Y. Rama Devi

Learn More
An efficient and robust video watermarking algorithm for video coding standard MPEG has been proposed in this paper. Digital video watermarking has attracted a great deal of research interest in the past few years in applications such as digital fingerprinting and owner identification. Grayscale 2-D watermark patterns such as detailed trademarks or logos(More)
— Cloud Computing has been rapidly and radically changing the dynamics of IT consumption. The core cloud computing proposition is being able to buy compute technology as a service in an on-demand, elastic, and pay-as-you-go model. Public cloud offerings to the IT industry are very prominent. But the organizations, which have already invested money in their(More)
Video text information plays an important role in semantic-based video analysis, indexing, and retrieval. Text embedded in the image or video contains very useful information like the name of the person, title, location and sometimes brief description of the image. Many algorithms have been proposed to detect and localize the text information present in(More)
Wireless sensor network has become a necessity than luxury in common man's life. A new routing protocol by name Chain Routing for Convergecast Small Scale (CRCSS) wireless sensor networks is proposed in this paper. The set of sensor nodes send the data sensed periodically to the base station located in the area of interest. The nodes that fail to send the(More)
Data mining process suffers from the curse of dimensionality. If a dataset has a large number of attributes, then the corresponding classification procedure loses its accuracy and precision. In this paper, an efficient algorithm for dimensionality reduction using Reducts through Ranking based on Rough Set Theory is presented. Classification process is(More)
– In wireless sensor networks multi-hop routing is often used because of the limited transmission range of sensor nodes. Opportunistic Routing is a multi-hop routing for wireless sensor networks. In this routing, the neighbors of sender node overhear the transmission and f```orm multiple hops from source to the destination for transfer of information. The(More)
  • 1