Qualification: 
M.Tech, B-Tech
Email: 
m_suchithra@cb.amrita.edu

Suchithra M. joined Amrita School of Engineering, Coimbatore in July 2014. She received her B. Tech. degree in Information Technology from Calicut University Institute of Engineering and Technology, Calicut  and M. Tech. degree in Computational Engineering and Networking  from Amrita School of Engineering, Coimbatore. She currently serves as Assistant Professor in the Department of Computer Science and Engineering, School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore Campus. Her areas of interest include Image Processing, Medical imaging and video analysis, Machine Learning, Deep Learning.

Publications

Publication Type: Conference Proceedings

Year of Publication Title

2015

Suchithra M. and Sikha O. K., “A Novel Image Encryption Scheme Using an Irrevocable Multimodal Biometric Key”, Security in Computing and Communications. Springer International Publishing, Cham, 2015.[Abstract]


In today's digital world the use of secret key is inevitable to any secure communication through the network. But human beings feel hard to recollect the lengthy cryptographic key. One solution to this would be the use of biometric characteristics of human beings which are unique in nature, that makes the attacker difficult to guess the key generated from these features. Here we propose a new scheme for multimodal biometric key generation to secure cryptographic communication. Initially, the feature points of fingerprint and iris image are extracted using SLGS feature extraction algorithm followed by which chaotic mechanism is applied to shuffle the feature vectors and finally fused them to produce a single biometric key. In this paper we also present a new image encryption technique using the multimodal biometric key, where we are able to reconstruct the secret image without any pixel quality loss. More »»

2013

Suchithra M., Sukanya, P., Prabha, P., Sikha O. K., Sowmya, and Dr. Soman K. P., “An experimental study on application of orthogonal matching pursuit algorithm for image denoising”, 2013 IEEE International Multi Conference on Automation, Computing, Control, Communication and Compressed Sensing, iMac4s 2013. IEEE, Kochi, Kerala, pp. 729-736, 2013.[Abstract]


Signal or image reconstruction has now become a common task in many applications. According to linear algebra perspective, the number of measurements made or the number of samples taken for reconstruction must be greater than or equal to the dimension of signal or image. Also reconstruction follows the Shanon's sampling theorem which is based on the Nyquist sampling rate. The reconstruction of a signal or image using the principle of compressed sensing is an exception which makes use of only few number of samples which is below the sampling limit. Compressive sensing also known as sparse recovery aims to provide a better data acquisition and reduces computational complexities that occur while solving problems. The main goal of this paper is to provide clear and easy way to understand one of the compressed sensing greedy algorithm called Orthogonal Matching Pursuit (OMP). The OMP algorithm involves the concept of overcomplete dictionary that is formulated based on different thresholding methods. The proposed method gives the simplified approach for image denoising by using OMP only. The experiment is performed on few standard image data set simulated with different types of noises such as Gaussian noise, salt and pepper noise, exponential noise and Poisson noise. The performance of the proposed method is evaluated based on the image quality metric, Peak Signal-to-Noise Ratio (PSNR). © 2013 IEEE.

More »»

2013

P. Sukanya, Suchithra M., Sikha O. K., Prabha, P., and Dr. Soman K. P., “Understanding CDMA in linear algebra point of view and its simulation in Excel”, Proceedings - 2013 IEEE International Multi Conference on Automation, Computing, Control, Communication and Compressed Sensing, iMac4s 2013. Kerala, pp. 78-83, 2013.[Abstract]


Code Division Multiple Access (CDMA) is one of the famous channel access method, mainly used in radio communication technologies. Unfortunately this concept is less understood by the student community due to the lack of understanding the mathematical rules behind it. This paper is intended to provide a linear algebra point of explanation of the concepts behind CDMA. The CDMA concept which was otherwise analyzed in spectral point of view is explained using the orthogonality of the bases. The Microsoft Excel Spread Sheet is used as an aid for the simulation since every one can go deep in to the basic concepts. © 2013 IEEE.

More »»

2012

R. Anand, Prabha, P., Sikha O. K., Suchithra M., Dr. Soman K. P., and Sowmya, “Visualization of OFDM using Microsoft Excel spreadsheet in Linear Algebra Perspective”, International Conference on Advances in Computing and Communications, ICACC 2012. IEEE, Kochi, Kerala, pp. 58-64, 2012.[Abstract]


Orthogonal Frequency Division Multiplexing (OFDM) is one of the leading technology that is ruling the communication field. But unfortunately, it is shrouded in mystery. A good knowledge in Linear Algebra is required to appreciate the technology in a better way. So the work focuses on explaining OFDM system from linear algebra point of view. Also, OFDM model communication system is simulated using Excel which makes ease for anyone experiment with OFDM and understand the underlying principle. The paper aims to provide strong foundation on the concept behind OFDM without the need of having much knowledge in electronics field. © 2012 IEEE.

More »»

2012

P. Prabha, Sikha O. K., Suchithra M., Sukanya, P., Sowmya, and Dr. Soman K. P., “Computation of continuous wavelet transform using microsoft excel spreadsheet”, Proceedings - 2012 International Conference on Advances in Computing and Communications, ICACC 2012. IEEE, Kochi, Kerala, pp. 73-77, 2012.[Abstract]


Wavelet theory has become an essential and significant tool for signal and image processing applied in the analysis of various real time signals. It is thus necessary to include wavelet transform and its application in multifractal analysis as a part of the engineering curriculum. In this paper, we present simple and effective way of computing Continuous Wavelet Transform (CWT) using Microsoft Excel Spreadsheet which serves as an user friendly mathematical tool for beginners. The motivation of this paper is to prove the computational power of excel, using which students can have better understanding of the basic concept behind the computation of Continuous Wavelet Transform. The plot of Continuous Wavelet Transform of Brownian signal computation in Excel is compared with that of the result in the Matlab Toolbox. The singularities present in the signal can be inferred from the wavelet modulus maxima plot. The visual interpretation proves that Excel tool provides computational power comparable to that of the Matlab software. The codes for the implementation of CWT in Excel are available on nlp.amrita.edu:8080/sisp/wavelet/cwt/cwt.xlsm, nlp.amrita.edu:8080/sisp/wavelet/cwt/modmax.xlsm, nlp.amrita.edu:8080/sisp/ wavelet/cwt/thermo.xlsm © 2012 IEEE.

More »»

Publication Type: Journal Article

Year of Publication Title

2015

Suchithra M., Selvakumaran, S., Nambiar, G., Arya, C., and Bharrathi, L. B., “Indian sign language recognition system for asymmetrical hand gestures”, International Journal of Applied Engineering Research, vol. 10, no. 55, pp. 2628 - 2632, 2015.[Abstract]


To provide a means of communication between the audibly challenged people and rest of the world we need a sign language recognition system that would recognize the signs/gestures and convert them into a form which could be understood by the common people. The sign language recognition (SLR) system acts as a sign language translator which would identify a specific set of gestures and map them to their corresponding meaning as text data/audio files. The work mainly includes 3 sections. 1) Segmentation 2) Feature extraction and 3) Classification of gestures. In this research work we have been proposed an efficient method for recognizing the asymmetrical hand gestures in Indian sign language for audibly challenged people. The efficiency of the proposed method is verified on a dataset consisting of 600 images. The results indicates that the proposed system recognize the hand gestures successfully with 97% of recognition rate.

More »»

2015

Suchithra M. and Sikha O. K., “Accelerating the performance of secret sharing algorithm using GPU”, International Journal of Applied Engineering Research, vol. 10, pp. 2921-2925, 2015.[Abstract]


The speed of the computer system is getting down as the complexity of the technology grows. Nowadays the popularity of GPU is getting increased and played an important role to accelerate the performance of the computer system. It maintains the computational efficiency and flexibility effectively compared to the CPU systems. In this work, we exploit the fundamental visual cryptographic algorithm by utilizing the computational power of GPU. Here we focus the parallel implementation of basic (2,2) visual cryptographic and compare the efficiency of execution with traditional CPU system.. This paper mainly emphasizes the strength of GPU. © Research India Publications.

More »»

2014

P. Prabha, Sikha O. K., Suchithra M., and Dr. Soman K. P., “Accelerating the performance of DES on GPU and a visualization tool in Microsoft Excel Spreadsheet”, Advances in Intelligent Systems and Computing, vol. 246, pp. 405-411, 2014.[Abstract]


Graphic processing units (GPU) have attained a greater dimension based on their computational efficiency and flexibility compared to that of classical CPU systems. By utilizing the parallel execution capability of GPU, traditional CPU systems can handle complex computations effectively. In this work, we exploit the parallel structure of GPU and provide an improved parallel implementation for data encryption standard (DES), one of the famous symmetric key cryptosystems. We also developed a visualization tool for DES in Microsoft Excel Spreadsheet which helps the students to understand the primitive operations that constitute the DES cryptosystem clearly. The main objective of this work is to investigate the strength of parallel implementation, on the basis of execution time on GPU as well as on CPU systems. © Springer India 2014. More »»
Faculty Research Interest: