- Chaos-based Image/Signal Encryption
- Digital Media Forensic Detection
- Advanced Steganography and Watermarking Techniques
- Photovoltaic System Optimization Techniques
- Solar Radiation and Photovoltaics
- Advanced DC-DC Converters
- Advanced Battery Technologies Research
- Energy Load and Power Forecasting
- Multilevel Inverters and Converters
- Advanced Malware Detection Techniques
- Cryptography and Data Security
- Blockchain Technology Applications and Security
- Optimal Power Flow Distribution
- Fractal and DNA sequence analysis
- solar cell performance optimization
- Data Stream Mining Techniques
- Global and Cross-Cultural Management
- Advanced Neural Network Applications
- Bioinformatics and Genomic Networks
- Wireless Body Area Networks
- Face recognition and analysis
- Semiconductor materials and interfaces
- Network Security and Intrusion Detection
- Smart Agriculture and AI
- Advanced Graph Neural Networks
Koneru Lakshmaiah Education Foundation
2024
Aligarh Muslim University
2012-2024
Integral University
2021-2023
University of Electronic Science and Technology of China
2017-2021
ORCID
2020
Gwangju Institute of Science and Technology
2007
Techniques for creating and manipulating multimedia information have progressed to the point where they can now ensure a high degree of realism. DeepFake is generative deep learning algorithm that creates or modifies face features in superrealistic form, which it difficult distinguish between real fake features. This technology has greatly advanced promotes wide range applications TV channels, video game industries, cinema, such as improving visual effects movies, well variety criminal...
Attributed networks are prevalent in the current information infrastructure, where node attributes enhance knowledge discovery. Anomaly detection attributed is gaining attention for its potential uses cybersecurity, finance, and healthcare. Recognizing complicated relationship between network topology crucial embedding anomaly detection. Nevertheless, there few approaches available to directly represent these two perspectives of property topology. Approaches utilizing reconstruction error...
Integration of blockchain and Internet Things (IoT) to build a secure, trusted robust communication technology is currently great interest for research communities industries. But challenge identify the appropriate position in current settings IoT with minimal consequences. In this article we propose blockchain-based DualFog-IoT architecture three configuration filter incoming requests at access level, namely: Real Time, Non-Real Delay Tolerant Blockchain applications. The segregate Fog...
A significant aspect of today's digital information is attributed networks, which combine multiple node attributes with the basic network topology in order to extract knowledge. Anomaly Detection on networks has recently drawn attention from researchers and widely used a number high-impact areas. The majority current approaches focus shallow learning methods such as community analysis, ego or selection subspace method. These have sparsity data nonlinearity problems, they do not even capture...
Phishing activity is undertaken by the hackers to compromise computer networks and financial system. A compromised system or network provides data processing resources world of cybercrime. Cybercrimes are projected cost $6 trillion 2021, in this context phishing expected continue being a growing challenge. Statistics around growth over last decade support theory as numbers enjoy almost an exponential period. Recent reports on complexity show that fight against URL means building more...
With the advent of new technologies and ever increasing use Cloud in nearly every sphere our day to life, data owner using cloud is still less confident. This lack trust obvious as entrusts with a third party which stores, manages processes data. Whatever be level security, there always some loop hole for misusers. Various machine learning techniques have been learn from available analysis results accordingly benefits. Homomorphic secure multi-party computation (SMC) or homomorphic...
Brain cancer is a life-threatening disease and hampers the normal operation of human body. For correct diagnosis methodical treatment planning, it essential to detect brain tumor in initial stages development. This study proposes an intelligent diagnostic method for early detection tumor. In developed method, deep features magnetic resonance imaging (MRI) scans are used as input support vector machine (SVM). first step proposed Grab cut applied segmenting region, then segmented images fed...
Reversible data hiding in encrypted image (RDHEI) is advantageous to scenarios where complete recovery of the original cover and additional are required. In some existing RDHEI schemes, pre-processing step involved an overhead for resource-constrained devices on sender’s side. this paper, efficient separable reversible scheme over a homomorphically that assures privacy preservation contents cloud environment proposed. This proposed comprises three stakeholders: content-owner, hider,...
Electrical energy demand has risen over the world which results in developmentof smart grid. Smart grid identified areas that requiresimprovement. Because of focus on cost-effective operation as well asenvironmental concerns electrical power system, complexity ofthe optimization function increased. In this study, a new energy-saving dispatch model is developed, takes into account renewable energysources dynamic generation-load interaction.Moreover, active response idea employed for...
Reversible Data Hiding in Encrypted Images (RDH-EI) has gained much popularity the field of signal processing and cloud computing. In this study, we propose a high-capacity RDH-EI scheme using multi-layer embedding. It ensures that after extraction embedded additional data from marked encrypted image, original image is recovered completely. Broadly, method comprises three parties: content owner, hider/ receiver. beginning, by owner encryption based on chaotic behaviour PWL-memristor sent to...
The effective farming means lossless which is a desired need of current scenario, since the cost increasing continuously. Weeds are big problem in agriculture because it major part agricultural losses. Nowadays, herbicides sprayed uniformly throughout field to control weed. This method not only expensive but also have bad impacts on environment and human health. Therefore, an automatic system needed for spot spray. Improvement drone technology leads availability high payload that suitable...
Abstract Most of the power electronic converters based on devices such as Silicon Controlled Rectifiers (SCRs) have been broadly utilized in home, business, and modern use recent years. Despite their many benefits, these major issues pulling harmonic current reactive part from supply, well having a highly nonlinear characteristic. The harmonics produced by supplied elements cause voltage distortion at common coupling point, which is causing problems for functioning number sensitive...
With the evolving needs of cloud-based information exchange, challenge a reliable and secure communication channel has also been center attention recently. Although cryptography traditional tool for communication; yet it carries possibility attacks aimed to gain access sensitive information. As an alternative, use reversible data hiding (RDH) technique proposed. RDH scheme involves concealment in cover image, both which are retrieved lossless manner at receiver end. Over insecure cloud...
Analyzing any cryptographic algorithm is in general a herculean task but smart use of Artificial Intelligence(A.I.) can deliver some positive results. Various attempts regarding cryptanalysis till now have been focused on either exploiting mathematical loop hole the or way out implementation algorithm. Work has done field using Neural Networks and other pattern recognition techniques to identify type used. In this paper, we attempt cryptanalyze Merkle-Hellman Knapsack Public Key Cryptosystem...
In most image enhancement tasks, contrast is a pre-step for the later processing stages. this paper, we propose new technique adaptive of compressed images in discrete cosine transform (DCT) domain. The algorithm, at same time, uses human visual system (HVS) as guide avoiding unpleasant block artifacts that often appear Hock boundaries result DCT An activity measure determines level can withstand without creating any blocking and simultaneously enhancing contrast. Since process done during...
In contemporary times, heart diseases have emerged as the leading cause of untimely deaths. To tackle this alarming situation, engineers developed a range medical devices for diagnosing and scrutinizing various diseases. Numerous patients suffer from problems that pose critical threats to their lives, thereby necessitating continuous monitoring via traditional systems such Electrocardiography (ECG). However, technique is available only in hospitals, making it prohibitively expensive...