Back close

Dr. Aditya Kumar Sahu

Associate Professor, School of Computing, Amaravati

Qualification: B. Tech., M.Tech., Ph.D
s_adityakumar@av.amrita.edu
Google Scholar Profile
ResearchGate Profile
Scopus Author ID
Research Interest: Multimedia Forensics, Digital Image Watermarking, Image Tamper Detection and Localization, Image Steganography, Reversible Data Hiding, Convolution Neural Network based Data hiding, Deepfake Detection, Information Security and Image Processing

Bio

Dr. Aditya Kumar Sahu currently working as an Associate Professor at Amrita School of Computing, Amaravati. Andhra Pradesh, India. He is working in the research areas of Multimedia Forensics, Digital Image Watermarking, Image Tamper Detection and Localization, Image Steganography, Reversible Data Hiding, Convolution Neural Network based Data hiding, Deepfake detection, Information Security and Image Processing.

Dr. Sahu got Listed in the World’s Top 2% Scientists 2021 by Elsevier and Stanford University. One of his articles has received ‘Excellent Citation Award’ from International Journal of Intelligent Engineering and Systems (IJIES). Dr. Sahu has completed Ph. D. in the area of Digital Image Steganography and Steganalysis in 2020. He received M. Tech. and B. Tech. in 2011 and 2007, respectively. He has more than 14 years of teaching and research experience.

Publications

Journal Article

Year : 2023

Latest Trends in Deep Learning Techniques for Image Steganography

Cite this Research Publication : V Kumar, S Sharma, C Kumar, A K Sahu, "Latest Trends in Deep Learning Techniques for Image Steganography," International Journal of Digital Crime and Forensics (IJDCF), IGI, 15 (1), 1-14, DOI: 10.4018/IJDCF.318666, 2023.

Year : 2023

A Study on Content Tampering in Multimedia Watermarking

Cite this Research Publication : Aditya Kumar Sahu, Krishnan Umachandran, Vaishali D. Biradar, Olebara Comfort, V. Sri Vigna Hema, Frank Odimegwu & Saifullah M. A., "A Study on Content Tampering in Multimedia Watermarking," SN Computer Science, Springer, 4(3), 2023, 1-11.

Publisher : Springer

Year : 2023

Secure reversible data hiding using block-wise histogram shifting

Cite this Research Publication : S. Kamil, M. Sahu, Raghunadan K , A K Sahu, "Secure reversible data hiding using block-wise histogram shifting", Electronics, 12(5), 1222, 2023,. (Indexed in SCIE (IF: 2.6), Q2). DOI: https://doi.org/10.3390/electronics12051222

Year : 2023

Local-Ternary-Pattern-Based Associated Histogram Equalization Technique for Cervical Cancer Detection

Cite this Research Publication : S. Srinivasan, A. Karuppanan, S. Mathivanan, P. Jayagopal, JC. Babu, A. K. Sahu, "Local-Ternary-Pattern-Based Associated Histogram Equalization Technique for Cervical Cancer Detection," Diagnostics. 13 (3). 548-555, 2023, DOI: 10.3390/diagnostics13030548

Year : 2023

Chaotic-Map Based Encryption for 3D Point and 3D Mesh Fog Data in Edge Computing

Cite this Research Publication : K. R Raghunandan, R. Dodmane, K. Bhavya, K. Rao, A. K. Sahu, "Chaotic-Map Based Encryption for 3D Point and 3D Mesh Fog Data in Edge Computing", IEEE Access, Volume: 11, 3545 - 3554, DOI: 10.1109/ACCESS.2022.3232461, 2023

Publisher : IEEE Access

Year : 2023

Dual image-based reversible fragile watermarking scheme for tamper detection and localization

Cite this Research Publication : Sahu, A.K., Sahu, M., Pramoda Patro, Gupteswar Sahu & Soumya Ranjan Nayak, "Dual image-based reversible fragile watermarking scheme for tamper detection and localization," Pattern Analysis and Application, 26, pages 571–590 (2023). DOI: https://doi.org/10.1007/s10044-022-01104-0

