Papers by Dr. Laxmi Gulappagol

Geofencing Technology for Sustaining Vehicular Noise Pollution in Urban Areas
2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC), Dec 3, 2021
Automobile has become an integral part of social life resulting in a by-product of Noise pollutio... more Automobile has become an integral part of social life resulting in a by-product of Noise pollution. Vehicular honking in urban areas is a major contributor to adverse health effects and biological imbalance between humans, animals, and birds. Various researches show that honking is one of the major causes of noise pollution and a negative contributor to the social peace index and decline in various species of birds which also contribute to socio-ecological balance and hygiene. This paper discusses the design of hybrid solutions to reduce the impact of honking, within a sustainable limit without neglecting the objective or failing its purpose. This, in turn, decreases the stress caused due to honking during the waiting period in traffic and improves the mental health also the quality of biodiversity, contributing to a sustainable society.

Bioscience biotechnology research communications, Dec 25, 2020
Internet source and digital media tools have become daily requirements of the society. A major pr... more Internet source and digital media tools have become daily requirements of the society. A major problem in digital communication is secured data transmission. Steganography is a technique of hiding confidential data in the media files such as audio, images and videos, in a cover model to provide secured communication. Video steganography process is an authenticated communication to hide secret information from unauthorized user(s) through a video file as cover medium. In this article, an architecture is developed to hide input secrete image into a cover video. The secret image is encrypted by RSA algorithm, further continued with data shuffling by using Fisher Yates algorithm. Then Discrete Cosine Transform is applied to generate 8*8 blocks. On the other side, video is discretized into frames which are applied with DCT to form 8*8 blocks which are embedded with earlier generated blocks that results in a stego-video. Performance analysis is also carried out to enhance embedding capacity, imperceptibility, robustness and security.

Secured data transmission using knight and LSB technique
Information security is to protect the confidentiality, integrity and availability of information... more Information security is to protect the confidentiality, integrity and availability of information assets that use, store or transmit information from risk. It is achieved via the application of policy, education, training and awareness, and technology. Steganography is a fascinating and effective method of covert communication that involves hiding a message in an appropriate carrier such as an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. This article proposes the hybrid approach towards implementation of Image Steganography using S-Box, Knight-Tour and 2-Bit LSB technique which exploits the weakness of the human visual system (HVS). For high security while embedding, three planes of RGB cover image are randomly chosen using row vector, divide the image into four pixel blocks and followed by knight's tour to select next block for embedding. The Knight's travel path is a pattern in which the path of a horse around a chess board is taken without revisiting any node. This travel path pattern is used to permute the pixel positions of the original image to obtain the scrambled image. This method makes sure that the communication has been encrypted before hiding it into a cover image. If in some case the secret message got uncovered from the cover image, the third person other than recipient can't access the data as it is in encrypted type. The PSNR value of the proposed technique is better than previous data hiding methods. This scheme has been implemented for images of various sizes and a comparative study in terms of PSNR and MSE is presented.
A Comparitive Study of Image Segmentation Techniques for Brain Tumor Detection

International Journal for Research in Applied Science and Engineering Technology
Automobile exhaust gases are one of the most significant sources of carbon dioxide. Carbon monoxi... more Automobile exhaust gases are one of the most significant sources of carbon dioxide. Carbon monoxide from the exhaust system can seep into the vehicle through holes. Carbon dioxide poisoning can be lethal if inhaled at a specific dosage and for a long time. To ensure that the level of carbon dioxide in the vehicle is safe, the air quality must be monitored. Our goal is to create a project that focuses on vehicle carbon monoxide monitoring, alerting, and control. The carbon monoxide level in the vehicle is detected by the system. The collected sensor data will be stored in a database. The technology allows the user to keep track of carbon dioxide levels and vehicle battery discharge. The user can also be notified when carbon dioxide levels are dangerously high. When the battery level drops due to infrequent use of the vehicle, the system can provide effective notification about the battery discharge levels. The device is affordable and simple to install in the vehicle.

