
Rajeev KumarDelhi Technological University | Delhi College of Engineering · Department of Computer Science and Engineering
Rajeev Kumar
Doctor of Philosophy
About
84
Publications
11,470
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,227
Citations
Introduction
Curretnly, Working as an Assistant Professor at Delhi Technological University, Delhi. I holds Post-Doctorate from Kyungil University, Korea and Ph.D. from Netaji Subhas Institute of Technology, Delhi (affiliated to University of Delhi), India. My areas of interest in Computer Science are Steganography, Image Compression, Wireless sensor Networks...
Additional affiliations
August 2011 - January 2016
Publications
Publications (84)
The objective of this special section is to solicit recent developments on new aspects and future research directions related to the hyperspectral imaging dealing with opportunities provided by deep learning. We invite contributions aimed at pushing the boundaries of hyperspectral imaging. Our goal is to foster the development of innovative concept...
Hyperspectral image classification grapples with the twin challenges of high dimensionality and limited labelled data. These limitations hinder the development of generalizable classification models that can perform well across diverse datasets. To overcome these limitations, this paper proposes a novel semi-supervised framework that synergizes aut...
The general public is becoming increasingly familiar with blockchain technology. Numerous new applications are made possible by this technology's unique features, which include transparency, strong security via cryptography, and distribution. These applications need certain programming tools and interfaces to be implemented. This is made feasible b...
Text summarisation plays a pivotal role in efficiently processing large volumes of textual data, making it an indispensable tool across diverse domains such as healthcare, legal, education, and journalism. It addresses the challenge of information overload by condensing or generating concise, meaningful summaries that improve decision-making, enhan...
The investigation of aerodynamic properties in multi-element airfoils is historically challenging and impractical for real-time applications. Predicting specific angles to achieve predetermined lift and drag forces has been elusive. Advances in machine learning (ML) and deep learning (DL) offer new possibilities, but their application to multi-wing...
Hyperspectral Imaging (HSI) has revolutionized earth observation through advanced remote sensing technology, providing rich spectral and spatial information across multiple bands. However, this wealth of data introduces significant challenges for classification, including high spectral correlation, the curse of dimensionality due to limited labeled...
In the last decade, data hiding in encrypted image has got a lot of attention within the security and privacy researcher’s communities. This attention has led to the development of various reversible data hiding techniques for encrypted images (RDHEI) which enables separable lossless recovery of cover media and extraction of the secret message, at...
The healthcare industry has witnessed an increase in the use of cloud storage, resulting in a significant demand for safeguarding medical records from potential attackers. In response to this challenge, reversible data hiding (RDH) has emerged as a lifesaver. The RDH ensures the concealment of private and confidential data with minimal loss to the...
Deepfake refers to an artificial intelligence-based technique to produce manipulated videos that look realistic. However, this good aspect of Deepfake sometimes pose serious threats to society as malicious intenet users exploit deepfakes to disseminate false information. That’s why a lot of research and applications are being developed in both the...
The rhombus mean predictor has been a popular and highly precise predictor commonly deployed for data hiding purposes. However, the rhombus predictor does not always produce the best prediction, for example, when any surrounding pixel is an outlier, because the predictor only calculates the mean of the surrounding pixels without considering their c...
The classification of hyperspectral images (HSI) into categories that correlate to various land cover sorts such as water bodies, agriculture and urban areas, has gained significant attention in research due to its wide range of applications in fields, such as remote sensing, computer vision, and more. Supervised deep learning networks have demonst...
Deep generative models, especially Generative Adversarial Networks (GANs), have recently demonstrated outstanding performance in real-world applications such as image generation and content production for large-scale public datasets and social media platforms, enabling high-resolution compelling fake content generation. Deepfakes have raised global...
The advent of sixth-generation (6G) technology is poised to revolutionize connectivity, particularly by enhancing the integration of Internet of Medical Things (IoMT) devices. This advancement offers ultra-fast data transmission, low latency, and high mobility but also brings the challenge of ensuring secure and energy-efficient communication. To s...
The convergence of Artificial Intelligence (AI) and Blockchain technologies has emerged as a powerful paradigm to address the challenges of data management, security, and privacy in the Edge of Things (EoTs) environment. This bibliometric analysis aims to explore the research landscape and trends surrounding the topic of convergence of AI and Block...
Interpolation-based reversible data hiding (IRDH) is a method for embedding data in a reversible manner into digital images. It is based on the polynomial interpolation to hide the secret data bit stream in the coefficients of the interpolation polynomial. In this paper, an IRDH method that combines a modified neighbor mean interpolation is present...
Pixel-value ordering (PVO) and prediction-error expansion (PEE) are the two most popular strategies of reversible data hiding (RDH) as PVO provides high-fidelity stego-images with decent embedding capacity (EC) and PEE provides high EC with limited distortion. Further, pairwise embedding scheme introduced by Ou et al. again boosts the EC and reduce...
