Back close

Dr. Amritha P. P.

Assistant Professor, TIFAC-CORE in Cyber Security, Coimbatore

Qualification: M.Tech.
pp_amritha@cb.amrita.edu
Amritha P. P's Google Scholar Profile
Research Interest: Information Hiding, Operating System Security

Bio

Dr.  Amrita P. P. currently serves as Assistant Professor at TIFAC-CORE in Cyber Security, Coimbatore Campus.

 

Publications

Journal Article

Year : 2017

Active steganalysis on svd-based embedding algorithm

Cite this Research Publication : P. P. Amritha, Ravi, R. P., and Dr. M. Sethumadhavan, “Active steganalysis on svd-based embedding algorithm”, Advances in Intelligent Systems and Computing, vol. 515, pp. 777-785, 2017.

Publisher : Advances in Intelligent Systems and Computing

Year : 2016

On the removal of steganographic content from images

Cite this Research Publication : P. P. Amritha, Sethumadhavan, M., and Krishnan, R., “On the removal of steganographic content from images”, Defence Science Journal, vol. 66, 6 vol., pp. 574-581, 2016.

Publisher : Defence Science Journal, Defense Scientific Information and Documentation Centre, Volume 66, Number 6, p.574-581.

Year : 2013

Optimally Locating for Hiding Information in Audio Signal

Cite this Research Publication : P. Premalatha and Amritha, P. P., “Optimally Locating for Hiding Information in Audio Signal”, International Journal of Computer Applications, vol. 65, no. 14, pp. 37-42, 2013.

Publisher : International Journal of Computer Applications

Year : 2011

A Survey on Digital Image Steganographic Methods

Cite this Research Publication : P. P. Amritha and Dr. Gireesh K. T., “A Survey on Digital Image Steganographic Methods”, in Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, 2011, pp. 250-258.

Publisher : Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives

Year : 2010

Unconditional Steganalysis of JPEG and BMP Images and Its Performance Analysis Using Support Vector Machine

Cite this Research Publication : P. P. Amritha, Madathil, A., and Dr. Gireesh K. T., “Unconditional Steganalysis of JPEG and BMP Images and Its Performance Analysis Using Support Vector Machine”, Communications in Computer and Information Science, vol. 101, pp. 638-640, 2010.

Publisher : Communications in Computer and Information Science

Year : 2010

Payload Estimation in Universal Steganalysis

Cite this Research Publication : P. P. Amritha and Madathil, A., “Payload Estimation in Universal Steganalysis”, Defence Science Journal, vol. 60, p. 412, 2010.

Publisher : Defence Science Journal

Year : 2010

A compressed video steganography using TPVD

Cite this Research Publication : A. P. Sherly and Amritha, P. P., “A compressed video steganography using TPVD”, International Journal of Database Management Systems (IJDMS) Vol, vol. 2, pp. 764–766, 2010.

Publisher : International Journal of Database Management Systems (IJDMS)

Conference Paper

Year : 2014

Multi-Level Steganography for Smart phones

Publisher : Networks Soft Computing (ICNSC), 2014 First International Conference on

Conference Proceedings

Year : 2012

Non linear secret sharing for gray scale images

Cite this Research Publication : A. Nandakumar, Amritha, P. P., Dr. Lakshmy K. V., and Talluri, V. S., “Non linear secret sharing for gray scale images”, Procedia Engineering, vol. 30. Coimbatore, pp. 945-952, 2012.

Publisher : Procedia Engineering

Book Chapter

Year : 2016

Steganalysis of LSB Using Energy Function

Cite this Research Publication : P. P. Amritha, M. Muraleedharan, S., Rajeev, K., and Dr. M. Sethumadhavan, “Steganalysis of LSB Using Energy Function”, in Intelligent Systems Technologies and Applications: Volume 1, S. Berretti, M. Thampi, S., and Srivastava, R. Praveen, Eds. Cham: Springer International Publishing, 2016, pp. 549–558.

Publisher : Intelligent Systems Technologies and Applications.

Year : 2016

Information Hiding in H.264, H.265, and MJPEG

Cite this Research Publication : S. Priya and Amritha, P. P., “Information Hiding in H.264, H.265, and MJPEG”, in Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2, P. L. Suresh and Panigrahi, K. Bijaya, Eds. New Delhi: Springer India, 2016, pp. 479–487.

Publisher : Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015.

Year : 2016

Active Warden Attack on Steganography Using Prewitt Filter

Cite this Research Publication : P. P. Amritha, Induja, K., and Rajeev, K., “Active Warden Attack on Steganography Using Prewitt Filter”, in Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2, P. L. Suresh and Panigrahi, K. Bijaya, Eds. New Delhi: Springer India, 2016, pp. 591–599.

Publisher : Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2, Springer India, Number 398, New Delhi, p.591–599

Year : 2015

Using Signature for Hidden Communication Prevention in IP Telephony

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 2

Year : 2015

A Novel Method for Secure Image Steganography

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1

Year : 2015

A Model for the Effective Steganalysis of VoIP

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 2

Year : 2010

A Novel Approach for Compressed Video Steganography

Publisher : Recent Trends in Network Security and Applications: Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings

Admissions Apply Now