K. Raja Sekhar
K L University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by K. Raja Sekhar.
2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS) | 2016
Anita Pradhan; Aditya Kumar Sahu; Gandharba Swain; K. Raja Sekhar
This paper illustrates the various performance evaluation parameters of image steganography techniques. The performance of a steganographic technique can be rated by three parameters; (i) hiding capacity, (ii) distortion measure and (iii) security. The hiding capacity means the maximum amount of information that can be hidden in an image. It can also be represented as the number of bits per pixel. The distortion is measured by using various metrics like mean square error, root mean square error, PSNR, quality index, correlation, structural similarity index etc. Each of these metrics can be represented mathematically. The security can be evaluated by testing the steganography technique with the steganalysis schemes like pixel difference histogram analysis, RS analysis etc. All these metrics are illustrated with mathematical equations. Finally, some future directions are also highlighted at the end of the paper.
Security and Communication Networks | 2017
Anita Pradhan; K. Raja Sekhar; Gandharba Swain
The traditional pixel value differencing (PVD) steganographical schemes are easily detected by pixel difference histogram (PDH) analysis. This problem could be addressed by adding two tricks: (i) utilizing horizontal, vertical, and diagonal edges and (ii) using adaptive quantization ranges. This paper presents an adaptive PVD technique using 6-pixel blocks. There are two variants. The proposed adaptive PVD for -pixel blocks is known as variant 1, and the proposed adaptive PVD for -pixel blocks is known as variant 2. For every block in variant 1, the four corner pixels are used to hide data bits using the middle column pixels for detecting the horizontal and diagonal edges. Similarly, for every block in variant 2, the four corner pixels are used to hide data bits using the middle row pixels for detecting the vertical and diagonal edges. The quantization ranges are adaptive and are calculated using the correlation of the two middle column/row pixels with the four corner pixels. The technique performs better as compared to the existing adaptive PVD techniques by possessing higher hiding capacity and lesser distortion. Furthermore, it has been proven that the PDH steganalysis and RS steganalysis cannot detect this proposed technique.
Mathematical Problems in Engineering | 2018
Anita Pradhan; K. Raja Sekhar; Gandharba Swain
To protect from pixel difference histogram (PDH) analysis and RS analysis, two hybrid image steganography techniques by appropriate combination of LSB substitution, pixel value differencing (PVD), and exploiting modification directions (EMD) have been proposed in this paper. The cover image is traversed in raster scan order and partitioned into blocks. The first technique operates on 2 × 2 pixel blocks and the second technique operates on 3 × 3 pixel blocks. For each block, the average pixel value difference, , is calculated. If value is greater than 15, the block is in an edge area, so a combination of LSB substitution and PVD is applied. If value is less than or equal to 15, the block is in a smooth area, so a combination of LSB substitution and EMD is applied. Each of these two techniques exists in two variants (Type 1 and Type 2) with respect to two different range tables. The hiding capacities and PSNR of both the techniques are found to be improved. The results from experiments prove that PDH analysis and RS analysis cannot detect these proposed techniques.
international conference on software engineering | 2012
K. Raja Sekhar; L. S. S. Reddy; U Jyothi Kameswari
Attack pattern system exhibits a unique property of pattern sequential cascading nature applied during the design phase of an application system. In this paper a mathematical framework based on predicate and propositional logic is applied to verify and check the mentioned property with the help of design specification. The framework also defines few predicate operators to construct the results in terms of propositions that each pattern displays during the design in the context of security scenario. Finally the results are presented against number of patterns along with number of propositions, operators, other resources where pattern consumes during the implementation scenario. Templates are proposed to present the pattern data to derive the desired security metric.
Indian journal of science and technology | 2016
Anita Pradhan; K. Raja Sekhar; Gandharba Swain
Procedia Computer Science | 2016
Srinivas Aluvala; K. Raja Sekhar; Deepika Vodnala
Perspectives on Science | 2016
Srinivas Aluvala; K. Raja Sekhar; Deepika Vodnala
International Journal of Advances in Applied Sciences | 2017
K.Sangeetha Supriya; M.Gopi Chand; K. Raja Sekhar
International Journal of Advances in Applied Sciences | 2017
Y.N.S.R. Bharadwaj; K. Raja Sekhar
Indian journal of science and technology | 2015
K. Raja Sekhar; L. Venkata Narasimha Rao