U. Dinesh Acharya
Manipal Institute of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by U. Dinesh Acharya.
Signal & Image Processing : An International Journal | 2013
S. Hemalatha; U. Dinesh Acharya; A. Renuka; Priya R. Kamath
Steganography is the science of “invisible” communication. The purpose of Steganography is to maintain secret communication between two parties. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide multiple secret images and keys in color cover image using Integer W avelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted secret images are also similar to the original secret images. Very good PSNR (Peak Signal to Noise Ratio) values are obtained for both stego and extracted secret images. The results are compared with the results of other techniques, where single image is hidden and it is found that the proposed technique is simple and gives better PSNR values than others
International Journal of Cooperative Information Systems | 2013
S. Hemalatha; U. Dinesh Acharya; A. Renuka; Priya R. Kamath
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted image is also similar to the secret image. This is proved by the high PSNR (Peak Signal to Noise Ratio), value for both stego and extracted secret image. The results are compared with the results of similar techniques and it is found that the proposed technique is simple and gives better PSNR values than others.
international conference on industrial and information systems | 2010
Rajesh Gopakumar; Nv Subbareddy; Krishnamoorthi Makkithaya; U. Dinesh Acharya
Automatic identification of a script in a given document image facilitates many important applications such as automatic archiving of multilingual documents, searching online archives of document images and for the selection of script specific OCR in a multilingual environment. In this paper a Zone-based Structural feature extraction algorithm scheme towards the recognition of South-Indian scripts along with English and Hindi is proposed. The document images are segmented into lines and the line image is divided into different zones and the structural features are extracted. A total of 37 features were extracted in the first level and then reduced to an optimal number of features using wrapper and filter selection approaches. The K-nearest neighbor and the support vector machine classifiers are used for classification and recognition purpose. A classification accuracy of 100% is achieved on the optimal feature set.
International Conference on Business Administration and Information Processing | 2010
G. Shiva Prasad; N. V. Subba Reddy; U. Dinesh Acharya
Knowledge discovery from Web Usage Data has become very critical in order to understand and better serve the needs of Web based applications. Web usage mining consists of three phases, namely prepro cessing, pattern discovery and pattern analysis. A survey of Web Usage Preprocessing techniques is presented in this paper.
world congress on information and communication technologies | 2012
S. Hemalatha; A. Renuka; U. Dinesh Acharya; Priya R. Kamath
This paper proposes a secure image steganography technique to hide a secret image using the key. The secret image itself is not hidden, instead a key is generated and the key is hidden in the cover image. Using the key the secret image can be extracted. Integer Wavelet Transform (IWT) is used to hide the key. So it is very secure and robust because no one can realize the hidden information and it cannot be lost due to noise or any signal processing operations. Experimental results show very good Peak Signal to Noise Ratio (PSNR), which is a measure of security. In this technique the secret information is hidden in the middle bit-planes of the integer wavelet coefficients in high frequency sub-bands.
international conference on networks and communications | 2013
S. Hemalatha; U. Dinesh Acharya; A. Renuka; Priya R. Kamath
Steganography is the science of “invisible” communication. The purpose of Steganography is to maintain secret communication between two parties. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide multiple secret images and keys in color cover image using Discrete Wavelet Transform (DWT). There is no visual difference between the stego image and the cover image. The extracted secret images are also similar to the original secret images. Very good PSNR (Peak Signal to Noise Ratio) values are obtained for both stego and extracted secret images. The results are compared with the results of other techniques, where single image is hidden and it is found that the proposed technique is simple and gives better PSNR values than others.
International Journal of Electronic Security and Digital Forensics | 2016
S. Hemalatha; U. Dinesh Acharya; A. Renuka
Secret data when transmitted over the network must be protected from the illegal copy, modification or destruction by the malicious user. Audio steganography is a technique that provides a platform for secure transmission of secret data over the internet. In audio steganography, the secret data is transmitted with audio signal as the carrier. This paper proposes a high capacity and security audio steganography technique to hide secret audio signal. In this technique, in lieu to ensconcing the secret information as a whole in the cover object a key corresponding to the secret information is produced and hidden imperceptibly in the cover signal. The key is used to retrieve the secret information. To generate the key and to conceal it in the cover, integer wavelet transform IWT is used. The performance metrics obtained are well above the required level of HAS, indicating good security and robustness of the stego system.
international conference on advanced computing | 2006
Krishnamoorthi; N. V. Subba Reddy; U. Dinesh Acharya
As the number of networked computers grows, intrusion detection is an essential component in keeping networks secure. Various approaches to intrusion detection are currently being in use with each one has its own merits and demerits. This paper presents a hybrid approach for modeling intrusion detection system (IDS). Rule based classifier and simple K-means clustering are combined as a hybrid intelligent system. The initial prototype developed by the rule base classifier improves the performance of K-means clustering. The results show that the developed hybrid model provides better IDS.
International Journal of Computer Applications | 2015
G Shivaprasad; N. V. Subba Reddy; U. Dinesh Acharya
Web Usage Mining (WUM) refers to extraction of knowledge from the web log data by application of data mining techniques. WUM generally consists of Web Log Preprocessing, Web Log Knowledge Discovery and Web Log Pattern Analysis. Web Log Preprocessing is a major and complex task of WUM. Elimination of noise and irrelevant data, thereby reducing the burden on the system leads to efficient discovery of patterns by further stages of WUM. In this paper, Web Log Preprocessing Methods to efficiently identify users and user sessions have been implemented and results have been analyzed.
computational science and engineering | 2012
S. Hemalatha; U. Dinesh Acharya; A. Renuka; Priya R. Kamath
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and keyin color cover image using Discrete Wavelet Transform (DWT).There is no visual difference between the stego image and the cover image. The extracted image is also similar to the secret image. This is proved by the high PSNR (Peak Signal to Noise Ratio), value for both stego and extracted secret image. The results are compared with the results of similar techniques and it is found that the proposed technique is simple and gives better PSNR values than others.