DR. ARIJIT SUR. Brief Biography:
|
|
- Kenneth Harvey
- 5 years ago
- Views:
Transcription
1 DR. ARIJIT SUR Associate Professor Dept. of Computer Science and Engineering Indian Institute of Technology Guwahati, India and Web: Multimedia lab: Brief Biography: Dr. Sur received his Ph.D. degree in Computer Science and Engineering from Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur in He has completed his M. Sc. in computer and Information Science in 2001 and M. Tech in Computer Science and Engineering in 2003, both from Department of Computer Science and Engineering, University of Calcutta. Dr. Sur joined Dept. of CSE, Indian Institute of Technology Guwahati in June 2009 as an Assistant Professor and has become Associate Professor in May Currently, three research scholars are pursuing their Ph.D. work under his guidance (as supervisor / co-supervisor), and five students have graduated. Dr. Sur has founded a research project lab named "Multimedia Lab" in Dept. of CSE on Dr. Sur has coauthored more than 15 top tier journal papers and more than 30 papers in different premier conferences. Date of Birth: 21st November 1976 Research: Computer Vision using Deep Learning: Currently, our group is working on various computer vision problems using deep learning framework. Specifically, we are concentrating on single image super resolution, depth estimation from a single image, image steganalysis, image restoration, image and object memorability etc. using mainly deep neural architectures such as CNN, RNN (or LSTM), GAN etc. Prior works: Previously, we had concentrated on different aspects of multimedia security such as Compressed Domain Video Watermarking for H.264/AVC, HEVC, scalable video watermarking, 3D image/video watermarking, steganography and steganalysis, Resource Allocation Strategies for Multimedia Services in Wireless Networks etc.
2 Students: Research Scholars: Sl. No. Name of the Student 1 Tanima Dutta 2 Nilkanta Sahu 3 Shuvendu Rana Topic / Thesis title Compressed Domain Video Watermarking for H.264/AVC Robust Video Watermarking against Content Adaptation Attack Authentication for the 3D video sequence 3 Sibaji Gaj Watermarking Schemes for High Definition Videos 4 Satish Kumar Resource Allocation Strategies for Multimedia services in wireless Networks Cosupervisor Jointly with Prof. P K Bora, EEE, IITG Jointly with Dr. Arnab Sarkar, CSE, IITG Status Graduated 2014 Graduated 2016 Graduated 2017 Graduated 2017 Graduated Sathisha B Image Memorability Ongoing Current Affiliation Assistant Professor, IIT BHU Assistant Professor, IIIT Guwahati Research Associate, University of Strathclyde, Glasgow, UK Postdoctoral Fellow, Cleveland Clinic, Ohio, USA Research fellow, 5G Innovation Centre University of Surrey, UK 7 Brijesh Singh 8 Prasen Sharma Image Steganalysis Computer Vision using Deep Learning Techniques Jointly with Dr. Pinaki Mitra, CSE, IITG Ongoing Ongoing
3 Professional Activities: Courses / Workshops / Conferences Organizing Co-chair 10th Indian Conference on Vision, Graphics and Image Processing (ICVGIP 2016) Tutorial Co-Chair, 8th International Conference on Information Systems Security (ICISS) AICTE sponsored QIP Workshop on "What is common among Cloud Computing, Nanotechnology, and Green Computing?" (jointly with Prof. K Srinivasan and Dr. Santosh Biswas) AICTE Sponsored QIP Short Term Course on "Multimedia Communication" (jointly with Prof. Sukumar Nandi) Year Reviewer of 1. IEEE Transaction on IEEE Transactions on Circuits and Systems for Video Technology 2. IEEE Transaction on Information Forensics and Security 3. IEEE Transaction on Mobile Computing 4. IEEE Transaction on Multimedia 5. IEEE Signal Processing Letters 6. Signal Processing, Elsevier 7. Journal of Visual Communication and Image Representation, Elsevier 8. Pattern Recognition Letters, Elsevier 9. Journal of Systems and Software, Elsevier 10. International Journal of Network Security 11. The ninth Indian Conference on Computer Vision, Graphics and Image Processing
