Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where K. Raja Sekhar is active.

Publication


Featured researches published by K. Raja Sekhar.


2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS) | 2016

Performance evaluation parameters of image steganography techniques

Anita Pradhan; Aditya Kumar Sahu; Gandharba Swain; K. Raja Sekhar

This paper illustrates the various performance evaluation parameters of image steganography techniques. The performance of a steganographic technique can be rated by three parameters; (i) hiding capacity, (ii) distortion measure and (iii) security. The hiding capacity means the maximum amount of information that can be hidden in an image. It can also be represented as the number of bits per pixel. The distortion is measured by using various metrics like mean square error, root mean square error, PSNR, quality index, correlation, structural similarity index etc. Each of these metrics can be represented mathematically. The security can be evaluated by testing the steganography technique with the steganalysis schemes like pixel difference histogram analysis, RS analysis etc. All these metrics are illustrated with mathematical equations. Finally, some future directions are also highlighted at the end of the paper.


Security and Communication Networks | 2017

Adaptive PVD Steganography Using Horizontal, Vertical, and Diagonal Edges in Six-Pixel Blocks

Anita Pradhan; K. Raja Sekhar; Gandharba Swain

The traditional pixel value differencing (PVD) steganographical schemes are easily detected by pixel difference histogram (PDH) analysis. This problem could be addressed by adding two tricks: (i) utilizing horizontal, vertical, and diagonal edges and (ii) using adaptive quantization ranges. This paper presents an adaptive PVD technique using 6-pixel blocks. There are two variants. The proposed adaptive PVD for -pixel blocks is known as variant 1, and the proposed adaptive PVD for -pixel blocks is known as variant 2. For every block in variant 1, the four corner pixels are used to hide data bits using the middle column pixels for detecting the horizontal and diagonal edges. Similarly, for every block in variant 2, the four corner pixels are used to hide data bits using the middle row pixels for detecting the vertical and diagonal edges. The quantization ranges are adaptive and are calculated using the correlation of the two middle column/row pixels with the four corner pixels. The technique performs better as compared to the existing adaptive PVD techniques by possessing higher hiding capacity and lesser distortion. Furthermore, it has been proven that the PDH steganalysis and RS steganalysis cannot detect this proposed technique.


Mathematical Problems in Engineering | 2018

Digital Image Steganography Using LSB Substitution, PVD, and EMD

Anita Pradhan; K. Raja Sekhar; Gandharba Swain

To protect from pixel difference histogram (PDH) analysis and RS analysis, two hybrid image steganography techniques by appropriate combination of LSB substitution, pixel value differencing (PVD), and exploiting modification directions (EMD) have been proposed in this paper. The cover image is traversed in raster scan order and partitioned into blocks. The first technique operates on 2 × 2 pixel blocks and the second technique operates on 3 × 3 pixel blocks. For each block, the average pixel value difference, , is calculated. If value is greater than 15, the block is in an edge area, so a combination of LSB substitution and PVD is applied. If value is less than or equal to 15, the block is in a smooth area, so a combination of LSB substitution and EMD is applied. Each of these two techniques exists in two variants (Type 1 and Type 2) with respect to two different range tables. The hiding capacities and PSNR of both the techniques are found to be improved. The results from experiments prove that PDH analysis and RS analysis cannot detect these proposed techniques.


international conference on software engineering | 2012

Templates to derive security metric based on attack patterns

K. Raja Sekhar; L. S. S. Reddy; U Jyothi Kameswari

Attack pattern system exhibits a unique property of pattern sequential cascading nature applied during the design phase of an application system. In this paper a mathematical framework based on predicate and propositional logic is applied to verify and check the mentioned property with the help of design specification. The framework also defines few predicate operators to construct the results in terms of propositions that each pattern displays during the design in the context of security scenario. Finally the results are presented against number of patterns along with number of propositions, operators, other resources where pattern consumes during the implementation scenario. Templates are proposed to present the pattern data to derive the desired security metric.


Indian journal of science and technology | 2016

Digital Image Steganography based on Seven Way Pixel Value Differencing

Anita Pradhan; K. Raja Sekhar; Gandharba Swain


Procedia Computer Science | 2016

An Empirical Study of Routing Attacks in Mobile Ad-hoc Networks☆

Srinivas Aluvala; K. Raja Sekhar; Deepika Vodnala


Perspectives on Science | 2016

A novel technique for node authentication in mobile ad hoc networks

Srinivas Aluvala; K. Raja Sekhar; Deepika Vodnala


International Journal of Advances in Applied Sciences | 2017

Congestion Aware Multi-Path Routing Protocol with Load Balancing

K.Sangeetha Supriya; M.Gopi Chand; K. Raja Sekhar


International Journal of Advances in Applied Sciences | 2017

Highly effective Security Techniques in OSN Based on Genetic Programming Approach

Y.N.S.R. Bharadwaj; K. Raja Sekhar


Indian journal of science and technology | 2015

A STATCOM Controller for Grid Interfaced Fuel Cell Generation System

K. Raja Sekhar; L. Venkata Narasimha Rao

Collaboration


Dive into the K. Raja Sekhar's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Deepika Vodnala

Gandhi Institute of Technology and Management

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

M.Gopi Chand

Vardhaman College of Engineering

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge