Back close

Dr. M. Sethumadhavan

Head - Cybersecurity, TIFAC CORE in Cyber Security, Coimbatore | Professor, School of Computing, Coimbatore | Professor, Mathematics, School of Engineering, Coimbatore

Qualification: Ph.D
m_sethu@cb.amrita.edu
Dr. M. Sethumadhavan's Google Scholar Profile
Research Interest: Cryptology, Number Theory

Bio

Prof. M. Sethumadhavan (born in 1966) is the Head of TIFAC-Centre of Relevance and Excellence in Cyber Security, an R&D centre at Amrita Vishwa Vidyapeetham Coimbatore campus since its inception in the year 2005. He leads the R&D that focuses on the areas of cyber security such as Cryptology, Post Quantum Cryptography, Steganalysis, Secure Coding, Computer Network Security, Digital Forensics etc. A central focus of his work has been to create innovative educational and research programs and develop world-class expertise in Cyber Security as the underlying vision.

TIFAC-CORE in Cyber Security at Amrita is a collaborative alliance of academic and industrial partners. The TIFAC-CORE in Cyber Security gives significant thrust to the frontier areas of Cyber Security, including technology, practice, management, and policy issues.

Prof. Sethumadhavan is the Principal Investigator of several Cyber Security Research projects funded by organizations such as Indian Space Research Organization (ISRO), Defence Research and Development Organization (DRDO), National Technical Research Organization (NTRO), Department of Science & Technology, Ministry of Electronics and Information Technology, Govt. of India, and recently from National Security Council Secretariat, Govt. of India. Total amount of the research grant received is Rupees Ten Crores.

Some of his latest research papers appeared in journals like IET Information Security, Discrete Applied Mathematics and Journal of Mathematical Cryptology. He has 40 research publications to his credit, guided six Ph.D. students and is currently guiding seven students.

 

Publications

Journal Article

Year : 2020

Finite-state model extraction and visualization from Java program execution

Cite this Research Publication : K.P. Jevitha, J. Swaminathan, B. Jayaraman, M. Sethumadhavan, “Finite-state model extraction and visualization from Java program execution”, Software: Practice and Experience, vol. 51, pp. 409-437, 2021. DOI: https://doi.org/10.1002/spe.2910

Publisher : Wiley

Year : 2018

A Selective Generation of Hybrid Random Numbers via Android Smart Phones

Cite this Research Publication : Ashok Kumar Mohan, Dr. Nirmala Devi M., Dr. M. Sethumadhavan, and Santhya R, “A Selective Generation of Hybrid Random Numbers via Android Smart Phones”, International Journal of Pure and Applied Mathematics, vol. 118, no. 8, pp. 311-317, 2018.

Publisher : International Journal of Pure and Applied Mathematics

Year : 2018

Partial Password Authentication using Vector Decomposition

Cite this Research Publication : I. Praveen and Dr. M. Sethumadhavan, “Partial Password Authentication using Vector Decomposition”, International Journal of Pure and Applied Mathematics, vol. 118, pp. 381-385, 2018.

Publisher : International Journal of Pure and Applied Mathematics

Year : 2018

The Art of Piecewise Hashing: A step toward better evidence provability

Cite this Research Publication : A. Gopalakrishnan, Vineti, E., Ashok Kumar Mohan, and Dr. M. Sethumadhavan, “The Art of Piecewise Hashing: A step toward better evidence provability”, Journal of Cyber Security and Mobility, vol. 7, pp. 109-130, 2018.

Publisher : Journal of Cyber Security and Mobility

Year : 2017

Wireless Security Auditing: Attack Vectors and Mitigation Strategies

Cite this Research Publication : Ashok Kumar Mohan, Dr. M. Sethumadhavan, and A, A. Devi, “Wireless Security Auditing: Attack Vectors and Mitigation Strategies”, Procedia Computer Science, vol. 115, pp. 674–682, 2017.

Publisher : Procedia Computer Science

Year : 2017

Opaque Predicate Detection by Static Analysis of Binary Executables

Cite this Research Publication : R. K. R. Prakash, Amritha, P. P., and Sethumadhavan, M., “Opaque Predicate Detection by Static Analysis of Binary Executables”, Communications in Computer and Information Science, vol. 746, pp. 250-258, 2017.

Publisher : Communications in Computer and Information Science

Year : 2017

An Android Application for Secret Image Sharing with Cloud Storage

Cite this Research Publication : K. Praveen, Indu, G., Santhya, R., and Sethumadhavan, M., “An Android Application for Secret Image Sharing with Cloud Storage”, Communications in Computer and Information Science, vol. 746, pp. 399-410, 2017.