4 Projects: Title Status Sponsoring agency Design and development of a statistical steganalytic tool and investigate the scope of the deep neural network as potential steganalyzer Design, Development of a Watermarking System for Scalable Video Authentication Recommen ded by the working group Completed Department of Information Technology, Govt. of India Department of Information Technology, Govt. of India Budget (Rs.) 70 Lakhs Lakhs Role Princi pal Invest igator Princi pal Invest igator Other PI/ Co- PIs Co-PI: Prof. P K Bora, EEE, IITG Shot Based Video Watermarking For Very Low Bit Rate Video Completed Department of Science and Technology, Govt. of India 6.40 Lakhs Princi pal Invest igator Development of Framework fo Completed Logging and Analysis of Network Traffic to secure IT infrastructure Projects of MCIT at Manipur University, Guwaha University, Assam Department of Information Technology, Govt. of India 15 Lakhs Co- Princi pal Invest igator PI: Dr. S. Biswas Co-PI: Prof. S. Nandi Remote Triggered Digital System Laboratory under Remote Triggered Lab ongoing MHRD, Govt. of India 49 Lakhs Princi pal Invest igator Others PIs: Dr. S. Biswas Dr. J.K. Deka
5 Awards: Dr. Sur is a recipient of Institute Scholarship ( ), Dept. of Computer Science and Engineering, IIT Kharagpur and Infosys Scholarship ( ) during his Ph.D. tenure at IIT Kharagpur. He was also awarded the prestigious Microsoft Outstanding Young Faculty Programme Award at Dept. of CSE, IIT Guwahati. Patents : Watermark Evaluation Tool (Indian Patent Applied) Selected Publications: Book Chapters: 1. Book Chapter : Nilkanta Sahu, Arijit Sur, "Scalable Video Watermarking: A Survey", Innovative Research in Attention Modelling and Computer Vision Applications, Edited by Rajarshi Pal, IGI Global Publication S. Kumar, D. Goswami, A. Sarkar and A.Sur. "A Buffer Aware Resource Allocation Framework for Video Streaming over LTE" (Chapter 14),. Accepted in: Communication Systems and Networks, Lecture Notes in Computer Science (LNCS), Springer, Vol , April, Journal Publications: Sl. No. Journal Details: 1 S. Kumar, A. Sarkar, A. Sur, "A Resource Allocation Framework for Adaptive Video Streaming Over LTE", Journal of Network and Computer Applications, Elsevier (Accepted) 2 Nilkanta Sahu, Arijit Sur, "SIFT Based Video Watermarking Resistant to Temporal Scaling", Journal of Visual Communication and Image Representation, Elsevier (Accepted) Sibaji Gaj, Aditya Kanetkar, A. Sur, Prabin Kumar Bora "Drift Compensated Robust Watermarking Algorithm for H.265/HEVC Video Stream", ACM Trans. Multimedia Comput. Commun. Appl. (TOMM) 2016 (Accepted) Sibaji Gaj, Anoop Rathor, A. Sur, Prabin Kumar Bora, "A Robust Watermarking Scheme against Frame Blending and Projection Attacks" Multimedia Tools and Applications, Springer US, September 2016(Accepted) Rana S., Sur A., "Depth Based View Invariant Blind 3D Image Watermarking" ACM Trans. Multimedia Comput. Commun. Appl. Volume 12 Issue 4, August 2016
6 6 Nilkanta Sahu, Shuvendu Rana and A. Sur, "MCDCT-TF based video watermarking resilient to temporal and quality scaling", Multimedia Tools and Applications, pp. 1-26, Springer, October 2015 (Online). 7 S. Kumar, A. Sarkar, S. Sriram, A. Sur. "A Three-Level LTE Downlink Scheduling Framework for RT VBR Traffic" Computer Networks, Elsevier, Volume 91, Pages , November Sibaji Gaj, Ashis Singh Patel, A. Sur, "Object-Based Watermarking for H.264/AVC Video Resistant to RST Attacks", Multimedia Tools and Applications, Springer, pp 1-28, 23 January 2015 (online) 9 A. Sur, Sista Venkat Madhav Krishna, Nilkanta Sahu and Shuvendu Rana, "Detection of Motion Vector Based Video Steganography", Multimedia Tools and Applications, Springer, Volume 74, Issue 23, pp , December Swathi Karri and A. Sur, "Steganographic Algorithm Based on Randomization of DCT Kernel", Multimedia Tools and Applications, Springer, Volume 74, Issue 21, pp , November Shuvendu Rana, Nilkanta Sahu, and A. Sur, "Robust watermarking for resolution and quality scalable video sequence,", Multimedia Tools and Applications, Springer, Volume 74, Issue 18, pp , September A. Sur, D. Shyam P. Goel, IIT Kharagpur and J. Mukherjee, IIT Kharagpur "An Image Steganographic Algorithm Based on Spatial Desynchronization",Multimedia Tools and Applications, Springer, Volume 71, Issue 3, pp , August A. Sur, R. Vignesh, IIT Kharagpur and J. Mukherjee, IIT Kharagpur, "Pixel rearrangement based statistical restoration scheme reducing embedding noise", Multimedia Tools and Applications, Springer, vol 68, issue. 3, pp , February A. Sur, A. S. Nair, A. Kumar, A. Jain, and S. Nandi "Steganalysis of Network Packet Length Based Data Hiding", Circuits, Systems & Signal Processing, Springer, vol 32, issue 3, pp , A. Sur, R. Vignesh and J. Mukherjee, IIT Kharagpur, "Secure Steganography using Randomized Cropping", LNCS Transactions on Data Hiding and Multimedia Security, Springer, Volume 7110/2012, pp , 2012.