Year : 2022

Data Hiding using PVD and improving security using RSA

Cite this Research Publication : J. Hemalatha, K. Kamatchi, A. K. Sahu, "Data Hiding using PVD and improving security using RSA", Journal of Applied Security Research, Tayler & Francis (T&F), Volume 17, Issue 3, 2022. DOI: https://doi.org/10.1080/19361610.2021.1900692

Publisher : Tayler & Francis (T&F)

Year : 2022

False-Positive-Free SVD Based Audio Watermarking with Integer Wavelet Transform

Cite this Research Publication : N. V. Lalitha, G. Suresh, D. P. Gangwar; A K Sahu, "False-Positive-Free SVD based audio watermarking with integer wavelet transform", Circuits, Systems & Signal Processing, Springer, 41, 5108–5133, 2022.

Year : 2022

Local binary pattern based reversible data hiding

Cite this Research Publication : M. Sahu, N. M. Padhy, S.S. Gantayat, A. K. Sahu, "Local binary pattern based reversible data hiding," CAAI Transactions on Intelligence Technology, John Wiley & Sons Inc., Volume 7, Issue 4, Pages 695-709 2022. DOI: https://doi.org/10.1049/cit2.12130

Publisher : John Wiley & Sons Inc

Year : 2022

High Fidelity based Reversible Data Hiding using Modified LSB Matching and Pixel Difference

Cite this Research Publication : A. K. Sahu, G. Swain, "High Fidelity based Reversible Data Hiding using Modified LSB Matching and Pixel Difference", Journal of King Saud University-Computer and Information Sciences, Elsevier, Volume 34, Issue 4, April 2022, Pages 1395-1409, https://doi.org/10.1016/j.jksuci.2019.07.004.

Year : 2022

A logistic map based blind and fragile watermarking for tamper detection and localization in images

Cite this Research Publication : A. K. Sahu, "A logistic map based blind and fragile watermarking for tamper detection and localization in images", Journal of Ambient Intelligence and Humanized Computing, Springer, 13, 869–3881, 2021.

Year : 2022

Improving grayscale steganography to protect personal information disclosure within hotel services

Cite this Research Publication : A. K. Sahu, A. Gutub, "Improving grayscale steganography to protect personal information disclosure within hotel services", Multimedia Tools and Applications, 81, 30663 - 30683, 2022.

Publisher : Springer

Year : 2022

Logistic-map based fragile image watermarking scheme for tamper detection and localization

Cite this Research Publication : A K Sahu, M. Hassaballah, S Routhu, G Suresh, "Logistic-map based fragile image watermarking schema for tamper detection and localization", Multimedia Tools and Applications, 2022. https://doi.org/10.1007/s11042-022-13630-4

Year : 2021

Shadow Image Based Reversible Data Hiding Using Addition and Subtraction Logic on the LSB Planes

Cite this Research Publication : M. Sahu, N. Padhy, S. S. Gantayat, A. K. Sahu, "Shadow Image Based Reversible Data Hiding Using Addition and Subtraction Logic on the LSB Planes," Sensing and Imaging, Springer, 22:7, 2021.

Year : 2021

Multi-directional Block based PVD and Modulus Function Image Steganography to avoid FOBP and IEP

Cite this Research Publication : A. K. Sahu, G. Swain, Monalisa Sahu, J Hemalatha, "Multi-directional Block based PVD and Modulus Function Image Steganography to avoid FOBP and IEP", Journal of Information Security and Applications, Elsevier, 58, 102808, 2021. DOI: https://doi.org/10.1016/j.jisa.2021.102808

Publisher : Elsevier

Year : 2020

Reversible Image Steganography using dual-layer LSB matching

Cite this Research Publication : A. K. Sahu, G. Swain, "Reversible Image Steganography using dual-layer LSB matching", Sensing and Imaging, 21: 1. Springer, 2020.

