DEPARTMENTS
Dr. P. P. Deepthi
Dr. P. P. Deepthi

Professor

Office Address:

ECED-1 : 203, Department of Electronics and Communication Engineering National Institute of Technology Calicut, Kerala, India

Contact no:

0495-2286725

Email ID:

deepthi@nitc.ac.in

Home Address:

  • B Tech (University of Calicut)

  • M Tech (IISc)

  • PhD (NIT Calicut)

  • Educational Qualifications

    • B Tech (University of Calicut)

    • M Tech (IISc)

    • PhD (NIT Calicut)

    Journals

    • S. Alex, D. K J and D. P.P, "Privacy-Preserving and Energy-Saving Random Forest-Based Disease Detection Framework for Green Internet of Things in Mobile Healthcare Networks" in IEEE Transactions on Dependable and Secure Computing, vol. , no. 01, pp. 1-13, 5555. doi: 10.1109/TDSC.2023.3347342

    • Sreelakshmi P, Donuru Keerthi, Deepthi P P, “User grouping and resource management in efficient NOMA-OMA transmission scheme for infotainment message dissemination in VANETs”, in Transactions on Emerging Telecommunications Technologies, https://doi.org/10.1002/ett.4835

    • Sona Alex, Dhanaraj K. J. and Deepthi P. P.,” Energy Efficient and Secure Neural Network-based Disease Detection Framework for Mobile Healthcare Network” in ACM Transactions on Privacy and Security, https://doi.org/10.1145/3585536

    • Sreelakshmi Pazhoor, Jesy Pachat, A. A. Mahesh, Deepthi P P and B. S. Rajan, "Index Coded - NOMA in Vehicular Ad Hoc Networks," in IEEE Transactions on Vehicular Technology, 2022, doi: 10.1109/TVT.2022.3182891.

    • Jesy Pachat, A. A. Mahesh, Deepthi P P and S. Rajan, "Embedded Index Coding with Consecutive Side Information in Vehicle to Vehicle Communication," in IEEE Transactions on Vehicular Technology, doi: 10.1109/TVT.2022.3175785.

    • S. Alex, K. J. Dhanaraj and P. P. Deepthi, "Private and Energy-Efficient Decision Tree-Based Disease Detection for Resource-Constrained Medical Users in Mobile Healthcare Network," in IEEE Access, vol. 10, pp. 17098-17112, 2022, doi: 10.1109/ACCESS.2022.3149771.

    • Aneesh M. Koya, P.P.Deepthi, “Efficient on‑site confirmatory testing for atrial fibrillation with derived 12‑lead ECG in a wireless body area network”, Journal of Ambient Intelligence and Humanized Computing, 2021 Nov 26;1-19. doi: 10.1007/s12652-021-03543-9

    • J. Pachat, N. S. Karat, A. A. Mahesh, Deepthi P. P. and B. S. Rajan, “Index Coded PSK Modulation in Vehicle to Vehicle Communication," Accepted for publication in IEEE Transactions on Vehicular Technology-available as early access article, doi: 10.1109/TVT.2021.3073788.

    • Lakshmi V.S., Deepthi S., Deepthi P.P. “Collusion Resistant Secret Sharing Scheme for Secure Data Storage and Processing over Cloud” Journal of Information Security and Applications, Elsevier, Volume 60, August 2021, https://doi.org/10.1016/j.jisa.2021.102869

    • J. Pachat, N. S. Karat, P. P. Deepthi and B. S. Rajan, “Index Coding in Vehicle to Vehicle Communication," in IEEE Transactions on Vehicular Technology, vol. 69, no. 10, pp. 11926-11936, Oct. 2020, doi: 10.1109/TVT.2020.3006441.

    • Sona Alex, Deepthi P. P. and Dhanaraj K. J., "SPCOR: A Secure and Privacy-Preserving Protocol for Mobile-Healthcare Emergency to Reap Computing Opportunities at Remote and Nearby," IET Information Security, Nov 2020. DOI:  10.1049/iet-ifs.2020.0086

    • Amit Satish Unde and Deepthi P. P., “Adaptive compressive video coding for embedded camera sensors: Compressed domain motion and measurements estimation,” IEEE Transactions on Mobile Computing. DOI: 10.1109/TMC.2019.2926271.

    • Aneesh M. Koya and Deepthi P. P., “Plug and play self-configurable IoT gateway node for secure telemonitoring of ECG,” Computers in Biology and Medicine, Elsevier vol.112, pp. 103359, September 2019.