7 Conference Publications: Sl. No. Conference Details 1 Sathisha Basavaraju, Paritosh Mittal, Arijit Sur, Image Memorability: The Role of Depth And Motion, IEEE ICIP 2018 (accepted) 2 Satish Kumar, Paras Vishnoi, Arnab Sarkar, Arijit Sur, QoE Aware Resource Allocation for Multi-View Video Flows in LTE, HPCC 2018 (accepted) 3 A. Lekharu, S. Kumar, A.sur, A.Sarkar, "A QoE Aware SVC Based Client-side Video Adaptation Algorithm for Cellular Networks". Accepted in: International Conference on Distributed Computing and Networking (ICDCN), Rana, S., Gaj, S., Sur, A.: "View Invariant 3D Video Watermarking using Depth Based Embedding". International Conference on Digital Image Computing: Techniques and Applications (DICTA 2016). (Accepted 2016) 5 Gaj, S., Rana, S., Sur, A., Bora, P.: "A Robust Watermarking Scheme against Frame Blending, Projection and Content Adaption Attacks". International Conference on Digital Image Computing: Techniques and Applications (DICTA 2016). (Accepted 2016) 6 Rana, S., Gaj, S., Sur, A., Bora, P.: Detection of Fake 3D Video Using CNN, 18th IEEE Workshop on Multimedia Signal Processing (MMSP 2016) (Accepted) 7 Rana, S., Gaj, S., Sur, A., Bora, P.: Segmentation-Based 3D Depth Watermarking using SIFT, 18th IEEE Workshop on Multimedia Signal Processing (MMSP 2016)(Accepted) 8 Gaj, S., Rana, S., Sur, A., Bora, P.: A Drift Compensated Reversible Watermarking Scheme for H.265/HEVC, 18th IEEE Workshop on Multimedia Signal Processing (MMSP 2016) (Accepted) 9 S. Kumar, S. Sriram, A. Sarkar, A. Sur. A Three Level Adaptive Video Streaming Framework Over LTE.,IEEE International Conference on Systems, Man, and Cybernetics, Oct 2016.(Accepted) 10 Shuvendu Rana, A Sur, "3D video watermarking using DT-DWT to resist synthesis view attack". in European Signal Processing Conference 2015 (EUSIPCO 2015), Nice, France, Aug
8 11 Sibaji Gaj, Shuvendu Rana, Anirban Lekharu, A Sur, Prabin Bora, "RST Invariant Multi-View 3D Image Watermarking using DWT and SVD ", NCVPRIPG2015, Patna, India 12 Sibaji Gaj, A Sur, Prabin Bora,"A Robust Watermarking Scheme against Re-Compression Attack for H.265/HEVC", NCVPRIPG2015, Patna, India 13 Shuvendu Rana, Vishavdeep Mattu, A Sur, "SIFT-based View Invariant Watermarking for DIBR 3D Image", NCVPRIPG2015, Patna, India Nilkanta Sahu, Vivek Tiwari and A Sur, "Robust Video Watermarking Resilient to Temporal Scalability", NCVPRIPG2015, Patna, India Priyatham Bollimpalli, Nilkanta Sahu and A. Sur, "SIFT-Based Robust Image Watermarking Resistant To Resolution Scaling,", IEEE International Conference on Image Processing (ICIP), October 2014 Shuvendu Rana, Arijit Sur, "Blind 3D Video Watermarking Based on 3D-HEVC Encoder Using Depth", Proceedings of the Eighth Indian Conference on Vision, Graphics and Image Processing (ICVGIP 2014) Tanima Dutta, A. Sur, Sukumar Nandi, "Motion Coherent Region Detection in H.264 Compressed Videos", IEEE International Conference on Multimedia and Expo (ICME 2013), July 2013 Lalit Vashishtha,Tanima Dutta and A. Sur, "Least Significant Bit Matching Steganalysis Based on Feature Analysis", The nineteenth annual National Conference on Communications (NCC- 2013), Delhi, January 16-17, 2013 Tanima Dutta, A. Sur, Sukumar Nandi, "A Robust Compressed Domain Video Watermarking in P-frames with Controlled Bit Rate Increase", The nineteenth annual National Conference on Communications (NCC-2013), Delhi, January 16-17, 2013 Boorla Chandrakanth, Tanima Dutta and A. Sur, "Steganographic Algorithm Based on Parametric Discrete Cosine Transform", Proceedings of the Eighth Indian Conference on Vision, Graphics and Image Processing (ICVGIP 2012), Article No. 79, ACM New York, NY, USA, Anand S Nair, Abhishek Kumar, A. Sur, Sukumar Nandi, "Length Based Network Steganography using UDP Protocol", 2011 International Conference on Computer and Communication Devices (ICCCD 2011), pp , Bali Island, Indonesia. April 1-3, 2011 A. Sur, Piyush Goel,, IIT Kharagpur and Jayanta Mukhopadhyay,, IIT Kharagpur, "Adaptive Pixel Swapping Based Steganography Reducing Embedding Noise", 4th International Conference on Pattern Recognition and Machine Intelligence (PReMI' 11), June 27 - July 1, 2011, Moscow, Russia Lecture Notes in Computer Science, Volume 6744/2011, pp , 2011.
