Premalatha P. currently serves as an Assistant Professor at the department of Electronics and Communication Engineering, Amrita School of Engineering, Coimbatore Campus. She pursued her BE in ECE from PSG cCollege of Technology in 2011 and MTech in Cyber Security from Amrita Vishwa Vidyapeetham in 2013. 


Research Expertise

  • UG Project: Physical layer security in a wireless network


  • Analog Communication
  • Digital Communication
  • Wireless Communication
  • Transmission Lines and radiating systems
  • Radio Frequency Engineering
  • Information and theory coding
  • Signals and systems


Publication Type: Conference Paper
Year of Publication Publication Type Title
2016 Conference Paper S. Anuraj, Premalatha, P., and Gireesh, K. T., “High Speed Network Intrusion Detection System Using FPGA”, in Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015, Volume 1, New Delhi, 2016, pp. 187–194.[Abstract]

Modern Network Intrusion detection needs a high-speed interface to analyze the incoming packet. Several network intrusion detection applications detect multiple strings in the payload of a packet by comparing it against predefined pattern set which requires more memory and computation power. To meet this, a dedicated hardware with high processing capacity can be placed at the port of incoming packets. Field Programmable Gate Array (FPGA) is the choice as it can be programmed easily and dynamically for parallel computing. Moreover, FPGA devices support at high-speed interface and are capable of providing better processing capability than other device; also it can be reprogrammed when it is needed. This paper proposes a new alternative approach to leaf attaching algorithm to improve the memory efficiency of algorithm. More »»
2015 Conference Paper R. Kuriakose and Premalatha, P., “A Novel Method for MP3 Steganalysis”, in Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 1, New Delhi, 2015, pp. 605–611.[Abstract]

Modern communication through digital media is finding traction in our day-to-day life. Steganography plays its role in improving the security of communication by various means. However, all these technologies can also be used with malicious intent. Terrorist organizations have been using steganographic techniques to communicate for a while now. Thus, it is imperative that countermeasures are made to be efficient. Various forms of stego-media are available. Among the available media, digital audio is a very popular carrier for covert communication. Recently, many audio steganalysis methods have been proposed to detect existence of hidden data in stego-media of all formats. In this paper, we look into the analysis of MP3Stego an MP3 steganographic tool. We have considered features such as Markov transition and neighboring joint density. Experimental results show that our approach is successful in discriminating MP3 covers and the steganograms generated using MP3Stego. More »»
Publication Type: Journal Article
Year of Publication Publication Type Title
2014 Journal Article P. Premalatha, Narayanan, K., ,, and , “Steganography in Audio Signals using Variable Bit Replacement Method in DCT Domain”, International Journal of Engineering Research and Technology, vol. 3, no. 4, 2014.[Abstract]

Steganography is the method of concealing a message or image within a media, be it audio, image or video. The purpose is the same as that of cryptography, which is to secure data. But the difference is that in steganography, the sole existence of such a secret message is known only to the sender and receiver of that message. Audio steganography is such a technique of hiding a message within an audio file (known as the cover audio). Lately, lot of novel and versatile Audio Steganographic methods have been proposed. A good audio steganographic technique not only intends at embedding data in such a way that the changes made in the cover audio are indiscernible but also at the efficient extraction of the data. The least-significant-bit (LSB) based approach is popular among the steganographic algorithms. Our aim here is creating an audio steganography technique by changing the LSBs of the Discrete-Cosine-Transform (DCT) coefficients of the Cover Audio. It is different from the conventional LSB technique in DCT domain because, here in proposed method data is embedded by spreading it all over the layers of the LSBs of the DCT coefficients. The technique has proven to be robust than the conventional LSB technique and to the channel induced noise as well, in terms of performance evaluation. The same conclusion is drawn from the experimental results obtained by using the DCT domain features and the Support Vector Machine (SVM) as the classifier. Besides, check on the integrity of the message and imperceptibility of the changes is also performed. More »»
2013 Journal Article P. Premalatha and Amritha, P. P., “Optimally Locating for Hiding Information in Audio Signal”, International Journal of Computer Applications, vol. 65, no. 14, pp. 37-42, 2013.[Abstract]

Steganography provides security and privacy of information on open environment systems. Audio steganography plays a vital role in hiding information by exploiting the human ear perceptibility. In this paper, the harmonic component that are imperceptible to the human auditory system are manipulated using Fast Fourier Transform to hide data within the samples. The decoder samples the modified song and extracts the hidden message with the key, using an error correcting code to fix any bits altered by the channel. More »»
Faculty Details


Faculty Email: