Qualification: 
M.E, BE
deepthilr@am.amrita.edu

Deepthi L. R. serves as Assistant Professor at the Department of Computer Science & Engineering, Amritapuri Campus. She pursued her M. E. in Computer Science & Engineering from Anna University. She has 12 years and 8 months of academic experience.

Publications

Publication Type: Conference Paper

Year of Publication Title

2018

K. M. Venkata Sai, Ramineni, M., Chowdary, M. V., and Deepthi, L. R., “Data Hiding Scheme in Quad Channel Images using Square Block Algorithm”, in 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Bangalore, India, 2018.[Abstract]


Steganography is a process of concealing the important information in a digital media which acts as a cover. A data concealing scheme in color images using both alpha and non-alpha channels is designed and implemented without decreasing the image quality and with minimal distortion. In the designed algorithm, data concealing in images is done using square block algorithm. The secret digits which are obtained in the implementation part of the algorithm are concealed in the cover pixel pairs with the help of reference matrix. Various security measures are calculated and the obtained results are found to be quite promising.

More »»

2017

M. S. Ramya, Soman, P. Sanjana, and Deepthi, L. R., “A novel approach for image security using reversible watermarking”, in 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India, 2017.[Abstract]


In this fast developing world of Internet, securing images is a major security concern in storage and communication. Images are prone to tampering, leakage and attacks. Hence, it is very essential to secure images in the fields of medical science, defense and law enforcement. Cryptographic techniques provide secure transmission of confidential images. Among the security requirements, authentication and confidentiality are the most essential ones. S-DES fulfills the confidentiality requirement and Reversible Watermarking provides the authentication that can retrieve the original image and the watermark. In this paper, the image to be secured is watermarked using a watermark image and then encrypted with S-DES (Simple-Data Encryption Standard) algorithm. This encrypted image is decrypted by applying S-DES decryption first and then removing the watermark. In addition to this, the image security approach confirms the secrecy of the image.

More »»

2017

C. Sudar, Arjun, S. K., and Deepthi, L. R., “Time-based one-time password for Wi-Fi authentication and security”, in 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India, 2017.[Abstract]


In the age of IOT, as more and more devices are getting connected to the internet through wireless networks, a better security infrastructure is required to protect these devices from massive attacks. For long SSIDs and passwords have been used to authenticate and secure Wi-Fi networks. But the SSID and password combination is vulnerable to security exploits like phishing and brute-forcing. In this paper, a completely automated Wi-Fi authentication system is proposed, that generates Time-based One-Time Passwords (TOTP) to secure Wi-Fi networks. This approach aims to black box the process of connecting to a Wi-Fi network for the user and the process of generating periodic secure passwords for the network without human intervention.

More »»

Publication Type: Conference Proceedings

Year of Publication Title

2018

Sarath S. and Deepthi, L. R., “Priority Based Real Time Smart Traffic Control System Using Dynamic Background”, 2018 International Conference on Communication and Signal Processing (ICCSP). IEEE, Chennai, India, pp. 620-622, 2018.[Abstract]


Vehicular traffic is increasing rapidly in this world which is resulting in traffic congestion. The emergency vehicles such as ambulances, fire engines and police vehicles are given equal priority over other vehicles and hence get stuck up in this traffic congestion. A methodology for priority based vehicle detection based on image processing techniques is proposed in this paper. If an emergency vehicle is detected on the road, the lane in which this vehicle is will be given higher priority over all other lanes. The paper proposes an algorithm which will detect whether a vehicle is an emergency one or not.

More »»
Faculty Research Interest: