scispace - formally typeset
Search or ask a question
Author

Sudhish N. George

Bio: Sudhish N. George is an academic researcher from National Institute of Technology Calicut. The author has contributed to research in topics: Encryption & Low-rank approximation. The author has an hindex of 14, co-authored 78 publications receiving 568 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: The aim of this paper is to conduct a detailed analysis of the different denoising techniques used for medical imaging modalities which include the 2D/3D Ultrasound (US), Magnetic Resonance (MR), Computed Tomography and Positron Emission Tomography (PET) images.

98 citations

Proceedings ArticleDOI
22 Mar 2013
TL;DR: The design of a simple low cost wireless GSM energy meter and its associated web interface is presented, for automating billing and managing the collected data globally.
Abstract: The technology of e-metering (Electronic Metering) has gone through rapid technological advancements and there is increased demand for a reliable and efficient Automatic Meter Reading (AMR) system. This paper presents the design of a simple low cost wireless GSM energy meter and its associated web interface, for automating billing and managing the collected data globally. The proposed system replaces traditional meter reading methods and enables remote access of existing energy meter by the energy provider. Also they can monitor the meter readings regularly without the person visiting each house. A GSM based wireless communication module is integrated with electronic energy meter of each entity to have remote access over the usage of electricity. A PC with a GSM receiver at the other end, which contains the database acts as the billing point. Live meter reading from the GSM enabled energy meter is sent back to this billing point periodically and these details are updated in a central database. A new interactive, user friendly graphical user interface is developed using Microsoft visual studio .NET framework and C#. With proper authentication, users can access the developed web page details from anywhere in the world. The complete monthly usage and due bill is messaged back to the customer after processing these data.

88 citations

Journal ArticleDOI
TL;DR: The proposed method combines novel twist tensor total variation norm to exploit spatio-temporal correlation and tensor-Singular Value Decomposition (t-SVD) based reweighted nuclear norm to improve low multi-rank tensor recovery.

64 citations

Journal ArticleDOI
20 Feb 2014
TL;DR: From experimental analysis, it is proven that the proposed system provides better performance than its counterparts and can provide security maintaining the robustness to noise of the CS system.
Abstract: In this paper, a novel approach for generating the secure measurement matrix for compressive sensing (CS) based on linear feedback shift register (LFSR) is presented. The basic idea is to select the different states of LFSR as the random entries of the measurement matrix and normalize these values to get independent and identically distributed (i.i.d.) random variables with zero mean and variance \(\frac{1}{N}\), where N is the number of input samples. The initial seed for the LFSR system act as the key to the user to provide security. Since the measurement matrix is generated from the LFSR system, and memory overload to store the measurement matrix is avoided in the proposed system. Moreover, the proposed system can provide security maintaining the robustness to noise of the CS system. The proposed system is validated through different block-based CS techniques of images. To enhance security, the different blocks of images are measured with different measurement matrices so that the proposed encryption system can withstand known plaintext attack. A modulo division circuit is used to reseed the LFSR system to generate multiple random measurement matrices, whereby after each fundamental period of LFSR, the feedback polynomial of the modulo circuit is modified in terms of a chaotic value. The proposed secure robust CS paradigm for images is subjected to several forms of attacks and is proven to be resistant against the same. From experimental analysis, it is proven that the proposed system provides better performance than its counterparts.

49 citations

Proceedings ArticleDOI
01 Aug 2017
TL;DR: The design and development of IoT based security surveillance system in buildings using Raspberry Pi Single Board Computer with WiFi network connectivity with biggest advantage is that the user can seek surveillance from anywhere in the world and can respond according to the situations.
Abstract: This paper details the design and development of IoT based security surveillance system in buildings using Raspberry Pi Single Board Computer(SBC) with WiFi network connectivity. Adding wireless fidelity to embedded systems will open up various feasibilities such as worldwide monitoring and control, reliable data storage etc. This system comprises of wireless sensor nodes and a controller section for surveillance. Remote user alerts, live video streaming and portability are the prime features of the system. WiFi enabled IoT(Internet of Things) module processes the sensor based events and sends the sensor status to controller section. Upon receiving the event notification, the controller enables the camera for capturing the event, alerts the user via email, phone call and SMS and places the live video of event on webpage. The IoT module eliminates the need of a microcontroller and wireless transceiver module in sensor node, thus it makes the node compact, cost effective and easy to use. The biggest advantage of the system is that the user can seek surveillance from anywhere in the world and can respond according to the situations.

