Prabaharan Poornachandran

Learn More
In this digital era, lot of information are expressed through images. Various social networking websites, such as Facebook, Twitter, MySpace etc. provides a platform for the users to post up almost any type of picture or photo. However, with the advancement in image editing technologies, many users have become victims of digital forgery as their uploaded(More)
With the evolution of internet, author profiling has become a topic of great interest in the field of forensics, security, marketing, plagiarism detection etc. However the task of identifying the characteristics of the author just based on a text document has its own limitations and challenges. This paper reports on the design, techniques and learning(More)
Given the continuous growth of malicious activities on the internet, there is a need for intelligent systems to identify malicious web pages. It has been shown that URL analysis is an effective tool for detecting phishing, malware, and other attacks. Previous studies have performed URL classification using a combination of lexical features, network traffic,(More)
Among most of the cyber attacks that occured, the most drastic are advanced persistent threats. APTs are differ from other attacks as they have multiple phases, often silent for long period of time and launched by adamant, well-funded opponents. These targeted attacks mainly concentrated on government agencies and organizations in industries, as are those(More)
Digital image processing is a very expanding area with applications reaching out into various fields such as defence, medicine, space exploration, authentication, automated industry inspection and many more areas. Many digital communication systems require reliable security in processing and transmission of digital images. The fast development of internet(More)
There has been a rampant surge in compromise of consumer grade small scale routers in the last couple of years. Attackers are able to manipulate the Domain Name Space (DNS) settings of these devices hence making them capable of initiating different man-in-the-middle attacks. By this study we aim to explore and comprehend the current state of these attacks.(More)