• Publications
  • Influence
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE , AUDIO AND VIDEO COVER MEDIA
Recently, there has been a lot of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover (carrier) media to obtain the stego media, in such aExpand
  • 75
  • 6
Survey and Taxonomy of Unicast Routing Protocols for Mobile Ad Hoc Networks
The purpose of this paper is to survey the unicast routing protocols for mobile ad hoc networks (MANETs) and study their primary route selection principle. In this context, we did an exhaustiveExpand
  • 48
  • 4
  • PDF
Tools and techniques for Network Forensics
Network forensics deals with the capture, recording and analysis of network events in order to discover evidential information about the source of security attacks in a court of law. This paperExpand
  • 43
  • 4
  • PDF
Impact of the Gauss-Markov Mobility Model on Network Connectivity, Lifetime and Hop Count of Routes for Mobile Ad hoc Networks
The high-level contribution of this paper is a simulation based analysis of the network connectivity, hop count and lifetime of the routes determined for mobile ad hoc networks (MANETs) using theExpand
  • 34
  • 3
  • PDF
A Survey on the Communication Protocols and Security in Cognitive Radio Networks
  • N. Meghanathan
  • Computer Science
  • Int. J. Commun. Networks Inf. Secur.
  • 26 March 2013
A cognitive radio (CR) is a radio that can change its transmission parameters based on the perceived availability of the spectrum bands in its operating environment. CRs support dynamic spectrumExpand
  • 32
  • 3
Stability-Energy Consumption Tradeoff among Mobile Ad Hoc Network Routing Protocols
  • N. Meghanathan
  • Computer Science
  • Third International Conference on Wireless and…
  • 4 March 2007
We present an ns-2 simulation based analysis on the energy consumption of the stability-oriented on- demand mobile ad hoc network (MANET) routing protocols. The stability-oriented routing protocolsExpand
  • 27
  • 3
An Energy-aware Greedy Perimeter Stateless Routing Protocol for Mobile Ad hoc Networks
highlevel contribution of this paper is an ene rgyaware version of the wellknown positionbased Greedy Per imeter Stateless Routing (GPSR) protocol for mobile ad hoc networks (MANETs). In the proposedExpand
  • 12
  • 3
Performance Comparison of Link, Node and Zone Disjoint Multi-path Routing Strategies and Minimum Hop Single Path Routing for Mobile Ad Hoc Networks
The high-level contribution of this paper is a simulation-based analysis to evaluate the tradeoffs between lifetime and hop count of link-disjoint, node-disjoint and zone-disjoint multi-path routesExpand
  • 17
  • 2
  • PDF
Applications of Graph Theory Algorithms in Mobile Ad hoc Networks
Various simulators (e.g., ns-2 and GloMoSim) are available to implement and study the behavior of the routing protocols for Mobile Ad hoc Networks (MANETs). However, students and investigators whoExpand
  • 13
  • 2