V. Vaithiyanathan's research while affiliated with SASTRA University and other places

What is this page?


This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.

It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.

If you're a ResearchGate member, you can follow this page to keep up with this author's work.

If you are this author, and you don't want us to display this page anymore, please let us know.

Publications (128)


Super Resolution Image Reconstruction for Bone Images
  • Article

July 2019

·

7 Reads

·

2 Citations

Indian Journal of Science and Technology

S. Kumaravel

·

K. Joseph Abraham Sundar

·

V. Vaithiyanathan
Share



A hybrid (IIHSF-LSM) approach to detect vegetation

November 2017

·

11 Reads

Indian Journal of Geo-Marine Sciences

As the region of interest is only on vegetative cover areas of satellite images, Panchromatic and Multispectral images are scanned for this purpose. A modified method of IHS fusion result is focused to be better in the method of traditional IHS fusion. Here in this study, a combination of improved IHS fusion and Coarse to Fine level segmentation is deployed to identify the vegetation area with less computational complexity and comparatively higher accuracy. © 2017, National Institute of Science Communication and Information Resources (NISCAIR). All rights reserved.


A novel image processing approach for finding the bubble count in neutron dosimeter

October 2017

·

123 Reads

Disaster Advances

B. Thamotharan

·

V. Vaithiyanathan

·

·

[...]

·

S. Venkata Keerthy

The bubble detector is used to detect the amount of neutron and hence used to measure the neutron dose under intense gamma field. It can be used to monitor radioactive exposure. The number of nucleated bubbles yields the neutron dose. Hence the accuracy of the measurement depends on the counting of bubbles. This work proposes an image processing based technique to increase the accuracy in finding the number of bubbles in the bubble detector. It is carried out by using watershed and region growing based segmentation. The image processing segmentation techniques shade the digital image of bubble detector into various segments from which the number of bubbles in the bubble detector is detected.



Figure 1: Reconstruction results of the “EIA” image sequence. a LR image, b wavelet method, c frequency domain method, d kernel regression method and e adaptive normalized convolution method
Figure 4: Reconstruction results of the “Aerial 1” image sequence. a LR image, b wavelet method, c frequency domain method, d kernel regression method and e adaptive normalized convolution method
Figure 5: Reconstruction results of the “Aerial 2” image sequence. a LR image, b wavelet method, c frequency domain method, d kernel regression method and e adaptive normalized convolution method
Multi-frame super-resolution using adaptive normalized convolution
  • Article
  • Publisher preview available

February 2017

·

26 Reads

·

6 Citations

Signal Image and Video Processing

An enhanced fusion algorithm for generating a super-resolution image from a sequence of low-resolution images captured from identical scene apparently a video based on adaptive normalized convolution has been designed and analyzed. The algorithm for fusing the images is based on the supporting structure of normalized convolution. Here the idea is projection of local signals onto a subspace. The adaptive nature of the window function in adaptive normalized convolution helps to gather more samples for processing and increases signal-to-noise ratio, decreases diffusion through discontinuities. The validation of proposed method is done using simulated experiments and real-time experiments. These experimental results are compared with various latest techniques using performance measures like peak signal-to-noise ratio, sharpness index and blind image quality index. In both the cases of experiments, the proposed adaptive normalized convolution-based super-resolution image reconstruction has proved to be highly efficient which is needed for satellite imaging, medical imaging diagnosis, military surveillance, remote sensing, etc.

View access options

A singular perturbation based midcourse guidance law for realistic air-To-Air engagement

January 2017

·

32 Reads

·

1 Citation

Defence Science Journal

In this study, a singular perturbation based technique is used for synthesis and analysis of a near optimal midcourse guidance law for realistic air-To-Air engagement. After designing the proposed midcourse guidance law using three dimensional point mass formulation it has been validated through detailed realistic six degrees of freedom simulation. During terminal phase only proportional navigation guidance have been used. The calculation of optimal altitude in present guidance law has been carried out using Newton's method, which needs generally one iteration for convergence and suitable for real-Time implementation. Extended Kalman filter based estimator has been used for obtaining evader kinetic information from both radar and seeker noisy measurements available during midcourse and terminal guidance. The data link look angle constraint due to hardware limitation which affects the performance of midcourse guidance has also been incorporated in guidance law design. Robustness of complete simulation has been carried out through Monte Carlo studies. Extension of launch boundary due to singular perturbation over proportional navigation guidance at a given altitude for a typical engagement has also been reported.


A Singular Perturbation Based Midcourse Guidance Law for Realistic Air-to-Air Engagement

December 2016

·

268 Reads

·

4 Citations

Defence Science Journal

In this study, a singular perturbation based technique is used for synthesis and analysis of a near optimal midcourse guidance law for realistic air-to-air engagement. After designing the proposed midcourse guidance law using three dimensional point mass formulation it has been validated through detailed realistic six degrees of freedom simulation. During terminal phase only proportional navigation guidance have been used. The calculation of optimal altitude in present guidance law has been carried out using Newton’s method, which needs generally one iteration for convergence and suitable for real-time implementation. Extended Kalman filter based estimator has been used for obtaining evader kinetic information from both radar and seeker noisy measurements available during midcourse and terminal guidance. The data link look angle constraint due to hardware limitation which affects the performance of midcourse guidance has also been incorporated in guidance law design. Robustness of complete simulation has been carried out through Monte Carlo studies. Extension of launch boundary due to singular perturbation over proportional navigation guidance at a given altitude for a typical engagement has also been reported.<br /


Enhancing Security for Data Hiding in Radiographic Images using Burrows Wheeler Transform

