Renuka Adige

Renuka Adige
Manipal Academy of Higher Education | MAHE · Department of Computer Science and Engineering

About

29
Publications
11,791
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
343
Citations

Publications

Publications (29)
Article
Differential count of leukocytes plays a consequential role in the determination of diagnostic details of a patient. Conventionally, leukocyte identification is performed manually by skilled medical personnel. But the involvement of humans slows down the task and also affects the process outcome. Designing a computer-aided system to automate this t...
Article
During congestion in LTE network, most of the algorithms succeed in either address the queue overflow problem or bufferbloat problem through implicit congestion control mechanism or using flow control technique. The flow control technique solves the bufferbloat problem but it affects the users while competing for shared resource in coexistence with...
Poster
Full-text available
To avoid queue overflow problems in the LTE network, the service providers have installed large capacity buffers (queue) in the eNodeB owing to the reduction in memory price. As a result of this, TCP connection can inject more packets into the network by increasing the sender window size. But, once the packets in network exceed the capacity of eNod...
Article
Full-text available
The cellular network keeps the vast capacity of queue space at eNodeBs (base stations) to reduce the queue overflow during the burst in data traffic. However, this adversely affects the delay sensitive applications and user quality of experience. Recently, few researchers have focused on reducing the packet delay, but it has a negative impact on th...
Article
Full-text available
The dynamic packet scheduling is a key component of LTE network to enhance the system throughput, as well as to satisfy the end users with the quality of service. However, the burst in user data traffic leads to user queue overflow at eNodeB due to resource starvation. Therefore, in this paper, queue monitoring and resource scheduling algorithms ar...
Conference Paper
Resource scheduling process in LTE network plays a vital role in enhancing the system performance. Therefore, in this paper, rotation based resource scheduling along with queue monitoring algorithm is proposed for LTE downlink transmission, to reduce overflow of packets from user queue at eNodeB, and to reduce the transmission delay of the packet....
Conference Paper
In LTE network, the downlink resource scheduling process plays a vital role in enhancing the system performance and satisfy the end-user quality of experience. However, the performance of system is not only confined to the single layer of LTE protocol stack, but there is also a correlation between the traffic dynamics and resource allocation decisi...
Article
Steganography is one of the techniques used for secure transmission of secret information. The secret information is concealed in a carrier and transmitted. Video steganography uses video signals to hide the secret information. The objective of this paper is to hide large volumes of secret data in video files. In the proposed technique, AVI video f...
Article
Secret data when transmitted over the network must be protected from the illegal copy, modification or destruction by the malicious user. Audio steganography is a technique that provides a platform for secure transmission of secret data over the internet. In audio steganography, the secret data is transmitted with audio signal as the carrier. This...
Article
Full-text available
Information security is one of the most important factors to be considered when secret information has to be communicated between two parties. Cryptography and steganography are the two techniques used for this purpose. Cryptography scrambles the information, but it reveals the existence of the information. Steganography hides the actual existence...
Article
Full-text available
Information security is one of the main factors to be considered when internet is used for secret information transmission. Secret data transmitted over the network must be protected from malicious or conspicuous users. Steganography is one of the foremost and fast developing techniques currently used in network to send the secret data without bein...
Conference Paper
Full-text available
Rapid increase in data transmission over internet results in emphasis on information security. Audio steganography is used for secure transmission of secret data with audio signal as the carrier. In the proposed method, cover audio file is transformed from space domain to wavelet domain using lifting scheme, leading to secure data hiding. Text mess...
Article
Full-text available
Steganography is one of the methods used for secret communication. Steganography attempts to hide the existence of the information. The object used to hide the secret information is called as cover object. Images are the most popular cover objects used for steganography. Different techniques have to be used for color image steganography and grey sc...
Article
Full-text available
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual diff...
Article
Full-text available
Steganography is the science of invisible communication. The purpose of Steganography is to maintain secret communication between two parties. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide multiple secret images and keys in color cover image using...
Article
Steganography is the science of "invisible" communication. The purpose of Steganography is to maintain secret communication between two parties. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide multiple secret images and keys in color cover image usi...
Article
Full-text available
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and keyin color cover image using Discrete Wavelet Transform (DWT).There is no visual difference between the stego image and the...
Conference Paper
Full-text available
This paper proposes a secure image steganography technique to hide a secret image using the key. The secret image itself is not hidden, instead a key is generated and the key is hidden in the cover image. Using the key the secret image can be extracted. Integer Wavelet Transform (IWT) is used to hide the key. So it is very secure and robust because...
Article
Mobile Ad-hoc Network (MANET) is a collection of autonomous nodes or terminals which communicate with each other by forming a multi-hop radio network and maintaining connectivity in a decentralized manner. The conventional security solutions to provide key management through accessing trusted authorities or centralized servers are infeasible for th...
Article
In this paper we present a protocol for group key management in mobile ad hoc networks based on K-dimensional trees, a space partitioning data structure. We use a 2D tree for a 2D space. The 2D tree resembles a binary tree. The protocol reduces the memory requirements for storing the tree by nearly 50% compared to the existing methods and also redu...
Article
Full-text available
We propose an Image matching technique based on Cumulative Distribution Function, which provides a considerable reduction in the retrieval time. The two novel approaches called bit plane histogram and hierarchical bit plane histogram are discussed. Next, the image matching technique based on Cumulative Distribution Function is explained and a compa...

Network

Cited By