Qualification: 
Ph.D
t_gireeshkumar@cb.amrita.edu

Dr. Gireeshkumar T. currently serves as Associate Professor at TIFAC-CORE in Cyber Security, Coimbatore Campus. His areas of research include Machine Learning, Algorithm and Robotics.

Education

YEAR DEGREE/PROGRAM INSTITUTION
2011 Ph.D(CSE) Anna University, Chennai
2003 M.Tech(CSE) Cochin University of Science & Technology
1998 B.Tech (Mechanical) NSS College of Engineering, Palakkad

PROFESSIONAL APPOINTMENTS

Year Affiliation
May 2008 to till date Associate Professor​
Amrita School of Engineering, Ettimadai
May 2004 to May 2008 Sr. Lecturer
V.L.B. Janaki Ammal College of Engineering and Technology, Coimbatore
2003 April to 2004 April Lecturer
Vel Multi Tech Engineering College, Chennai
Industrial/Research: 
1998 Nov to 2000 April
Scientist Trainee
Vikram Sarabhai Space Centre(VSSC),India Space research Organization, Thiruvananthapuram.

Research Projects

  • Project Guide: Classified Image Transmission Systems
    Funded By: (SAG), DRDO New Delhi 4.90Laks 
  • Principal Investigator: Malware detection using FPGA, Sandboxing and Machine Learning
    Funded By: IBM SUR

AWARDS/RECOGNITION

  1. TCS Best Research Paper Award for the paper titled “Tracking of nose tip: An Alternative for Mouse”,( ICDEM 2011)
  2. Best Paper Award: “A Novel Authentication Framework for Hadoop, International Conference on Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (ICAEES 2014

INVITED LECTURERS

MP Nachimuthu M Jaganathan Engineering College In Chennimalai, Erode Research Trends in Cyber Security
V.L.B. Janaki Ammal College of Engineering and Technology, Coimbatore Steganography and Steganalysis
Eswari Engineering College Chennai Artificial Intelligence
Eswari Engineering College, Chennai Soft Computing
MEA College of Engineering, Perinthalmanna, Kerala Machine Learning In Cloud
Info Institute of Technology Coimbatore Cloud Computing Issues
Sethu Institute of Technology, Madurai Cloud Security
GCE, Palakkad Cloud Computing
PSG College of Technology, Coimbatore Intrusion Detection System
Nehru Institute of Technology, Coimbatore Algorithms
Ratnam College of Engineering, Coimbatore Robotic
St. Thomas Engg. Kottayam Artificial Intelligence
CIT, Coimbatore Machine Learning for Cloud and Bigdata
Amrita School of Arts and Science Machine Learning
IRTT , Erode Cyber Security Awareness
MEA Engineering College, Perinthalmanna Cyber Security Awareness
KCT, Coimbatore Swarm Intelligence
SKCT,Coimbatore Back Tracking Algorithms
SKCT,Coimbatore Complexity and Computability
SKCT,Coimbatore Theory of Computations
SKCET Coimbatore Malware Detection feb 2016
MES College Mampad Security and privacy issues March 2016
Amrita Kochin Machine learning for modelling, March 2016

Publications

Publication Type: Journal Article

Year of Conference Publication Type Title

2018

Journal Article

B.A. Sabarish, R. Karthi, and Dr. Gireesh K. T., “Spatial Outlier Detection Algorithm for Trajectory Data”, International Journal of Pure and Applied Mathematics, vol. 118, pp. 325-330, 2018.[Abstract]


Trajectories are spatiotemporal data generated by moving objects containing the spatial position of object at various time intervals. GPS devices record this information and it is possible to construct trajectory of moving objects for analysis. Outlier analysis of trajectories is done to identify abnormal activities like intrusion detection, fraud detection, fault detection and rate event detection. In this paper, Trajectory Outlier Detection algorithm using Boundary (TODB) is proposed using a boundary construction algorithm and a binary classifier. In TODB, Convex Hull algorithm is used to construct the boundary and ray casting algorithm is used to build the binary classifier. TODB is tested for its accuracy using real world data sets. Experimental results on real world data sets demonstrate that TODB correctly classify normal and outlier trajectories

More »»

2018

Journal Article

B.A. Sabarish, R. Karthi, and Dr. Gireesh K. T., “Clustering of trajectory data using hierarchical approaches”, Lecture Notes in Computational Vision and Biomechanics, vol. 28, pp. 215-226, 2018.[Abstract]


Large volume of spatiotemporal data as trajectories are generated from GPS enabled devices such as smartphones, cars, sensors, and social media. In this paper, we present a methodology for clustering of trajectories to identify patterns in vehicle movement. The trajectories are clustered using hierarchical method and similarity between trajectories are computed using Dynamic Time Warping (DTW) measure. We study the effects on clustering by varying the linkage methods used for clustering of trajectories. The clustering method generate clusters that are spatially similar and optimal results are obtained during the clustering process. The results are validated using Cophenetic correlation coefficient, Dunn, and Davies-Bouldin Index by varying the number of clusters. The results are tested for its efficiency using real world data sets. Experimental results demonstrate that hierarchical clustering using DTW measure can cluster trajectories efficiently. © 2018, Springer International Publishing AG.

More »»

2018

Journal Article

B.A. Sabarish, R. Karthi, and Dr. Gireesh K. T., “String based Feature Representation for Trajectory Clustering (Accepted)”, International Journal of Embedded and Real-Time Communication Systems (IJERTCS), 2018.

2017

Journal Article

S. S. Prabhu, Bhavani, R., Dr. Gireesh K. T., and Dr. T. Rajagopalan, “A computational approach to determine shielding effectiveness of carbon nanotube-based nanocomposites for \EMC\ application”, Computational Materials Science, vol. 126, pp. 400 - 406, 2017.[Abstract]


Abstract A computational method to determine the shielding effectiveness against electromagnetic interference of carbon nanotube (CNTs)-based nanocomposites through modelling of its electrical properties is presented. Specifically, simulations based on Ant Colony Optimization (ACO) were implemented to evaluate the electrical conductivity (σ) of \{CNTs\} (used as a filler in a polymer matrix) that formed electrical network inside a representative cuboid volume of the sample. A pseudo three-dimensional (3D) percolation model was developed to study the effects of random connectivity of \{CNTs\} to one another on the conductivity of nanocomposites. In our approach, both contact and intrinsic resistances were taken into account. The tunneling resistance between \{CNTs\} was also taken into account while dealing with single-walled \{CNTs\} (SWCNTs). A resistor network recognition method that optimizes connective paths was built using \{ACO\} method and conductivity was subsequently computed as a function of \{CNTs\} concentration. Then, the shielding effectiveness was computed using the conductivity data. It is remarkable that the calculated \{SE\} values as a function of frequency of \{EM\} waves at a constant weight percent of \{CNTs\} were in agreement with the experimental data for CNT-based nanocomposites reported in literature. More »»

2017

Journal Article

T. G. Gregory Paul and Dr. Gireesh K. T., “A framework for dynamic malware analysis based on behavior artifacts”, Advances in Intelligent Systems and Computing, vol. 515, pp. 551-559, 2017.[Abstract]


Malware stands for malicious software. Any file that causes damage to the computer or network can be termed as malicious. For malware analysis, there are two fundamental approaches: static analysis and dynamic analysis. The static analysis focuses on analyzing the file without executing, whereas dynamic analysis means analyzing or observing its behavior while it is being executed. While performing malware analysis, we have to classify malware samples. The different types of malware include worm, virus, rootkit, trojan horse, back door, botnet, ransomware, spyware, adware, and logic bombs. In this paper, our objective is to have a breakdown of techniques used for malware analysis and a comparative study of various malware detection/classification systems. © Springer Nature Singapore Pte Ltd. 2017. More »»

2016

Journal Article

N. S. Sunder and Dr. Gireesh K. T., “Privilege-based scoring system against cross-site scripting using machine learning”, Advances in Intelligent Systems and Computing, vol. 394, pp. 591-598, 2016.[Abstract]


The attacks on the users by exploiting the vulnerabilities of the browsers have increased at an alarming rate. The existing attack prevention strategies have failed miserably in most of the situations. Moreover, users have also not taken much care of configuring their browsers securely, using available extensions and plug-ins. This proposal puts forward an advanced XSS prevention technique by introducing a new scoring system for privilege levels and vulnerability levels of the contents rendered in the browser. The java scripts rendered in the browsers are stored, classified, and analyzed using machine learning algorithms. Machine learning can also be used to predict the browser quirks and generate an attacker pattern. The security mechanisms are also implemented inside the Document Object Model (DOM) to check the execution of dynamic scripts. © Springer India 2016. More »»

2014

Journal Article

V. A. Pandian and Dr. Gireesh K. T., “A Novel Cloud Based NIDPS for Smartphones”, Communications in Computer and Information Science, vol. 420 CCIS, pp. 473-484, 2014.[Abstract]


Internet usage via smartphones becomes higher which catches the attention of malicious cyber attackers to target their cyber threats over smart phones. Data being sent out from phone carries as packets contains lots of private and confidential information about the user. This paper proposes and evaluates an enhanced security model and architecture to provide an Internet security as a service for the smartphone users. It uses a cloud environment, includes VPN Server for the secure communication and network-based IDS and IPS provided with different machine learning detectors to analyze the real-time network traffic and serves as a user-friendly firewall. We also propose a D-S Evidence theory of information fusion to enhance the accuracy of detecting the malicious activity. Empirical result suggests that the proposed framework is effective in detecting the anomaly network activity by malicious smartphones and intruders. © Springer-Verlag Berlin Heidelberg 2014.

More »»

2013

Journal Article

V. Dayanand, Dr. Gireesh K. T., and Sharma, R., “Comparative Study of Algorithms for Frontier based Area Exploration and Slam for Mobile Robots”, International Journal of Computer Applications, vol. 77, 2013.[Abstract]


Exploration strategies are used to guide mobile robots for map building. Usually, exploration strategies work greedily by evaluating a number of candidate observations on the basis of a utility function and selecting the best one. The core challenge in area exploration is to deploy a large number of robots in an unknown environment, map the environment and establishing an efficient communication between the robots. Simultaneous Localization and Mapping (SLAM) comes in to add more accuracy and heuristics to the generic area exploration strategies. Addition to SLAM algorithms will improve the performance of the exploration process and map building to a great extend. In this paper a survey of existing approaches in frontier based area exploration and various SLAM algorithms which can be useful for the process of area exploration are discussed.

More »»

2012

Journal Article

Dr. Gireesh K. T., Poornaselvan, K. Jb, ,, ,, and Sreevathsan, Ra, “Tracking of nose tip: An alternative for mouse”, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6411 LNCS, pp. 219-225, 2012.[Abstract]


Gesture recognition is mainly apprehensive on analyzing the functionality of human wits. The primary goal of gesture recognition research is to create a system which can recognize specific human gestures and use them to convey information or for device control. The purpose of this paper is to interface machines directly to human wits without any corporeal media in an ambient environment. This work pertains to reckoning on tracking of nose tip. In the pragmatic phenomenon the nose tip is tracked and mouse positioning event is generated on how the nose tip moves on the real world domain. In effectuation phase a single camera based computational paradigm is used for tracking nose tip, and recognizing gestures. Reference point location tracking method is used to spot nose tip in successive frames. © 2012 Springer-Verlag.

More »»

2012

Journal Article

B. I. Chandra, Dr. Gireesh K. T., and Nagarjunavarma, K., “Foreground Estimation in a Degraded Text document”, International Journal of Computer Applications, vol. 44, pp. 31-37, 2012.[Abstract]


In this paper an attempt is made to retrieve the text region alone from a degraded text document. For doing that, four different filters are used for noise removal in the text document. Later document binarization is done using thresholding. Three different thresholding techniques are implemented for foreground-background separation.Then candidate region is selected and features are extracted. The features are then fed to an SVM to classify text and non-text regions. The proposed approach is implemented and tested on various hand written and machine printed degraded text documents More »»

2012

Journal Article

P. Sudheesh and Dr. Gireesh K. T., “Vision based robot navigation for disaster scenarios”, International Journal of Computer Applications, vol. 49, 2012.[Abstract]


This paper aims at providing real time vision based robotnavigation for disaster management scenarios. The task is to navigate a robot in unstructured environment by using gestures. Navigation is an important task that is to be performed while traversing a particular path in disaster management scenario. There are various methodologies like autonomous mapping and SLAM techniques in which the robot is trained itself to create the path by making a map, but training the robot and creating a map itself requires a lot of time and is a tedious process. Meanwhile in this approach a real time video streaming is done by the robot itself that is being transmitted to user who in turn controls the robot using gestures. Apart from streaming the video we also find the closest obstacle distance using IR sensors. For the purpose of performing a particular task for a detected gesture, the robot needs to have intelligence. This intelligence is the algorithm that is loaded into the robot to make it perform the task assigned to it. Here we make use of principle component analysis along with image moments for identifying the gestures and thereby controlling the robot. Real-time implementation is done on iRobot platform. More »»

2011

Journal Article

D. D. Shankar, Dr. Gireesh K. T., and Nath, H. V., “Steganalysis for calibrated and lower embedded uncalibrated images”, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7077 LNCS, pp. 294-301, 2011.[Abstract]