Publisher : Communications in Computer and Information Science

Year : 2017

Active steganalysis on svd-based embedding algorithm

Cite this Research Publication : P. P. Amritha, Ravi, R. P., and Dr. M. Sethumadhavan, “Active steganalysis on svd-based embedding algorithm”, Advances in Intelligent Systems and Computing, vol. 515, pp. 777-785, 2017.

Publisher : Advances in Intelligent Systems and Computing

Year : 2016

On the removal of steganographic content from images

Cite this Research Publication : P. P. Amritha, Sethumadhavan, M., and Krishnan, R., “On the removal of steganographic content from images”, Defence Science Journal, vol. 66, 6 vol., pp. 574-581, 2016.

Publisher : Defence Science Journal, Defense Scientific Information and Documentation Centre, Volume 66, Number 6, p.574-581.

Year : 2016

Hash-One: a lightweight cryptographic hash function

Cite this Research Publication : Dr. M. Sethumadhavan, ,, Megha, P., Dr. Sindhu M., and Dr. Srinivasan C., “Hash-One: a lightweight cryptographic hash function”, IET Information Security, vol. 10, no. 5, pp. 225-231(6), 2016.

Publisher : IET Information Security, Institution of Engineering and Technology.

Year : 2016

Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation

Cite this Research Publication : M. James, Srinivasan, C., K.V., L., and Sethumadhavan, M., “Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation”, in Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015, M. Senthilkumar, Ramasamy, V., Sheen, S., Veeramani, C., Bonato, A., and Batten, L., Eds. Singapore: Springer Singapore, 2016, pp. 385–392.

Publisher : Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015

Year : 2015

Cube Attack on Stream Ciphers using a Modified Linearity Test

Cite this Research Publication : Dr. Srinivasan C., Pillai, U. U., K.V., L., and Dr. M. Sethumadhavan, “Cube Attack on Stream Ciphers using a Modified Linearity Test”, Journal of Discrete Mathematical Sciences and Cryptography, vol. 18, pp. 301-311, 2015.

Publisher : Journal of Discrete Mathematical Sciences and Cryptography, Taru Publications

Year : 2014

A Framework for Analyzing the Security of Chrome Extensions

Publisher : Advanced Computing, Networking and Informatics- Volume 2 (pp. 267-272). Springer International Publishing.

Year : 2014

Counting rotation symmetric functions using Polyas theorem

Publisher : Discrete Applied Mathematics,

Year : 2014

On the k-error Joint Linear Complex- ity and Error Multisequence over Fq (charFq = p; prime)

Publisher : Recent Trends in Computer Networks and Distributed Systems Security (pp. 512-519). Springer Berlin Heidelberg.

Year : 2014

On the k-error Joint Linear Complexity and Error Multisequence over F

Cite this Research Publication : M. Sindhu and Dr. M. Sethumadhavan, “On the k-error Joint Linear Complexity and Error Multisequence over F”, Communications in Computer and Information Science, vol. 420 CCIS, pp. 512-519, 2014.

Publisher : Communications in Computer and Information Science

Year : 2014

Counting rotation symmetric functions using Polya’s theorem

Cite this Research Publication : L. K.V., Dr. M. Sethumadhavan, and Cusick, T. W., “Counting rotation symmetric functions using Polya’s theorem”, Discrete Applied Mathematics, vol. 169, pp. 162 - 167, 2014.

Publisher : Discrete Applied Mathematics

Year : 2014

Biometric Authentication via Facial Recognition

Cite this Research Publication : K. Nimmy and Dr. M. Sethumadhavan, “Biometric Authentication via Facial Recognition”, 2014.

Publisher : (2014)

Year : 2013

Linear Complexity Measures of Binary Multi-sequences

Publisher : International Journal of Computer Applications, 62(16), (pp. 6-10).

Year : 2013

An Application of Vector Decom- position Problem in Public Key Cryptography Using Homomorphic Encryption

Publisher : proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications - ERICA 2013 (pp. 328-331).

Year : 2013

Linear Complexity Measures of Binary Multisequences

Cite this Research Publication : Dr. Sindhu M. and Dr. M. Sethumadhavan, “Linear Complexity Measures of Binary Multisequences”, International Journal of Computer Applications, vol. 62, 2013.

Publisher : International Journal of Computer Applications

Year : 2012

A more ecient and faster pairing computation with cryptographic security

Publisher : Proceedings of the first international conference on security of internet of things

Year : 2012

Measuring diffusion in stream ciphers using statistical testing methods

Cite this Research Publication : Dr. Srinivasan C., K.V., L., and Dr. M. Sethumadhavan, “Measuring diffusion in stream ciphers using statistical testing methods”, Defence Science Journal, vol. 62, pp. 6-10, 2012.

