Entity

Time filter

Source Type

Hyderabad, India

Prasad M.V.N.K.,IDRBT
International Journal of Advancements in Computing Technology | Year: 2012

This paper proposes a watermarking algorithm to embed a watermark generated through Complete complementary code method into the original image by using Fast Walsh Hadamard Transform (FWHT) technique. Two valued kernels of Hadamard transformation cause smaller image information change during embedding compared to other transform domains. Spread spectrum communication systems use the spread sequences having good correlation properties. Complete complementary code (CCC) is a set of spread sequences, and has an ideal autocorrelation and cross correlation properties. This paper also discusses the watermark extraction procedure. It is found that the algorithm implementation on various 24 bit color images have proven that the strength of the algorithm is as required. Source


Jabbar M.A.,Jawaharlal Nehru Technological University | Deekshatulu B.L.,IDRBT | Chandra P.,Advanced System Laboratory
Communications in Computer and Information Science | Year: 2012

This Paper focuses a new approach for applying association rules in the Medical Domain to discover Heart Disease Prediction. The health care industry collects huge amount of health care data which,unfortunately are not mined to discover hidden information for effective decision making.Discovery of hidden patterns and relationships often goes unexploited. Data mining techniques can help remedy this situation.Data mining have found numerous applications in Business and Scientific domains.Association rules,classification,clustering are major areas of interest in data mining. Among these,association rules have been a very active research area.In our work Genetic algorithm is used to predict more accurately the presence of Heart Disease for Andhra Pradesh Population.The main motivation for using Genetic algorithm in the discovery of high level Prediction rules is that they perform a global search and cope better with attribute interaction than the greedy rule induction algorithms often used in Data Mining. © 2012 Springer-Verlag. Source


Kumar S.,University of Hyderabad | Syam Kumar P.,IDRBT
Souvenir of the 2015 IEEE International Advance Computing Conference, IACC 2015 | Year: 2015

Storage virtualization is the most applied word in the industry due to its importance. Now a day's data become more import, to hold and to extract needful information. Datacenter become an integral part of any organization, so its management too. For best and efficient result as well as proper storage utilization and management we need storage area network (SAN). In the environment of SAN, there is the compatibility issue with the different vendors and their drivers, so we are going for storage virtualization. Storage virtualization is applied in SAN environment. The classical techniques [1] to achieve storage virtualization is suffering from many problems like improper disk utilization, high latency, power consumption, different attacks and security issues. In this paper we design and implement storage virtualization technique EC2S2 to get better yield in terms of security, high throughput, efficient management and least latency. Through the security and performance analysis we show that our method is secure and efficient. © 2015 IEEE. Source


Channapragada R.S.R.,Cmr Institute Of Technology | Prasad M.V.N.K.,IDRBT
Advances in Intelligent Systems and Computing | Year: 2016

This paper presents a watermarking method using fractals. In the method discussed here, the host image is encoded by the proposed fractal coding method. To embed the watermark evenly over the whole host image, specific Range blocks are selected. Then, the scrambled watermark is inserted into the selected Range blocks. Finally, the watermarked image is obtained by the fractal decoding method. Simulation results have proven the imperceptibility of the proposed scheme and shown the robustness against various attacks. © Springer International Publishing Switzerland 2016. Source


Prasad M.V.N.K.,IDRBT
Advances in Intelligent Systems and Computing | Year: 2014

his paper proposes two algorithms for embedding and extraction of the watermark into the cover image based on magic square and ridgelet transform techniques. Spread-spectrum communication systems use the spread sequences that have good correlation properties. Magic square technique is used as a spreadspectrum technique to spread the watermark. Ridgelet transform is the nextgeneration wavelets as it is effective through line singularities characteristic. Ridgelet transform generates sparse image representation where the most significant coefficient represents the most energetic direction of an image with straight edges. The experiments indicated that these algorithms enabled the cover images to have the good invisibility and made them robust to the general image compression attacks such as JPEG, GIF. © Springer India 2014. Source

Discover hidden collaborations