9 Vengala Satish Kumar, Tanima Dutta, A. Sur and Sukumar Nandi "Secure Network Steganographic Scheme Exploiting TCP Sequence Numbers", The Fourth International Conference on Network Security & Applications (CNSA-2011), July 15 ~ 17, 2011, Chennai, India, Advances in Network Security and Applications, Communications in Computer and Information Science, Springer, Volume 196, Part 1, pp Omprakash Meena, Sathisha Basavaraju and A. Sur, "DCT block location based data hiding" World Congress on Information and Communication Technologies (WICT), pp , December 2011 Ankush Rai, Ferdous Barbhuiya, A. Sur, Santosh Biswas, Suchetana Chakraborty and Sukumar Nandi, "Exploit Detection Techniques for STP using Distributed IDS", World Congress on Information and Communication Technologies (WICT), pp , 2011 A. Sur and Jayanta Mukhopadhyay, IIT Kharagpur: An Adaptive Steganographic Scheme with JPEG Compressed Digital Images, Proceedings, National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG), Jan Udit Singh, Rajat Singh, A. Sur "Reversible Data Hiding by Utilizing the Local Maxima in the Histogram",Second International Conference on Multimedia and Content-Based Image Retrieval (ICMCBIR) 2010 Anand S Nair, A. Sur, Sukumar Nandi, "Detection of Packet Length Based Network Steganography", International Conference on Multimedia Information Networking and Security (MINES), pp , 2010 Udit Singh, A. Sur "Reversible Data Hiding by Alternate Shifting of Peaks in the Histogram" First International Conference on Intelligent Interactive Technologies and Multimedia (IITM), 2010 A. Sur, Piyush Goel,, IIT Kharagpur and Jayanta Mukhopadhyay, IIT Kharagpur: Spatial Desynchronization : A Possible Way to Resist Calibration Attack, International Conference on Multimedia Information Networking and Security (MINES), pp , A. Sur, Piyush Goel and Jayanta Mukhopadhyay: A New Statistical Restoration Method for Spatial Domain Images, Third International Conference on Pattern Recognition and Machine Intelligence (PReMI'09), Lecture Notes in Computer Science, Springer Berlin / Heidelberg, Volume 5909/2009, pp A. Sur, Srikar Sagar, Rajarshi Pal, Pabitra Mitra and Jayanta Mukhopadhyay, IIT Kharagpur: A New Image Watermarking Scheme using Saliency-Based Visual Attention Model, IEEE INDICON, pp. 1-4, A. Sur, Piyush Goel and Jayanta Mukhopadhyay: A Spatial Domain Steganographic Scheme for Reducing Embedding Noise, 3rd International Symposium on Communications, Control and Signal Processing, ISCCSP March 12 14, 2008, St. Julians, Malta, on page(s):
10 A. Sur, Piyush Goel and Jayanta Mukhopadhyay: A New Approach for Reducing Embedding Noise in Multiple Bit Plane Steganography, International Conference on Image and Signal Processing, ICISP July 1-3, 2008, Cherbourg-Octeville, Normandy, France, Lecture Notes in Computer Science, Springer Berlin / Heidelberg, Volume 5099/2008, on page(s): A. Sur, Piyush Goel and Jayanta Mukhopadhyay: Pixel Swapping: Another Possible Way to Resist Targeted Attacks on LSB Steganography, International Workshop on Digital Watermarking (IWDW 2008), November 10 12, 2008, Busan, Korea, Lecture Notes in Computer Science, Springer Berlin / Heidelberg, Volume 5450/2009, on page(s): A. Sur, Piyush Goel and JayantaMukhopadhyay: A SDS Based Steganographic Scheme for Reducing Embedding Noise, Proceedings, ADCOM 2007, Dec 18-21, Guwahati, INDIA, IEEE Computer Society Press, on page(s): ( ). A. Sur. and Jayanta Mukhopadhyay: Adaptive data hiding in compressed video domain, ICVGIP-2006, Dec , Madurai, India, Lecture Notes in Computer Science, Vol. 4338/2006. Springer Berlin / Heidelberg (2006), on page(s):
A New Statistical Restoration Method for Spatial Domain Images
A New Statistical Restoration Method for Spatial Domain Images Arijit Sur 1,,PiyushGoel 2, and Jayanta Mukherjee 2 1 Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati-781039,
More informationAbstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction
A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor
More informationAbhishek Chakraborty
Abhishek Chakraborty Institute Post Doctoral Fellow Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036, India Phone: +91-859-286-2863/+91-943-498-6672 Email:
More informationCall for Papers for Communication QoS, Reliability and Modeling Symposium
Call for Papers for Communication QoS, Reliability and Modeling Symposium Scope and Motivation: In modern communication networks, different technologies need to cooperate with each other for end-to-end
More informationFACULTY PROFILE. Total Experience : Academic : 7 Years and 3 Months. Degree Branch / Specialization College University
FACULTY PROFILE Name Designation Email ID : A.K.Kavitha : Assistant Professor : kavitha.ece@srit.org Area of Specialization : Wireless Communication Total Experience : Academic : 7 Years and 3 Industry
More informationWorkshops. 1. SIGMM Workshop on Social Media. 2. ACM Workshop on Multimedia and Security
1. SIGMM Workshop on Social Media SIGMM Workshop on Social Media is a workshop in conjunction with ACM Multimedia 2009. With the growing of user-centric multimedia applications in the recent years, this
More informationA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY Md. Maklachur Rahman 1 1 Department of Computer Science and Engineering, Chittagong University of Engineering and Technology,
More informationProfessional Excellence Summary
Mr. J.SANTHOSH B.E.,M.E., (Ph.D).,MISTE Assistant Professor Department of Computer Science & Engineering K.S.R. College of Engineering (Autonomous) Tiruchengode - 637 215, Namakkal District, TamilNadu.
More informationA New Approach to Compressed Image Steganography Using Wavelet Transform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography
More informationDegree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR
FACULTY PROFILE Name Designation Email ID : NISHA SOMS : ASSISTANT PROFESSOR (SENIOR GRADE) : nishasoms.cse@srit.org Area of Specialization : Wireless Ad Hoc Networks, Mobile Computing Cryptography and
More informationCOCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY
COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY Name: Department: Contact Details: Address for communication Email Phone Intercom Academic Background Qualifications: Qualifying Post Graduate Degree: Ph. D
More informationPayal Gulati. House No. 1H-36, NIT, Faridabad E xp e r i e nc e
Payal Gulati House No. 1H-36, NIT, gulatipayal@yahoo.co.in Total Experience: 9.5 years E xp e r i e nc e Currently working as Assistant Professor (IT) in YMCA University of Science & Technology, since
More informationAn Adaptive Video Compression Technique for Resource Constraint Systems
An Adaptive Video Compression Technique for Resource Constraint Systems Shreelekshmi R, Sruthi S Abstract As display devices become more and more vivid, and people demand more perfection in video quality,
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 6, June 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationDr. Badrinath Gurappa Srinivas
Dr. Badrinath Gurappa Srinivas Chief Engineer, Advanced Technology Group, Samsung Research Institute Noida, Sector-62, Noida - 201301, Uttar Pradesh, India Permanent Address: #A-35, Sector-14, Noida-201301,
More informationAppendix A. Definition of Terms
Appendix A Definition of Terms Artifact: Artifacts are the irregularities that may be present in an image after processing. They are not related to the details of the image and sometimes accompany transmitted
More informationWireless Communications, Information Theory, Physical Layer Security, Cyber Security for Smart Grid, Cryptography, Network Coding.
Mustafa El-Halabi Contact Information Fleifel Building Cell Phone: + (979) 422 4585 Mathaf E-mail: mhalabi@aust.edu.lb Beirut, Lebanon Webpage: https://mustafa-halabi.appspot.com/ Research Interests Education
More informationAnurag Singh. 10th Percentage (1992): 79.16% Pt. Deendayal Upadhyay Sanatan Dharam Vidyalaya, Kanpur, India. (U.P.Board Allahabad).
Anurag Singh Flat No. 16, SFS Flats, Pkt 10, Sec. 11, Rohini, Delhi - 110085 Email: anuanu52@gmail.com Phone: +91-9810526575(M) Homepage: http://home.iitk.ac.in/~anuragsg/ EDUCATION PhD from IIT Kanpur,
More informationMCRD: MOTION COHERENT REGION DETECTION IN H.264 COMPRESSED VIDEO
MCRD: MOTION COHERENT REGION DETECTION IN H.264 COMPRESSED VIDEO Tanima Dutta Arijit Sur Sukumar Nandi Department of Computer Science and Engineering Indian Institute of Technology Guwahati, India Email:
More informationarxiv: v1 [cs.mm] 9 Aug 2017
Robust Video Watermarking against H.264 and H.265 Compression Attacks Nematollah Zarmehi 1* and Mohammad Javad Barikbin 2 1 Advanced Communication Research Institute, Electrical Engineering Department,
More informationCURRICULUM VITAE. Discipline University /Board Year % Secured. Indian Institute of Technology (IIT), Kharagpur. (NIT), Rourkela
CURRICULUM VITAE Name: Dr. ASHOK KUMAR TURUK Personal Data : Position Held: Assistant Professor Department : Computer Science & Engineering Office Address : Dept. of Computer Science & Engineering. (NIT)
More informationANNA UNIVERSITY REGIONAL CAMPUS MADURAI DEPARTMENT OF COMPUTER APPLICATIONS FACULTY PROFILE
ANNA UNIVERSITY REGIONAL CAMPUS MADURAI DEPARTMENT OF COMPUTER APPLICATIONS FACULTY PROFILE Full Name (With qualification) Designation Department E Mail Area of Interest V. FRANCIS DENSIL RAJ, MCA.,M.PHIL.,
More informationName: S.Brindha. Assistant Professor Grade I. Designation: Qualification: B.E, M.E, Ph.D (Pursuing)
Name: S.Brindha Designation: Qualification: B.E, M.E, Ph.D (Pursuing) Assistant Professor Grade I Area of specialization: B.E(ECE), M.E( &Networking) Ph.D(Pursuing) Radio over Fiber Networks Experience
More informationIJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby
Dr. P.P.Joby Contact Address Professor & Dean, Department of Computer Science & Engineering, MBC College of Engineering and Technology, Kuttikanam, Peermade, Idukki Dt, Kerala-685531. Permanent Address
More informationAYAN MONDAL ayan.mondal/
AYAN MONDAL +91-7872773669 mondalayan12@gmail.com, ayanmondal@iitkgp.ac.in http://cse.iitkgp.ac.in/ ayan.mondal/ Present Address Kharagpur - 721302 India Permanent Address Ashrampara (Teachers Colony)
More informationAuthentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
, 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
More informationAREAS OF SPECIALIZATION. Digital Image Processing Computer Vision Pattern Recognition Image Retrieval Image Reconstruction Face Recognition
Dr. Pooja Sharma (Gold Medalist) UGC (NET and JRF) Assistant Professor Department of Computer Science and Engineering IKGPTU, Main Campus, Kapurthala, Punjab, India. E-mail: dr.poojasharma@ptu.ac.in Mobile:
More informationA Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security
A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security Manas Paul 1 and Jyotsna Kumar Mandal 2 1 Dept. of Comp. Application, JIS College of Engineering,
More informationRobust Image Watermarking based on DCT-DWT- SVD Method
Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete
More informationSECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology May-2017 Volume- 4, Issue-3 Email: editor@ijermt.org www.ijermt.org SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE
More informationResume. Techniques. Mail ID: Contact No.: S.No. Position held Organisation From To. AU PG Center, Vizianagaram
Resume Name: Designation: Qualifications: Subjects taught: Research specialization: Dr. M.Seshashayee Assistant Professor MCA, M.Tech, Ph.D. Programming In Java, Internet programming, Software Engineering,
More informationImage Processing and Watermark
IJCST Vo l. 7, Is s u e 1, Ja n - Ma r c h 2016 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Image Processing and Watermark 1 Dr. Amit Verma, 2 Navdeep Kaur Gill 1,2 Dept. Computer Science and Engineering,
More informationFACULTY PROFILE. Designation Institution/Organization Period Nature of Duties
Name of the Staff Designation FACULTY PROFILE : D.VIJAYAKUMAR Date of joining in the college : 04-06-2010 E-mail Id : Assistant Professor (Sr.Grade) : dvk@nec.edu.in Mobile Number : 9994357984 Personal
More informationVenkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91)
Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: +91-94482 26130 Dept. of Electrical Communication Engg. (ECE) Fax: (+91)-80-2360 0991 Indian Institute of Science E-mail: rvenkat@ece.iisc.ernet.in
More informationYET Another Steganographic Scheme (YASS) [1] is a
374 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 3, SEPTEMBER 2010 An Experimental Study on the Security Performance of YASS Fangjun Huang, Member, IEEE, Jiwu Huang, Senior Member,
More informationIMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY
IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY Shreelekshmi R, Wilscy M 2 and C E Veni Madhavan 3 Department of Computer Science & Engineering, College of Engineering, Trivandrum,
More informationSermakani. AM Mobile: : IBM Rational Rose, IBM Websphere Studio Application Developer.
Objective: With sound technical knowledge as background and with innovative ideas, I am awaiting to work on challenging jobs that expose my skills and potential ability. Also looking for the opportunity
More informationDigital Image Steganography Using Bit Flipping
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using
More informationVelammal Engineering College Department of Computer Science and Engineering
Velammal Engineering College Department of Computer Science and Engineering Name & Photo : Prof.B.Rajalakshmi Designation: Qualification : Area of Specialization : Teaching Experience : Vice Principal
More informationComparative Study between DCT and Wavelet Transform Based Image Compression Algorithm
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. II (Jan Feb. 2015), PP 53-57 www.iosrjournals.org Comparative Study between DCT and Wavelet
More informationJPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images
JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images Dessalegn Atnafu AYALNEH*, Hyoung Joong KIM*, Yong Soo CHOI** *CIST (Center for Information Security Technologies), Korea University
More informationBiodata. Name: Ms. Jyoti M. Hurakadli. Designation: Associate Professor. Qualification: M.Tech (Computer Network Engineering),
Biodata Name: Ms. Jyoti M. Hurakadli Designation: Associate Professor Qualification: M.Tech (Computer Network Engineering), B.E. (Computer Science and Engineering) Specialization: Computer Networking Date
More informationPersonal Profile. Allied Additional Subordinate Subject studied. Management Information System. Electronic Commerce. Image Processing.
Personal Profile (1) Name of the teacher (in full): Ms. Sarika Vijay Purao (2) Department: (3) Designation: Assistant Professor (4) Qualifications of the teacher:- Degree/ Post Graduate Degree Examinatio
More informationI. Introduction. II Integer-To-Integer Wavelet Transforms
Reversible Image Data Hiding Using Lifting Wavelet Transform and Histogram Shifting S. Kurshid Jinna Dr. L. Ganesan Professor, Dept of Computer Science & Engineering Professor, Dept of Computer Science
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationNCC 2009, January 16-18, IIT Guwahati 267
NCC 2009, January 6-8, IIT Guwahati 267 Unsupervised texture segmentation based on Hadamard transform Tathagata Ray, Pranab Kumar Dutta Department Of Electrical Engineering Indian Institute of Technology
More informationRandom Image Embedded in Videos using LSB Insertion Algorithm
Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.
More informationResearch Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature
Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationEvaluating the Effect of Path Diversity over QoS and QoE in a High Speed Indoor Mesh Backbone
Evaluating the Effect of Path Diversity over QoS and QoE in a High Speed Indoor Mesh Backbone Sandip Chakraborty 12, Sukumar Nandi Department of Computer Science and Engineering Indian Institute of Technology
More informationExperience : Teaching : UG: 18 years PG : 6 Industry : - No. of workshop / Conferences / FDP attended : 25
Name & Photo : R.VALARMATHI Designation: Qualification : Area of Specialisation : Associate Professor M.E.,(Ph.d) Cloud Computing Experience : Teaching : UG: 18 years PG : 6 Industry : - No. of workshop
More informationEducational Qualification PhD (Computer and science engineering) - pursuing from Sir Padampat Singhania University, Udaipur, Rajasthan.
