic Key-based chaotic image encryption. | J. Internet Serv. Inf. Secure. | Vol. 8, Issue 1 | 46-55 | 2018 |   | 
		
			| M.Brindha & N.Ammasai Gounden | Chaos-based image encryption andlossless compression algorithm using a hash table and the Chinese Remainder Theorem | Applied Soft Computing (Elsevier) | Vol. 40 | 379-390 | 2016 | 6.725 | 
		
			| M.Brindha & N.Ammasai Gounden | Image encryption scheme based on block-based confusion and multiple levels of diffusion | IET Computer Vision | Vol.10, Issue.6 | 593- 602 | 2016 | 1.516 | 
		
			| M.Brindha, N. Ammasai Gounden. And M. Sriram | hybrid image encryption algorithm using chaos and Conway's game-of-life cellular automata | Security and Communication Networks (Wiley) | Vol.9, No.7 | 634-651 | 2015 | 1.791 | 
		
			| S.Subash Dangol, S.Selvakumar            and M.Brindha | Genuine ARP(GARP) - A Broadcast-based Stateful Authentication Protocol | ACM. Sig soft Software Engineering Notes | Vol.36, No.4 | 1-10 | 2011 |   |