Siva S. Sivatha Sindhu

According to our database1, Siva S. Sivatha Sindhu authored at least 14 papers between 2004 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
A Literature Review on Image Encryption Techniques.
Int. J. Inf. Secur. Priv., 2018

2016
Stego anomaly detection in images exploiting the curvelet higher order statistics using evolutionary support vector machine.
Multim. Tools Appl., 2016

2012
Evolving optimised decision rules for intrusion detection using particle swarm paradigm.
Int. J. Syst. Sci., 2012

Decision tree based light weight intrusion detection using a wrapper approach.
Expert Syst. Appl., 2012

2010
Evolving Clusters for Network Intrusion Detection System Using Genetic-X-Means Algorithm.
Inf. Secur. J. A Glob. Perspect., 2010

Passive steganalysis based on higher order image statistics of curvelet transform.
Int. J. Autom. Comput., 2010

2009
Detection of Stego Anomalies in Images Exploiting the Content Independent Statistical Footprints of the Steganograms.
Informatica (Slovenia), 2009

A neuro-genetic based short-term forecasting framework for network intrusion prediction system.
Int. J. Autom. Comput., 2009

Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system.
Comput. Secur., 2009

High Performance Image Steganalysis Through Stego Sensitive Feature Selection Using MBEGA.
Proceedings of the First International Conference on Networks and Communications, 2009

2008
Close Color Pair Signature ensemble Adaptive Threshold based Steganalsis for LSB Embedding in Digital Images.
Trans. Data Priv., 2008

StegoHunter: Steganalysis of LSB Embedded Images Based on Stego-Sensitive Threshold Close Color Pair Signature.
Proceedings of the Sixth Indian Conference on Computer Vision, Graphics & Image Processing, 2008

2006
An Active Rule Based Approach to Audio Steganalysis with a Genetic Algorithm.
Proceedings of the First IEEE International Conference on Digital Information Management (ICDIM), 2006

2004
Intelligent Multi-agent Based Genetic Fuzzy Ensemble Network Intrusion Detection.
Proceedings of the Neural Information Processing, 11th International Conference, 2004


  Loading...