Mrs. Vijaya Umesh Pinjarkar Mobile : 9757143228 Email: vkhirodkar@somaiya.edu Professional Objective To utilize my teaching skills towards a challenging career in growth oriented and leading edge that
More informationDescrambling Privacy Protected Information for Authenticated users in H.264/AVC Compressed Video
Descrambling Privacy Protected Information for Authenticated users in H.264/AVC Compressed Video R.Hemanth Kumar Final Year Student, Department of Information Technology, Prathyusha Institute of Technology
More informationGabor Filter HOG Based Copy Move Forgery Detection
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p-ISSN: 2278-8735 PP 41-45 www.iosrjournals.org Gabor Filter HOG Based Copy Move Forgery Detection Monisha Mohan
More informationRobust Video Coding. Heechan Park. Signal and Image Processing Group Computer Science Department University of Warwick. for CS403
Robust Video Coding for CS403 Heechan Park Signal and Image Processing Group Computer Science Department University of Warwick Standard Video Coding Scalable Video Coding Distributed Video Coding Video
More informationData Hiding in Video
Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract
More informationA NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD
A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute
More informationVideo signal Processing Power Electronics & Drives. Anna University - Pursuing % Anna, Chennai
K.S.R COLLEGE OF ENGINEERING, TIRUCHENGODE 63725 (An Autonomous Institution, Affiliated to Anna University, Chennai) DEPARTMENT OF EEE FACULTY PROFILE 0. Name : J.Thiyagarajan 02. Designation : Assistant.Professor
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A REVIEW ON ILLUMINATION COMPENSATION AND ILLUMINATION INVARIANT TRACKING METHODS
More informationJun Li, Ph.D. School of Computing and Information Sciences Phone:
Jun Li, Ph.D. School of Computing and Information Sciences Phone: + 1-305-348-4964 Florida International University Email: junli @ cs. fiu. edu 11200 SW 8th St, ECS 380, Miami, FL 33199 Web: http://users.cs.fiu.edu/
More informationA Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 11, Issue 09 (September 2015), PP.27-31 A Blind Steganalysis on JPEG Gray Level
More informationA NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO
International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad
More informationCOMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING
International Journal of Computer Engineering and Applications, Volume X, Issue VII, July 16 www.ijcea.com ISSN 2321-3469 COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING Geeta
More informationImproved Qualitative Color Image Steganography Based on DWT
Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V
More informationA Digital Video Watermarking Algorithm Based on LSB and DCT
A Digital Video Watermarking Algorithm Based on LSB and DCT Kirti Jain, U.S.N Raju Department of Computer Science and Engineering NIT Warangal India kirtijain.kj@gmail.com,usnraju@gmail.com ABSTRACT: In
More informationSecuring Multiprocessor Systemon-Chip
Securing Multiprocessor Systemon-Chip By Arnab Kumar Biswas Department of Electronic Systems Engineering Under guidance of Prof. S. K. Nandy Motivation Now-a-days MPSOCs are pervading our dayto-day lives.
More informationDistributed Rate Allocation for Video Streaming over Wireless Networks. Wireless Home Video Networking
Ph.D. Oral Defense Distributed Rate Allocation for Video Streaming over Wireless Networks Xiaoqing Zhu Tuesday, June, 8 Information Systems Laboratory Stanford University Wireless Home Video Networking
More informationEMBEDDING WATERMARK IN VIDEO RECORDS
EMBEDDING WATERMARK IN VIDEO RECORDS D.Abirami UG (CSE), Sri Krishna College of Technology, Anna University abidhanabal17@gmail.com R.Gowsika UG (CSE), Sri Krishna College of Technology, Anna University
More informationVideo Inter-frame Forgery Identification Based on Optical Flow Consistency
Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong
More informationDr. Spencer Sevilla Postdoctoral Researcher, University of Washington
Dr. Spencer Sevilla Postdoctoral Researcher, University of Washington email: sevilla@cs.washington.edu Research Interests Computer networks, Host mobility, Web technology, Content caching Education University
More informationAnalysis and Comparison of Torus Embedded Hypercube Scalable Interconnection Network for Parallel Architecture
242 IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.1, January 2009 Analysis and Comparison of Torus Embedded Hypercube Scalable Interconnection Network for Parallel Architecture
More informationDIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS
DICTA22: Digital Image Computing Techniques and Applications, 2 22 January 22, Melbourne, Australia. DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS *Yuk Ying CHUNG, Man To WONG *Basser Department of Computer
More informationAn Improved Performance of Watermarking In DWT Domain Using SVD
An Improved Performance of Watermarking In DWT Domain Using SVD Ramandeep Kaur 1 and Harpal Singh 2 1 Research Scholar, Department of Electronics & Communication Engineering, RBIEBT, Kharar, Pin code 140301,
More informationA Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach
www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions
More informationKCG College of Technology, Chennai
faculty member : Dr. ROOPALAKSHMI R Department : Computer Science & Engineering Present Designation : Associate Professor Residential Address : Plot No15, 2 nd cross road, Sri Sai Nagar, West Tambaram,
More informationSurvey paper - Audio-Video Steganography Using Anti Forensics Technique
Survey paper - Audio-Video Steganography Using Anti Forensics Technique Ms. V.Sarangpure 1 ; Mrs. R. B. Talmale 2 ;Ms. M. Domke 3 1 Final Year M. Tech (CSE), Tulsiramji Gaikwad Patil College of Engineering
More informationDWT AND LSB ALGORITHM BASED IMAGE HIDING IN A VIDEO
DWT AND LSB ALGORITHM BASED IMAGE HIDING IN A VIDEO M Abhilash Reddy 1,P.Sanjeeva Reddy 2, Member, IEEE and GS Naveen Kumar 3 1 M.Tech Student, Malla Reddy College of Engineering & Technology, Hyd., India.