Geofencing Technology for Sustaining Vehicular Noise Pollution in Urban Areas
2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC), 2021
Automobile has become an integral part of social life resulting in a by-product of Noise pollutio... more Automobile has become an integral part of social life resulting in a by-product of Noise pollution. Vehicular honking in urban areas is a major contributor to adverse health effects and biological imbalance between humans, animals, and birds. Various researches show that honking is one of the major causes of noise pollution and a negative contributor to the social peace index and decline in various species of birds which also contribute to socio-ecological balance and hygiene. This paper discusses the design of hybrid solutions to reduce the impact of honking, within a sustainable limit without neglecting the objective or failing its purpose. This, in turn, decreases the stress caused due to honking during the waiting period in traffic and improves the mental health also the quality of biodiversity, contributing to a sustainable society.
A Comparitive Study of Image Segmentation Techniques for Brain Tumor Detection
Proceedings of Second International Conference on Signal Processing, Image Processing and VLSI, 2015

Secured data transmission using knight and LSB technique
2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), 2017
Information security is to protect the confidentiality, integrity and availability of information... more Information security is to protect the confidentiality, integrity and availability of information assets that use, store or transmit information from risk. It is achieved via the application of policy, education, training and awareness, and technology. Steganography is a fascinating and effective method of covert communication that involves hiding a message in an appropriate carrier such as an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. This article proposes the hybrid approach towards implementation of Image Steganography using S-Box, Knight-Tour and 2-Bit LSB technique which exploits the weakness of the human visual system (HVS). For high security while embedding, three planes of RGB cover image are randomly chosen using row vector, divide the image into four pixel blocks and followed by knight's tour to select next block for embedding. The Knight's travel path is a pattern in which the path of a horse around a chess board is taken without revisiting any node. This travel path pattern is used to permute the pixel positions of the original image to obtain the scrambled image. This method makes sure that the communication has been encrypted before hiding it into a cover image. If in some case the secret message got uncovered from the cover image, the third person other than recipient can't access the data as it is in encrypted type. The PSNR value of the proposed technique is better than previous data hiding methods. This scheme has been implemented for images of various sizes and a comparative study in terms of PSNR and MSE is presented.
International Journal of Science and Research (IJSR), 2016
Many requests to one network will take large time to get a replay. To reduce this issue, user dem... more Many requests to one network will take large time to get a replay. To reduce this issue, user demand protocol using a ballot agency is proposed. The secure techniques provided by the agency are cryptography, watermarking, and steganography with DCT and LSB methods. These are used for embedding and extraction of the message. User's request to any of the three techniques, the agency will give the corresponding technique with options DCT and LSB. The quality analysis is done after each embedding process using the PSNR value calculation. The result shows promising support to large scale networks.
Private Key Steganography Based on Agent Technology
Proceedings of Second International Conference on Signal Processing, Image Processing and VLSI, 2015

Bioscience Biotechnology Research Communications, 2020
Internet source and digital media tools have become daily requirements of the society. A major pr... more Internet source and digital media tools have become daily requirements of the society. A major problem in digital communication is secured data transmission. Steganography is a technique of hiding confidential data in the media files such as audio, images and videos, in a cover model to provide secured communication. Video steganography process is an authenticated communication to hide secret information from unauthorized user(s) through a video file as cover medium. In this article, an architecture is developed to hide input secrete image into a cover video. The secret image is encrypted by RSA algorithm, further continued with data shuffling by using Fisher Yates algorithm. Then Discrete Cosine Transform is applied to generate 8*8 blocks. On the other side, video is discretized into frames which are applied with DCT to form 8*8 blocks which are embedded with earlier generated blocks that results in a stego-video. Performance analysis is also carried out to enhance embedding capacity, imperceptibility, robustness and security.
Uploads
Papers by Dr. Laxmi Gulappagol