Reversible data hiding in encrypted images (RDHEI) has gained significant popularity among security and privacy researchers as well as users, because of its features such as reversibility, embedding capacity (EC), and security. To enlarge the EC while ensuring the complete reversibility and security, we propose a bit-plane based RDHEI method based...
Communication bandwidth plays a significant role in real-time communication. For this, absolute moment block truncation coding (AMBTC) has been popular. An AMBTC based high capacity multimedia data hiding method for covert communication is proposed in this paper. The proposed method applies AMBTC to the host image to get the compressed image in the...
Reversible data hiding (RDH) schemes based on pixel value ordering have gained significant popularity due to their unique capability of providing high-quality marked images with a decent embedding capacity, while also enabling secret information extraction and the lossless recovery of the original images at the receiving side. However, the marked i...
Industrial Internet of Things (IIoT) is a very effective and efficient way to track products during their production, packaging, storage, and shipments. It can also help in monitoring their real‐time conditions such as location, speed of moments, and temperature. Presently most of the supply chain management systems are not effective due to their i...
The new technological developments and enhancements of digital media have made access to information easy and convenient to users. As a result, media consumption has increased tremendously in recent years. The lockdowns, imposed by numerous countries, have further accelerated this increasing consumption trend. However, this technological progress h...
In this paper, we propose a new enhanced absolute moment block truncation coding (AMBTC) image compression method based on interpolation. The proposed compression method takes the human visual system characteristics into the account using Weber’s law while compressing the image so that perceived image quality is maintained. Further, the low and hig...
Nowadays, Reversible Data Hiding (RDH) is used extensively in information sensitive communication domains to protect the integrity of hidden data and the cover medium. However, most of the recently proposed RDH methods lack robustness. Robust RDH methods are required to protect the hidden data from security attacks at the time of communication betw...
Being as an integral part of data exchange in disaster management, Internet of Thing (IoT) is an essential component to update the disaster management information to all the connected nodes. In such scenarios, the nodes are deployed with a limited battery, batteries of these nodes are non-rechargeable and such networks consume huge energy in data e...
This paper proposes an optimized Genetic Algorithm (GA) based sustainable and secure green data collection/transmission method for IoT enabled WSN in healthcare by optimizing intra cluster distance, systematic utilization of node’s energy and reducing hop count. For secure transmission of data, the communication data is encrypted us ing stream ciph...
Internet of Things (IoT) enabled Wireless Sensor Network (WSN) permits the development of various IoT-based applications, ranging from industry to education and military to agriculture. However, the common IoT devices usually have very limited battery power which is not frequently rechargeable. Thus, an energy-efficient mechanism is required to ope...
Unmanned aerial vehicle (UAV)‐enabled wireless sensor networks (WSNs) have evolved as the significant paradigms to communicate the information among the devices in today's scenario instantly. These technologies support for developing smart crop spraying, smart infrastructure, aerial photography and videography, emergency services, etc. in providing...
Pixel-value-ordering (PVO) is one of the most widely used reversible data hiding (RDH) framework which efficiently utilizes smooth pixels of the cover image to provide high-fidelity stego-image but with limited embedding capacity. This letter proposes an RDH scheme based on local moment driven pixel value ordering (LM-PVO) which further enhances th...
In this paper, a high capacity reversible data hiding technique using a parametric binary tree labeling scheme is proposed. The proposed parametric binary tree labeling scheme is used to label a plaintext image’s pixels as two different categories, regular pixels and irregular pixels, through a symmetric or asymmetric process. Regular pixels are on...
This paper proposes a novel reversible data hiding (RDH) technique using sorting and pairwise
prediction error expansion (PEE) to improve embedding capacity (EC) while retaining
the quality of cover image. The proposed scheme traverses alternate pixels of the cover
image in a zig-zag order to construct two independent sets for sequential embedding....
In recent years, low bandwidth data hiding schemes for multimedia systems are being seen as a promising new technology for multimedia information protection and rights management. More specifically, Absolute moment preserving block truncation coding (AMBTC) based data hiding schemes have gain a wide attraction among the researches due to their low...
Reversible data hiding (RDH) plays a significant role in the field of information security which allows safe transmission of secret data inside a cover media. Additionally, RDH allows extraction of secret data and lossless recovery of the cover media at the decoding end which makes it applicable for the applications like medical imaging and militar...
Improved Pixel-Value-Ordering (I-PVO) based reversible data hiding scheme provides high-fidelity watermarked images with high data embedding capacity. In this paper, a new reversible data hiding scheme based on the I-PVO method is proposed to increase the data embedding capacity. The proposed scheme first divides the cover image into non-overlappin...
In this paper, a novel color image steganography scheme using gray invariant in AMBTC compression domain is proposed. Unlike the conventional schemes, the proposed scheme embeds the secret data into a compressed color image while keeping gray pixel values intact. First, the proposed scheme partitions each color component (R, G, B) of a cover image...