The objective of steganalysis is to detect messages hidden in a cover images, such as digital images. The ultimate goal of a steganalyst is to extract and decipher the secret message. In this paper, we present a powerful new blind steganalytic scheme that can reliably detect hidden data with a relatively small embedding rate in JPEG images as well as using a technique known as calibration. This would increase the success rate of steganalysis by detecting data in transform domain. This scheme is feature based in the sense that features that are sensitive to embedding changes are being employed as means of steganalysis. The features are extracted in DCT domain. DCT domain features have extended DCT features and Markovian features merged together in calibration technique to eliminate the drawbacks of both(inter and intra block dependency) respectively. For the lesser embedding rate, the features are considered separately to evolve a better classification rate. The blind steganalytic technique has a broad spectrum of analyzing different embedding techniques The feature set contains 274 features by merging both DCT features and Markovian features. The extracted features are being fed to a classifier which helps to distinguish between a cover and stego image. Support Vector Machine is used as classifier here. © 2011 Springer-Verlag.

More »»

2011

Journal Article

S. Sharma, Sreevathsan, R., Srikanth, M. V. V. N. S., Harshith, C., and Dr. Gireesh K. T., “Cognitive environment for pervasive learners”, Communications in Computer and Information Science, vol. 191 CCIS, pp. 506-515, 2011.[Abstract]


We present a novel approach for taking the ordinary classroom teaching to a new level, by creating a cognitive environment which includes the use of an image sensing device, number of client/student systems and a master/faculty system connected over a network. An automatic face detector and recognizer are activated on all the client systems for taking the attendance. The detection process is based on the adaboost algorithm, which is a cascade of binary features to rapidly locate and detect faces; recognition is achieved using principle component analysis. Hand gesture detection for students to raise doubts is achieved using adaboost algorithm. The system can also detect whether the students are asleep by extracting the eye region alone and applying principle component analysis to classify whether eyes are closed or open. Kalman filter is used to track the detected eye in consecutive frames. Experimental results show that our system is a viable approach and achieves good detection and recognition rates across wide range of head poses with different lighting conditions. © 2011 Springer-Verlag.

More »»

2010

Journal Article

P. P. Amritha, Madathil, A., and Dr. Gireesh K. T., “Unconditional Steganalysis of JPEG and BMP Images and Its Performance Analysis Using Support Vector Machine”, Communications in Computer and Information Science, vol. 101, pp. 638-640, 2010.[Abstract]


A feature based steganalytic method used for detecting both transform and spatial domain embedding techniques was developed. We developed an unconditional steganalysis which will automatically classify an image as having hidden information or not using a powerful classifier Support Vector Machine which is independent of any embedding techniques. To select the most relevant features from the total 269 features extracted, they apply Principal Component Analysis. Experimental results showed that our steganalysis scheme blindly detect the images obtained from six steganographic algorithms- F5, Outguess, S-Tool, JP Hide & Seek, LSB flipping and PVD. This method is able to detect any new algorithms which are not used during the training step, even if the embedding rate is very low. We also analyzed embedding rate versus detectability performances. © Springer-Verlag Berlin Heidelberg 2010.

More »»

2010

Journal Article

JaDivya Udayan, Dr. Gireesh K. T., John, R. Mc, Poornaselvan, K. Jd, and Lakshmanan, S. Aa, “Mobile Robot Pose Estimation Based on Particle Filters for Multi-dimensional State Spaces”, Communications in Computer and Information Science, vol. 101, pp. 602-605, 2010.[Abstract]


Perception and pose estimation are still some of the key challenges in the area of robotics, and hence the basic requirement for an autonomous mobile robot is its capability to elaborate the sensor measurements to localize itself with respect to a global reference frame. For this purpose the odometric values or the sensor measurements have to be fused together by means of particle filters. Earlier particle filters were limited to low-dimensional estimation problems, such as robot localization in known environments. More recently, particle filters are used in spaces with as many as 100,000 dimensions. This paper presents some of the recent innovations on the use of particle filters in robotics. © Springer-Verlag Berlin Heidelberg 2010.

More »»

2010

Journal Article

Dr. Gireesh K. T., Poornaselvan, K. J., and Dr. M. Sethumadhavan, “Fuzzy Support Vector Machine-based Multi-agent Optimal Path Planning Approach to Robotics Environment.”, Defence Science Journal, vol. 60, no. 4, pp. 387-391, 2010.[Abstract]


A mobile robot to navigate purposefully from a start location to a target location, needs three basic requirements: sensing, learning, and reasoning. In the existing system, the mobile robot navigates in a known environment on a predefined path. However, the pervasive presence of uncertainty in sensing and learning, makes the choice of a suitable tool of reasoning and decision-making that can deal with incomplete information, vital to ensure a robust control system. This problem can be overcome by the proposed navigation method using fuzzy support vector machine (FSVM). It proposes a fuzzy logic-based support vector machine (SVM) approach to secure a collision-free path avoiding multiple dynamic obstacles. The navigator consists of an FSVM-based collision avoidance. The decisions are taken at each step for the mobile robot to attain the goal position without collision. Fuzzy-SVM rule bases are built, which require simple evaluation data rather than thousands of input-output training data. The effectiveness of the proposed method is verified by a series of simulations and implemented with a microcontroller for navigation. More »»