43 citations


Cited by
More filters
Christopher M. Bishop1
01 Jan 2006
TL;DR: Probability distributions of linear models for regression and classification are given in this article, along with a discussion of combining models and combining models in the context of machine learning and classification.
Abstract: Probability Distributions.- Linear Models for Regression.- Linear Models for Classification.- Neural Networks.- Kernel Methods.- Sparse Kernel Machines.- Graphical Models.- Mixture Models and EM.- Approximate Inference.- Sampling Methods.- Continuous Latent Variables.- Sequential Data.- Combining Models.

10,141 citations

01 Jan 2002

9,314 citations

Journal ArticleDOI
TL;DR: To bridge the gap between theory and practicality of CS, different CS acquisition strategies and reconstruction approaches are elaborated systematically in this paper.
Abstract: Compressive Sensing (CS) is a new sensing modality, which compresses the signal being acquired at the time of sensing. Signals can have sparse or compressible representation either in original domain or in some transform domain. Relying on the sparsity of the signals, CS allows us to sample the signal at a rate much below the Nyquist sampling rate. Also, the varied reconstruction algorithms of CS can faithfully reconstruct the original signal back from fewer compressive measurements. This fact has stimulated research interest toward the use of CS in several fields, such as magnetic resonance imaging, high-speed video acquisition, and ultrawideband communication. This paper reviews the basic theoretical concepts underlying CS. To bridge the gap between theory and practicality of CS, different CS acquisition strategies and reconstruction approaches are elaborated systematically in this paper. The major application areas where CS is currently being used are reviewed here. This paper also highlights some of the challenges and research directions in this field.

334 citations

Journal ArticleDOI
TL;DR: The proposed cryptosystem decreases the volume of data to be transmitted and simplifies the keys distribution simultaneously as a nonlinear encryption system with acceptable compression and security performance.
Abstract: Most image encryption algorithms based on low-dimensional chaos systems bear security risks and suffer encryption data expansion when adopting nonlinear transformation directly. To overcome these weaknesses and reduce the possible transmission burden, an efficient image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing is proposed. The original image is measured by the measurement matrices in two directions to achieve compression and encryption simultaneously, and then the resulting image is re-encrypted by the cycle shift operation controlled by a hyper-chaotic system. Cycle shift operation can change the values of the pixels efficiently. The proposed cryptosystem decreases the volume of data to be transmitted and simplifies the keys distribution simultaneously as a nonlinear encryption system. Simulation results verify the validity and the reliability of the proposed algorithm with acceptable compression and security performance.

311 citations

Journal ArticleDOI
TL;DR: A new image compression–encryption hybrid algorithm is proposed to realize compression and encryption simultaneously, where the key is easily distributed, stored or memorized.
Abstract: The existing ways to encrypt images based on compressive sensing usually treat the whole measurement matrix as the key, which renders the key too large to distribute and memorize or store. To solve this problem, a new image compression–encryption hybrid algorithm is proposed to realize compression and encryption simultaneously, where the key is easily distributed, stored or memorized. The input image is divided into 4 blocks to compress and encrypt, then the pixels of the two adjacent blocks are exchanged randomly by random matrices. The measurement matrices in compressive sensing are constructed by utilizing the circulant matrices and controlling the original row vectors of the circulant matrices with logistic map. And the random matrices used in random pixel exchanging are bound with the measurement matrices. Simulation results verify the effectiveness, security of the proposed algorithm and the acceptable compression performance.

282 citations