DR. ARIJIT SUR. Brief Biography:

Size: px
Start display at page:

Download "DR. ARIJIT SUR. Brief Biography:"

Transcription

1 DR. ARIJIT SUR Associate Professor Dept. of Computer Science and Engineering Indian Institute of Technology Guwahati, India and Web: Multimedia lab: Brief Biography: Dr. Sur received his Ph.D. degree in Computer Science and Engineering from Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur in He has completed his M. Sc. in computer and Information Science in 2001 and M. Tech in Computer Science and Engineering in 2003, both from Department of Computer Science and Engineering, University of Calcutta. Dr. Sur joined Dept. of CSE, Indian Institute of Technology Guwahati in June 2009 as an Assistant Professor and has become Associate Professor in May Currently, three research scholars are pursuing their Ph.D. work under his guidance (as supervisor / co-supervisor), and five students have graduated. Dr. Sur has founded a research project lab named "Multimedia Lab" in Dept. of CSE on Dr. Sur has coauthored more than 15 top tier journal papers and more than 30 papers in different premier conferences. Date of Birth: 21st November 1976 Research: Computer Vision using Deep Learning: Currently, our group is working on various computer vision problems using deep learning framework. Specifically, we are concentrating on single image super resolution, depth estimation from a single image, image steganalysis, image restoration, image and object memorability etc. using mainly deep neural architectures such as CNN, RNN (or LSTM), GAN etc. Prior works: Previously, we had concentrated on different aspects of multimedia security such as Compressed Domain Video Watermarking for H.264/AVC, HEVC, scalable video watermarking, 3D image/video watermarking, steganography and steganalysis, Resource Allocation Strategies for Multimedia Services in Wireless Networks etc.

2 Students: Research Scholars: Sl. No. Name of the Student 1 Tanima Dutta 2 Nilkanta Sahu 3 Shuvendu Rana Topic / Thesis title Compressed Domain Video Watermarking for H.264/AVC Robust Video Watermarking against Content Adaptation Attack Authentication for the 3D video sequence 3 Sibaji Gaj Watermarking Schemes for High Definition Videos 4 Satish Kumar Resource Allocation Strategies for Multimedia services in wireless Networks Cosupervisor Jointly with Prof. P K Bora, EEE, IITG Jointly with Dr. Arnab Sarkar, CSE, IITG Status Graduated 2014 Graduated 2016 Graduated 2017 Graduated 2017 Graduated Sathisha B Image Memorability Ongoing Current Affiliation Assistant Professor, IIT BHU Assistant Professor, IIIT Guwahati Research Associate, University of Strathclyde, Glasgow, UK Postdoctoral Fellow, Cleveland Clinic, Ohio, USA Research fellow, 5G Innovation Centre University of Surrey, UK 7 Brijesh Singh 8 Prasen Sharma Image Steganalysis Computer Vision using Deep Learning Techniques Jointly with Dr. Pinaki Mitra, CSE, IITG Ongoing Ongoing

3 Professional Activities: Courses / Workshops / Conferences Organizing Co-chair 10th Indian Conference on Vision, Graphics and Image Processing (ICVGIP 2016) Tutorial Co-Chair, 8th International Conference on Information Systems Security (ICISS) AICTE sponsored QIP Workshop on "What is common among Cloud Computing, Nanotechnology, and Green Computing?" (jointly with Prof. K Srinivasan and Dr. Santosh Biswas) AICTE Sponsored QIP Short Term Course on "Multimedia Communication" (jointly with Prof. Sukumar Nandi) Year Reviewer of 1. IEEE Transaction on IEEE Transactions on Circuits and Systems for Video Technology 2. IEEE Transaction on Information Forensics and Security 3. IEEE Transaction on Mobile Computing 4. IEEE Transaction on Multimedia 5. IEEE Signal Processing Letters 6. Signal Processing, Elsevier 7. Journal of Visual Communication and Image Representation, Elsevier 8. Pattern Recognition Letters, Elsevier 9. Journal of Systems and Software, Elsevier 10. International Journal of Network Security 11. The ninth Indian Conference on Computer Vision, Graphics and Image Processing

4 Projects: Title Status Sponsoring agency Design and development of a statistical steganalytic tool and investigate the scope of the deep neural network as potential steganalyzer Design, Development of a Watermarking System for Scalable Video Authentication Recommen ded by the working group Completed Department of Information Technology, Govt. of India Department of Information Technology, Govt. of India Budget (Rs.) 70 Lakhs Lakhs Role Princi pal Invest igator Princi pal Invest igator Other PI/ Co- PIs Co-PI: Prof. P K Bora, EEE, IITG Shot Based Video Watermarking For Very Low Bit Rate Video Completed Department of Science and Technology, Govt. of India 6.40 Lakhs Princi pal Invest igator Development of Framework fo Completed Logging and Analysis of Network Traffic to secure IT infrastructure Projects of MCIT at Manipur University, Guwaha University, Assam Department of Information Technology, Govt. of India 15 Lakhs Co- Princi pal Invest igator PI: Dr. S. Biswas Co-PI: Prof. S. Nandi Remote Triggered Digital System Laboratory under Remote Triggered Lab ongoing MHRD, Govt. of India 49 Lakhs Princi pal Invest igator Others PIs: Dr. S. Biswas Dr. J.K. Deka

5 Awards: Dr. Sur is a recipient of Institute Scholarship ( ), Dept. of Computer Science and Engineering, IIT Kharagpur and Infosys Scholarship ( ) during his Ph.D. tenure at IIT Kharagpur. He was also awarded the prestigious Microsoft Outstanding Young Faculty Programme Award at Dept. of CSE, IIT Guwahati. Patents : Watermark Evaluation Tool (Indian Patent Applied) Selected Publications: Book Chapters: 1. Book Chapter : Nilkanta Sahu, Arijit Sur, "Scalable Video Watermarking: A Survey", Innovative Research in Attention Modelling and Computer Vision Applications, Edited by Rajarshi Pal, IGI Global Publication S. Kumar, D. Goswami, A. Sarkar and A.Sur. "A Buffer Aware Resource Allocation Framework for Video Streaming over LTE" (Chapter 14),. Accepted in: Communication Systems and Networks, Lecture Notes in Computer Science (LNCS), Springer, Vol , April, Journal Publications: Sl. No. Journal Details: 1 S. Kumar, A. Sarkar, A. Sur, "A Resource Allocation Framework for Adaptive Video Streaming Over LTE", Journal of Network and Computer Applications, Elsevier (Accepted) 2 Nilkanta Sahu, Arijit Sur, "SIFT Based Video Watermarking Resistant to Temporal Scaling", Journal of Visual Communication and Image Representation, Elsevier (Accepted) Sibaji Gaj, Aditya Kanetkar, A. Sur, Prabin Kumar Bora "Drift Compensated Robust Watermarking Algorithm for H.265/HEVC Video Stream", ACM Trans. Multimedia Comput. Commun. Appl. (TOMM) 2016 (Accepted) Sibaji Gaj, Anoop Rathor, A. Sur, Prabin Kumar Bora, "A Robust Watermarking Scheme against Frame Blending and Projection Attacks" Multimedia Tools and Applications, Springer US, September 2016(Accepted) Rana S., Sur A., "Depth Based View Invariant Blind 3D Image Watermarking" ACM Trans. Multimedia Comput. Commun. Appl. Volume 12 Issue 4, August 2016

6 6 Nilkanta Sahu, Shuvendu Rana and A. Sur, "MCDCT-TF based video watermarking resilient to temporal and quality scaling", Multimedia Tools and Applications, pp. 1-26, Springer, October 2015 (Online). 7 S. Kumar, A. Sarkar, S. Sriram, A. Sur. "A Three-Level LTE Downlink Scheduling Framework for RT VBR Traffic" Computer Networks, Elsevier, Volume 91, Pages , November Sibaji Gaj, Ashis Singh Patel, A. Sur, "Object-Based Watermarking for H.264/AVC Video Resistant to RST Attacks", Multimedia Tools and Applications, Springer, pp 1-28, 23 January 2015 (online) 9 A. Sur, Sista Venkat Madhav Krishna, Nilkanta Sahu and Shuvendu Rana, "Detection of Motion Vector Based Video Steganography", Multimedia Tools and Applications, Springer, Volume 74, Issue 23, pp , December Swathi Karri and A. Sur, "Steganographic Algorithm Based on Randomization of DCT Kernel", Multimedia Tools and Applications, Springer, Volume 74, Issue 21, pp , November Shuvendu Rana, Nilkanta Sahu, and A. Sur, "Robust watermarking for resolution and quality scalable video sequence,", Multimedia Tools and Applications, Springer, Volume 74, Issue 18, pp , September A. Sur, D. Shyam P. Goel, IIT Kharagpur and J. Mukherjee, IIT Kharagpur "An Image Steganographic Algorithm Based on Spatial Desynchronization",Multimedia Tools and Applications, Springer, Volume 71, Issue 3, pp , August A. Sur, R. Vignesh, IIT Kharagpur and J. Mukherjee, IIT Kharagpur, "Pixel rearrangement based statistical restoration scheme reducing embedding noise", Multimedia Tools and Applications, Springer, vol 68, issue. 3, pp , February A. Sur, A. S. Nair, A. Kumar, A. Jain, and S. Nandi "Steganalysis of Network Packet Length Based Data Hiding", Circuits, Systems & Signal Processing, Springer, vol 32, issue 3, pp , A. Sur, R. Vignesh and J. Mukherjee, IIT Kharagpur, "Secure Steganography using Randomized Cropping", LNCS Transactions on Data Hiding and Multimedia Security, Springer, Volume 7110/2012, pp , 2012.

7 Conference Publications: Sl. No. Conference Details 1 Sathisha Basavaraju, Paritosh Mittal, Arijit Sur, Image Memorability: The Role of Depth And Motion, IEEE ICIP 2018 (accepted) 2 Satish Kumar, Paras Vishnoi, Arnab Sarkar, Arijit Sur, QoE Aware Resource Allocation for Multi-View Video Flows in LTE, HPCC 2018 (accepted) 3 A. Lekharu, S. Kumar, A.sur, A.Sarkar, "A QoE Aware SVC Based Client-side Video Adaptation Algorithm for Cellular Networks". Accepted in: International Conference on Distributed Computing and Networking (ICDCN), Rana, S., Gaj, S., Sur, A.: "View Invariant 3D Video Watermarking using Depth Based Embedding". International Conference on Digital Image Computing: Techniques and Applications (DICTA 2016). (Accepted 2016) 5 Gaj, S., Rana, S., Sur, A., Bora, P.: "A Robust Watermarking Scheme against Frame Blending, Projection and Content Adaption Attacks". International Conference on Digital Image Computing: Techniques and Applications (DICTA 2016). (Accepted 2016) 6 Rana, S., Gaj, S., Sur, A., Bora, P.: Detection of Fake 3D Video Using CNN, 18th IEEE Workshop on Multimedia Signal Processing (MMSP 2016) (Accepted) 7 Rana, S., Gaj, S., Sur, A., Bora, P.: Segmentation-Based 3D Depth Watermarking using SIFT, 18th IEEE Workshop on Multimedia Signal Processing (MMSP 2016)(Accepted) 8 Gaj, S., Rana, S., Sur, A., Bora, P.: A Drift Compensated Reversible Watermarking Scheme for H.265/HEVC, 18th IEEE Workshop on Multimedia Signal Processing (MMSP 2016) (Accepted) 9 S. Kumar, S. Sriram, A. Sarkar, A. Sur. A Three Level Adaptive Video Streaming Framework Over LTE.,IEEE International Conference on Systems, Man, and Cybernetics, Oct 2016.(Accepted) 10 Shuvendu Rana, A Sur, "3D video watermarking using DT-DWT to resist synthesis view attack". in European Signal Processing Conference 2015 (EUSIPCO 2015), Nice, France, Aug