2010

Journal Article

A. .K.S, .V.Nath, H., Kutty, T. N., and Dr. Gireesh K. T., “Low Budget Honeynet Creation and Implementation for Nids and Nips”, (IJCNS) International Journal of Computer and Network Security, vol. 2, no. 8, pp. 27-32, 2010.[Abstract]


This paper describes Honeynet, a system for automated generation of attack signatures for network intrusion detection and prevention systems. A honeypot is a security resource whose value lies in being probed, attacked or compromised. We examine different kinds of honeypots, honeypot concepts, and approaches to their implementation. Our system applies pattern detection techniques and protocol based classification on the traffic captured on a honeypot system. Softwares like Sun virtual box-VMware were used for this purpose so that it was not required to buy large number of high end systems for implementing this setup and thereby cost was reduced in a great extend. While running Honeynet on a WAN environment, the system successfully created precise traffic signatures and updates the firewall that otherwise would have required the skills and time of a security officer. More »»

2010

Journal Article

P. P. Amritha and Dr. Gireesh K. T., “A Survey on Digital Image Steganographic Methods”, Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives: Applications and Perspectives, p. 250, 2010.[Abstract]


Steganography is the art of hiding information in ways that prevent the detection of hidden message, where as cryptographic techniques try to conceal the contents of a message. In steganography, the object of communication is the hidden message while the cover data is only the means of sending it. The secret information as well as the cover data can be any medium like text, image, audio, video etc. The objective of this chapter is to report various steganographic embedding schemes that can provide provable security. More »»

2010

Journal Article

Dr. Gireesh K. T., Udayan, D., J, R., John, M., and Poornaselvan, K. J., “Self Localization and pose estimation of Mobile robot”, International journal of Embedded System and Computer Engineering, vol. 2, 2010.

2010

Journal Article

V. Das, Pathak, V., Sharma, S., ,, .Srikanth, M. V. V. N. S., and Dr. Gireesh K. T., “Network Intrusion Detection System Based On Machine Learning Algorithms”, International Journal of Computer Science & Information Technology (IJCSIT), vol. 2, 2010.

2010

Journal Article

D. Udayan J, John, R. M., Dr. Gireesh K. T., and Poornaselvan, K. J., “Self Localization of a Mobile Robot in Planetary Terrain”, International Journal of Embedded Systems and Computer Engineering, vol. 2, pp. 57-60, 2010.

2010

Journal Article

S. Sasidharan, .A.P, S., .N.R, K., .Y, A., and Dr. Gireesh K. T., “An Advanced Steganographic Scheme with Diamond Encoding and Morphological Neural Network”, pp. 3-14, 2010.

2009

Journal Article

Dr. Gireesh K. T., Alexander, A., Varghese, J., and Johnson, S., “Image Steganographic Scheme Based On Modified Tri-way PVD in Orthogonal Domain”, Indo-US Conference and Workshop on Cyber Security, Cyber Crime and Cyber Forensics, 2009.

Publication Type: Conference Proceedings

Year of Conference Publication Type Title

2017

Conference Proceedings

R. E. Vinodhini, Malathi P., and Dr. Gireesh K. T., “A Survey on DNA and Image Steganography”, 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, Coimbatore, India, 2017.[Abstract]


Steganography is the classical technique of securing the confidential data. The data is hidden in an object called cover medium. The encoder (sender) and the decoder (receiver) only have the knowledge of secret data hidden in the cover object. An image is a cover object that hides the secret data. DNA is another cover object which has a huge data storage capacity and it hides a very large secret data by replacing the bases which are of huge numbers to a particular DNA. In this study, the various techniques that are applied for hiding a secret message in different cover objects like image and DNA are summarized and the integrity of the secret message in various mediums are discussed. The combination of DNA and Images used together to hide a secret message or data is known as dual cover steganography; here the cover objects are DNA and Image. This work also provides all the existing methods on Image steganography, DNA-based steganography and Dual Cover steganography, their merits, and demerits.

More »»

2016

Conference Proceedings

Malathi P. and Dr. Gireesh K. T., “Relating the Embedding Efficiency of LSB Steganography Techniques in Spatial and Transform Domains”, Procedia Computer Science, vol. 93. Elsevier, Rajagiri School of Engineering and TechnologyKochi; India, pp. 878-885, 2016.[Abstract]


This paper is based on image steganography that is Least Significant Bits (LSB) techniques on images to enhance the security of the communication. The LSB-based technique is the most challenging one because it is difficult to differentiate between the cover-object and stego-object, if few LSB bits of the cover object are replaced. The LSB approach combined with F5 algorithm and matrix embedding which is applied on both spatial and frequency domain of an image. The Mean squared error (MSE) and Peak signal to noise ratio (PSNR) was used as the performance measure to compare the different LSB techniques. This paper shows that MSE and PSNR of LSB techniques with Matrix embedding yields better results.

More »»

2010

Conference Proceedings

D. D.Shankar and Dr. Gireesh K. T., “Feature based Classification System for Image Steganalysis”, International Conference on Computer Communication and Network 2010. pp. 70 - 74, 2010.

2008

Conference Proceedings

, Dr. Gireesh K. T., and V.P, V., “Agent Based Ground Flight Control Using Type-2 Fuzzy Logic And Hybrid Ant Colony Optimization To A Dynamic Environment ”, First International Conference on Emerging Trends in Engineering and Technology. 2008.[Abstract]


The main objective of this paper/project is to focus on an Agent based approach to flight control in ground/ runway. Here we are trying to provide a autonomous control on flight once it comes to runway. In all airport there is a particular structure for runway, Like main runways ,sub runways ,different tracks. In an International air port there will be a busy traffic. There will be more flights and other ground vehicles. By using this particular system we can move the flight from one location to another ,totally through wireless control. For a better autonomous control level of intelligence matters. A type 2 fuzzy interval controller can be applied to the autonomous vehicle in order to handle uncertainty in a better way. Ant colony optimization technique can be used for a optimized path planning in traffic environment with more number of flight. We are using a hybrid ant colony optimization to handle real time dynamic environment and path planning. Both Agent based and type-2 fuzzy together with Ant Colony Optimization technique is used to achieve another level of intelligence. More »»

2007

Conference Proceedings

Dr. Gireesh K. T. and .V.P., V., “A Multi-agent Optimal Path Planning Approach to Robotics Environment ”, International Conference on Computational Intelligence and Multimedia Applications. 2007.[Abstract]


A mobile robot having to navigate purposefully from a start location to a target location, needs two basic requirements: sensing and reasoning. However, the pervasive presence of uncertainty in sensing makes the choice of a suitable tool of reasoning and decision making that can deal with incomplete information, vital to ensure a robust control system. In the existing system the mobile robot navigates in the known environment with a predefined path. This problem can be overcome by the proposed navigation method using fuzzy logic. It proposes a fuzzy logic approach to secure a collision free path avoiding multiple dynamic obstacles. The proposed navigator consists of an Fuzzy-Based Collision Avoidance , pit detection sensor and color sensor. The decisions are taken at each action step so that the mobile robot can go for the goal position without colliding with obstacles. Fuzzy rule bases are built which requires simple evaluation data rather than thousands of input-output training data. The effectiveness of the proposed method is verified by a series of simulations and implementing it with the microcontroller to navigate. More »»

Publication Type: Conference Paper

Year of Conference Publication Type Title

2016

Conference Paper

S. K. Rahul, Honc, D., Dušek, F., Dr. Gireesh K. T., F., H., O., R., and M., M., “Frontier based multi robot area exploration using prioritized routing”, in Proceedings - 30th European Conference on Modelling and Simulation, ECMS 2016, 2016, pp. 25-30.[Abstract]


The paper deals with multi-robot centralized autonomous area exploration of unknown environment with static obstacles. A simple reasoning algorithm based on preassignment of routing priority is proposed. The algorithm tracks the frontiers and assigns the robots to the frontiers when the robots fall into a trap situation. The algorithm is simulated with various multi-robotic configurations in different environments and compared with performance indices in the MATLAB simulation environment. More »»

2016

Conference Paper

S. Anuraj, Premalatha, P., and Dr. Gireesh K. T., “High Speed Network Intrusion Detection System Using FPGA”, in Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015, Volume 1, New Delhi, 2016, pp. 187–194.[Abstract]


Modern Network Intrusion detection needs a high-speed interface to analyze the incoming packet. Several network intrusion detection applications detect multiple strings in the payload of a packet by comparing it against predefined pattern set which requires more memory and computation power. To meet this, a dedicated hardware with high processing capacity can be placed at the port of incoming packets. Field Programmable Gate Array (FPGA) is the choice as it can be programmed easily and dynamically for parallel computing. Moreover, FPGA devices support at high-speed interface and are capable of providing better processing capability than other device; also it can be reprogrammed when it is needed. This paper proposes a new alternative approach to leaf attaching algorithm to improve the memory efficiency of algorithm. More »»