Publisher : Defence Science Journal

Year : 2011

Error Linear Complexity Measures of Binary Multisequences

Cite this Research Publication : Dr. Sindhu M. and Dr. M. Sethumadhavan, “Error Linear Complexity Measures of Binary Multisequences”, 2011.

Year : 2010

Fuzzy Support Vector Machine-based Multi-agent Optimal Path Planning Approach to Robotics Environment.

Cite this Research Publication : Dr. Gireesh K. T., Poornaselvan, K. J., and Dr. M. Sethumadhavan, “Fuzzy Support Vector Machine-based Multi-agent Optimal Path Planning Approach to Robotics Environment.”, Defence Science Journal, vol. 60, no. 4, pp. 387-391, 2010.

Publisher : Defence Science Journal

Year : 2008

An algorithm for k-error joint linear complexity of binary multisequences

Cite this Research Publication : Dr. M. Sethumadhavan, Dr. Sindhu M., Dr. Srinivasan C., and Kavitha, C., “An algorithm for k-error joint linear complexity of binary multisequences”, Journal of Discrete Mathematical Sciences and Cryptography, vol. 11, pp. 297-304, 2008.

Publisher : Journal of Discrete Mathematical Sciences and Cryptography

Year : 2006

Sequences; Predictability and Linear Complexity Measures

Cite this Research Publication : Dr. M. Sethumadhavan, “Sequences; Predictability and Linear Complexity Measures”, Discrete Mathematics and Its Applications, p. 104, 2006.

Publisher : Discrete Mathematics and Its Applications

Conference Paper

Year : 2017

Active Steganalysis on SVDBased Embedding Algorithm

Publisher : Proceedings of the 5th International Conference on Frontiers in Intelligent Computing

Year : 2017

Survey of consensus protocols on blockchain applications

Cite this Research Publication : L. S. Sankar, Sindhu, M., and Sethumadhavan, M., “Survey of consensus protocols on blockchain applications”, in 2017 4th International Conference on Advanced Computing and Communication Systems, ICACCS 2017, 2017.

Publisher : 2017 4th International Conference on Advanced Computing and Communication Systems, ICACCS 2017

Year : 2017

Sum Chain Based Approach against Session Hijacking in MPTCP

Cite this Research Publication : A. V. Krishnan, Amritha, P. P., and Sethumadhavan, M., “Sum Chain Based Approach against Session Hijacking in MPTCP”, in Procedia Computer Science, 2017, vol. 115, pp. 794-803.

Publisher : Procedia Computer Science

Year : 2014

Novel mutual authentication protocol for cloud computing using secret sharing and steganography

Cite this Research Publication : K. Nimmy and Dr. M. Sethumadhavan, “Novel mutual authentication protocol for cloud computing using secret sharing and steganography”, The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014), 2014, pp. 101-106, doi: 10.1109/ICADIWT.2014.6814685.

Publisher : IEEE Xplore

Year : 2012

Reconciliation engine and metric for network vulnerability assessment

Cite this Research Publication : H. Va Nath, Gangadharan, Kb, and Dr. M. Sethumadhavan, “Reconciliation engine and metric for network vulnerability assessment”, in ACM International Conference Proceeding Series, Kerala, 2012, pp. 9-21.

Publisher : ACM International Conference Proceeding Series

Year : 2012

A More Efficient and Faster Pairing Computation with Cryptographic Security

Cite this Research Publication : I. Praveen and Dr. M. Sethumadhavan, “A More Efficient and Faster Pairing Computation with Cryptographic Security”, in Proceedings of the First International Conference on Security of Internet of Things, New York, NY, USA, 2012, pp. 145-149.

Publisher : Proceedings of the First International Conference on Security of Internet of Things

Conference Proceedings

Year : 2016

Ideal Contrast Visual Cryptography for General Access Structures with AND Operation.

Cite this Research Publication : K. Praveen and Dr. M. Sethumadhavan, “Ideal Contrast Visual Cryptography for General Access Structures with AND Operation.”, In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015, vol. 2, 44 vol. Springer India, New Delhi, 2016.

Publisher : In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015, Springer India.

Year : 2014

On the k-error Joint Linear Complexity and Error Multisequence over F q (char F q= p, prime)

Cite this Research Publication : Dr. Sindhu M. and Dr. M. Sethumadhavan, “On the k-error Joint Linear Complexity and Error Multisequence over F q (char F q= p, prime)”, In Recent Trends in Computer Networks and Distributed Systems Security, Springer Berlin Heidelberg. pp. 512-519, 2014.

