M. Venkatesan

Learn More
Data hiding is usually achieved by alternating some nonessential information in the host message. A more challenging problem is to hide data in a two - color binary image. Hiding is difficult for the binary image since each of its black or white pixels requires only one bit representation. So that, changing a pixel can be easily detected. In this paper, we(More)
Problem statement: In recent years, as digital media are gaining wider popularity, their security related issues are becoming greater concern. Method for authenticating and assuring the integrity of the image is required. Image authentication is possible by embedding a layer of the authentication signature into the digital image using a digital watermark.(More)
Spatial co-location patterns are the subsets of Boolean spatial features whose instances are often located in close geographic proximity. Co-location rules can be identified by spatial statistics or data mining approaches. In data mining method, Association rule-based approaches can be used which are further divided into transaction-based approaches and(More)
In this paper, a new reversible image authentication technique with tamper localization based on watermarking in integer wavelet transform is proposed. If the image authenticity is verified, then the distortion due to embedding the watermark can be completely removed from the watermarked image. If the image is tampered, then the tampering positions can also(More)
The processing capacity, architecture and algorithms of traditional database system are not coping with big data analysis. Big data are now rapidly growing in all science and engineering domains, including biological, biomedical sciences and disaster management. The characteristics of complexity formulate an extreme challenge for discovering useful(More)
The network security always remains attraction for the IT security professionals due to the availability of various solutions for the single problem such as opting single layered security approached e. g. , Software Based Firewall or Either select for High Range Firewalls or go for mixed solution which include the deployment of firewall including the NIDPS(More)
This article presents the Learning Algorithm for increasing speed in cognitive radio system. In today’s modern world wireless communications are an effective and efficient way for data transmission. Success of this communication depends on limited radio spectrum. Cognitive radio systems (CRs) are more flexible and used for intelligent spectrum management.(More)