scispace - formally typeset
Search or ask a question
Author

S. M. Sakthivel

Bio: S. M. Sakthivel is an academic researcher from VIT University. The author has contributed to research in topics: Digital watermarking & Verilog. The author has an hindex of 5, co-authored 13 publications receiving 45 citations.

Papers
More filters
Proceedings ArticleDOI
02 Apr 2015
TL;DR: Verifying the memory transactions of AXI includes the verification of all the five channels write address, write data, write response, read address and read data and the System connectivity during write and read cycles is one of the fundamental features verified.
Abstract: This paper mainly focuses on verifying the important features of advanced extensible interface (AXI). Verifying the memory transactions of AXI includes the verification of all the five channels write address, write data, write response, read address and read data. In this work a Verification Intellectual Property cores (VIP) based methodology is used to carry out the verification Process. In the VIP design the entire test environment is modeled using system verilog and the read, write transactions from the same and different memory locations has been verified with the quantitative values of Busy Count, Valid Count and its Bus Utilization. Verifying the System connectivity during write and read cycles is also one of the fundamental features verified in this paper.

11 citations

Proceedings ArticleDOI
02 Mar 2015
TL;DR: This paper proposes a new spatial domain watermarking of grayscale images and has shown its VLSI Implementation without altering its content in real time using a secret key and evaluated the robustness of the algorithm against several signal processing attacks using MATLAB.
Abstract: This paper proposes a new spatial domain watermarking of grayscale images and has also shown its VLSI Implementation without altering its content in real time using a secret key. The secret key is generated by searching the watermark pixel values in host image content and the location maps are marked in secret key. Therefore this algorithm is called PVSA- Pixel Value Search Algorithm. The proposed algorithm does not make any change in the host image. Thus it shows high robustness to signal processing attacks. The watermark extraction process is simple as the host content is extracted based on key. We have evaluated the robustness of the algorithm against several signal processing attacks using MATLAB. Finally we have implemented the same algorithm in verilog HDL using Altera Quartus-II.

10 citations

Journal ArticleDOI
TL;DR: The secret watermark bits are inserted in the DCT low-frequency coefficients using a mean adaptive threshold value, which not only results in a minimum degradation to the host image quality but also increases the robustness of the proposed algorithm.

7 citations

Proceedings ArticleDOI
01 Jan 2016
TL;DR: The entire watermark embedding process and extraction process are modeled in MATLAB and analyzed against the signal processing attacks like compression, salt & pepper noise, rotation and Intensity transformation attacks.
Abstract: In this paper, 2D integer wavelet transform based watermarking is carried out for the grayscale image with its VLSI architectural implementations. In the 2D integer wavelet transformation the lifting scheme is adopted and the watermarking operation is carried out in the LL2 frequency subbands. The entire watermark embedding process and extraction process are modeled in MATLAB and analyzed against the signal processing attacks like compression, salt & pepper noise, rotation and Intensity transformation attacks. Finally the same algorithm is modeled using Verilog HDL and implemented using ALTERA QUARTUS-II.

6 citations

Proceedings ArticleDOI
03 Apr 2013
TL;DR: The proposed design of the dual edge triggered flip-flop (DE-CPSFF) eliminates the redundant transitions of internal nodes when current data is same as the previous one using conditional technique, which will significantly reduces the power dissipation.
Abstract: Dual edge triggering is an effective method for reducing the power consumption in the clock distribution network. This paper compares two existing design of flip-flop CDMFF and CPSFF with the proposed design of the dual edge triggered flip-flop (DE-CPSFF). The design eliminates the redundant transitions of internal nodes when current data is same as the previous one using conditional technique. This will significantly reduces the power dissipation. Various TSPICE simulation with different input sequences is done. The design has been simulated using Tanner 13.0 EDA tool with 0.25 μm technology.

6 citations


Cited by
More filters
Journal Article
TL;DR: Find the secret to improve the quality of life by reading this seeing the unseen, which can be your favorite book to read after having this book.
Abstract: Find the secret to improve the quality of life by reading this seeing the unseen. This is a kind of book that you need now. Besides, it can be your favorite book to read after having this book. Do you ask why? Well, this is a book that has different characteristic with others. You may not need to know who the author is, how well-known the work is. As wise word, never judge the words from who speaks, but make the words as your good value to your life.

108 citations

Journal ArticleDOI
TL;DR: A time efficient optimization method based on machine learning algorithms to detect the best embedding parameter for image watermarking with both robustness and imperceptibility is proposed and it has been found that the proposed method consumes very less time for the evaluation of optimum solutions.

33 citations

Journal ArticleDOI
TL;DR: A novel and efficient hardware implementation of an image watermarking system based on the Haar Discrete Wavelet Transform (DWT) that shows the effectiveness of the developed architecture in terms of visibility and robustness against several attacks.
Abstract: In this paper we propose a novel and efficient hardware implementation of an image watermarking system based on the Haar Discrete Wavelet Transform (DWT). DWT is used in image watermarking to hide secret pieces of information into a digital content with a good robustness. The main advantage of Haar DWT is the frequencies separation into four subbands (LL, LH, HL, and HH) which can be treated independently. This permits ensuring a better compromise between robustness and visibility factors. A Field Programmable Gate Array (FPGA) that is based on a very large scale integration architecture of the watermarking algorithm is developed to accelerate media authentication. A hardware cosimulation strategy using the Matlab-Xilinx system generator (XSG) was applied to prove the validity of the suggested implementation. The hardware cosimulation results show the effectiveness of the developed architecture in terms of visibility and robustness against several attacks. The proposed hardware system presents also a high performance in terms of the operating speed.

30 citations

Journal ArticleDOI
TL;DR: This paper describes the generation process of the SIFT algorithm in detail and obtains a series of scale-invariant feature points and proposes a digital watermarking algorithm based on SIFT, singular value decomposition, and all phase biorthogonal transform.
Abstract: Watermarking techniques can be applied in digital images to maintain the authenticity and integrity for copyright protection. In this paper, scale-invariant feature transform (SIFT) is combined with local digital watermarking and a digital watermarking algorithm based on SIFT, singular value decomposition (SVD), and all phase biorthogonal transform (APBT) is proposed. It describes the generation process of the SIFT algorithm in detail and obtains a series of scale-invariant feature points. A large amount of candidate feature points are selected to obtain the neighborhood which can be used to embed the watermark. For these selected feature points, block-based APBT is carried out on their neighborhoods. Moreover, a coefficients matrix of certain APBT coefficients is generated for SVD to embed the encrypted watermark. Experimental results demonstrate that the proposed watermarking algorithm has stronger robustness than some previous schemes. In addition, APBT-based digital watermarking algorithm has good imperceptibility and is more robust to different combinations of attacks, which can be applied for the purpose of copyright protection.

19 citations