Aditya Kumar Sahu

ORCID: 0000-0003-4257-0688
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Chaos-based Image/Signal Encryption
  • Digital Media Forensic Detection
  • Blockchain Technology Applications and Security
  • Anomaly Detection Techniques and Applications
  • Biometric Identification and Security
  • Digital and Cyber Forensics
  • Misinformation and Its Impacts
  • Vehicle License Plate Recognition
  • Adversarial Robustness in Machine Learning
  • Synthesis and Characterization of Heterocyclic Compounds
  • Cellular Automata and Applications
  • Speech and Audio Processing
  • Synthesis and biological activity
  • Music and Audio Processing
  • Internet Traffic Analysis and Secure E-voting
  • Cloud Computing and Resource Management
  • Cryptography and Data Security
  • Advanced Malware Detection Techniques
  • Quinazolinone synthesis and applications
  • Mathematical Dynamics and Fractals
  • Human Pose and Action Recognition
  • Leaf Properties and Growth Measurement
  • Gait Recognition and Analysis
  • Fault Detection and Control Systems

Indus University
2024

Amrita Vishwa Vidyapeetham
2022-2024

Vignan's Foundation for Science, Technology & Research
2022-2023

Education & Research Foundation
2023

Koneru Lakshmaiah Education Foundation
2016-2020

Siddaganga Institute of Technology
2020

Sri Siddhartha Medical College
2020

KLE University
2017

Reversible data hiding (RDH) techniques recover the original cover image after extraction. Thus, they have gained popularity in e-healthcare, law forensics, and military applications. However, histogram shifting using a reversible embedding technique suffers from low capacity high variability. This work proposes which distribution obtained determines pixels that attain peak or zero distribution. Afterward, adjacent bins of point are shifted, is performed least significant bit (LSB) pixels....

10.3390/electronics12051222 article EN Electronics 2023-03-03

In the digital age, where information is a cornerstone for decision-making, social media's not-so-regulated environment has intensified prevalence of fake news, with significant implications both individuals and societies. This study employs bibliometric analysis large corpus 9678 publications spanning 2013–2022 to scrutinize evolution news research, identifying leading authors, institutions, nations. Three thematic clusters emerge: Disinformation in media, COVID-19-induced infodemics,...

10.1016/j.heliyon.2024.e24727 article EN cc-by-nc-nd Heliyon 2024-01-24

Owing to the inefficiency hide large volume of secret data for reversible hiding (RDH) image steganography approaches, we propose two improved RDH based such as (1) dual least significant bit (LSB) matching with reversibility, and (2) n-rightmost replacement (n-RBR) modified pixel value differencing (MPVD). The first approach extends ability LSB reversibility using images. Whereas second utilizes four identical cover images embedding phases, In n-RBR phase, n bits are embedded in pair...

10.1016/j.jksuci.2019.07.004 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2019-07-19

This paper illustrates the various performance evaluation parameters of image steganography techniques. The a steganographic technique can be rated by three parameters; (i) hiding capacity, (ii) distortion measure and (iii) security. capacity means maximum amount information that hidden in an image. It also represented as number bits per pixel. is measured using metrics like mean square error, root PSNR, quality index, correlation, structural similarity index etc. Each these mathematically....

10.1109/rains.2016.7764399 article EN 2016-05-01

Abstract Steganography is the science and art of covert communication. Conversely, steganalysis study uncovering steganographic process. The evolution steganography has been paralleled by development steganalysis. In this game hide seek, two player’s always want to break other down. Over past three decades, research produced a plethora remarkable image techniques (ISTs). major challenge for most these ISTs achieve fair balance between metrics such as high hiding capacity (HC), better...

10.1515/comp-2020-0136 article EN cc-by-nc-nd Open Computer Science 2020-10-27

A novel local binary pattern-based reversible data hiding (LBP-RDH) technique has been suggested to maintain a fair symmetry between the perceptual transparency and capacity. During embedding, image is divided into various 3×3 blocks. Then, using LBP-based descriptor, LBP codes for each block are computed. Next, obtained XORed with embedding bits concealed in respective blocks proposed pixel readjustment process. Further, cover (CI) produces two different stego-image pixels. Likewise, during...

10.1049/cit2.12130 article EN cc-by-nc-nd CAAI Transactions on Intelligence Technology 2022-08-16

Abstract This article proposes bit flipping method to conceal secret data in the original image. Here a block consists of 2 pixels and thereby one or two LSBs hide information it. It exists variants. Variant-1 Variant-2 both use 7th 8th pixel data. hides 3 bits per pair 4 pixels. Our proposed notably raises capacity as well that can be hidden image compared existing method. The steganographic parameters such as, Peak Signal Noise Ratio (PSNR), hiding capacity, Quality Index (Q.I) techniques...

10.2478/cait-2018-0006 article EN cc-by-nc-nd Cybernetics and Information Technologies 2018-03-01

10.1007/s12652-021-03365-9 article EN Journal of Ambient Intelligence and Humanized Computing 2021-06-29

The development of deep convolutional neural networks has been largely responsible for the significant strides forward made in steganography over past decade. In field image steganography, generative adversarial (GAN) are becoming increasingly popular. This study describes current steganographic systems based on learning. authors' goal is to lay out various works that have done using learning techniques and provide some notes methods. proposed a result could open up new avenues future...

10.4018/ijdcf.318666 article EN International Journal of Digital Crime and Forensics 2023-02-24

Sharing accurate and lossless images with higher quality through digital mediums is challenging, particularly, shared on social media platforms can serve as good carriers for sending hidden data. However, apply severe compression when transferring end-to-end to efficient network transporting bandwidth provide enough storage space the users. Within scope of this research, proposed method introduces a novel approach by combining cryptographic steganographic techniques, providing robust...

10.1016/j.jestch.2024.101756 article EN cc-by-nc-nd Engineering Science and Technology an International Journal 2024-07-14

Since the inception of reversible data hiding (RDH) concept, it has been a compelling topic in field hiding.Being reversible, ability to restore original image followed by successful retrieval secret data, at receiving side.The concept dual stego-image based RDH technique utilizes two identical images for concealing gained wide compliance.Therefore, someone with both stego-images can only extract concealed data.In this paper, improved imaging techniques, such as (1) pixel pair LSB matching...

10.22266/ijies2019.1031.07 article EN International journal of intelligent engineering and systems 2019-09-02

Recent decades have seen dramatic development and adoption of digital technology. This technological advancement generates a large amount critical data that must be safeguarded. The security confidential is one the primary concerns in fog computing. As result, achieving reliable level computing environment crucial. In this context, 3D point mesh are becoming increasingly popular among various types stored fog. Data encryption using chaotic behavior preferred research areas due to its unique...

10.1109/access.2022.3232461 article EN cc-by-nc-nd IEEE Access 2022-12-26
Coming Soon ...