big data privacy and security

Goals

Protecting critical systems from cyber-attacks and protecting sensitive information from cyber-attacks

Keywords

Threat detection, anomaly detection, intrusion detection, privacy, authentication, confidentiality, and integrity

Publications

Logistic map-based fragile watermarking for pixel level tamper detection and resistance

S Suthaharan

EURASIP Journal on Information Security 2010, 1-7


Fragile image watermarking using a gradient image for improved localization and security

S Suthaharan

Pattern Recognition Letters 25 (16), 1893-1903


A Gradient image dependent fragile watermarking for improved security and localization

S Suthaharan, SW Kim

IEEE SoutheastCon, 2004. Proceedings., 343-348


An entropy masking model for multimedia content watermarking

SW Kim, S Suthaharan

37th Annual Hawaii International Conference on System Sciences, 2004 …


Motion Entropy Masking for Perceptually Tuned Robust Watermarking of H. 264 Video over DAB IP Networks

HS Sung, SW Kim, S Suthaharan

Proceedings of the Korean Institute of Communication Sciences Conference …


Perceptually tuned robust watermarking scheme for digital images

S Suthaharan, SW Kim, HK Lee, S Sathananthan

Pattern Recognition Letters 21 (2), 145-149


Perceptually tuned video watermarking scheme using motion entropy masking

S Suthaharan, SW Kim, S Sathananthan, HK Lee, KR Rao

Proceedings of IEEE. IEEE Region 10 Conference. TENCON 99.'Multimedia …


Perceptually tuned robust watermarking scheme for digital video using motion entropy masking

SW Kim, S Suthaharan, HK Lee, KR Rao

1999 Digest of Technical Papers. International Conference on Consumer …


Image watermarking scheme using visual model and BN distribution

SW Kim, S Suthaharan, HK Lee, KR Rao

Electronics letters 35 (3), 212-214


Improving the Performance of Computer Systems that Hide Information In Audio Signal from Specific Musical Genres

T Wendell, S Suthaharan (Advisor)


An analysis of a sparse linearization attack on the advanced encryption standard. 2006

Stephanie D. Rednour, S Suthaharan (Advisor)


System and a method for securing information

S Suthaharan

US Patent App. 11/759,457


Calculating a Cryptographic Primitive: Suitable for Wireless Sensor Networks

S Suthaharan

2008 Australasian Telecommunication Networks and Applications Conference, 51-56


Chaos-based image encryption scheme using Galois field for fast and secure transmission

S Suthaharan

Real-Time Image Processing 2008 vol. 6811, p. 681105