B Rajeswari Matam

  • Citations Per Year
Learn More
This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the(More)
Evaluation of the security of data hiding methods has gained considerable interest recently. The security of quantisation index modulation (QIM) based watermark embedding methods has previously been investigated for different classes of attacks including known-message attack, known-original attack and watermark-only attack. In this paper, an extreme case of(More)
We have recently proposed the framework of independent blind source separation as an advantageous approach to steganography. Amongst the several characteristics noted was a sensitivity to message reconstruction due to small perturbations in the sources. This characteristic is not common in most other approaches to steganography. In this paper we discuss how(More)
Acute life threatening events such as cardiac/respiratory arrests are often predictable in adults and children. However critical events such as unplanned extubations are considered as not predictable. This paper seeks to evaluate the ability of automated prediction systems based on feature space embedding and time series methods to predict unplanned(More)
Most existing, expert monitoring systems do not provide the real time continuous analysis of the monitored physiological data that is necessary to detect transient or combined vital sign indicators nor do they provide long term storage of the data for retrospective analyses. In this paper we examine the feasibility of implementing a long term data storage(More)
  • 1