Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where C. Parthasarathy is active.

Publication


Featured researches published by C. Parthasarathy.


2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) | 2013

Multi-level and multi-key trust in PPDM

A. V. Sriharsha; C. Parthasarathy

Privacy in data for data mining is ensured by many methods since decades. Data Transformation in the KDD process ensures transforming the data into cryptic codes and some abbreviated forms, yet the details of the data are guessable to the data miners. Perturbation theory comprises mathematical methods that are used to find an approximate solution to a problem which cannot be solved exactly, by starting from the exact solution of a related problem. Perturbation function causes a minor or major change in the result of the problem-solution scenario to get the expected yield mathematically. The concern over privacy of personal and sensitive information has led to the implementation of several techniques for hiding, obfuscating and encrypting sensitive information in databases. The requirement of preserving privacy as well as the usability of sensitive data has led to development of nearest neighborhood techniques. In this work we propose a method that expands the scope of perturbation in PPDM as multilevel and multikey trust in privacy preserving data mining. An analogical approach with measuring the identification attacks, diversity attacks and the problem is addresses the challenge by properly correlating perturbation across copies of different trust levels and keys that are pertaining to the sub domain contexts of the databases. Our proposed framework is architecturally robust and defends the attacks to achieve the privacy goal. Our framework supports data providers to deliver different forms of data with different privacy levels based on the market demand. Data owners can relax with the framework provided in this paper.


International Journal of Computer Applications | 2011

Communication in Network using Wavelet Transform

C. Parthasarathy; C. S. Ramanathan; S.K. Srivatsa

Huge amounts of digital visual data are stored on different media and exchanged over various sorts of networks nowadays. We propose new measures and techniques for encryption of image. We show that both statistical and pattern classification techniques using our proposed measures provide reasonable discrimination schemes for detecting embedding of different levels. We propose the use of wavelet transforms for steganalysis. As a consequence, techniques are required to provide security functionalities like privacy, integrity, or authentication especially suited for these data types. A relatively new field, denoted “Multimedia Security”, is aimed towards these emerging technologies and applications. Several dedicated international meetings have emerged as a forum to present and discuss recent developments in this field, among them “Security, Steganography, and Watermarking of Multimedia


International journal of engineering and technology | 2017

CROSSING POINT CRASH CAUTIONING (CPCC) SYSTEM FOR VEHICLES AND AGGREGATING TRAFFIC INFORMATION THROUGH VANET APPLICATION TO AVOID ACCIDENT

Chandrasekaran B; C. Parthasarathy


Archive | 2015

A Survey on Privacy Preserving Data Mining

A. V. Sriharsha; C. Parthasarathy


Indian journal of science and technology | 2015

A Novel Approach to Design the Finite Automata to Accept the Palindrome with the Three Input Characters

P. Ezhilarasu; Jai Prakash; N. Krishnaraj; D. Satheesh Kumar; K. Suresh Babu; C. Parthasarathy


IJSEAT | 2015

A Graph theory algorithmic approach to data clustering and its Application

K. Venkatasubramanian; S.K. Srivatsa; C. Parthasarathy


Archive | 2014

Partial Swarm Optimization for Minimizing Occlusion Problem during Multi-Face Recognition

M. A. Archana; Dinesh Kumar; C. Parthasarathy


International journal of engineering research and technology | 2013

A Simulation Study on the Performance Of Mobile IP

C. Parthasarathy; J. Thamaraiselvi; B. Narayana Babu


International journal of engineering research and technology | 2013

A Novel Approach To Track The Facial Image Forging Using Face Recognition Techniques

P. Senthilraj; C. Parthasarathy


International Journal of Artificial Intelligence & Applications | 2013

Data Mining Un-Compressed Images from cloud with Clustering Compression technique using Lempel-Ziv-Welch

C. Parthasarathy; K. Srinivasan; R. Saravanan

Collaboration


Dive into the C. Parthasarathy's collaboration.

Top Co-Authors

Avatar

A. V. Sriharsha

Sree Vidyanikethan Engineering College

View shared research outputs
Top Co-Authors

Avatar

Jai Prakash

Indian Agricultural Research Institute

View shared research outputs
Top Co-Authors

Avatar

N. Krishnaraj

Valliammai Engineering College

View shared research outputs
Researchain Logo
Decentralizing Knowledge