More informationKCG College of Technology, Chennai
, Chennai-600 097 faculty member : S SANKAR Department : COMPUTER SCIENCE AND ENGINEERING Present Designation : ASSOCIATE PROFESSOR Residential Address : B22, SHANTINIKETAN ALTAIR APARTMENT KELAMBAKKAM,
More informationLSB Based Audio Steganography Using Pattern Matching
ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom
More informationRavindranagar Colony, Habsiguda, : Department of Computer Science & Engineering, University College of Engineering(A),
Name Designation Father Name : Dr.V.B.Narsimha : Assistant Professor : V.Raghavulu Date of Birth : 20-06-1969 Residence Address : Flat No.101, SR Apartment, Ravindranagar Colony, Habsiguda, Hyderabad,
More informationCOMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT
COMPARISO BETWEE TWO WATERMARKIG ALGORITHMS USIG DCT COEFFICIET, AD LSB REPLACEMET Mona M. El-Ghoneimy Associate Professor, Elect. & Comm. Dept., Faculty of Engineering, Cairo University, Post code 12316
More informationMAGNO QUEIROZ Curriculum Vitae
MAGNO QUEIROZ Curriculum Vitae Office Management Information Systems Jon M. Huntsman School of Business Utah State University 3515 Old Main Hill Logan, UT 84322-3515 Location: Eccles Business Building
More informationRobust DWT Based Technique for Digital Watermarking
Robust DWT Based Technique for Digital Watermarking Mamta Jain Department of Electronics & Communication Institute of Engineering & Technology Alwar er.mamtajain@gmail.com Abstract Hiding the information
More informationRobust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based
More informationQuality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain YAHYA E. A. AL-SALHI a, SONGFENG LU *b a. Research Scholar, School of computer science, Huazhong
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationA Comparison of SIFT and SURF
A Comparison of SIFT and SURF P M Panchal 1, S R Panchal 2, S K Shah 3 PG Student, Department of Electronics & Communication Engineering, SVIT, Vasad-388306, India 1 Research Scholar, Department of Electronics
More informationCONTENT BASED VIDEO RETRIEVAL SYSTEM
CONTENT BASED RETRIEVAL SYSTEM Madhav Gitte 1, Harshal Bawaskar 2, Sourabh Sethi 3, Ajinkya Shinde 4 1 B.E. Scholar, Department of Information Technology, Sinhgad College of Engineering Pune-41, University
More information1. Discovering Important Nodes through Graph Entropy The Case of Enron Database
1. Discovering Important Nodes through Graph Entropy The Case of Enron Email Database ACM KDD 2005 Chicago, Illinois. 2. Optimizing Video Search Reranking Via Minimum Incremental Information Loss ACM MIR
More informationDIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION
DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION T.Punithavalli 1, S. Indhumathi 2, V.Karthika 3, R.Nandhini 4 1 Assistant professor, P.A.College of Engineering and Technology, pollachi 2 Student,
More informationRobust Watermarking Method for Color Images Using DCT Coefficients of Watermark
Global Journal of Computer Science and Technology Graphics & Vision Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc.
More informationImage Steganography Method Using Integer Wavelet Transform
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationFRAGILE WATERMARKING USING SUBBAND CODING
ICCVG 2002 Zakopane, 25-29 Sept. 2002 Roger ŚWIERCZYŃSKI Institute of Electronics and Telecommunication Poznań University of Technology roger@et.put.poznan.pl FRAGILE WATERMARKING USING SUBBAND CODING
More informationInternational Journal of Advance Research in Engineering, Science & Technology
Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 6, June-2018 SECURE DATA HIDING IN AUDIO
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationSPEC Research Group and Big Data Xiao Wei Zhang, Liang Lu (IBM / SPEC RG Big Data WG)
SPEC Research Group and Big Data Xiao Wei Zhang, Liang Lu (IBM / SPEC RG Big Data WG) Mission and Objectives The mission of the SPEC RG Big Data Working Group is to facilitate research in performance methodologies
More informationFeature Based Watermarking Algorithm by Adopting Arnold Transform
Feature Based Watermarking Algorithm by Adopting Arnold Transform S.S. Sujatha 1 and M. Mohamed Sathik 2 1 Assistant Professor in Computer Science, S.T. Hindu College, Nagercoil, Tamilnadu, India 2 Associate
More informationOpenSFS Test Cluster Donation. Dr. Nihat Altiparmak, Assistant Professor Computer Engineering & Computer Science Department University of Louisville
OpenSFS Test Cluster Donation Dr. Nihat Altiparmak, Assistant Professor Computer Engineering & Computer Science Department University of Louisville 4/24/2018 Donation Details Jan 5, 2018 OpenSFS announced
More informationNavjot Singh *1, Deepak Sharma 2 ABSTRACT I. INTRODUCTION
2017 IJSRSET Volume 3 Issue 1 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section: Engineering and Technology An Efficient Multiple Data Hiding Technique for Medical Images Using QR Code Authentication
More informationAdvanced Digital Image Forgery Detection by Using SIFT
RESEARCH ARTICLE OPEN ACCESS Advanced Digital Image Forgery Detection by Using SIFT Priyanka G. Gomase, Nisha R. Wankhade Department of Information Technology, Yeshwantrao Chavan College of Engineering
More informationA Review on Cloud Service Broker Policies
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.1077
More information