Page Not Found
Page not found. Your pixels are in another canvas.
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Page not found. Your pixels are in another canvas.
About me
Published:
This post gives a basic overview of Steganography and is intended towards the uninitiated. We go through some basic techniques of hiding data in image files with some programming in Matlab.
Published:
This is Part 1 in a series of posts where we build a word prediction application in R. In this post, we lay out our plan of action and decide how to proceed with the project.
Published:
This is part 2 of 5 in a series of blogs where we build a word prediction application. In this post we download our corpus and do some preliminary analysis (EDA).
Published:
This is part 3 of 5 in a series of blogs where we build a word prediction app. In this part we create a n-gram model and write the code to implement the back-off to predict the next word.
Published:
This is Part 4 of a 5 part series where we build and deploy a text prediction app using R. In this part we build the ui and server side code of the app and deploy it on Shiny.
Published:
This is Part 5 , the final part, in the series where we build and deploy a text prediction app using R. In this part we will reflect upon what we have built and discuss the the things we got right and the things which could have been better.
Published:
This post gives an intuition about the metrics being used in academic literature on image encryption.
Published in Intelligent Techniques in Signal Processing for Multimedia Security, 65-91, 2016
This is publication gives a review of some of the most popular steganography techniques being used in industry and academia. It was published as a book chapter.
Recommended citation: Thanikaiselvan V., Shastri S., Ahmad S. (2017). "Information Hiding: Steganography." In: Dey N., Santhi V. (eds) Intelligent Techniques in Signal Processing for Multimedia Security. Studies in Computational Intelligence, vol 660. Springer, Cham. https://doi.org/10.1007/978-3-319-44790-2_4
Published in Journal of Visual Communication and Image Representation, 2019
This paper proposes a novel Dual Image RDH scheme which reduces the embedding distortion considerably while preserving the Embedding Capacity. We did this by designing a new encoding that converts binary data to “ready-to-embed” trinary data.
Recommended citation: S Shastri, V Thanikaiselvan (2019). "Dual image reversible data hiding using trinary assignment and centre folding strategy with low distortion." Journal of Visual Communication and Image Representation. 61. 130-140 https://doi.org/10.1016/j.jvcir.2019.03.022
Published in 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN), 2019
This paper proposed a method to convert a normal Prediction Error Expansion based RDH algorithm to a Dual Image RDH algorithm. It was awarded the Best Paper certificate in the ViteCon 2019 conference.
Recommended citation: Shastri, S. Thanikaiselvan, V. (2019). "Dual Image Reversible Data Hiding Using Rhombus Prediction." 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN). 1(2). https://ieeexplore.ieee.org/document/8899667
Published:
This talk was presented to 2nd and 3rd year engineering students. The talk was hosted by the local IEEE chapter and streamed on Facebook. It gave a short introduction to the field of cryptography.
Undergraduate and Post-graduate projects, VIT Vellore, School of Electronics Engineering, 2020
Part of my job as a Teaching and Research Assistant was to help mentor and guide Bachelors and Masters degree students in completing their semseter and degree projects (and preferably help them get a publication in the process).
Undergraduate courses, VIT Vellore, School of Electronics Engineering, 2020
My responsibilities as a Teaching and Research Assistant included helping the faculties and laboratory staff with their teaching.