Dr. Sateesh Kumar H C (original) (raw)

Papers by Dr. Sateesh Kumar H C

Research paper thumbnail of Reputation Based Zone Trust Detection and Swatt Revocation Method Using SPRT in Sensor Networks

International Journal of Innovative Research in Science, Engineering and Technology, 2013

Wireless sensor networks can be used in several real world applications, including various critic... more Wireless sensor networks can be used in several real world applications, including various critical applications such as military surveillance, infrastructure security monitoring and fault detection. Typically sensors are deployed in large number in environments that may not be safe or easily accessible to humans. An adversary or attacker can modify the sensor nodes that operate in the harsh environment and thus can insert faulty data to mislead the whole network. Hence in order to reduce the damage occurred to the compromised sensor nodes, it is extremely important to detect and revoke them as early as possible. The main idea is to propose zone based node compromise detection and revocation scheme for sensor networks. This is achieved using reputation based trust management scheme and software based attestation technique. Software attestation technique has been proposed to verify the integrity of the code without physical access. Whereas Reputation-based Framework for Sensor Networ...

Research paper thumbnail of An Efficient Face Recognition Technique Using PCA and Artificial Neural Network

Face recognition is one of the biometric tool for authentication and verification. It is having b... more Face recognition is one of the biometric tool for authentication and verification. It is having both research and practical relevance. . Face recognition, it not only makes hackers virtually impossible to steal one's "password", but also increases the userfriendliness in human-computer interaction. Facial recognition technology (FRT) has emerged as an attractive solution to address many contemporary needs for identification and the verification of identity claims. A facial recognition based verification system can further be deemed a computer application for automatically identifying or verifying a person in a digital image.The two common approaches employed for face recognition are analytic (local features based) and holistic (global features based) approaches with acceptable success rates. In this paper, we present a hybrid features based face recognition technique using principal component analysis technique.Principal component analysisis used to compute global feat...

Research paper thumbnail of Next century challenges

Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking - MobiCom '99, 1999

A key challenge facing wireless networking is to utilize the spectrum as efficiently as possible ... more A key challenge facing wireless networking is to utilize the spectrum as efficiently as possible given current channel conditions and in the most effective way for each application. This is difficult to achieve with existing wireless devices because physical layer functionality is fixed, while channel condibions and applications can change rapidly. Here; we argue that RadioActive networks, an adaptable wireless network architecture that draws on the strengths of software radios and active networks, can meet this challenge. Active networks provide a framework for programming network services, and software radios extend this programmability into the phvsical layer. ?Ve believe that this approach offers the opliortunity for significant improvements in functionality and performance over today's wireless networks by making it no longer necessary to design a priori with pessimistic assumptions that describe worst case conditions. In this paper, we outline our vision, the opportunities it affords, and the challenges that must be tackled before it can become a reality.

Research paper thumbnail of An Adaptive Threshold based FPGA Implementation for Object and Face detection

2015 Third International Conference on Image Information Processing (ICIIP), 2015

The moving object and face detection are vital requirement for real time security applications. I... more The moving object and face detection are vital requirement for real time security applications. In this paper, we propose an Adaptive Threshold based FPGA Implementation for Object and Face detection. The input Images and reference Images are preprocessed using Gaussian Filter to smoothen the high frequency components. The 2D-DWT is applied on Gaussian fIlter outputs and only LL bands are considered for further processing. The modified background with adaptive threshold are used to detect the object with LL band of reference image. The detected object is passed through Gaussian fIlter to enhance the quality of object. The matching unit is designed to recognize face from standard face database images. It is observed that the performance parameters such as percentage TSR and hardware utilizations are better compared to existing techniques.

Research paper thumbnail of Reputation Based Zone Trust Detection and Swatt Revocation Method Using SPRT in Sensor Networks

International Journal of Innovative Research in Science, Engineering and Technology, 2013

Wireless sensor networks can be used in several real world applications, including various critic... more Wireless sensor networks can be used in several real world applications, including various critical applications such as military surveillance, infrastructure security monitoring and fault detection. Typically sensors are deployed in large number in environments that may not be safe or easily accessible to humans. An adversary or attacker can modify the sensor nodes that operate in the harsh environment and thus can insert faulty data to mislead the whole network. Hence in order to reduce the damage occurred to the compromised sensor nodes, it is extremely important to detect and revoke them as early as possible. The main idea is to propose zone based node compromise detection and revocation scheme for sensor networks. This is achieved using reputation based trust management scheme and software based attestation technique. Software attestation technique has been proposed to verify the integrity of the code without physical access. Whereas Reputation-based Framework for Sensor Networ...

Research paper thumbnail of An Efficient Face Recognition Technique Using PCA and Artificial Neural Network

Face recognition is one of the biometric tool for authentication and verification. It is having b... more Face recognition is one of the biometric tool for authentication and verification. It is having both research and practical relevance. . Face recognition, it not only makes hackers virtually impossible to steal one's "password", but also increases the userfriendliness in human-computer interaction. Facial recognition technology (FRT) has emerged as an attractive solution to address many contemporary needs for identification and the verification of identity claims. A facial recognition based verification system can further be deemed a computer application for automatically identifying or verifying a person in a digital image.The two common approaches employed for face recognition are analytic (local features based) and holistic (global features based) approaches with acceptable success rates. In this paper, we present a hybrid features based face recognition technique using principal component analysis technique.Principal component analysisis used to compute global feat...

Research paper thumbnail of Next century challenges

Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking - MobiCom '99, 1999

A key challenge facing wireless networking is to utilize the spectrum as efficiently as possible ... more A key challenge facing wireless networking is to utilize the spectrum as efficiently as possible given current channel conditions and in the most effective way for each application. This is difficult to achieve with existing wireless devices because physical layer functionality is fixed, while channel condibions and applications can change rapidly. Here; we argue that RadioActive networks, an adaptable wireless network architecture that draws on the strengths of software radios and active networks, can meet this challenge. Active networks provide a framework for programming network services, and software radios extend this programmability into the phvsical layer. ?Ve believe that this approach offers the opliortunity for significant improvements in functionality and performance over today's wireless networks by making it no longer necessary to design a priori with pessimistic assumptions that describe worst case conditions. In this paper, we outline our vision, the opportunities it affords, and the challenges that must be tackled before it can become a reality.

Research paper thumbnail of An Adaptive Threshold based FPGA Implementation for Object and Face detection

2015 Third International Conference on Image Information Processing (ICIIP), 2015

The moving object and face detection are vital requirement for real time security applications. I... more The moving object and face detection are vital requirement for real time security applications. In this paper, we propose an Adaptive Threshold based FPGA Implementation for Object and Face detection. The input Images and reference Images are preprocessed using Gaussian Filter to smoothen the high frequency components. The 2D-DWT is applied on Gaussian fIlter outputs and only LL bands are considered for further processing. The modified background with adaptive threshold are used to detect the object with LL band of reference image. The detected object is passed through Gaussian fIlter to enhance the quality of object. The matching unit is designed to recognize face from standard face database images. It is observed that the performance parameters such as percentage TSR and hardware utilizations are better compared to existing techniques.