Dr. V.  Thanikaiselvan

Dr. V. Thanikaiselvan

Associate Professor
Vellore Institute of Technology, India


Highest Degree
Ph.D. in Information Security from VIT University, India

Share this Profile

Area of Interest:

Computer Sciences
100%
Data Communication
62%
Image Processing
90%
Steganography
75%
Cryptography
55%

Selected Publications

  1. Velmurugan, T., D. Sumathi, K. Saravanan and V. Thanikaiselvan, 2016. A study and survey of handoff strategies in next generation wireless networks. Int. J. Appl. Eng. Res., 11: 4202-4213.
    Direct Link  |  
  2. Thanikaiselvan, V., T. Bansal, P. Jain and S. Shastri, 2016. 9/7 IWT domain data hiding in image using adaptive and non adaptive methods. Indian J. Sci. Technol., Vol. 9. 10.17485/ijst/2016/v9i5/87189.
    CrossRef  |  Direct Link  |  
  3. Thanikaiselvan, V., S. Shastri, S. Ahmad and S. Subashanthini, 2016. A new pixel value based steganography method for data security. Indian J. Sci. Technol., Vol. 9. 10.17485/ijst/2016/v9i37/102118.
    CrossRef  |  Direct Link  |  
  4. Shastri, S. and V. Thanikaiselvan, 2016. PVO based reversible data hiding with improved embedding capacity and security. Indian J. Sci. Technol., Vol. 9. 10.17485/ijst/2016/v9i5/87191.
    CrossRef  |  Direct Link  |  
  5. Thanikaiselvan, V. and P. Arulmozhivarman, 2015. Rand-Steg: An integer wavelet transform domain digital image random steganography using knight's tour. Secur. Commun. Networks, 8: 2374-2382.
    CrossRef  |  Direct Link  |  
  6. Thanikaiselvan, V., S. Subashanthini and R. Amirtharajan, 2014. PVD based steganography on scrambled RGB cover images with pixel indicator. J. Artif. Intell., 7: 54-68.
    CrossRef  |  Direct Link  |  
  7. Thanikaiselvan, V., P. Arulmozhivarman, S. Chakrabarty, A. Agarwa, S. Subashanthini and R. Amirtharajan, 2014. Comparative analysis of (5/3) and Haar IWT based steganography. Inform. Technol. J., 13: 2534-2543.
    CrossRef  |  Direct Link  |  
  8. Thanikaiselvan, V., S. Malpani and M. Garg, 2013. A new steganography for crypto cover files. Int. J. Eng. Technol., 5: 1594-1599.
    Direct Link  |  
  9. Thanikaiselvan, V., P. Gregorios, A. Mohile and M. Madhusudhanan, 2013. Reversible data hiding using histogram manipulations. Int. J. Appl. Eng. Res., 8: 601-610.
  10. Thanikaiselvan, V., P. Arulmozhivarman, S. Subashanthini and R. Amirtharajan, 2013. A graph theory practice on transformed image: A random image steganography. Scient. World J. 10.1155/2013/464107.
    CrossRef  |  
  11. Thanikaiselvan, V., K. Santosh, D. Manikanta and R. Amirtharajan, 2013. A new steganography algorithm against chi square attack. Res. J. Inform. Technol., 5: 363-372.
    CrossRef  |  Direct Link  |  
  12. Thanikaiselvan, V. and P. Arulmozhivarman, 2013. Horse communication against harsh attack: A stego ride. Res. J. Inf. Technol., 5: 263-276.
    CrossRef  |  Direct Link  |  
  13. Katira, R. and V. Thanikaiselvan, 2013. Random traversing based reversible data hiding technique using PE and LSB. Int. J. Eng. Technol., 5: 1579-1583.
    Direct Link  |  
  14. Amirtharajan, R., M.V. Abhiram, G. Revathi, J.B. Reddy, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Rubik's cube: A way for random image steganography. Res. J. Inform. Technol., 5: 329-340.
    CrossRef  |  Direct Link  |  
  15. Amirtharajan, R., G. Devipriya, V. Thanikaiselvan and J.B.B. Rayappan, 2013. High capacity triple plane embedding: A colour stego. Res. J. Inform. Technol., 5: 373-382.
    CrossRef  |  Direct Link  |  
  16. Amirtharajan, R., G. Aishwarya, M.S.K. Karthik, V. Thanikaiselvan and J.B.B. Rayappan, 2013. Bio-hiding for smart swipe card: A secret security. Res. J. Inform. Technol., 5: 100-112.
    CrossRef  |  Direct Link  |  
  17. Thanikaiselvan, V., P. Arulmozhivarman, R. Amirtharajan and J.B.B. Rayappan, 2012. Wavelet Pave the Trio travel for a secret mission: A stego vision. Global Trends Inform. Syst. Software Applic., 270: 212-221.
    CrossRef  |  Direct Link  |  
  18. Thanikaiselvan, V., P. Arulmozhivarman, R. Amirtharajan and J.B.B. Rayappan, 2012. Horse riding and hiding in image for data guarding. Proc. Eng., 30: 36-44.
    CrossRef  |  Direct Link  |  
  19. Thanikaiselvan, V., P. Arulmozhivarman, J.B.B. Rayappan and R. Amirtharajan, 2012. Graceful graph for graceful security-towards a STE (G) Raph. Res. J. Inform. Technol., 4: 220-227.
    CrossRef  |  Direct Link  |  
  20. Thanikaiselvan, V., S. Kumar, N. Neelima and R. Amirtharajan, 2011. Data battle on the digital field between horse cavalry and interlopers. J. Theor. Applied Inform. Technol., 29: 85-91.
    Direct Link  |