Dr. Ravindranath C Cherukuri
Qualification : Ph.D. (University of Texas at San Antonio)
Designation : Professor & Dean-Research and Innovation
Email: [email protected]
Details of Educational Qualification:
| Course | Specialization | Group | College Name/University | Year of Passing |
|---|---|---|---|---|
| Ph.D. | Electrical and Computer Engineering | Electrical and Computer Engineering | University of Texas at San Antonio, San Antonio, USA | 2009 |
| M.S. | Electrical and Computer Engineering | Electrical and Computer Engineering | University of Texas at San Antonio, San Antonio, USA | 2005 |
| B.Tech. | Electrical and Electronic Engineering | Electrical and Electronic Engineering | Jawaharlal Nehru Technological University, Hyderabad, India | 2002 |
List of Publications
| S.No | Title of the Paper | Full Details of Journal Name / Conference Name, Volume number, page number, Date |
|---|---|---|
| 1 | Sentiment Analysis on Banking Feedback and News Data using Synonyms and Antonyms | International Journal of Advanced Computer Science and Applications, Vol.14, No.12, 2023 |
| 2 | Realization of Humanoid Doctor and Real-Time Diagnostics of Disease Using Internet of Things, Edge Impulse Platform, and ChatGPT. | Annals of Biomedical Engineering, 1-3. |
| 3 | Study of Self-Resilient Cloud Server Using Machine Learning Techniques for Local Area Networks. | In Engineering, Science, and Sustainability (pp. 59-63). CRC Press. |
| 4 | Machine Learning and Artificial Intelligence Techniques for Detecting Driver Drowsiness. | Journal of Automation, Mobile Robotics and Intelligent Systems, 16(2), 64-73. |
| 5 | "Reflecto–A Smart Mirror Structure with a Contextual Association of Internet of Things." | Information Technology in Industry 9, no. 2 (2021): 984-988. |
| 6 | "Symbiotic view of Provenance in Cyber Infrastructure and Information Security." | Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 3261-3267. |
| 7 | "Disaster recovery and risk management over private networks using data provenance: Cyber security perspective." | Indian Journal of Science and Technology 14, no. 8 (2021): 725-737. |
| 8 | A Revisit to Speech Processing and analysis | International Journal of Computer Applications (0975 – 8887), Volume 175 - No.30, 2020 |
| 9 | A secure and light weight privacy preserving data aggregation algorithm for wireless sensor networks | Journal of Green Engineering, 2020, 10(12), pp. 13329–13336 |
| 10 | A Secure Biometrics-Based User Authenticated Key Agreement Protocol for Multi-Server Environments. | International Journal of Advanced Science and Technology, 29(9s), 517-532. |
| 11 | Secure provenance-based communication using visual encryption. | International Journal of Innovative Computing and Applications, 10(3-4), 194-206. |
| 12 | Cryptanalysis of Design and Analysis of a Provably Secure Multi-Server Authentication Scheme. | IJ Network Security, 20(2), 217-224. |
| 13 | A Robust Authenticated Privacy-Preserving Attribute Matchmaking Protocol for Mobile Social Networks” | Proceedings of the Computational Intelligence and Informatics (pp. 17-26). Springer Singapore. |
| 14 | The secured data provenance: Background and application oriented analysis. | In 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) (pp. 1212-1216). IEEE. |
| 15 | Secure Data Aggregation in Wireless Sensor Networks: Filtering Out the Attacker’s Impact. | International Journal of Innovative Research in Science and Engineering, Vol. No. 2, Issue 12, pp 215-222 |
| 16 | “Analysis of Diffie Hellman Key Exchange Algorithm with Proposed Key Exchange Algorithm” | International Journal of Emerging Trends and Technology in Computer Science. (2278 – 6856) Volume 4, Issue 1, January-February 2015. |
| 17 | “Image Encryption Technique incorporating wavelet Transform and Hash Integrity” | International Journal of Research in Engineering and Technology. (2321 – 7308) Volume 4, Issue 2, January-March 2015. |