Pixel-Value-Ordering (PVO) based reversible data hiding schemes provide high-fidelity stego-images with moderate embedding capacity. In this paper, a novel reversible data hiding scheme based on enhanced pairwise pixel value ordering is proposed to increase embedding capacity. The proposed scheme divides a host image into non-overlapping blocks of...
Block truncation coding is one of the simplest encoding methods which require insignificant computing cost to compress images. Due to the vast demand on embedding data into compressed images with low computing cost, a number of data hiding methods to improve block truncation coding have been proposed to be suitable for the low power devices such as...
Robust reversible data hiding (RRDH) prevents the hidden secret information from un- intentional modifications. This paper presents a novel RRDH scheme based on two-layer embedding with reduced capacity-distortion trade-off. The proposed scheme first decom- poses the image into two planes namely higher significant bit (HSB) and least significant bi...
Reversible Data hiding techniques reduce transmission cost as secret data is embedded into a cover image without increasing its size in such a way that at the receiving end, both secret data and the cover image can be extracted and recovered, respectively, to their original form. To further reduce the transmission cost, the secret data can be embed...
Improved pixel value ordering (I-PVO) is a popular reversible data hiding scheme which uses sorting-based prediction error expansion method to provide high fidelity marked images. In this paper, a new reversible data hiding scheme for large payload is presented. The proposed scheme first embeds the secret data into 2×2 sub-block using I-PVO method...
Malware is any malicious software to cause
damage to computer systems. Data hiding is related
to hide the secret data without existence of the secret
data to the third parties. Recently, data hiding
methods are used to intrude anti-virus programs
without detection. In this paper, structure of
documents are analyzed to embed secret message and
the e...
This paper proposes a novel data hiding method using adaptive quantization & dynamic bit plane based AMBTC technique. In the proposed method, initially, a cover image is partitioned into a set of non-overlapping blocks, then adaptive number of quantization levels and size of the bit-plane for each block is determined, using the complexity level. Th...
In this paper, we propose a new Absolute Moment Block Truncation Coding (AMBTC) based data hiding scheme using hamming distance and pixel value differencing methods. The proposed method firstly pre-processes the original image using a smoothing filter so that its quality can be maintained after AMBTC compression. It then applies AMBTC compression o...
In this paper, authors propose a new reversible data hiding scheme that has two passes. In first pass, the cover image is divided into non-overlapping blocks of 2×2 pixels. The secret data bit stream is converted into 2-bit segments, each representing one of the four values, i.e., 0,1,2,3 and these digits (2-bit segments) are embedded into blocks b...
In this paper, we propose a reversible data hiding scheme to hide a secret message into a cover image by considering the characteristics of Human Visual System (HVS) in order to improve the visual imperceptibility. The human eyes are more sensitive to the changes in the low intensity pixels than the higher intensity ones. Therefore, we divide the i...
There have been discussed various data hiding methods which can embed the secret data in an image. However, the image gets destroyed after extraction of the secret data at the receiving end. Thus, there exists a need to have data hiding methods which can recover the image after extraction of the secret data. Such types of schemes are called reversi...
There have been discussed several data hiding techniques which can hide the secret data in an image. However, after extracting the secret data some of the image information gets lost. It is an important issue to have a data hiding scheme which can extract the secret data as well as can restore the original image without any loss of information. Suc...
In this paper, we propose a 3-level heterogeneous network model for WSNs to enhance the network lifetime, which is characterized by a single parameter. Depending upon the value of the model parameter, it can describe 1-level, 2-level, and 3-level heterogeneity. Our heterogeneous network model also helps to select cluster heads and their respective...
This paper introduces a high capacity reversible data hiding scheme which embeds the secret data into LZW codes. It firstly compresses the cover media using LZW compression algorithm and then the output codes are used to embed the secret data. It constructs a location map of the LZW codes before embedding the secret data so that reversibility of th...
In this paper, a novel energy-efficient clustering protocol (NEECP) for increasing the network lifetime in wireless sensor networks is proposed. This technique selects the cluster heads in an effective way with an adjustable sensing range and performs data aggregation using chaining approach. It also avoids transmission of redundant data by using a...
In this paper, we propose a space character based reversible high capacity text steganography scheme which embeds the secret data into a Microsoft word document. The scheme hides the secret data bits into the white spaces by changing their font type and style. Since the white spaces are invisible characters, the changes made in their style as well...
This paper proposes a reversible data hiding scheme which embeds the secret data into LZW codes using even odd embedding strategy. It firstly compresses the cover media using LZW algorithm and then constructs a location map of the LZW codes based on their value. The secret data bit stream is converted into base3 representation and then the output L...
In this paper, we propose a new reversible data hiding scheme which embeds the secret data into an image. It divides the cover image into blocks of two pixels each in raster scan order. We construct a location map for the cover image so that reversibility of the scheme can be ensured. The secret data bit-stream is divided into segments each of size...
In this paper, we propose a high capacity text steganography method using Huffman compression. The forward email platform is used to hide the secret data. We make use of the number of characters used in email id to indicate the hidden secret data bits. So, to make optimal utilization of number of characters in email ids, the characters added to the...