December 2016

·

9 Reads

Indian Journal of Science and Technology

Objectives: This paper proposes a new method to enhance security for data hiding in radiographic images through distortion of original data. Method: The process involves applying a Burrows-Wheeler Transform (BWT) to the original data, which groups and stores similar patterns in data, causing distortion. This distorted data is then further encoded in a safe format before hiding it in the cover image. The decoding process decoding from the safe format and applying Inverse Burrows-Wheeler Transform (IBWT) to retrieve the original data from the stego image. Findings: Thus, a 2-level security scheme is implemented. Cryptanalysis of the hidden data becomes difficult since the original data is distorted, thus enhancing the security of the hidden data. Nevertheless, the stego image obtained from this method is less deviated from the original cover image. This is shown from the satisfactory PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) obtained. Application/Improvements: This proposed method can be used wherever steganography or data hiding has its applications. This method can be used in commercial communication, military communication etc.


Citations (47)


... The unique quality of the scene or the uniqueness of the captured image can be used to reduce the ill posedness of the problem. Various such techniques have been proposed, for example in (2) a unique filter is applied on the deblurred images to recover the parts which are in focus and another image is used to recover the portions which are not in focus. Vahid Saffari et al. (3) introduces the novel nonparametric regression technique for the deblurring of blurred and noisy images which depends on the idea of the LPA (Local Polynomial Approximation) of an image with the consideration of Intersecting Confidence Intervals (ICI) which is adapted to characterize a versatile changing parameter i.e., sizes of window in an LPA assessor. ...

Reference:

Adaptive Sparsity through Hybrid Regularization for Effective Image Deblurring
Super Resolution Image Reconstruction for Bone Images
  • Citing Article
  • July 2019

Indian Journal of Science and Technology

... With spatial-domain methods, secret information is embedded in the pixels of the carrier image. Such methods include those that use the LSB of the image [10] and those that use the lower two bits [11]. Using the LSB has a relatively low impact on the pixels among the bit sequences. ...

A combined approach of steganography with LSB encoding technique and DES algorithm
  • Citing Conference Paper
  • February 2017

... 37 Kumar et al. encrypted secret data via chaos and managed to hide data into DCT coefficients of the image. 38 Charan et al. hid data with two leveled encryption method. 39 Secret data were encrypted with ceaser encryption technique and with chaos on the first level and second level, respectively. ...

A Hybrid Approach for Data Hiding Through Chaos Theory and Reversible Integer Mapping
  • Citing Chapter
  • December 2016

... The versatility of this WSNs device, on the one hand, can generate generic applications such as web server, smart home unit, email server, VPN server, DNS server, 3D printers or recreational machines or video game consoles. But, on the other hand, applications for science such as the design and implementation supervisory control and data acquisition of the sedimentation process of water treatment plants [9], automated security modules for text and image steganography [10], surveillance robots [11], text readers for the visually impaired [12], or real time face detection [13]. ...

Stego Pi: An automated security module for text and image steganography using Raspberry Pi
  • Citing Conference Paper
  • May 2016

... When the dynamic equations of motion are simple, the planning may be easy. However, when it is very complicated, simplifications and assumptions such as linear approximations and timescale separation are often used [2][3][4]. Path planning can be understood as a motion planning algorithm for vehicles in two-or three-dimensional space because the time is often not labeled at the positions on the resulting path. The path-planning algorithm provides a reference path for the vehicle to follow, and therefore the reference path is often considered to be given in advance in the path-following algorithm [5,6]. ...

A singular perturbation based midcourse guidance law for realistic air-To-Air engagement
  • Citing Article
  • January 2017

Defence Science Journal

... [6][7][8] GNRFETs are an indispensable development in the advancement of semiconductors since mass CMOS encounters issues in scaling past 32 nm. [9][10] Usage of the graphene prompts extremely interesting arrangement openings. Rich average assortment of setup styles, made possible by free control of GNRFET gate terminal, can be used effectively to diminish supreme unique influence use LP mode circuits give an enabling trade-off among influence and zone. ...

A New Approach for Low Power Decoder for Memory Array
  • Citing Article
  • August 2016

Indian Journal of Science and Technology

... The multi-frame SR method, firstly addressed in [4], often uses a set of LR images taken at the same scene to reconstruct the unknown HR image [5]. By fusing or super-embossing the LR image sequence, a HR image can be reconstructed via the advantage of the additional and complementary information presented in these LR images [6]. ...

Multi-frame super-resolution using adaptive normalized convolution

Signal Image and Video Processing

... In this paper the Arithmet ic coding technique is used to compress the data and hide it in an image which results in a positive response of getting more security [1 6]. Another alternative that can be used is the Rotor ceaser cipher technique to encrypt the message which can be followed by the 2-bit LSB technique using python libraries which g ives a positive result [17]. Another technique to perform a co mbination of cryptography and steganography is to take an image and get its matrix form and perform the Hill cipher algorithm on it and p lace it as a cover image and perform LSB operation to get a stego image wh ich can result in more security and higher capacity [18]. ...

An approach of cryptography and steganography using rotor cipher for secure transmission
  • Citing Conference Paper
  • December 2015

... In this paper, we first implement an improved EDF scheduling algorithm using [4]SSBPF scheduling approach and will measure its performance in terms of packet loss, end to end delay and throughput. Further, we Implement H-EDF scheduling algorithm which is based on [13] heuristic function in the WiMAX environment. To avoid Starvation, the priority of the mobile node subscriber station (SS) is calculated with the help of historical throughput. ...

Improved partitioned queue scheduling in multiprocessor soft real time systems
  • Citing Article
  • January 2013