2012

Conference Paper

M. Niranjan, Saipreethy, M. S., and Dr. Gireesh K. T., “An intelligent question answering conversational agent using Na #x00EF;ve Bayesian classifier”, in Technology Enhanced Education (ICTEE), 2012 IEEE International Conference on, 2012.[Abstract]


In the current scenario, learning has taken a completely new dimension. New methods of teaching like E-learning and collaborative learning etc have computerized the learning process to a large extent. But the teachers' presence is still mandatory at all times. Also the current systems have low reliability so the teacher has to monitor them constantly. To solve this problem this paper introduces an automated question answering system. This proposed system answers the queries posted by the student in a more interactive way like a virtual teacher (chatbot system). The Q&A knowledge base can be accessed and modified by the instructor who could also know the areas where the students are more prone to doubts thus helping the student as well as the instructor. More »»

2010

Conference Paper

Dr. Gireesh K. T., Sasidharan, S., N., K., A.P., S., and Y., A., “An Efficient Embedding and Restoration Steganographic Scheme for Secure Multimedia Communication”, in Proceedings of the 2010 International Conference on Advances in Computer Engineering, Washington, DC, USA, 2010, pp. 363-365.[Abstract]


A novel steganographic scheme is proposed. For image compression, wavelets and genetic programming is used. This image compression is build upon the DWPT to shorten the image, and to provide better quality levels at better compression ratios. Quantizing an image in the wavelet domain allows for easier evolution of genetic programs without sacrificing much in terms of image quality. Diamond Encoding is a new concept of data hiding used here. The Diamond Encoding provides an easy way to produce a more perceptible result than those yielded by other embedding methods. This method is capable of hiding more secret data while keeping the stego image quality degradation imperceptible. In this paper, image restoration is also done using morphological neural network to provide better performance. More »»

2010

Conference Paper

Dr. Gireesh K. T., Jithin, R., and Shankar, D. D., “Feature based steganalysis using wavelet decomposition and magnitude statistics”, in ACE 2010 - 2010 International Conference on Advances in Computer Engineering, Bangalore, 2010, pp. 298-300.[Abstract]


Steganography is broadly used to embed information in high resolution images, since it can contain adequate information within the small portion of cover image. Steganalysis is the procedure of finding the occurrence of hidden message in an image. This paper compares the efficiency of two embedding algorithms using the image features that are consistent over a wide range of cover images, but are distributed by the presence of embedded data. Image features were extracted after wavelet decomposition of the given image. These features were then given to a SVM classifier to identify the stego content. © 2010 IEEE.

More »»

Publication Type: Book Chapter

Year of Conference Publication Type Title

2016

Book Chapter

A. Eldho Jose and Dr. Gireesh K. T., “Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Reconfigurable Hardware”, in Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015, Volume 1, C. Suresh Satapathy, Raju, S. K., Mandal, K. Jyotsna, and Bhateja, V. New Delhi: Springer India, 2016, pp. 11–19.[Abstract]


Network intrusion detection system collects information from network and identifies all the possible existing network security threats. Software based detection systems are common but are not good enough for the current network security requirements. Present day network intrusion detection needs wire-level data transfer to avoid the inefficiency in pattern matching process. Hardware based solutions like field programmable gate array which is known for its high processing capability can easily solve these issues. This paper implements a hardware based gigabit intrusion detection system using extended Bloom filter concepts. The paper presents a solution to reduce the high error rate of Bloom Filter by introducing a Reference Vector to the work and evaluates its performance. The reference vector verifies the Bloom filter output for any possible false positive results and reduces the error rate in the system. More »»

2015

Book Chapter

B.A. Sabarish, R. Karthi, and Dr. Gireesh K. T., “A Survey of Location Prediction Using Trajectory Mining”, in Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1, P. L. Suresh, Dash, S. Subhransu, and Panigrahi, K. Bijaya New Delhi: Springer India, 2015, pp. 119–127.[Abstract]


This paper is a research and analysis on the prediction of location of moving objects that gained popularity over the years. Trajectory specifies the path of the movement of any object. There is an increase in the number of applications using the location-based services (LBS), which needs to know the location of moving objects where trajectory mining plays a vital role. Trajectory mining techniques use the geographical location, semantics, and properties of the moving object to predict the location and behavior of the object. This paper analyses the various strategies in the process of making prediction of future location and constructing the trajectory pattern. The analyses of various mechanisms are done based on various factors including accuracy and ability to predict the distant future. Location prediction problem can be with known reference points and unknown reference points, and semantic-based prediction gives an accurate result whereas the probability-based prediction for unknown reference points.

More »»

2015

Book Chapter

Ashok Kumar Mohan and Dr. Gireesh K. T., “Secure Seed-Based Sturdy OTP via Convenient Carry-on Device”, in Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1, P. L. Suresh, Dash, S. Subhransu, and Panigrahi, K. Bijaya New Delhi: Springer India, 2015, pp. 447–455.[Abstract]


The Internet users for the purpose of easy memorizing select a weak password and reuse it along many Web sites vulnerable to password stealing and reuse due to rapid growth of cloud computing. Sturdy one-time password (S-OTP) provides with easy remembrance and prevention of password reuse using personal Android mobile phone without the necessity of sending an SMS and can be integrated into any original user authentication system without contradicting the overall security. Also, in the worst cases, if the mobile phones are stolen, it is made unfeasible by means of two-dimensional SHA3 and MD5 forward hashing with unique and secure hard-coded seed information from mobile device. More »»

2015

Book Chapter

P. K. Rahul and Dr. Gireesh K. T., “A Novel Authentication Framework for Hadoop”, in Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1, P. L. Suresh, Dash, S. Subhransu, and Panigrahi, K. Bijaya New Delhi: Springer India, 2015, pp. 333–340.[Abstract]


Hadoop is an open-source file system used to process and carry Big data which is out of the reach of normal softwares to be work on. This paper analyses the data security issues in Hadoop and proposes a new authentication framework for clients. The framework uses cryptographic functions such as public key cryptography, private key cryptography, hashing functions, and random number generator. This framework will define a new key for each client and authenticate all clients and services using this key. The authentication agent offers user data protection, way for privilege separations, and basic security needs for data stored in Hadoop file system. More »»

2015

Book Chapter

R. S. Anoop, Dr. Gireesh K. T., and Saisuriyaa, G., “A Probabilistic Method Toward SLAM for Mobile Robotic Systems”, in Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 1, L. C. Jain, Patnaik, S., and Ichalkaranje, N. New Delhi: Springer India, 2015, pp. 285–291.[Abstract]


Simultaneous localization and mapping (SLAM) problem helps a mobile robot in identifying its own position by providing an autonomously built map. This work proposes a software and hardware approach for online mobile robotic systems, which is capable of performing SLAM. The mapping of unknown environment with low-cost sensors, incorporating probabilistic method, is the highlight of this work. The hardware system comprises of a multisensor mobile robot developed on the ARM Cortex platform. The software part mainly incorporates pose graph data structure blended with mixture model, which is further optimized by stochastic gradient descent method. More »»

2015

Book Chapter

A. Velayudhan and Dr. Gireesh K. T., “An Autonomous Obstacle Avoiding and Target Recognition Robotic System Using Kinect”, in Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 1, L. C. Jain, Patnaik, S., and Ichalkaranje, N. New Delhi: Springer India, 2015, pp. 643–649.[Abstract]


This article describes the development of an autonomous navigation system for mobile robots which can be used in unstructured and unknown indoor environment. Histogram of the range data captured using Kinect is utilized in developing the obstacle avoidance algorithm which avoids the static and dynamic obstacles. In addition to this, an object recognition task is also carried out by the robot using SURF algorithm. Once the object is recognized, it sends that information to the remote workstation through wireless communication. More »»

2012

Book Chapter

D. D. Shankar, Dr. Gireesh K. T., Praveen, K., Jithin, R., and Raj, A. S., “Block Dependency Feature Based Classification Scheme for Uncalibrated Image Steganalysis”, in Data Engineering and Management: Second International Conference, ICDEM 2010, Tiruchirappalli, India, July 29-31, 2010. Revised Selected Papers, R. Kannan and Andres, F. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 189–195.

2011

Book Chapter

P. P. Amritha and Dr. Gireesh K. T., “A Survey on Digital Image Steganographic Methods”, in Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, 2011, pp. 250-258.[Abstract]


The embedding schemes utilizes the characteristic of the human vision’s sensitivity to color value variations and resistant to all known steganalysis methods. The main requirement of steganography is undetectability, which loosely defines that no algorithm exists that can determine whether a work contains a hidden message. More »»
Faculty Research Interest: 
207
PROGRAMS
OFFERED
6
AMRITA
CAMPUSES
15
CONSTITUENT
SCHOOLS
A
GRADE BY
NAAC, MHRD
8th
RANK(INDIA):
NIRF 2018
150+
INTERNATIONAL
PARTNERS