8 11 Sibaji Gaj, Shuvendu Rana, Anirban Lekharu, A Sur, Prabin Bora, "RST Invariant Multi-View 3D Image Watermarking using DWT and SVD ", NCVPRIPG2015, Patna, India 12 Sibaji Gaj, A Sur, Prabin Bora,"A Robust Watermarking Scheme against Re-Compression Attack for H.265/HEVC", NCVPRIPG2015, Patna, India 13 Shuvendu Rana, Vishavdeep Mattu, A Sur, "SIFT-based View Invariant Watermarking for DIBR 3D Image", NCVPRIPG2015, Patna, India Nilkanta Sahu, Vivek Tiwari and A Sur, "Robust Video Watermarking Resilient to Temporal Scalability", NCVPRIPG2015, Patna, India Priyatham Bollimpalli, Nilkanta Sahu and A. Sur, "SIFT-Based Robust Image Watermarking Resistant To Resolution Scaling,", IEEE International Conference on Image Processing (ICIP), October 2014 Shuvendu Rana, Arijit Sur, "Blind 3D Video Watermarking Based on 3D-HEVC Encoder Using Depth", Proceedings of the Eighth Indian Conference on Vision, Graphics and Image Processing (ICVGIP 2014) Tanima Dutta, A. Sur, Sukumar Nandi, "Motion Coherent Region Detection in H.264 Compressed Videos", IEEE International Conference on Multimedia and Expo (ICME 2013), July 2013 Lalit Vashishtha,Tanima Dutta and A. Sur, "Least Significant Bit Matching Steganalysis Based on Feature Analysis", The nineteenth annual National Conference on Communications (NCC- 2013), Delhi, January 16-17, 2013 Tanima Dutta, A. Sur, Sukumar Nandi, "A Robust Compressed Domain Video Watermarking in P-frames with Controlled Bit Rate Increase", The nineteenth annual National Conference on Communications (NCC-2013), Delhi, January 16-17, 2013 Boorla Chandrakanth, Tanima Dutta and A. Sur, "Steganographic Algorithm Based on Parametric Discrete Cosine Transform", Proceedings of the Eighth Indian Conference on Vision, Graphics and Image Processing (ICVGIP 2012), Article No. 79, ACM New York, NY, USA, Anand S Nair, Abhishek Kumar, A. Sur, Sukumar Nandi, "Length Based Network Steganography using UDP Protocol", 2011 International Conference on Computer and Communication Devices (ICCCD 2011), pp , Bali Island, Indonesia. April 1-3, 2011 A. Sur, Piyush Goel,, IIT Kharagpur and Jayanta Mukhopadhyay,, IIT Kharagpur, "Adaptive Pixel Swapping Based Steganography Reducing Embedding Noise", 4th International Conference on Pattern Recognition and Machine Intelligence (PReMI' 11), June 27 - July 1, 2011, Moscow, Russia Lecture Notes in Computer Science, Volume 6744/2011, pp , 2011.

9 Vengala Satish Kumar, Tanima Dutta, A. Sur and Sukumar Nandi "Secure Network Steganographic Scheme Exploiting TCP Sequence Numbers", The Fourth International Conference on Network Security & Applications (CNSA-2011), July 15 ~ 17, 2011, Chennai, India, Advances in Network Security and Applications, Communications in Computer and Information Science, Springer, Volume 196, Part 1, pp Omprakash Meena, Sathisha Basavaraju and A. Sur, "DCT block location based data hiding" World Congress on Information and Communication Technologies (WICT), pp , December 2011 Ankush Rai, Ferdous Barbhuiya, A. Sur, Santosh Biswas, Suchetana Chakraborty and Sukumar Nandi, "Exploit Detection Techniques for STP using Distributed IDS", World Congress on Information and Communication Technologies (WICT), pp , 2011 A. Sur and Jayanta Mukhopadhyay, IIT Kharagpur: An Adaptive Steganographic Scheme with JPEG Compressed Digital Images, Proceedings, National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG), Jan Udit Singh, Rajat Singh, A. Sur "Reversible Data Hiding by Utilizing the Local Maxima in the Histogram",Second International Conference on Multimedia and Content-Based Image Retrieval (ICMCBIR) 2010 Anand S Nair, A. Sur, Sukumar Nandi, "Detection of Packet Length Based Network Steganography", International Conference on Multimedia Information Networking and Security (MINES), pp , 2010 Udit Singh, A. Sur "Reversible Data Hiding by Alternate Shifting of Peaks in the Histogram" First International Conference on Intelligent Interactive Technologies and Multimedia (IITM), 2010 A. Sur, Piyush Goel,, IIT Kharagpur and Jayanta Mukhopadhyay, IIT Kharagpur: Spatial Desynchronization : A Possible Way to Resist Calibration Attack, International Conference on Multimedia Information Networking and Security (MINES), pp , A. Sur, Piyush Goel and Jayanta Mukhopadhyay: A New Statistical Restoration Method for Spatial Domain Images, Third International Conference on Pattern Recognition and Machine Intelligence (PReMI'09), Lecture Notes in Computer Science, Springer Berlin / Heidelberg, Volume 5909/2009, pp A. Sur, Srikar Sagar, Rajarshi Pal, Pabitra Mitra and Jayanta Mukhopadhyay, IIT Kharagpur: A New Image Watermarking Scheme using Saliency-Based Visual Attention Model, IEEE INDICON, pp. 1-4, A. Sur, Piyush Goel and Jayanta Mukhopadhyay: A Spatial Domain Steganographic Scheme for Reducing Embedding Noise, 3rd International Symposium on Communications, Control and Signal Processing, ISCCSP March 12 14, 2008, St. Julians, Malta, on page(s):