| 18 | “An Evolution of the Pixel Embedding Techniques in Image Based Adaptive Steganography” | Journal of Web Engineering & Technology, Vol.1 No.1, pp:1-18, April 2014 |
| 19 | A WCDMA System with High Power Amplifier. | International Journal of Advanced Electronics and Communication Systems, 3(5). |
| 20 | High Power Amplifier designed with LDMOS: A Review. | International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), 3(7), pp-363. |
| 21 | “Evaluation of Network Security Policy Incorporating Genetic Network Feedback” | International Journal of Emerging Trends and Technology in Computer Science, Vol. 2, Issue-3, pp: 302-305, June 2013 |
| 22 | “A Novel Data Hiding Framework Using Switching Threshold Mechanism” | International Journal of Engineering and Advanced Technology, Vol.2, Issue-5, pp:5-10, June 2013 |
| 23 | “Adaptive Cryptosystem for Digital Images using Fibonacci Bit-Plane Decomposition” | International Journal of Computer Applications 65(14):32-36, March 2013 |
| 24 | “A Novel Weighted Median Switching Filter for Denoising Corrupted Images” | International Journal of Computer Applications, vol.64, pp:5-10, February 2013 |
| 25 | “Developing an Android Using Eclipse Juno” | International Journal for Research in Science & Advanced Technologies, Issue-1, Volume-3, pp.90-95, December 2012 |
| 26 | “Two New M-sequence Based Data Hiding Algorithms,” | Pattern Recognition and Image Analysis, Vol.15, No.2, pp :479-482, June 2005 |
| 27 | “Run Length Based Steganography for Binary Images,” | Pattern Recognitions and Machine Intelligence, Lecture Notes in Computer Science, Publisher: Springer-Verlag GmbH, N 3776, ISBN: 3-540-30506-8, pp. 481 - 485, 2005. |
| 28 | Improving Speaker Gender Detection by Combining Pitch and SDC | 4th International Conference on data Science and Application (ICDSA 2023), July 14-15, Jaipur India |
| 29 | Security and Authentication of Vehicular Ad-hoc networks via Digital Signature Approach. | In First International Conference on Technologies, Sustainable Development Goals and Academia 2022 (ICTSGA-1) (pp. 132-137). |
| 30 | Improvement of Speech Emotion Recognition by Deep Convolution Neural Networks and Speech Features | 3rd Congress on Intelligent Systems (CIS 2022), September 05-06, Sept. India |
| 31 | Securing Provenance Data with Secret Sharing Mechanism: Model Perspective. | In 2019 International Conference on Data Science and Communication (IconDSC) (pp. 1-6). IEEE. |
| 32 | Secured Electronic Transactions Using Visual Encryption: An E-Commerce Instance. | In 2018 International Conference on Inventive Research in Computing Applications (ICIRCA) (pp. 1341-1345). IEEE. |
| 33 | “A Novel High-Capacity Data Hiding Algorithm based on Switching and Matrix Encoding Techniques” | 2016 International Conference on Signal Processing (ICSP-SATI 2016), November, 2016 |
| 34 | The secured data provenance: Background and application-oriented analysis. | In Recent Trends in Electronics, Information & Communication Technology (RTEICT), IEEE International Conference on (pp. 1212-1216). IEEE. |
| 35 | “Visual Cryptography and its Implications: Research Allied Literature Survey” | 6th IEEE International Advance Computing Conference (IACC-2016), February 2016 |
| 36 | “Semi-circular Microstrip Patch Antenna for Multi-frequency Application” | 2014 Fourth International Conference on Communication Systems and Network Technologies, April 2014 |
| 37 | “A Fast and Efficient Back Propagation Algorithm to Forecast Active and Reactive Power Drawn by Various Capacity Induction Motors” | International Conference on Circuits, Power and Computing Technologies, ICCPCT-2013, March 2013 |
| 38 | “Developing an Android Using Eclipse Juno” | National Conference on Advances in Network & Information Security, Nov 2012, pp. 42- 48 |
