Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Virendra Kumar Yadav is active.

Publication


Featured researches published by Virendra Kumar Yadav.


Electronics and Communication Systems (ICECS), 2014 International Conference on | 2014

Approach to accurate circle detection: Circular Hough Transform and Local Maxima concept

Virendra Kumar Yadav; Saumya Batham; Anuja Kumar Acharya; Rahul Paul

Detecting circular objects over digital images have received considerable attention from industries for applications such as detection of pellets in pelletization plant, target detection, inspection of manufactured products etc. Several algorithms were proposed in past few years to detect circular features. One powerful approach for circle detection is the Circular Hough Transform and its variants. This article presents an algorithm which is based on CHT and Local Maxima concept. Finding one or several maxima considering different accumulators simultaneously and mapping the found parameters corresponding to the maxima back to the original image is key concept of proposed algorithm. Experiments were performed on real industrial images to validate the efficiency of proposed algorithm regarding good accuracy of detection.


international conference on contemporary computing | 2014

ICSECV: An efficient approach of video encryption

Saumya Batham; Virendra Kumar Yadav; Amit Kumar Mallik

Encryption for the compressed video stream has attracted the attention of many researchers within past few years. Due to exponential growth of digital multimedia contents over the network, their secure transmission over the network is a serious concern. Security and performance are two main peculiarities of any digital multimedia encryption algorithm. This paper presents an indexed chaotic sequence based selective encryption of compressed video (ICSECV) which exploits the characteristics of compressed video. ICSECV selectively encrypts the compressed Intra coded frames and predictively coded frames from each Group of picture (GoP). This method of encryption is quite efficient since it provides the real time encryption of digital multimedia contents. ICSECV uses indexed based chaotic sequence for encrypting the selected frames which do not leaks any information and provide desirable amount of security.


international conference on information and communication technology | 2016

Analysis of Several Image Steganography Techniques in Spatial Domain: A Survey

Munesh Chandra Trivedi; Shivani Sharma; Virendra Kumar Yadav

Steganography enables user to hide confidential data in any digital medium such that its existence cannot be concealed by the third party. Several research work is being is conducted to improve steganography algorithms efficiency. Recent trends in computing technology use steganography as an important tool for hiding confidential data. This paper summarizes some of the research work conducted in the field of image steganography in spatial domain along with their advantages and disadvantages. Future research work and experimental results of some techniques is also being discussed. The key goal is to show the powerful impact of steganography in information hiding and image processing domain.


international symposium on security in computing and communication | 2014

Zero Distortion Technique: An Approach to Image Steganography Using Strength of Indexed Based Chaotic Sequence

Shivani Sharma; Virendra Kumar Yadav; Saumya Batham

Steganography is an art of hiding information. There are several existing approaches, of which LSB is the popular known technique. While performing image steganography, there are certain limitations, in terms of time, robustness, distortion, quantity of data to hide etc. A common major limitation involved in these approaches is: altering the pixel value of the image which leads to distortion in the cover image. It can be easily detected by histogram and PSNR value. Zero Distortion Technique (ZDT) is proposed to overcome the limitation, as no changes are reflected in the histogram and PSNR value of the cover and the stego image. Experimental results on certain images shows that the proposed algorithm gives refine results. The proposed technique is robust, fast and helpful in providing security to our confidential data.


computational intelligence | 2016

Congestion Control Techniques in MANET: A Survey

Neelam Sharma; A. Gupta; Shyam Singh Rajput; Virendra Kumar Yadav

This paper is concerned with a crucial problem of MANET which is congestion control (CongClt). CongClt can be described as a mechanism used to control congestion (Cong) and keep the traffic below the capacity of the network. Many approaches have been proposed to overcome CongClt in Ethernet as well as in MANET. Controlling the Cong in MANET is quite difficult due to its fundamental characteristics. This discussion is centered on CongClt in MANET. In this work we discussed some of the CongClt techniques along with characteristics and working.


computational intelligence | 2016

Analysis of Different Text Steganography Techniques: A Survey

Shivani Sharma; A. Gupta; Munesh Chandra Trivedi; Virendra Kumar Yadav

Steganography is helping individual to send confidential data between two parties. It enables user to hide data in different digital mediums. Steganography is of many types such as image steganography, text steganography, audio/video steganography etc. Text Steganography is quite difficult than other techniques because of less amount of redundancy and changes can be detected quite easily. Some of the techniques of text steganography has been discussed along with characteristics and working.