10 A. Sur, Piyush Goel and Jayanta Mukhopadhyay: A New Approach for Reducing Embedding Noise in Multiple Bit Plane Steganography, International Conference on Image and Signal Processing, ICISP July 1-3, 2008, Cherbourg-Octeville, Normandy, France, Lecture Notes in Computer Science, Springer Berlin / Heidelberg, Volume 5099/2008, on page(s): A. Sur, Piyush Goel and Jayanta Mukhopadhyay: Pixel Swapping: Another Possible Way to Resist Targeted Attacks on LSB Steganography, International Workshop on Digital Watermarking (IWDW 2008), November 10 12, 2008, Busan, Korea, Lecture Notes in Computer Science, Springer Berlin / Heidelberg, Volume 5450/2009, on page(s): A. Sur, Piyush Goel and JayantaMukhopadhyay: A SDS Based Steganographic Scheme for Reducing Embedding Noise, Proceedings, ADCOM 2007, Dec 18-21, Guwahati, INDIA, IEEE Computer Society Press, on page(s): ( ). A. Sur. and Jayanta Mukhopadhyay: Adaptive data hiding in compressed video domain, ICVGIP-2006, Dec , Madurai, India, Lecture Notes in Computer Science, Vol. 4338/2006. Springer Berlin / Heidelberg (2006), on page(s):

A New Statistical Restoration Method for Spatial Domain Images

A New Statistical Restoration Method for Spatial Domain Images A New Statistical Restoration Method for Spatial Domain Images Arijit Sur 1,,PiyushGoel 2, and Jayanta Mukherjee 2 1 Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati-781039,

More information

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor

More information

Abhishek Chakraborty

Abhishek Chakraborty Abhishek Chakraborty Institute Post Doctoral Fellow Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036, India Phone: +91-859-286-2863/+91-943-498-6672 Email:

More information

Call for Papers for Communication QoS, Reliability and Modeling Symposium

Call for Papers for Communication QoS, Reliability and Modeling Symposium Call for Papers for Communication QoS, Reliability and Modeling Symposium Scope and Motivation: In modern communication networks, different technologies need to cooperate with each other for end-to-end

More information

FACULTY PROFILE. Total Experience : Academic : 7 Years and 3 Months. Degree Branch / Specialization College University

FACULTY PROFILE. Total Experience : Academic : 7 Years and 3 Months. Degree Branch / Specialization College University FACULTY PROFILE Name Designation Email ID : A.K.Kavitha : Assistant Professor : kavitha.ece@srit.org Area of Specialization : Wireless Communication Total Experience : Academic : 7 Years and 3 Industry

More information

Workshops. 1. SIGMM Workshop on Social Media. 2. ACM Workshop on Multimedia and Security

Workshops. 1. SIGMM Workshop on Social Media. 2. ACM Workshop on Multimedia and Security 1. SIGMM Workshop on Social Media SIGMM Workshop on Social Media is a workshop in conjunction with ACM Multimedia 2009. With the growing of user-centric multimedia applications in the recent years, this

More information

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY Md. Maklachur Rahman 1 1 Department of Computer Science and Engineering, Chittagong University of Engineering and Technology,

More information

Professional Excellence Summary

Professional Excellence Summary Mr. J.SANTHOSH B.E.,M.E., (Ph.D).,MISTE Assistant Professor Department of Computer Science & Engineering K.S.R. College of Engineering (Autonomous) Tiruchengode - 637 215, Namakkal District, TamilNadu.

More information

A New Approach to Compressed Image Steganography Using Wavelet Transform

A New Approach to Compressed Image Steganography Using Wavelet Transform IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography

More information

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR FACULTY PROFILE Name Designation Email ID : NISHA SOMS : ASSISTANT PROFESSOR (SENIOR GRADE) : nishasoms.cse@srit.org Area of Specialization : Wireless Ad Hoc Networks, Mobile Computing Cryptography and

More information

COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY

COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY Name: Department: Contact Details: Address for communication Email Phone Intercom Academic Background Qualifications: Qualifying Post Graduate Degree: Ph. D

More information

Payal Gulati. House No. 1H-36, NIT, Faridabad E xp e r i e nc e

Payal Gulati. House No. 1H-36, NIT, Faridabad E xp e r i e nc e Payal Gulati House No. 1H-36, NIT, gulatipayal@yahoo.co.in Total Experience: 9.5 years E xp e r i e nc e Currently working as Assistant Professor (IT) in YMCA University of Science & Technology, since

More information

An Adaptive Video Compression Technique for Resource Constraint Systems

An Adaptive Video Compression Technique for Resource Constraint Systems An Adaptive Video Compression Technique for Resource Constraint Systems Shreelekshmi R, Sruthi S Abstract As display devices become more and more vivid, and people demand more perfection in video quality,

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 6, June 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Dr. Badrinath Gurappa Srinivas

Dr. Badrinath Gurappa Srinivas Dr. Badrinath Gurappa Srinivas Chief Engineer, Advanced Technology Group, Samsung Research Institute Noida, Sector-62, Noida - 201301, Uttar Pradesh, India Permanent Address: #A-35, Sector-14, Noida-201301,

More information

Appendix A. Definition of Terms

Appendix A. Definition of Terms Appendix A Definition of Terms Artifact: Artifacts are the irregularities that may be present in an image after processing. They are not related to the details of the image and sometimes accompany transmitted

More information

Wireless Communications, Information Theory, Physical Layer Security, Cyber Security for Smart Grid, Cryptography, Network Coding.

Wireless Communications, Information Theory, Physical Layer Security, Cyber Security for Smart Grid, Cryptography, Network Coding. Mustafa El-Halabi Contact Information Fleifel Building Cell Phone: + (979) 422 4585 Mathaf E-mail: mhalabi@aust.edu.lb Beirut, Lebanon Webpage: https://mustafa-halabi.appspot.com/ Research Interests Education

More information

Anurag Singh. 10th Percentage (1992): 79.16% Pt. Deendayal Upadhyay Sanatan Dharam Vidyalaya, Kanpur, India. (U.P.Board Allahabad).

Anurag Singh. 10th Percentage (1992): 79.16% Pt. Deendayal Upadhyay Sanatan Dharam Vidyalaya, Kanpur, India. (U.P.Board Allahabad). Anurag Singh Flat No. 16, SFS Flats, Pkt 10, Sec. 11, Rohini, Delhi - 110085 Email: anuanu52@gmail.com Phone: +91-9810526575(M) Homepage: http://home.iitk.ac.in/~anuragsg/ EDUCATION PhD from IIT Kanpur,

More information

MCRD: MOTION COHERENT REGION DETECTION IN H.264 COMPRESSED VIDEO

MCRD: MOTION COHERENT REGION DETECTION IN H.264 COMPRESSED VIDEO MCRD: MOTION COHERENT REGION DETECTION IN H.264 COMPRESSED VIDEO Tanima Dutta Arijit Sur Sukumar Nandi Department of Computer Science and Engineering Indian Institute of Technology Guwahati, India Email:

More information

arxiv: v1 [cs.mm] 9 Aug 2017

arxiv: v1 [cs.mm] 9 Aug 2017 Robust Video Watermarking against H.264 and H.265 Compression Attacks Nematollah Zarmehi 1* and Mohammad Javad Barikbin 2 1 Advanced Communication Research Institute, Electrical Engineering Department,

More information

CURRICULUM VITAE. Discipline University /Board Year % Secured. Indian Institute of Technology (IIT), Kharagpur. (NIT), Rourkela

CURRICULUM VITAE. Discipline University /Board Year % Secured. Indian Institute of Technology (IIT), Kharagpur. (NIT), Rourkela CURRICULUM VITAE Name: Dr. ASHOK KUMAR TURUK Personal Data : Position Held: Assistant Professor Department : Computer Science & Engineering Office Address : Dept. of Computer Science & Engineering. (NIT)

More information

ANNA UNIVERSITY REGIONAL CAMPUS MADURAI DEPARTMENT OF COMPUTER APPLICATIONS FACULTY PROFILE

ANNA UNIVERSITY REGIONAL CAMPUS MADURAI DEPARTMENT OF COMPUTER APPLICATIONS FACULTY PROFILE ANNA UNIVERSITY REGIONAL CAMPUS MADURAI DEPARTMENT OF COMPUTER APPLICATIONS FACULTY PROFILE Full Name (With qualification) Designation Department E Mail Area of Interest V. FRANCIS DENSIL RAJ, MCA.,M.PHIL.,

More information

Name: S.Brindha. Assistant Professor Grade I. Designation: Qualification: B.E, M.E, Ph.D (Pursuing)

Name: S.Brindha. Assistant Professor Grade I. Designation: Qualification: B.E, M.E, Ph.D (Pursuing) Name: S.Brindha Designation: Qualification: B.E, M.E, Ph.D (Pursuing) Assistant Professor Grade I Area of specialization: B.E(ECE), M.E( &Networking) Ph.D(Pursuing) Radio over Fiber Networks Experience

More information

IJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby

IJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby Dr. P.P.Joby Contact Address Professor & Dean, Department of Computer Science & Engineering, MBC College of Engineering and Technology, Kuttikanam, Peermade, Idukki Dt, Kerala-685531. Permanent Address

More information

AYAN MONDAL ayan.mondal/

AYAN MONDAL ayan.mondal/ AYAN MONDAL +91-7872773669 mondalayan12@gmail.com, ayanmondal@iitkgp.ac.in http://cse.iitkgp.ac.in/ ayan.mondal/ Present Address Kharagpur - 721302 India Permanent Address Ashrampara (Teachers Colony)

More information

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation , 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

More information

AREAS OF SPECIALIZATION. Digital Image Processing Computer Vision Pattern Recognition Image Retrieval Image Reconstruction Face Recognition

AREAS OF SPECIALIZATION. Digital Image Processing Computer Vision Pattern Recognition Image Retrieval Image Reconstruction Face Recognition Dr. Pooja Sharma (Gold Medalist) UGC (NET and JRF) Assistant Professor Department of Computer Science and Engineering IKGPTU, Main Campus, Kapurthala, Punjab, India. E-mail: dr.poojasharma@ptu.ac.in Mobile:

More information

A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security

A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security Manas Paul 1 and Jyotsna Kumar Mandal 2 1 Dept. of Comp. Application, JIS College of Engineering,

More information

Robust Image Watermarking based on DCT-DWT- SVD Method

Robust Image Watermarking based on DCT-DWT- SVD Method Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete

More information

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING International Journal of Engineering Research ISSN: 2348-4039 & Management Technology May-2017 Volume- 4, Issue-3 Email: editor@ijermt.org www.ijermt.org SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE

More information

Resume. Techniques. Mail ID: Contact No.: S.No. Position held Organisation From To. AU PG Center, Vizianagaram

Resume. Techniques. Mail ID: Contact No.: S.No. Position held Organisation From To. AU PG Center, Vizianagaram Resume Name: Designation: Qualifications: Subjects taught: Research specialization: Dr. M.Seshashayee Assistant Professor MCA, M.Tech, Ph.D. Programming In Java, Internet programming, Software Engineering,

More information

Image Processing and Watermark

Image Processing and Watermark IJCST Vo l. 7, Is s u e 1, Ja n - Ma r c h 2016 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Image Processing and Watermark 1 Dr. Amit Verma, 2 Navdeep Kaur Gill 1,2 Dept. Computer Science and Engineering,

More information

FACULTY PROFILE. Designation Institution/Organization Period Nature of Duties

FACULTY PROFILE. Designation Institution/Organization Period Nature of Duties Name of the Staff Designation FACULTY PROFILE : D.VIJAYAKUMAR Date of joining in the college : 04-06-2010 E-mail Id : Assistant Professor (Sr.Grade) : dvk@nec.edu.in Mobile Number : 9994357984 Personal

More information

Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91)

Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91) Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: +91-94482 26130 Dept. of Electrical Communication Engg. (ECE) Fax: (+91)-80-2360 0991 Indian Institute of Science E-mail: rvenkat@ece.iisc.ernet.in

More information

YET Another Steganographic Scheme (YASS) [1] is a

YET Another Steganographic Scheme (YASS) [1] is a 374 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 3, SEPTEMBER 2010 An Experimental Study on the Security Performance of YASS Fangjun Huang, Member, IEEE, Jiwu Huang, Senior Member,

More information

IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY

IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY Shreelekshmi R, Wilscy M 2 and C E Veni Madhavan 3 Department of Computer Science & Engineering, College of Engineering, Trivandrum,

More information

Sermakani. AM Mobile: : IBM Rational Rose, IBM Websphere Studio Application Developer.

