Dr. K B SHIVA KUMAR
Opp. Shikshak Bhavan, Beside Byraveshwara Bank,
Dr. S. Radhakrishnan Road
S.S.Puram, Tumkur – 572 102
Telephone No.: 0816 – 2273197
Mobile No.: 9448661097
Email Id: email@example.com
B.E: ELECTRONIC TELEPHONE EXCHANGE.
M.E: COLOR GRAPHIC TERMINAL.
MBA: MARKETING STRATEGIES OF TVS MOTORS
M.Phil: A STUDY ON CONSUMERS PERCEPTION AND ATTITUDE TOWARDS SOFT
DRINKS IN BANGALORE
Ph D: Area of Research: IMAGE PROCESSING
Title of the Work: SECURE COMMUNICATION USING STEGANOGRAPHY.
WORK EXPERIENCE: 33 years of Teaching Experience as on Jan 2017:
MEMBERSHIP IN PROFESSIONAL BODIES:
1. Counsellor, IGNOU.
2. Visiting faculty, SSIMS TUMKUR.
Guided more than 100 projects at UG level since 1984 and 30 projects at PG Level since 2006 and few are listed below:
Guided during 2008-09.
2. “Power saving system and Intelligent Security”.
3. “Pic Development and Applications”.
4.”Microcontroller based Notice Board display”.
1.GSM based Border security system.
2.Visual Cryptography for images.
Guided during 2009-10
Guided during 2010-11
Guided during 2011-2012
Palm Controlled System Using Video Processing
Guided during 2012-2013
1.Unique Technique for Video steganography.
2.GSN Based Energy meter reading with tampering alert.
1.Design of Low Power Dissipation TPG using LP-LFSR
2.Precision Aware Hardware Design for Discrete wavelet transform
Guided during 2013-2014
1.ARM Based ROBO CAR
2.Luggage Security System using Microcontroller.
1.Precision Aware of Self Quantizing Hardware Architecture for DWT/IWT.
2.Implementation of HP and BP FIR filter on FPGA using DA.
Guided during 2014-15
Multiprocessing Industrial Automation using CAN and Voice Processor
Guided during 2015-16
Guided during 2016-17
IoT Based Smart Flouriculture
“Hiding Technique Using FMM, Visual Cryptography and Genetic Algorithm”, International Journal for Research and Development in Engineering (IJRDE) Vol2: Issue3, May 2014.
Improved Security”, in the proceedings of Third International Conference on Emerging
Research in Computing, Information, Communication and Applications, ERCICA 2015 at
Nitte Meenakshi Institute of Technology, Bangalore held during 31st July – 01st
PAPERS PUBLISHED IN NATIONAL CONFERENCES:
List of International Publications:
“Hiding Technique Using FMM, Visual Cryptography and Genetic Algorithm”
Published on 26/05/2014
at International Journal for Research and Development in Engineering (IJRDE)
"Invariant Image Watermarking Based on Statistical Features in the low frequency Domain”, National Conference on Emerging Trends in Engineering & Mangement at PESITM, Shivamogga , pp. 26,March 2013.ISBN: 978-81-926416-0-7
"Private Key Steganography Based On Agent Technology", International conference on recent trends in signal processing, Image processing and VLSI, at Don Bosco Institute of Technology,Bangalore on 15th and 16th May-2015
"Secure Key Issuing Protocol Using Multiple Authority Approach”"Secure Key Issuing Protocol Using Multiple Authority Approach”, National Conference on Emerging Trends in Engineering & Mangement at PESITM, Shivamogga , pp. 40.March 2013.ISBN: 978-81-926416-0-7
"Secured Data Transmission using Knight and LSB Technique" in the International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques (ICEECCOT-2017)in association with IEEE Bangalore section at GSSS Institute of Engineering & Technology for Women, Mysuru on 15th & 16th December 2017.
"Secured Data transmission using Knight and LSB Technique", 2017 International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques (ICEECCOT), pp 253-259, ISSN: 978-1-5386-2361-9/17/$31.00 ©2017 IEEE, 15th -16th December 2017
"Secured Data Transmission using Text Steganography" published on 13/12/2016 in ICICT, Bangkok
A Ballot Agency Performance under Data Secure Techniques", International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2015): 6.391 Volume 5, pp 1973-1976, Issue 5, May 2016
Bit Length Replacement steganography Based on DCT Coefficients
Published on 12/10/2010
at International Journal of Engineering Science and Technology(IJEST)
“ A High Secure and Robust LSB image steganography using Hybrid Encryption, LZW Compression and Knight Tour Algorithm”
Published on 19/06/2014
at International Conference on Research Methods in Engineering and Technology
“ Advanced Control and Monitoring of Electric Grid”
Published on 07/01/2011
at International Conference on Smart Technologies(ICST)
“ Enhanced LSB image steganography using Hybrid Encryption, LZW Compression and Knight Tour Algorithm”
Published on 25/04/2015
at International Conference on Emerging Trends in Engineering Sciences (ICETES 2015)
“ Hiding Technique Using Genetic Algorithm Along with Steganography of FMM and Visual Cryptography ”
Published on 29/06/2014
at International Conference on International Conference on Information and Communication Engineering ( ICICE - 2014)
“ Improved Design of Low Power TPG Using LP-LFSR”
Published on 17/05/2013
at International Journal of Computer and Organisation Trends
“ Multiplier Based on Add and Shift bypassing Zero”
Published on 07/08/2011
at International Conference on Control, Communication and Computer Technology(CCCT 2011)