Hemalatha Shivaram

Hemalatha Shivaram
Manipal Academy of Higher Education | MAHE · Department of Computer Science and Engineering

M.Tech

About

13
Publications
5,268
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
289
Citations
Citations since 2017
1 Research Item
225 Citations
2017201820192020202120222023010203040
2017201820192020202120222023010203040
2017201820192020202120222023010203040
2017201820192020202120222023010203040

Publications

Publications (13)
Article
Steganography is one of the techniques used for secure transmission of secret information. The secret information is concealed in a carrier and transmitted. Video steganography uses video signals to hide the secret information. The objective of this paper is to hide large volumes of secret data in video files. In the proposed technique, AVI video f...
Article
Secret data when transmitted over the network must be protected from the illegal copy, modification or destruction by the malicious user. Audio steganography is a technique that provides a platform for secure transmission of secret data over the internet. In audio steganography, the secret data is transmitted with audio signal as the carrier. This...
Article
Full-text available
Information security is one of the most important factors to be considered when secret information has to be communicated between two parties. Cryptography and steganography are the two techniques used for this purpose. Cryptography scrambles the information, but it reveals the existence of the information. Steganography hides the actual existence...
Article
Full-text available
Information security is one of the main factors to be considered when internet is used for secret information transmission. Secret data transmitted over the network must be protected from malicious or conspicuous users. Steganography is one of the foremost and fast developing techniques currently used in network to send the secret data without bein...
Conference Paper
Full-text available
This paper presents a parallel approach to improve the time complexity problem associated with sequential algorithms. An image steganography algorithm in transform domain is considered for implementation. Image steganography is a technique to hide secret message in an image. With the parallel implementation, large message can be hidden in large ima...
Conference Paper
Full-text available
Rapid increase in data transmission over internet results in emphasis on information security. Audio steganography is used for secure transmission of secret data with audio signal as the carrier. In the proposed method, cover audio file is transformed from space domain to wavelet domain using lifting scheme, leading to secure data hiding. Text mess...
Article
Full-text available
Steganography is one of the methods used for secret communication. Steganography attempts to hide the existence of the information. The object used to hide the secret information is called as cover object. Images are the most popular cover objects used for steganography. Different techniques have to be used for color image steganography and grey sc...
Article
Full-text available
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual diff...
Article
Full-text available
Steganography is the science of invisible communication. The purpose of Steganography is to maintain secret communication between two parties. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide multiple secret images and keys in color cover image using...
Article
Steganography is the science of "invisible" communication. The purpose of Steganography is to maintain secret communication between two parties. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide multiple secret images and keys in color cover image usi...
Article
Full-text available
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and keyin color cover image using Discrete Wavelet Transform (DWT).There is no visual difference between the stego image and the...
Conference Paper
Full-text available
This paper proposes a secure image steganography technique to hide a secret image using the key. The secret image itself is not hidden, instead a key is generated and the key is hidden in the cover image. Using the key the secret image can be extracted. Integer Wavelet Transform (IWT) is used to hide the key. So it is very secure and robust because...

Network

Cited By