Sermakani. AM Mobile: : IBM Rational Rose, IBM Websphere Studio Application Developer. Objective: With sound technical knowledge as background and with innovative ideas, I am awaiting to work on challenging jobs that expose my skills and potential ability. Also looking for the opportunity

More information

Digital Image Steganography Using Bit Flipping

Digital Image Steganography Using Bit Flipping BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using

More information

Velammal Engineering College Department of Computer Science and Engineering

Velammal Engineering College Department of Computer Science and Engineering Velammal Engineering College Department of Computer Science and Engineering Name & Photo : Prof.B.Rajalakshmi Designation: Qualification : Area of Specialization : Teaching Experience : Vice Principal

More information

Comparative Study between DCT and Wavelet Transform Based Image Compression Algorithm

Comparative Study between DCT and Wavelet Transform Based Image Compression Algorithm IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. II (Jan Feb. 2015), PP 53-57 www.iosrjournals.org Comparative Study between DCT and Wavelet

More information

JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images

JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images Dessalegn Atnafu AYALNEH*, Hyoung Joong KIM*, Yong Soo CHOI** *CIST (Center for Information Security Technologies), Korea University

More information

Biodata. Name: Ms. Jyoti M. Hurakadli. Designation: Associate Professor. Qualification: M.Tech (Computer Network Engineering),

Biodata. Name: Ms. Jyoti M. Hurakadli. Designation: Associate Professor. Qualification: M.Tech (Computer Network Engineering), Biodata Name: Ms. Jyoti M. Hurakadli Designation: Associate Professor Qualification: M.Tech (Computer Network Engineering), B.E. (Computer Science and Engineering) Specialization: Computer Networking Date

More information

Personal Profile. Allied Additional Subordinate Subject studied. Management Information System. Electronic Commerce. Image Processing.

Personal Profile. Allied Additional Subordinate Subject studied. Management Information System. Electronic Commerce. Image Processing. Personal Profile (1) Name of the teacher (in full): Ms. Sarika Vijay Purao (2) Department: (3) Designation: Assistant Professor (4) Qualifications of the teacher:- Degree/ Post Graduate Degree Examinatio

More information

I. Introduction. II Integer-To-Integer Wavelet Transforms

I. Introduction. II Integer-To-Integer Wavelet Transforms Reversible Image Data Hiding Using Lifting Wavelet Transform and Histogram Shifting S. Kurshid Jinna Dr. L. Ganesan Professor, Dept of Computer Science & Engineering Professor, Dept of Computer Science

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

NCC 2009, January 16-18, IIT Guwahati 267

NCC 2009, January 16-18, IIT Guwahati 267 NCC 2009, January 6-8, IIT Guwahati 267 Unsupervised texture segmentation based on Hadamard transform Tathagata Ray, Pranab Kumar Dutta Department Of Electrical Engineering Indian Institute of Technology

More information

Random Image Embedded in Videos using LSB Insertion Algorithm

Random Image Embedded in Videos using LSB Insertion Algorithm Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.

More information

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

Evaluating the Effect of Path Diversity over QoS and QoE in a High Speed Indoor Mesh Backbone

Evaluating the Effect of Path Diversity over QoS and QoE in a High Speed Indoor Mesh Backbone Evaluating the Effect of Path Diversity over QoS and QoE in a High Speed Indoor Mesh Backbone Sandip Chakraborty 12, Sukumar Nandi Department of Computer Science and Engineering Indian Institute of Technology

More information

Experience : Teaching : UG: 18 years PG : 6 Industry : - No. of workshop / Conferences / FDP attended : 25

Experience : Teaching : UG: 18 years PG : 6 Industry : - No. of workshop / Conferences / FDP attended : 25 Name & Photo : R.VALARMATHI Designation: Qualification : Area of Specialisation : Associate Professor M.E.,(Ph.d) Cloud Computing Experience : Teaching : UG: 18 years PG : 6 Industry : - No. of workshop

More information

Educational Qualification PhD (Computer and science engineering) - pursuing from Sir Padampat Singhania University, Udaipur, Rajasthan.

Educational Qualification PhD (Computer and science engineering) - pursuing from Sir Padampat Singhania University, Udaipur, Rajasthan. Mrs. Vijaya Umesh Pinjarkar Mobile : 9757143228 Email: vkhirodkar@somaiya.edu Professional Objective To utilize my teaching skills towards a challenging career in growth oriented and leading edge that

More information

Descrambling Privacy Protected Information for Authenticated users in H.264/AVC Compressed Video

Descrambling Privacy Protected Information for Authenticated users in H.264/AVC Compressed Video Descrambling Privacy Protected Information for Authenticated users in H.264/AVC Compressed Video R.Hemanth Kumar Final Year Student, Department of Information Technology, Prathyusha Institute of Technology

More information

Gabor Filter HOG Based Copy Move Forgery Detection

Gabor Filter HOG Based Copy Move Forgery Detection IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p-ISSN: 2278-8735 PP 41-45 www.iosrjournals.org Gabor Filter HOG Based Copy Move Forgery Detection Monisha Mohan

More information

Robust Video Coding. Heechan Park. Signal and Image Processing Group Computer Science Department University of Warwick. for CS403

Robust Video Coding. Heechan Park. Signal and Image Processing Group Computer Science Department University of Warwick. for CS403 Robust Video Coding for CS403 Heechan Park Signal and Image Processing Group Computer Science Department University of Warwick Standard Video Coding Scalable Video Coding Distributed Video Coding Video

More information

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute

More information

Video signal Processing Power Electronics & Drives. Anna University - Pursuing % Anna, Chennai

Video signal Processing Power Electronics & Drives. Anna University - Pursuing % Anna, Chennai K.S.R COLLEGE OF ENGINEERING, TIRUCHENGODE 63725 (An Autonomous Institution, Affiliated to Anna University, Chennai) DEPARTMENT OF EEE FACULTY PROFILE 0. Name : J.Thiyagarajan 02. Designation : Assistant.Professor

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A REVIEW ON ILLUMINATION COMPENSATION AND ILLUMINATION INVARIANT TRACKING METHODS

More information

Jun Li, Ph.D. School of Computing and Information Sciences Phone:

Jun Li, Ph.D. School of Computing and Information Sciences Phone: Jun Li, Ph.D. School of Computing and Information Sciences Phone: + 1-305-348-4964 Florida International University Email: junli @ cs. fiu. edu 11200 SW 8th St, ECS 380, Miami, FL 33199 Web: http://users.cs.fiu.edu/

More information

A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis

A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 11, Issue 09 (September 2015), PP.27-31 A Blind Steganalysis on JPEG Gray Level

More information

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad

More information

COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING

COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING International Journal of Computer Engineering and Applications, Volume X, Issue VII, July 16 www.ijcea.com ISSN 2321-3469 COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING Geeta

More information

Improved Qualitative Color Image Steganography Based on DWT

Improved Qualitative Color Image Steganography Based on DWT Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V

More information

A Digital Video Watermarking Algorithm Based on LSB and DCT

A Digital Video Watermarking Algorithm Based on LSB and DCT A Digital Video Watermarking Algorithm Based on LSB and DCT Kirti Jain, U.S.N Raju Department of Computer Science and Engineering NIT Warangal India kirtijain.kj@gmail.com,usnraju@gmail.com ABSTRACT: In

More information

Securing Multiprocessor Systemon-Chip

Securing Multiprocessor Systemon-Chip Securing Multiprocessor Systemon-Chip By Arnab Kumar Biswas Department of Electronic Systems Engineering Under guidance of Prof. S. K. Nandy Motivation Now-a-days MPSOCs are pervading our dayto-day lives.

More information

Distributed Rate Allocation for Video Streaming over Wireless Networks. Wireless Home Video Networking

Distributed Rate Allocation for Video Streaming over Wireless Networks. Wireless Home Video Networking Ph.D. Oral Defense Distributed Rate Allocation for Video Streaming over Wireless Networks Xiaoqing Zhu Tuesday, June, 8 Information Systems Laboratory Stanford University Wireless Home Video Networking

More information

EMBEDDING WATERMARK IN VIDEO RECORDS

EMBEDDING WATERMARK IN VIDEO RECORDS EMBEDDING WATERMARK IN VIDEO RECORDS D.Abirami UG (CSE), Sri Krishna College of Technology, Anna University abidhanabal17@gmail.com R.Gowsika UG (CSE), Sri Krishna College of Technology, Anna University

More information

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

Video Inter-frame Forgery Identification Based on Optical Flow Consistency Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong

More information

Dr. Spencer Sevilla Postdoctoral Researcher, University of Washington

Dr. Spencer Sevilla Postdoctoral Researcher, University of Washington Dr. Spencer Sevilla Postdoctoral Researcher, University of Washington email: sevilla@cs.washington.edu Research Interests Computer networks, Host mobility, Web technology, Content caching Education University

More information

Analysis and Comparison of Torus Embedded Hypercube Scalable Interconnection Network for Parallel Architecture

Analysis and Comparison of Torus Embedded Hypercube Scalable Interconnection Network for Parallel Architecture 242 IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.1, January 2009 Analysis and Comparison of Torus Embedded Hypercube Scalable Interconnection Network for Parallel Architecture

More information

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS DICTA22: Digital Image Computing Techniques and Applications, 2 22 January 22, Melbourne, Australia. DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS *Yuk Ying CHUNG, Man To WONG *Basser Department of Computer

More information

An Improved Performance of Watermarking In DWT Domain Using SVD

An Improved Performance of Watermarking In DWT Domain Using SVD An Improved Performance of Watermarking In DWT Domain Using SVD Ramandeep Kaur 1 and Harpal Singh 2 1 Research Scholar, Department of Electronics & Communication Engineering, RBIEBT, Kharar, Pin code 140301,

More information

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions

More information

KCG College of Technology, Chennai

KCG College of Technology, Chennai faculty member : Dr. ROOPALAKSHMI R Department : Computer Science & Engineering Present Designation : Associate Professor Residential Address : Plot No15, 2 nd cross road, Sri Sai Nagar, West Tambaram,

More information

Survey paper - Audio-Video Steganography Using Anti Forensics Technique

Survey paper - Audio-Video Steganography Using Anti Forensics Technique Survey paper - Audio-Video Steganography Using Anti Forensics Technique Ms. V.Sarangpure 1 ; Mrs. R. B. Talmale 2 ;Ms. M. Domke 3 1 Final Year M. Tech (CSE), Tulsiramji Gaikwad Patil College of Engineering

More information

DWT AND LSB ALGORITHM BASED IMAGE HIDING IN A VIDEO

DWT AND LSB ALGORITHM BASED IMAGE HIDING IN A VIDEO DWT AND LSB ALGORITHM BASED IMAGE HIDING IN A VIDEO M Abhilash Reddy 1,P.Sanjeeva Reddy 2, Member, IEEE and GS Naveen Kumar 3 1 M.Tech Student, Malla Reddy College of Engineering & Technology, Hyd., India.