Year : 2020

Digital Image Steganography and Steganalysis: A Journey of the Past Three Decades

Cite this Research Publication : A. K. Sahu and M. Sahu, "Digital Image Steganography and Steganalysis: A Journey of the Past Three Decades," September, Open Computer Science, Degruyter, 10, 1-47, DOI: https://doi.org/10.1515/comp-2020-0136, 2020

Year : 2019

Dual Stego-imaging based Reversible Data Hiding using Improved LSB Matching

Cite this Research Publication : A. K. Sahu, G. Swain, "Dual Stego-imaging based Reversible Data Hiding using Improved LSB Matching", International Journal of Intelligent Engineering and Systems, 12(5), 63-73, 2019. DOI: 10.22266/ijies2019.1031.0

Year : 2019

Digital Image Steganography using PVD and Modulo Operation

Cite this Research Publication : A. K. Sahu, G. Swain, "Digital Image Steganography using PVD and Modulo Operation", Internetworking Indonesian Journal. 10(2), 3-13, 2019

Year : 2019

Data hiding using adaptive LSB and PVD technique resisting PDH and RS-analysis

Cite this Research Publication : A. K. Sahu, G. Swain, "Data hiding using adaptive LSB and PVD technique resisting PDH and RS-analysis," International Journal of Electronic Security and Digital Forensics, Inderscience, 11(4), 458-476, 2019.

Year : 2019

A Novel Multi Stego-Image based Data Hiding Method for Gray Scale Image

Cite this Research Publication : A. K. Sahu, G. Swain, "A Novel Multi Stego-Image based Data Hiding Method for Gray Scale Image," Pertanika Journal of Science & Technology, 27(2), 753-768, 2019

Year : 2019

A Novel n-Rightmost Bit Replacement Image Steganography Technique

Cite this Research Publication : A. K. Sahu, G. Swain, "A novel n-rightmost bit replacement image steganography technique," 3D Research, Springer, 10(1), 1-18, 2019.

Year : 2019

An Optimal Information Hiding Approach Based on Pixel Value Differencing and Modulus Function

Cite this Research Publication : A. K. Sahu, G. Swain, "An optimal information hiding approach based on pixel value differencing and modulus function", Wireless Personal Communications, Springer, 108(1), 159-174, 2019.

Year : 2018

Digital Image Steganography Using Bit Flipping

Cite this Research Publication : A. K. Sahu, G. Swain, E. S. Babu, "Digital Image Steganography Using Bit Flipping", Cybernetics and Information Technologies, Degruyter. 18(1), 69-80, 2018.

Year : 2018

An Improved Data Hiding Technique Using Bit Differencing and LSB Matching

Cite this Research Publication : A. K. Sahu, G. Swain, "An Improved Data Hiding Technique Using Bit Differencing and LSB Matching," Internetworking Indonesian Journal, 10(1), 17-21, 2018.

Year : 2018

Pixel Overlapping Image Steganography using PVD and Modulus Function

Cite this Research Publication : A. K. Sahu, G. Swain, "Pixel Overlapping Image Steganography using PVD and Modulus Function," 3D Research, Springer, 9(3), 1-14, 2018.

Publisher : Springer

Year : 2017

Digital Image Steganography Techniques in Spatial Domain: A Study

Cite this Research Publication : A. K. Sahu and M. Sahu, "Digital Image Steganography Techniques in Spatial Domain: A Study", International Journal of Pharmacy and Technology (IJPT), 8(4), 5205-5217, 2016.

Year : 2017

An Improved Information Hiding Method Using Group of Bits Substitution

Cite this Research Publication : A. K. Sahu, G. Swain, "An Improved Information Hiding Method Using Group of Bits Substitution," International Journal on Communications Antenna and Propagation (IRECAP), 7(2). 162-167, 2017.

Year : 2016

Performance Evaluation of Energy Efficient Power Models for Digital Cloud

Cite this Research Publication : S. R. Jena, V. V. Raja and A K Sahu, "Performance Evaluation of Energy Efficient Power Models for Digital Cloud", Indian Journal of Science and Technology (IJST), 9(48), Pg 1-7, DOI: 10.17485/ijst/2016/v9i48/105639, 2016.

Year : 2016

A review on LSB substitution and PVD based image steganography techniques

Cite this Research Publication : A. K. Sahu, G. Swain, "A review on LSB substitution and PVD based image steganography techniques," Indonesian Journal of Electrical Engineering and Computer Science, 2(3), 712-719, 2016.

Conference Paper

Year : 2022

Machine Learning-Based Method for Recognition of Paddy Leaf Diseases

Cite this Research Publication : G. Suresh, N.V. Lalitha, A. K. Sahu (2022), "Machine Learning-Based Method for Recognition of Paddy Leaf Diseases," In Proceedings of the International Conference on Computational Intelligence and Sustainable Technologies. Algorithms for Intelligent Systems.

Year : 2022

Performance analysis of image steganography techniques

Cite this Research Publication : M. Sahu, N. Padhy, S. S. Gantayat, A. K. Sahu (2022), "Performance analysis of image steganography techniques," Second International Conference on Computer Science, Engineering and Applications, IEEE conference

Publisher : IEEE

Year : 2016

Performance Evaluation Parameters of Image Steganography Techniques

Cite this Research Publication : Pradhan, A. K. Sahu, G. Swain, K. R. Sekhar. "Performance Evaluation Parameters of Image Steganography Techniques," 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS), IEEE digital explore, Bangalore, 2016, 1-8.

Year : 2012

Framework for cyber security

Cite this Research Publication : A. K. Sahu and M. Sahu, "Framework for cyber security," Proceedings of National Conference by Sambalpur University on ATCIT, Sambalpur University, Odisha, India, 2013. 51-53.

Year : 2012

Vertical partitioning algorithm

Cite this Research Publication : A. K. Sahu, M. Sahu and J. Mondal, "Vertical partitioning algorithm," Proceedings of International Conference on Advanced Computer Science and Information Technology (ACSIT), IT Research India, Vizag, 2012, 18-20.

Year : 2012

A web mining approach for hotel recommendation

Cite this Research Publication : A. K. Sahu and M. Sahu, L. Swain. "A web mining approach for hotel recommendation," Proceedings of International Conference on electrical, Electronics, and Computer science by IRD, India, Bhubaneswar, 2012. 15-21.

Year : 2012

Data mining techniques

Cite this Research Publication : A. K. Sahu and M. Sahu, "Data mining techniques", Proceedings of National Conference Advances in communication, navigation & Computer networks (ACNCN-2012) by IEEE Hyderabad section, Andhra University, Visakhapatnam 2012, India, 47-49.

Year : 2011

Online Hotel Accommodation using Hybrid Recommender System

Cite this Research Publication : A. K. Sahu and A. K Panda, "Online Hotel Accommodation using Hybrid Recommender System," 2011 Proceedings of the joint International Conference on SEMCCO & FANCCO 2011, Vol 3, 53-56.

Book Chapter

Year : 2020

An improved LSB and PVD based method for high hiding capacity and avoiding fall off boundary problem

Cite this Research Publication : A. K. Sahu, G. Swain, "An improved LSB and PVD based method for high hiding capacity and avoiding fall off boundary problem". Elsevier Book Chapter, DMS 2020.