| 39 | “The Open Source Cross- Platform Application Development Frameworks for Smart phones” | International Conference on Engineering Technology and Management, Sept 2012, pp. 56-62 |
| 40 | “Secured Data Hiding for Binary Images based on Distance Measure Transform” | National Conference on Recent Advances in Electronics and Electrical Engineering, March 2012, pp.51-55 (Awarded Best Paper) |
| 41 | “Logical Transform based encryption for multimedia systems” | IEEE International Conference on Systems, Man and Cybernetics, Oct 2010, pp. 1953-1957 |
| 42 | "New normalized expansions for redundant number systems: adaptive data hiding techniques" | Proceedings of SPIE on Multimedia on Mobile Devices 2010, vol. 7542, San Jose, California, USA 2010 |
| 43 | "Selective object encryption for privacy protection," | Proceedings of SPIE Vol. 7351, 73510F (2009). |
| 44 | "Logical subband decomposition based secured multimedia system," | Proceedings of SPIE Vol. 6982, 69820X (2008). |
| 45 | “Switching Theory Based Steganographic system for JPEG images” | v Mobile Multimedia/Image Processing for Military and Security Applications 2007, Proceedings of the SPIE, Volume 6579, pp. 65790C, Orlando, Florida, 2007 USA |
| 46 | “Key Dependent Covert Communication System for Audio Signals” | IEEE International Conference on Systems, Man and Cybernetics, 2007. ISIC, 7-10 Oct. 2007 Page(s):3356 - 3360, Montreal, Canada. |
| 47 | “Key Dependent Covert Communication System using Fibonacci P-codes” | IEEE International Conference on System of Systems Engineering, SoSE 07, 16-18 April 2007 Page(s):1 - 5, San Antonio, Texas, USA. |
| 48 | “Adaptive Steganographic System for Binary Images using Variable Block Embedding Rate” | IEEE International Conference on Systems, Man and Cybernetics, Volume:3, pp: 1879-1883, Oct. 2006, Taipei, Taiwan. |
| 49 | “Secure and Robust Steganographic Algorithm for Binary Images” | Signal Processing, Sensor Fusion, and Target Recognition XV, Proceedings of the SPIE, Volume 6235, pp. 62351F, 2006 Orlando, Florida, USA. |
| 50 | “A New JPEG- Based Steganographic Algorithm for Mobile Devices” | Mobile Multimedia/Image Processing for Military and Security Applications, Proceedings of the SPIE, Volume 6250, pp. 62500F, April17- 18 2006, Orlando, Florida, USA. |
| 51 | “Adaptive Steganography for Mobile Devices” | Mobile Multimedia/Image Processing for Military and Security Applications, Proceedings of the SPIE, Volume 6250, pp. 62500E, April17- 18 2006, Orlando, Florida, USA. |
| 52 | “A New Secure Adaptive Steganographic Algorithm using Fibonacci Numbers” | 2006 IEEE Region 5 Technology and Science conference, San Antonio, USA, April 7-8 2006. |
| 53 | “T-order statistics and secure adaptive steganography” | Mathematical Methods in Pattern and Image Analysis, Proceedings of the SPIE, Volume 5916, pp. 91-100 San Diego, USA, 31July-4August 2005. |
| 54 | “Run Length Based Steganography for Binary Images” | Pattern Recognitions and Machine Intelligence: First International Conference, PReMI'05 December 20-22, 2005 ISBN 3-540-30506-8 (LNCS) pp. 481-484. |
| 55 | “Two Algorithms for Compressing Noise Like Signals” | SPIE Defense & Security Symposium, Signal Processing, Sensor Fusion and Target Recognitions XIV, March 28- April 1, 2005, Volume 5809, pp. 472-481 Florida, USA. |
| 56 | “Two New M-sequence Based Data Hiding Algorithms” | 7th International Conference of Pattern Recognition and Image Analysis: New Information Technologies (PRIA-7-2004), December 2004. |
| 57 | “Key Dependent Multi-Band Scaling Based Data Hiding” | Pacific Rim Workshop on Digital Steganography, November 2004, Japan, pp131-143. |
| 58 | “Watermarking Using Multi-Band Scaling Approach” | SCISS April 2004, Rice University, Houston, TX, (abstract publication) |
