V. Thanikaiselvan

ORCID: 0000-0003-2418-5217
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Cellular Automata and Applications
  • Cryptographic Implementations and Security
  • Retinal Imaging and Analysis
  • Algorithms and Data Compression
  • Mathematical Dynamics and Fractals
  • Image Enhancement Techniques
  • Wireless Communication Security Techniques
  • Advanced MIMO Systems Optimization
  • Chaos control and synchronization
  • Biometric Identification and Security
  • Advanced Data Compression Techniques
  • Digital Imaging for Blood Diseases
  • IoT and Edge/Fog Computing
  • Robotic Path Planning Algorithms
  • DNA and Biological Computing
  • Smart Agriculture and AI
  • Lung Cancer Diagnosis and Treatment
  • COVID-19 diagnosis using AI
  • Water Quality Monitoring Technologies
  • Artificial Intelligence in Healthcare
  • Retinal Diseases and Treatments
  • Radiomics and Machine Learning in Medical Imaging

Vellore Institute of Technology University
2013-2024

With the growing demand for digitalization, multimedia data transmission through wireless networks has become more prominent. These include text, images, audio, and video. Therefore, a secure method is needed to modify them so that such even if intercepted, will not be interpreted accurately. Such encryption proposed with two-layer image scheme involving bit-level in time-frequency domain. The top layer consists of bit plane slicing image, each then scrambled using chaotic map encrypted key...

10.3390/math11020457 article EN cc-by Mathematics 2023-01-15

Retinal blood vessel segmentation influences a lot of vessel-related disorders such as diabetic retinopathy, hypertension, cardiovascular and cerebrovascular disorders, etc. It is found that using convolutional neural network (CNN) showed increased accuracy in feature extraction compared to the classical algorithms. CNN does not need any artificial handcrafted features train network. In proposed deep (DNN), better pre-processing technique multilevel/multiscale supervision (DS) layers are...

10.3390/sym11070946 article EN Symmetry 2019-07-22

With the growing internet technology, science and requirement of concealing defense research work, there is a need for highly secured information exchange, which essence steganography. Classic secret could be undermined or even faked thereby, creating menace to core secrecy. Steganography camouflages hidden into an unsuspicious digital file i.e. image, video audio, thereby covering existence it. Using modified LSB substitution readjustment procedure mean square error has been reduced. Pixel...

10.1016/j.proeng.2012.01.831 article EN Procedia Engineering 2012-01-01

In the secured data communication scenario, image based Reversible Data Hiding (RDH) at transform domain is receiving its due popularity now. research works so far, evaluation of transforms in RDH very minor compared to that coding. Since both areas deal primarily with integers, present study takes an appreciable step forward by investigating utilization integer-to-integer wavelet have reversibility, which helped developing high capacity and robust algorithms. The proposed investigation...

10.1016/j.jksuci.2018.06.001 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2018-06-05

10.1007/s11042-018-6544-x article EN Multimedia Tools and Applications 2018-08-28

Steganography is used to hide a secret message within cover image, thereby yielding stego image such that even the trace of presence information wiped out. The purpose steganography maintain communication between two users. has several technical challenges namely high hiding capacity and imperceptibility. In this paper we propose modern steganographic technique with Integer Wavelet transform (IWT) double key achieve capacity, security good visual quality. Here converted in wavelet...

10.1109/icccet.2011.5762459 article EN 2011-03-01

From the past few decades new image encryption methods are being developed so as to increase secrecy rate. Eavesdropping is main concern for any type of cryptographic methods. include various like cipher text attack. In order overcome these problems, we have proposed a compelling chaos-based algorithm particularly pictures. this use secret hexadecimal key which used generates initial conditions Tinkerbell maps. These further generate seeds. The advantage that it produces different seeds...

10.1109/iceca.2018.8474891 article EN 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA) 2018-03-01

This article introduces a new color correction method based on the adjustment of pixel intensity to remove casts in underwater images. As images are captured non-homogeneous with nonuniform illumination, Gray-World Assumption (GWA) causes red artefacts. The mainly aims overcome drawback GWA for white balancing Before employing GWA, image is preprocessed by adding inferiority-reducing factor inferior channels increase level. applied preserve information substantially removing casts. adjusted...

10.1109/access.2024.3370597 article EN cc-by-nc-nd IEEE Access 2024-01-01

Modern day information age is enriched with the advanced network communication expertise but unfortunately at same time encounters infinite security issues when dealing secret and/or private information. The storage and transmission of become highly essential have led to a deluge research in this field. In paper, an optimistic effort has been taken combine graceful graph along integer wavelet transform (IWT) implement random image steganography for secure communication. implementation part...

10.1155/2013/464107 article EN cc-by The Scientific World JOURNAL 2013-01-01

Steganography conceals the secret information inside cover medium. There are two types of steganography techniques available practically. They spatial domain and Transform steganography. The objectives to be considered in methods high capacity, imperceptibility robustness. In this paper, a Color image transform is proposed. Reversible Integer Haar wavelet applied R, G B planes separately data embedded random manner. Random selection coefficients based on graph theory. This proposed system...

10.1109/icsipa.2013.6708029 article EN 2013-10-01
Coming Soon ...