Publisher : Elsevier

Workshop Attended
  1. Name: QIP, AICTE Sponsored Short-Term Course on Multimedia Communication
    Duration: 1 week (from 20th October 2010 to 26th October 2010. Venue: Indian Institute of Technology (IIT), Guwahati.
  2. Name: QIP Workshop on cloud computing & Green computing.
    Duration: 3 days (from 19th January 2012 to 22nd January 2012.
    Venue: Indian Institute of Technology (IIT), Guwahati.
  3. Participated in the faculty development program (FDP) ‘WIPRO MISSION 10X’
    Duration: April 17-21, 2012.
    Venue: MITS, Rayagada. Odisha
Research Talk Delivered
  1. Delivered a research talk on “One-Week FDP on A-Z of Writing & Publication in Scopus- indexed Journals conducted by Dept. of BS&H, GMRIT on 21st August
  2. Delivered a research talk on “Writing a good research paper” conducted by Deep brain club of ML, ICB&M college of engineering, Nande, Pune on 27st August
Membership

Membership of Professional Bodies

Society Membership Detail Membership Number
Computer Society of India Life Membership 01503837
Awards
  1. Listed in the world’s top 2% scientists 2021 by Elsevier and Stanford
  2. Received ‘Excellent Citation Award’ for the article “Dual Stego-imaging based Reversible Data Hiding using Improved LSB Matching” from International Journal of Intelligent Engineering and Systems (IJIES).
  3. Received best paper award by Proceedings of International Conference on Electrical, Electronics, and Computer Science by IRD, India.
Reviewer and Editorial of Journals

Associate Editor

  1. Associate Editor in Journal of Electronic Imaging, SPIE
  2. Section Board Member of the Journal ‘Computer’, MDPI
  3. Associate Editor, Journal of Information Processing Systems (JIPS)

Reviewer

  1. IEEE Transactions on Network Science and Engineering, IEEE Transactions
  2. Transactions on Dependable and Secure Computing, IEEE Transactions
  3. IEEE Transactions    on   Circuits    and   Systems    for   Video   Technology,    IEEE Transactions
  4. IEEE Access, IEEE
  5. Signal Processing: Image Communication, Elsevier
  6. Computer Science Review, Elsevier
  7. Neurocomputing, Elsevier
  8. Journal of Information Security and Applications, Elsevier
  9. Computers and Electronics in Agriculture, Elsevier
  10. Journal of king saud university – computer and information sciences, Elsevier
  11. Egyptian Informatics Journal, Elsevier
  12. Computers and Electronics in Agriculture, Elsevier
  13. Signal Processing, Elsevier
  14. IET image processing, Willy
  15. Security and Privacy, Willy
  16. Transactions on Emerging Telecommunications Technologies, Willy
  17. Concurrency and Computation: Practice and Experience, Willy
  18. Arabian Journal for Science and Engineering (AJSE), Springer
  19. Wireless Personal Communications, Springer
  20. SN Applied Sciences, Springer
  21. Security and Communication Networks, Hindawi
  22. Advances in Multimedia, Hindawi
  23. Computational Intelligence and Neuroscience, Hindawi
  24. IETE Technical Review, Taylor and Francis
  25. Information Security Journal: A Global Perspective, Taylor and Francis
  26. Cogent Engineering, Taylor and Francis
  27. Plus One
  28. CMC-Computers, Materials & Continua
  29. Information Technology and Control
  30. Cryptography, MDPI
  31. Symmetry, MDPI
  32. Algorithms, MDPI
  33. Mathematics, MDPI
  34. Applied Science, MDPI
  35. Entropy, MDPI
  36. Sustainability, MDPI
  37. Electronics, MDPI
  38. Information, MDPI
  39. Imaging, MDPI
  40. International Journal of Digital Crime and Forensics (IJDCF), IGI Global
  41. Journal of Engineering Science & Technology
  42. Journal of Food Process Engineering
  43. EMaTTech Journals
  44. Journal of Engineering Research
  45. Advances in Science, Technology and Engineering Systems
  46. Applied Computing and Informatics
  47. Journal of Engineering Science & Technology
  48. J. of Medical Engineering and Informatics (IJMEI), Inderscience
  49. Journal of Computer Science
  50. Journal of Engineering Research and Sciences
Admissions Apply Now