Publisher : Recent Trends in Computer Networks and Distributed Systems Security, Springer Berlin Heidelberg

Year : 2014

A Framework for Analysing the Security of Chrome Extensions

Cite this Research Publication : V. Aravind and Dr. M. Sethumadhavan, “A Framework for Analysing the Security of Chrome Extensions”, In Advanced Computing, Networking and Informatics, vol. 2. Springer International Publishing, pp. 267-272, 2014.

Publisher : Advanced Computing, Networking and Informatics

Year : 2014

On the Extensions of (k, n)*-Visual Cryptographic Schemes

Cite this Research Publication : K. Praveen, Dr. M. Sethumadhavan, and Rajeev, K., “On the Extensions of (k, n)*-Visual Cryptographic Schemes”, In Recent Trends in Computer Networks and Distributed Systems Security. Springer Berlin Heidelberg, pp. 231-238, 2014.

Publisher : In Recent Trends in Computer Networks and Distributed Systems Security

Year : 2013

An Application of Vector Decomposition problem in Public key Cryptography using homomarphic Encryption

Cite this Research Publication : K. Praveen and Dr. M. Sethumadhavan, “An Application of Vector Decomposition problem in Public key Cryptography using homomarphic Encryption”, International Conference on Emerging Research in Computing Information Communication and Applications. Meenakshi Institute of Technology, Bangalore, 2013.

Publisher : International Conference on Emerging Research in Computing Information Communication and Applications

Book Chapter

Year : 2016

Steganalysis of LSB Using Energy Function

Cite this Research Publication : P. P. Amritha, M. Muraleedharan, S., Rajeev, K., and Dr. M. Sethumadhavan, “Steganalysis of LSB Using Energy Function”, in Intelligent Systems Technologies and Applications: Volume 1, S. Berretti, M. Thampi, S., and Srivastava, R. Praveen, Eds. Cham: Springer International Publishing, 2016, pp. 549–558.

Publisher : Intelligent Systems Technologies and Applications.

Year : 2014

Results on (2, n) Visual Cryptographic Scheme

Cite this Research Publication : K. Praveen and Dr. M. Sethumadhavan, “Results on (2, n) Visual Cryptographic Scheme”, in Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings, J. Lloret Mauri, Thampi, S. M., Rawat, D. B., and Jin, D., Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014, pp. 335–340.

Publisher : Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings

Year : 2014

A Probabilistic Essential Visual Cryptographic Scheme for Plural Secret Images

Cite this Research Publication : K. Praveen and Dr. M. Sethumadhavan, “A Probabilistic Essential Visual Cryptographic Scheme for Plural Secret Images”, in Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on Advanced Computing, Networking and Informatics (ICACNI-2014), M. Kumar Kundu, Mohapatra, P. Durga, Konar, A., and Chakraborty, A., Eds. Cham: Springer International Publishing, 2014, pp. 225–231.

Publisher : Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on Advanced Computing, Networking and Informatics (ICACNI-2014)

Year : 2010

Complexity Measures of Cryptographically Secure Boolean Functions

Cite this Research Publication : Dr. Srinivasan C., K.V., L., and Dr. M. Sethumadhavan, “Complexity Measures of Cryptographically Secure Boolean Functions”, in Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, IGI Global, 2010.

Publisher : Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives

Year : 2008

An algorithm for k-error joint linear complexity of binary multi-sequences

Publisher : Journal of Discrete Mathematical Sciences and Cryptography

Year : 2006

A construction of p-ary balanced sequence with large k-error linear complexity

Cite this Research Publication : Dr. M. Sethumadhavan, C. Lakxmie, Y., and Vijayagovindan, C., “A construction of p-ary balanced sequence with large k-error linear complexity”, Journal of Discrete Mathematical Sciences and Cryptography, vol. 9, pp. 253-261, 2006.

Publisher : Journal of Discrete Mathematical Sciences and Cryptography

Book

Year : 2011

Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives

Cite this Research Publication : Dr. M. Sethumadhavan, Santanam, R., and Virendra, M., Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives. IGI Global , 2011.

Publisher : IGI Global

Year : 2006

Discrete Mathematics and Its Applications

Cite this Research Publication : Dr. M. Sethumadhavan, Discrete Mathematics and Its Applications. Alpha Science Int'l Ltd., 2006.

Publisher : Alpha Science Int'l Ltd

Admissions Apply Now