scispace - formally typeset
Search or ask a question
Author

V. Santhi

Bio: V. Santhi is an academic researcher from VIT University. The author has contributed to research in topics: Digital watermarking & Watermark. The author has an hindex of 11, co-authored 34 publications receiving 538 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: This work presents an application of bio-inspired flower pollination algorithm (FPA) for tuning proportional–integral–derivative (PID) controller in load frequency control (LFC) of multi-area interconnected power system and established that FPA-PID controller exhibit better performance compared to performances of GA-Pid and PSO-P ID controller-based power system with and without nonlinearity effect.
Abstract: This work presents an application of bio-inspired flower pollination algorithm (FPA) for tuning proportional–integral–derivative (PID) controller in load frequency control (LFC) of multi-area interconnected power system. The investigated power system comprises of three equal thermal power systems with appropriate PID controller. The controller gain [proportional gain (K p), integral gain (K i) and derivative gain (K d)] values are tuned by using the FPA algorithm with one percent step load perturbation in area 1 (1 % SLP). The integral square error (ISE) is considered the objective function for the FPA. The supremacy performance of proposed algorithm for optimized PID controller is proved by comparing the results with genetic algorithm (GA) and particle swarm optimization (PSO)-based PID controller under the same investigated power system. In addition, the controller robustness is studied by considering appropriate generate rate constraint with nonlinearity in all areas. The result cumulative performance comparisons established that FPA-PID controller exhibit better performance compared to performances of GA-PID and PSO-PID controller-based power system with and without nonlinearity effect.

92 citations

Journal ArticleDOI
TL;DR: A contemporary distributed clustering methodology for imbalance data reduction using k-nearest neighbor (K-NN) classification approach has been introduced and it is depicted that MapReduce based K-NN classifier provided accurate results for big data of DNA.

76 citations

Journal ArticleDOI
TL;DR: A new singular value decomposition (SVD) and discrete wavelet transformation (DWT) based technique is proposed for hiding watermark in full frequency band of color images (DSFW) and it is observed that the quality of the watermark is maintained with the value of 36dB.
Abstract: Due to the advancement in Computer technology and readily available tools, it is very easy for the unknown users to produce illegal copies of multimedia data which are floating across the Internet. In order to protect those multimedia data on the Internet many techniques are available including various encryption techniques, steganography techniques, watermarking techniques and information hiding techniques. Digital watermarking is a technique in which a piece of digital information is embedded into an image and extracted later for ownership verification. Secret digital data can be embedded either in spatial domain or in frequency domain of the cover data. In this paper, a new singular value decomposition (SVD) and discrete wavelet transformation (DWT) based technique is proposed for hiding watermark in full frequency band of color images (DSFW). The quality of the watermarked image and extracted watermark is measured using peak signal to noise ratio (PSNR) and normalized correlation (NC) respectively. It is observed that the quality of the watermarked image is maintained with the value of 36dB. Robustness of proposed algorithm is tested for various attacks including salt and pepper noise and Gaussian noise, cropping and JPEG compression.

67 citations

Book ChapterDOI
TL;DR: In this paper, three novel methods were reported to solve the problem of recognition of Indian sign language gestures effectively by combining Neural Network (NN) with Genetic Algorithm (GA), Evolutionary algorithm (EA) and Particle Swarm Optimization (PSO) separately to attain novel NN-GA, NN -EA and NNPSO methods; respectively.
Abstract: Recognition of sign languages has gained reasonable interest by the researchers in the last decade. An accurate sign language recognition system can facilitate more accurate communication of deaf and dumb people. The wide variety of Indian Sign Language (ISL) led to more challenging learning process. In the current work, three novel methods was reported to solve the problem of recognition of ISL gestures effectively by combining Neural Network (NN) with Genetic Algorithm (GA), Evolutionary algorithm (EA) and Particle Swarm Optimization (PSO) separately to attain novel NN-GA, NN-EA and NN-PSO methods; respectively. The input weight vector to the NN has been optimized gradually to achieve minimum error. The proposed methods performance was compared to NN and the Multilayer Perceptron Feed-Forward Network (MLP-FFN) classifiers. Several performance metrics such as the accuracy, precision, recall, F-measure and kappa statistic were calculated. The experimental results established that the proposed algorithm achieved considerable improvement over the performance of existing works in order to recognize ISL gestures. The NN-PSO outperformed the other approaches with 99.96 accuracy, 99.98 precision, 98.29 recall, 99.63 F-Measure and 0.9956 Kappa Statistic.

