Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Saumya Batham is active.

Publication


Featured researches published by Saumya Batham.


Electronics and Communication Systems (ICECS), 2014 International Conference on | 2014

Approach to accurate circle detection: Circular Hough Transform and Local Maxima concept

Virendra Kumar Yadav; Saumya Batham; Anuja Kumar Acharya; Rahul Paul

Detecting circular objects over digital images have received considerable attention from industries for applications such as detection of pellets in pelletization plant, target detection, inspection of manufactured products etc. Several algorithms were proposed in past few years to detect circular features. One powerful approach for circle detection is the Circular Hough Transform and its variants. This article presents an algorithm which is based on CHT and Local Maxima concept. Finding one or several maxima considering different accumulators simultaneously and mapping the found parameters corresponding to the maxima back to the original image is key concept of proposed algorithm. Experiments were performed on real industrial images to validate the efficiency of proposed algorithm regarding good accuracy of detection.


international conference on contemporary computing | 2014

ICSECV: An efficient approach of video encryption

Saumya Batham; Virendra Kumar Yadav; Amit Kumar Mallik

Encryption for the compressed video stream has attracted the attention of many researchers within past few years. Due to exponential growth of digital multimedia contents over the network, their secure transmission over the network is a serious concern. Security and performance are two main peculiarities of any digital multimedia encryption algorithm. This paper presents an indexed chaotic sequence based selective encryption of compressed video (ICSECV) which exploits the characteristics of compressed video. ICSECV selectively encrypts the compressed Intra coded frames and predictively coded frames from each Group of picture (GoP). This method of encryption is quite efficient since it provides the real time encryption of digital multimedia contents. ICSECV uses indexed based chaotic sequence for encrypting the selected frames which do not leaks any information and provide desirable amount of security.


international symposium on security in computing and communication | 2014

Zero Distortion Technique: An Approach to Image Steganography Using Strength of Indexed Based Chaotic Sequence

Shivani Sharma; Virendra Kumar Yadav; Saumya Batham

Steganography is an art of hiding information. There are several existing approaches, of which LSB is the popular known technique. While performing image steganography, there are certain limitations, in terms of time, robustness, distortion, quantity of data to hide etc. A common major limitation involved in these approaches is: altering the pixel value of the image which leads to distortion in the cover image. It can be easily detected by histogram and PSNR value. Zero Distortion Technique (ZDT) is proposed to overcome the limitation, as no changes are reflected in the histogram and PSNR value of the cover and the stego image. Experimental results on certain images shows that the proposed algorithm gives refine results. The proposed technique is robust, fast and helpful in providing security to our confidential data.


international conference on information and communication technology | 2014

Zero Distortion Technique: An approach to image steganography on color images using strength of Chaotic Sequence

Shivani; Virendra Kumar Yadav; Saumya Batham

Steganography is a powerful technique to hide data, i.e. the existence of the private and sensitive data cannot be pursued by the intruder. Combination of cryptography with steganography gives a powerful impact. It becomes a tedious task for the steganalyst to break the code. There are several techniques for performing steganography, out of which LSB is the widely used technique. Limitations of these techniques are like, it degrades the quality of the cover image, blurring, less amount of data can be hidden. Zero Distortion Technique has been proposed to overcome these limitations. Proposed technique consider the image only as a reference and hides data in the locations of the image. The bits of the cover image remains untouched which provides zero distortion in the cover image chaotic sequence is used to encrypt the elements of location matrix. Experimental results on certain color images gives better results in terms of amount of data which can be hidden i.e. in RGB bands. Proposed technique is efficient as there is no distortion in the cover image.


international conference on computational intelligence and communication networks | 2014

SRTS: A Novel Technique to Generate Random Text

Virendra Kumar Yadav; Shantanu Agarwal; Jaishree Uprety; Saumya Batham

Random texts have wide applications in day-to-day life. The most basic use of random text is in CAPTCHA generation. CAPTCHA is an abbreviation of Completely Automated Public Turing test to tell Computers and Humans Apart. It is a test that only humans can pass but current computer systems cannot. CAPTCHA protects web services from attack of codes that are automated to fill forms and overflow the servers or used for registering fake ids. They may consist of text, or distorted images containing a text. Text CAPTCHA generally employ random text generation algorithms which have flaws of quick repetitions due to low degree of randomness. They sometimes employ the pseudo random number generation techniques in which a seed is provided and the next random text or number generated follows that pattern thus repeats after a fixed interval of time. In this paper we aim at generating secured random text sequences for CAPTCHA. Text generated is completely based on date and time. These texts are breakable by normal coding and by simple users and applies the intellect of changing time to create completely new sequence whenever a user sends request for a new text. This algorithm uses the servers date and time to generate random text which can be used in CAPTCHA generation.


Electronics and Communication Systems (ICECS), 2014 International Conference on | 2014

An approach to Electronic Voting System using UIDAI

Virendra Kumar Yadav; Saumya Batham; Mradul Jain; Shivani Sharma

Casting a vote and counting votes both by electronic means constitutes Electronic Voting System. Creating an electronic voting system requires the use of robust voting mechanism that is relatively complex to design. In this paper we present a concept of electronic voting system which ensures authentication, authorization and accounting. Approach collects information from UIDAI and uses this information in validating electorate, casting electorate vote during electronic voting procedure. Only necessary information is collected from UIDAI that has some significance in AAA. Our approach addresses issues such as voter frauds, voting accuracy, reliable voting, time delays, increasing electorate participation providing user friendly interface etc., thus providing a framework for fair elections.


Archive | 2016

Approach to Accurate Circle Detection: Multithreaded Implementation of Modified Circular Hough Transform

Virendra Kumar Yadav; Munesh Chandra Trivedi; Shyam Singh Rajput; Saumya Batham

Several applications of real-world industries, for example, detection of pellets in pelletization plant, target detection, inspection of manufactured products, ADAS, etc., requires detection of circular features of objects from digital images. Researches have performed in the area of development of algorithms from past few years to detect circular features. Major limitations of these proposed algorithms were either time complexity or accuracy in detection. One powerful concept for circle and ellipse detection is the circular Hough transform and its variants. This paper presents an algorithm which is based on multithreaded concept of modified CHT. Multithreaded approach is used to reduce the time complexity. Simulation results of real industrial images validate the efficiency of proposed algorithm in terms of accuracy in detection and also time efficient.


Confluence 2013: The Next Generation Information Technology Summit (4th International Conference) | 2013

A New Video Encryption Algorithm Based on Indexed Based Chaotic Sequence

Saumya Batham; A.K. Acharya; Virendra Kumar Yadav; R. Paulo


Procedia Computer Science | 2015

A Novel Approach of Bulk Data Hiding using Text Steganography

Shivani; Virendra Kumar Yadav; Saumya Batham


IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies | 2012

Kerberos based Electronic Voting System

Virendra Kumar Yadav; Saumya Batham; Amit Kumar Mallik

Collaboration


Dive into the Saumya Batham's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Shivani Sharma

ABES Engineering College

View shared research outputs
Top Co-Authors

Avatar

Shivani

ABES Engineering College

View shared research outputs
Top Co-Authors

Avatar

A.K. Acharya

ABES Engineering College

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mradul Jain

ABES Engineering College

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

R. Paulo

ABES Engineering College

View shared research outputs
Researchain Logo
Decentralizing Knowledge