Archive | 2016

DDA: An Approach to Handle DDoS (Ping Flood) Attack

Virendra Kumar Yadav; Munesh Chandra Trivedi; B. M. Mehtre

Distributed denial of service attack (DDoS) is an attempt by malicious hosts to overload website, network, e-mail servers, applications, network resources, bandwidth, etc. Globally DDoS attacks affected four out of ten organizations (around 41 %) over the past few years. Challenges involved in taking counter measures against DDoS attacks are network infrastructure, identifying legitimate traffic from polluted traffic, attacker anonymity, large problem space, nature of attacks, etc. Several approaches proposed in the past few years to combat the problem of DDoS attacks. These approaches suffer for many limitations. Some of the limitations include: implementing filtering at router (firewall enabled) will create bottleneck, additional traffic, no means of sending alert to an innocent host acting as a bot, etc. Ping flood attack is one kind of DDoS attack. In this paper, ping flood attack is analyzed and a new approach, distributed defence approach (DDA) is proposed to mitigate ping flood attack. Distributed defence is applied with the help of routers connected to network when count of PING request crosses a threshold limit or packet size is greater than normal ping packet size. Concept of the proposed approach is to help the end router by putting less load during filtering attack packets, enhancing the speed of processing and informing the innocent host acting as bot simultaneously making the DDoS attack ineffective.


international conference on information and communication technology | 2014

Zero Distortion Technique: An approach to image steganography on color images using strength of Chaotic Sequence

Shivani; Virendra Kumar Yadav; Saumya Batham

Steganography is a powerful technique to hide data, i.e. the existence of the private and sensitive data cannot be pursued by the intruder. Combination of cryptography with steganography gives a powerful impact. It becomes a tedious task for the steganalyst to break the code. There are several techniques for performing steganography, out of which LSB is the widely used technique. Limitations of these techniques are like, it degrades the quality of the cover image, blurring, less amount of data can be hidden. Zero Distortion Technique has been proposed to overcome these limitations. Proposed technique consider the image only as a reference and hides data in the locations of the image. The bits of the cover image remains untouched which provides zero distortion in the cover image chaotic sequence is used to encrypt the elements of location matrix. Experimental results on certain color images gives better results in terms of amount of data which can be hidden i.e. in RGB bands. Proposed technique is efficient as there is no distortion in the cover image.


international conference on computational intelligence and communication networks | 2014

SRTS: A Novel Technique to Generate Random Text

Virendra Kumar Yadav; Shantanu Agarwal; Jaishree Uprety; Saumya Batham

Random texts have wide applications in day-to-day life. The most basic use of random text is in CAPTCHA generation. CAPTCHA is an abbreviation of Completely Automated Public Turing test to tell Computers and Humans Apart. It is a test that only humans can pass but current computer systems cannot. CAPTCHA protects web services from attack of codes that are automated to fill forms and overflow the servers or used for registering fake ids. They may consist of text, or distorted images containing a text. Text CAPTCHA generally employ random text generation algorithms which have flaws of quick repetitions due to low degree of randomness. They sometimes employ the pseudo random number generation techniques in which a seed is provided and the next random text or number generated follows that pattern thus repeats after a fixed interval of time. In this paper we aim at generating secured random text sequences for CAPTCHA. Text generated is completely based on date and time. These texts are breakable by normal coding and by simple users and applies the intellect of changing time to create completely new sequence whenever a user sends request for a new text. This algorithm uses the servers date and time to generate random text which can be used in CAPTCHA generation.


Electronics and Communication Systems (ICECS), 2014 International Conference on | 2014

An approach to Electronic Voting System using UIDAI

Virendra Kumar Yadav; Saumya Batham; Mradul Jain; Shivani Sharma

Casting a vote and counting votes both by electronic means constitutes Electronic Voting System. Creating an electronic voting system requires the use of robust voting mechanism that is relatively complex to design. In this paper we present a concept of electronic voting system which ensures authentication, authorization and accounting. Approach collects information from UIDAI and uses this information in validating electorate, casting electorate vote during electronic voting procedure. Only necessary information is collected from UIDAI that has some significance in AAA. Our approach addresses issues such as voter frauds, voting accuracy, reliable voting, time delays, increasing electorate participation providing user friendly interface etc., thus providing a framework for fair elections.

Collaboration


Dive into the Virendra Kumar Yadav's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Saumya Batham

ABES Engineering College

View shared research outputs
Top Co-Authors

Avatar

Shivani Sharma

ABES Engineering College

View shared research outputs
Top Co-Authors

Avatar

A. Gupta

ABES Engineering College

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Namrata Singh

ABES Engineering College

View shared research outputs
Top Co-Authors

Avatar

Shilpi Mishra

ABES Engineering College

View shared research outputs
Top Co-Authors

Avatar

Shivani

ABES Engineering College

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

A.K. Acharya

ABES Engineering College

View shared research outputs
Researchain Logo
Decentralizing Knowledge