66 citations

Journal ArticleDOI
TL;DR: A review of a few of the proposed image and video watermarking techniques using neural networks for authentication of both video and still images.
Abstract: The use of computer network communication makes information exchange and transmission relatively simple and quick. But with digital image, audio and video products like multimedia, copyright protected security questions will be exposed in such communication environments. Digital watermarks have been recently proposed for authentication of both video and still images. This paper gives a review of a few of the proposed image and video watermarking techniques using neural networks.

40 citations


Cited by
More filters
Christopher M. Bishop1
01 Jan 2006
TL;DR: Probability distributions of linear models for regression and classification are given in this article, along with a discussion of combining models and combining models in the context of machine learning and classification.
Abstract: Probability Distributions.- Linear Models for Regression.- Linear Models for Classification.- Neural Networks.- Kernel Methods.- Sparse Kernel Machines.- Graphical Models.- Mixture Models and EM.- Approximate Inference.- Sampling Methods.- Continuous Latent Variables.- Sequential Data.- Combining Models.

10,141 citations

Journal Article
TL;DR: The Health Insurance Portability and Accountability Act, also known as HIPAA, was designed to protect health insurance coverage for workers and their families while between jobs and establishes standards for electronic health care transactions.
Abstract: The Health Insurance Portability and Accountability Act, also known as HIPAA, was first delivered to congress in 1996 and consisted of just two Titles. It was designed to protect health insurance coverage for workers and their families while between jobs. It establishes standards for electronic health care transactions and addresses the issues of privacy and security when dealing with Protected Health Information (PHI). HIPAA is applicable only in the United States of America.

561 citations

Book ChapterDOI
08 Sep 2018
TL;DR: This work finds that neural networks can learn to use invisible perturbations to encode a rich amount of useful information, and demonstrates that adversarial training improves the visual quality of encoded images.
Abstract: Recent work has shown that deep neural networks are highly sensitive to tiny perturbations of input images, giving rise to adversarial examples Though this property is usually considered a weakness of learned models, we explore whether it can be beneficial We find that neural networks can learn to use invisible perturbations to encode a rich amount of useful information In fact, one can exploit this capability for the task of data hiding We jointly train encoder and decoder networks, where given an input message and cover image, the encoder produces a visually indistinguishable encoded image, from which the decoder can recover the original message We show that these encodings are competitive with existing data hiding algorithms, and further that they can be made robust to noise: our models learn to reconstruct hidden information in an encoded image despite the presence of Gaussian blurring, pixel-wise dropout, cropping, and JPEG compression Even though JPEG is non-differentiable, we show that a robust model can be trained using differentiable approximations Finally, we demonstrate that adversarial training improves the visual quality of encoded images

420 citations

Journal ArticleDOI
TL;DR: The proposed hybrid security model for securing the diagnostic text data in medical images proved its ability to hide the confidential patient’s data into a transmitted cover image with high imperceptibility, capacity, and minimal deterioration in the received stego-image.
Abstract: Due to the significant advancement of the Internet of Things (IoT) in the healthcare sector, the security, and the integrity of the medical data became big challenges for healthcare services applications. This paper proposes a hybrid security model for securing the diagnostic text data in medical images. The proposed model is developed through integrating either 2-D discrete wavelet transform 1 level (2D-DWT-1L) or 2-D discrete wavelet transform 2 level (2D-DWT-2L) steganography technique with a proposed hybrid encryption scheme. The proposed hybrid encryption schema is built using a combination of Advanced Encryption Standard, and Rivest, Shamir, and Adleman algorithms. The proposed model starts by encrypting the secret data; then it hides the result in a cover image using 2D-DWT-1L or 2D-DWT-2L. Both color and gray-scale images are used as cover images to conceal different text sizes. The performance of the proposed system was evaluated based on six statistical parameters; the peak signal-to-noise ratio (PSNR), mean square error (MSE), bit error rate (BER), structural similarity (SSIM), structural content (SC), and correlation. The PSNR values were relatively varied from 50.59 to 57.44 in case of color images and from 50.52 to 56.09 with the gray scale images. The MSE values varied from 0.12 to 0.57 for the color images and from 0.14 to 0.57 for the gray scale images. The BER values were zero for both images, while SSIM, SC, and correlation values were ones for both images. Compared with the state-of-the-art methods, the proposed model proved its ability to hide the confidential patient’s data into a transmitted cover image with high imperceptibility, capacity, and minimal deterioration in the received stego-image.

414 citations