Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where P. Mohan Kumar is active.

Publication


Featured researches published by P. Mohan Kumar.


Information Security Journal: A Global Perspective | 2012

Developing a Secure Image Steganographic System Using TPVD Adaptive LSB Matching Revisited Algorithm for Maximizing the Embedding Rate

P. Mohan Kumar; K. L. Shunmuganathan

ABSTRACT In modern electronic communication, ensuring security during transferring of data is crucial. Digital steganography is the technique that ensures the same, in which any secret data is hidden into the cover mediums such as images, audio or video files. Resistance to removal and invisibility of hidden data are the two important requirements of any steganographic system. This paper proposes a new approach to hide any secret data in images. Also, this paper proposes a new approach which hides an executable file in images. The executable files we have considered are Windows PE (Portable-Executable) files. Moreover from the experimental results, it is proven that the proposed approach is suitable for hiding all type of digital files including exe files. Also, comparing with the existing approaches, this approach shows better performance.


Computational and Mathematical Methods in Medicine | 2013

Smart Spotting of Pulmonary TB Cavities Using CT Images

V. Ezhil Swanly; L. Selvam; P. Mohan Kumar; J. Arokia Renjith; M. Arunachalam; K. L. Shunmuganathan

One third of the worlds population is thought to have been infected with mycobacterium tuberculosis (TB) with new infection occurring at a rate of about one per second. TB typically attacks the lungs. Indication of cavities in upper lobes of lungs shows the high infection. Traditionally, it has been detected manually by physicians. But the automatic technique proposed in this paper focuses on accurate detection of disease by computed tomography (CT) using computer-aided detection (CAD) system. The various steps of the detection process include the following: (i) image preprocessing, which is done by techniques such as resizing, masking, and Gaussian smoothening, (ii) image egmentation that is implemented by using mean-shift model and gradient vector flow (GVF) model, (iii) feature extraction that can be achieved by Gradient inverse coefficient of variation and circularity measure, and (iv) classification using Bayesian classifier. Experimental results show that its perfection of detecting cavities is very accurate in low false positive rate (FPR).


2016 Second International Conference on Science Technology Engineering And Management (ICONSTEM) | 2016

Recognition and analysis of Tamil inscriptions and mapping using image processing techniques

G. Janani; V. Vishalini; P. Mohan Kumar

The most important necessity in image processing lies in the conversion of ancient Tamil characters to modern text. The ancient Tamil stone inscriptions are the source for these ancient Tamil characters. Analysing and Recognising the ancient Tamil characters from the scripts called inscriptions is a difficult task for the present generation who learn to educate, read and write only through the modern Tamil characters. Learning the elaboration of Modern Tamil from ancient Tamil inscriptions is a time devouring process and thus we need a recognition system that helps to teach, understand and also to research the ancient cultures and heritages. To design a good comprehend and better analysing system we propose a method called noise removal which is also called as pre-processing which removes the entire disturbance in the input image. Next we use a method called morphological operation to perform dilation and erosion operations. Next step is to use the connected component to find the letters which are present in the binary image. Finally we will segment each and every character and match it with our current Tamil language using a process called correlation matching to produce the result of matching characters.


Journal of Applied Security Research | 2014

Achieving Secrecy in Visual Secret Sharing Scheme Using Encrypted Images

Annie Daisy; J. Arokia Renjith; P. Mohan Kumar; L. Selvam

Visual cryptography (VC), an emerging cryptography technology, uses the characteristics of human vision to decrypt encrypted images. Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data security, entity authentication, and data origin authentication, but it is not the only means of providing information security, rather one of the techniques. VC is a new technique that provides information security which uses simple algorithms unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. Previous methods in the literature show good results for black and white VC schemes, however, they are not sufficient to be applied directly to shares due to different structures. Some methods for color VC are not satisfactory in terms of producing either meaningless shares or meaningful shares with low visual quality, leading to suspicion of encryption. Visual secret sharing encrypts a secret message into halftone image shares. This article introduces the concept of visual information pixel (VIP) synchronization and error diffusion to attain a visual cryptography encryption method that produces meaningful shares with high visual quality. VIP synchronization retains the positions of pixels carrying visual information of original images throughout the channels and error diffusion generates shares pleasant to human eyes. Comparisons with previous approaches show the superior performance of the new method.


Journal of Applied Security Research | 2014

Encryption-Based Secure Sharing of Data with Fine-Grained Access Control in Public Clouds

L. Selvam; P. Mohan Kumar; J. Arokia Renjith

Security challenges are still among the biggest obstacles when considering the adoption of cloud services. This triggered a lot of research activities, resulting in a quantity of proposals targeting the various cloud security threats. Current approaches to enforce fine-grained access control on confidential data hosted in the cloud are based on fine-grained encryption of the data. Under such approaches, data owners are in charge of encrypting the data before uploading them on the cloud and re-encrypting the data whenever user credentials change. Data owners thus incur high communication and computation costs. A better approach should delegate the enforcement of fine-grained access control to the cloud to minimize the overhead of the data owners, while assuring data confidentiality from the cloud. To achieve fine-grained and scalable data access control for personal health records (PHRs), the authors leverage attribute-based encryption (ABE) techniques to encrypt each patients PHR file. Differently from previous works in secure data outsourcing, they focus on the multiple data owner scenario and divide the users in the PHR system into multiple security domains that greatly reduce the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multiauthority ABE. The scheme also enables dynamic modification of access policies or file attributes and supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios.


Journal of Applied Security Research | 2013

Dynamic Programming Based Encrypted Reversible Data Hiding in Images

Linda Joseph; J. Arokia Renjit; P. Mohan Kumar

Reversible data hiding is a technique which enables images to be authenticated and then restored to their original form by removing the digital watermark and replacing the image data that had been overwritten. An efficient reversible lossless data hiding algorithm can recover the original image without any distortion and its Peak Signal to Noise Ratio (PSNR) lower bound is higher than that of all existing reversible data hiding algorithms. This article proposes a dynamic method to determine the most suitable peak-valley pairs instead of greedy way to maximize the embedding capacity of the object. Thus the embedding capacity and the image quality can be improved by this new approach. The application of data hiding includes hidden communication in military applications and watermarking of copyright protection, and so forth.


Security and Communication Networks | 2016

Screening the covert key using honey encryption to rule out the brute force attack of AES—a survey

P Dharshini; J. Arokia Renjith; P. Mohan Kumar

Recently, the major challenging attack is the side channel attack for both symmetric and asymmetric algorithm. Because in both cases, the secret key has to be sent out via a safe secured channel. The advanced encryption standard (AES) is mentioned as the best standard encryption algorithm by the US government, but there is one major attack on the AES that is the brute force attack. So, how to rule out these kinds of attack and how it is implemented effectively in hardware are being discussed in this paper. The honey encryption scheme is an effective algorithm, and it is also being discussed. In this paper, the detailed description of the AES and the methods to improve its speed and how it is integrated with the honey technique have been discussed. The different kinds of attacks and the various solutions are discussed for both of the algorithms. A survey of papers which has used these algorithms for various reasons with different perspective has been given. The honey algorithm creates the fake message for the wrong try of the key puncher. Thus, this is considered as the best algorithm, but it is also has some disadvantages that is also focussed in our survey. Copyright


Journal of Applied Security Research | 2016

Security Enhancement for Mobile Ad Hoc Network Using Region Splitting Technique

P. Mohan Kumar; S. Gopalakrishnan

ABSTRACT Mobile Ad hoc Network (MANET) is more vulnerable to various attacks since it has no centralized or any pre-existing network structure. In this research, we proposed an Attacker Identification using Region Splitting (AIRS) scheme for intrusion detection and attacker identification in MANET. In this scheme, the network is split into several regions for efficient detection. Our proposed AIRS scheme provides an effective response for attacks such as: jellyfish attack, neighbor attack, and location disclosure attack. Here, we calculate Degradation Performance (DP) and Trust of Attack and it provides three response schemes such as Full isolation, Partial isolation, and No reaction. We compare our proposed scheme with the existing Secure Routing Attacker Identification (SRAI) approach. Experimental results show the performance of response scheme on jellyfish attack, neighbor attack, and location disclosure attacks on various scenarios.


International Journal of Electronic Security and Digital Forensics | 2016

An image steganographic algorithm on smart mechanism of embedding secret data in images

P. Mohan Kumar; J. Arokia Renjith

In reversible compressed image data hiding, the exact cover image is restored at approximate efficient rate after extracting the secret data from the stego-image. The improved version of the traditional histogram shifting method as proposed, prevents overflow and underflow to a greater extent. The primary objective of this paper is to develop a high data hiding capability in histogram-based reversible data hiding algorithm by introducing a relatively lower distortion after embedding the secret message.


2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM) | 2016

Vehicular Ad Hoc Networks (VANET): Architectures, methodologies and design issues

B. Ayyappan; P. Mohan Kumar

In the recent decade the VANET has been emerged as a prominent field for research and it receives considerable attention. VANET uses different specifications of the WLAN 802.11 family. It takes the basics of ad hoc network and the VANET creates a network with a collection of independent entities with the ability to communicate among themselves. The Adaption to the various 802.1 family causes a remarkable increase in the number of wireless network. The VANET has various benefits along with many challenges including security, privacy, Quality of communication, effective bandwidth utilization etc,. This article provides information about VANET and the related challenges.

Collaboration


Dive into the P. Mohan Kumar's collaboration.

Top Co-Authors

Avatar

J. Arokia Renjith

Jeppiaar Engineering College

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

B. Ayyappan

Jeppiaar Engineering College

View shared research outputs
Top Co-Authors

Avatar

S. Gopalakrishnan

PSNA College of Engineering and Technology

View shared research outputs
Top Co-Authors

Avatar

Annie Daisy

Jeppiaar Engineering College

View shared research outputs
Top Co-Authors

Avatar

Arokia Renjith

Jeppiaar Engineering College

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

G. Janani

Jeppiaar Engineering College

View shared research outputs
Top Co-Authors

Avatar

J. Arokia Renjit

Jeppiaar Engineering College

View shared research outputs
Top Co-Authors

Avatar

L. K. Shoba

Jeppiaar Engineering College

View shared research outputs
Researchain Logo
Decentralizing Knowledge