K. B. Shivakumar

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Demand for new and robust techniques for digital data security and privacy are increasing with advancement of digital communication, Internet and cloud based storage. Cryptography combined with steganography is considered as a good measure of privacy protection scheme. However conventionally, steganography deals with the hiding of text or audio or image(More)
Increased usage of privacy breaches with competition intercepting communications and electronic vandalism makes cryptographic algorithms strong and secure. Cryptographic techniques together with Steganography algorithms visualize file as well as the data size that can be transferred in a balanced manner. In this paper the message is first encrypted using(More)
During Recent days, huge importance is given to Reversible Data Hiding(RDH) techniques in images, since it assures the excellent feature of retrieving the original cover image information in a lossless manner after embedded secret information is extracted, while protecting the image contents confidentiality. This paper proposes a lossless data hiding scheme(More)
Offline signature verification system finds several applications in monitory transaction systems like banks. However one of the major challenges in this direction is the capability of the system to detect skilled and unskilled forgery. Many cases of bank check forgeries have been reported. Most of the offline signature verification system adopts recognition(More)
In this paper, a low-power structure for shift-and-add multipliers is proposed. The architecture considerably lowers the switching activity of conventional multipliers. The modification to the multiplier which multiplies A by B include the removal of the shifting register, direct feeding of A to the adder, bypassing the adder whenever possible, using a ring(More)
  • 1