More information

KCG College of Technology, Chennai

KCG College of Technology, Chennai , Chennai-600 097 faculty member : S SANKAR Department : COMPUTER SCIENCE AND ENGINEERING Present Designation : ASSOCIATE PROFESSOR Residential Address : B22, SHANTINIKETAN ALTAIR APARTMENT KELAMBAKKAM,

More information

LSB Based Audio Steganography Using Pattern Matching

LSB Based Audio Steganography Using Pattern Matching ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom

More information

Ravindranagar Colony, Habsiguda, : Department of Computer Science & Engineering, University College of Engineering(A),

Ravindranagar Colony, Habsiguda, : Department of Computer Science & Engineering, University College of Engineering(A), Name Designation Father Name : Dr.V.B.Narsimha : Assistant Professor : V.Raghavulu Date of Birth : 20-06-1969 Residence Address : Flat No.101, SR Apartment, Ravindranagar Colony, Habsiguda, Hyderabad,

More information

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT COMPARISO BETWEE TWO WATERMARKIG ALGORITHMS USIG DCT COEFFICIET, AD LSB REPLACEMET Mona M. El-Ghoneimy Associate Professor, Elect. & Comm. Dept., Faculty of Engineering, Cairo University, Post code 12316

More information

MAGNO QUEIROZ Curriculum Vitae

MAGNO QUEIROZ Curriculum Vitae MAGNO QUEIROZ Curriculum Vitae Office Management Information Systems Jon M. Huntsman School of Business Utah State University 3515 Old Main Hill Logan, UT 84322-3515 Location: Eccles Business Building

More information

Robust DWT Based Technique for Digital Watermarking

Robust DWT Based Technique for Digital Watermarking Robust DWT Based Technique for Digital Watermarking Mamta Jain Department of Electronics & Communication Institute of Engineering & Technology Alwar er.mamtajain@gmail.com Abstract Hiding the information

More information

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based

More information

Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain

Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain YAHYA E. A. AL-SALHI a, SONGFENG LU *b a. Research Scholar, School of computer science, Huazhong

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

A Comparison of SIFT and SURF

A Comparison of SIFT and SURF A Comparison of SIFT and SURF P M Panchal 1, S R Panchal 2, S K Shah 3 PG Student, Department of Electronics & Communication Engineering, SVIT, Vasad-388306, India 1 Research Scholar, Department of Electronics

More information

CONTENT BASED VIDEO RETRIEVAL SYSTEM

CONTENT BASED VIDEO RETRIEVAL SYSTEM CONTENT BASED RETRIEVAL SYSTEM Madhav Gitte 1, Harshal Bawaskar 2, Sourabh Sethi 3, Ajinkya Shinde 4 1 B.E. Scholar, Department of Information Technology, Sinhgad College of Engineering Pune-41, University

More information

1. Discovering Important Nodes through Graph Entropy The Case of Enron Database

1. Discovering Important Nodes through Graph Entropy The Case of Enron  Database 1. Discovering Important Nodes through Graph Entropy The Case of Enron Email Database ACM KDD 2005 Chicago, Illinois. 2. Optimizing Video Search Reranking Via Minimum Incremental Information Loss ACM MIR

More information

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION T.Punithavalli 1, S. Indhumathi 2, V.Karthika 3, R.Nandhini 4 1 Assistant professor, P.A.College of Engineering and Technology, pollachi 2 Student,

More information

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark Global Journal of Computer Science and Technology Graphics & Vision Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc.

More information

Image Steganography Method Using Integer Wavelet Transform

Image Steganography Method Using Integer Wavelet Transform ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

FRAGILE WATERMARKING USING SUBBAND CODING

FRAGILE WATERMARKING USING SUBBAND CODING ICCVG 2002 Zakopane, 25-29 Sept. 2002 Roger ŚWIERCZYŃSKI Institute of Electronics and Telecommunication Poznań University of Technology roger@et.put.poznan.pl FRAGILE WATERMARKING USING SUBBAND CODING

More information

International Journal of Advance Research in Engineering, Science & Technology

International Journal of Advance Research in Engineering, Science & Technology Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 6, June-2018 SECURE DATA HIDING IN AUDIO

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

SPEC Research Group and Big Data Xiao Wei Zhang, Liang Lu (IBM / SPEC RG Big Data WG)

SPEC Research Group and Big Data Xiao Wei Zhang, Liang Lu (IBM / SPEC RG Big Data WG) SPEC Research Group and Big Data Xiao Wei Zhang, Liang Lu (IBM / SPEC RG Big Data WG) Mission and Objectives The mission of the SPEC RG Big Data Working Group is to facilitate research in performance methodologies

More information

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Feature Based Watermarking Algorithm by Adopting Arnold Transform Feature Based Watermarking Algorithm by Adopting Arnold Transform S.S. Sujatha 1 and M. Mohamed Sathik 2 1 Assistant Professor in Computer Science, S.T. Hindu College, Nagercoil, Tamilnadu, India 2 Associate

More information

OpenSFS Test Cluster Donation. Dr. Nihat Altiparmak, Assistant Professor Computer Engineering & Computer Science Department University of Louisville

OpenSFS Test Cluster Donation. Dr. Nihat Altiparmak, Assistant Professor Computer Engineering & Computer Science Department University of Louisville OpenSFS Test Cluster Donation Dr. Nihat Altiparmak, Assistant Professor Computer Engineering & Computer Science Department University of Louisville 4/24/2018 Donation Details Jan 5, 2018 OpenSFS announced

More information

Navjot Singh *1, Deepak Sharma 2 ABSTRACT I. INTRODUCTION

Navjot Singh *1, Deepak Sharma 2 ABSTRACT I. INTRODUCTION 2017 IJSRSET Volume 3 Issue 1 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section: Engineering and Technology An Efficient Multiple Data Hiding Technique for Medical Images Using QR Code Authentication

More information

Advanced Digital Image Forgery Detection by Using SIFT

Advanced Digital Image Forgery Detection by Using SIFT RESEARCH ARTICLE OPEN ACCESS Advanced Digital Image Forgery Detection by Using SIFT Priyanka G. Gomase, Nisha R. Wankhade Department of Information Technology, Yeshwantrao Chavan College of Engineering

More information

A Review on Cloud Service Broker Policies

A Review on Cloud Service Broker Policies Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.1077

More information