    • V.S. Lakshmi, P.P. Deepthi, “A Secure Regenerating Code based Cloud Storage with Efficient Integrity Verification”, International Journal of Communication Systems, Wiley, April 2019, https://doi.org/10.1002/dac.3948

    • V.S. Lakshmi, P.P. Deepthi, "An Efficient Scheme for Secure Domain Medical Image Fusion over Cloud”,  Multimedia Tools and Applications, Springer, DOI: https://doi.org/10.1007/s11042-019-7378-x

    • Amit Satish Unde, and Deepthi P. P., “Design and Analysis of Compressive Sensing Based Lightweight Encryption Scheme for Multimedia IoT” IEEE Transactions on Circuits and Systems II: Express Briefs, Feb. 2019. doi:10.1109/TCSII.2019.2897839

    • V.S. Lakshmi, P.P. Deepthi, "A secure channel code‐based scheme for privacy preserving data aggregation in wireless sensor networks”, International Journal of Communication Systems, Wiley, vol. 32, Issue 1, Jan. 2019, doi:http://dx.doi.org/10.1002/dac.3832

    • Aneesh M. Koya, Deepthi P. P., “Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network,” Computer Networks, Elsevier, vol. 40, pp. 138-151, July 2018. doi:https://doi.org/10.1016/j.comnet.2018.05.006

    • A.S. Unde, P.P. Deepthi, “Rate-distortion analysis of structured sensing matrices for block compressive sensing of images”, Signal Processing: Image Communication, Elsevier, vol. 65, pp. 115 – 227, July 2018.doi: https://doi.org/10.1016/j.image.2018.

    • A.S. Unde, P.P. Deepthi, “Fast BCS-FCOUSS and DBCS-FOCUSS with augmented Lagrangian and minimum residual methods”, Journal of Visual Communication and Image Representation, Elsevier, vol. 52, pp. 92 – 100, Apr. 2018.doi: https://doi.org/10.1016/j.jvcir.2018.02.009

    • Stuart, C.M., Deepthi, P.P., “Nonlinear Cryptosystem Based on QC-LDPC Codes for Enhanced Security and Reliability with Low Hardware Complexity and Reduced Key Size” Wireless PersCommun(Springer )Issue 3,pp:4177-4197.Vol 96, Oct 2017

    • A.S. Unde, P.P. Deepthi, “Block Compressive Sensing: Individual and Joint Reconstruction of Correlated Images”, Journal of Visual Communication and Image Representation, Elsevier, vol. 44, pp. 187 – 197, Apr. 2017. doi: http://dx.doi.org/10.1016/j.jvcir.2017.01.028.

    • Celine Mary Stuart, Spandana K., Dhanaraj K.J., Deepthi P. P., “Design and implementation of hardware-efficient modified Rao–Nam scheme with high security for wireless sensor networks”, Journal of Information Security and Applications, Elsevier vol. 29, pp. 65 – 79, Aug. 2016.

    • Celine Mary Stuart and P.P. Deepthi, "FPGA implementation of highly secure, hardware-efficient QC-LDPC code based nonlinear cryptosystem for wireless sensor networks", International Journal of Communication Systems, Wiley, pp. 1 – 16, Dec 2016.

    • Jilna P., Deepthi P.P., Jayaraj U.K., “Hardware Implementation of an Efficient Key Management Scheme for Wireless Sensor Networks”, International Journal of Intelligent Computing Research (IJICR), Vol. 7, no. 1, pp. 663 - 671, 2016.

    • Celine Mary Stuart, Deepthi P.P., “A novel low-complexity scheme for improving security of NLFG-based symmetric key cryptosystem using secure concatenated RS–QCLDPC code”, Security and Communication Networks, Wiley, pp. 2888 – 2900, 2015. DOI: 10.1002/ sec.1215.

    • Jilna P. and Deepthi P.P., “A key management technique based on elliptic curves for static wireless sensor networks”, Security and Communication Networks, Wiley, vol. 8, no. 18, pp. 3726-3738, 2015.

    • Jilna P. and Deepthi P. P., “Pseudorandom Bit Sequence Generator for Stream Cipher Based on Elliptic Curves”, Mathematical Problems in Engineering, Hindawi, vol. 2015, Article ID 257904, 16 pages, 2015.

    • Sudhish N. George, Nishanth Augustine, Deepthi P. P., “Audio security through compressive sensing and cellular automata” Multimedia Tools and Applications, Springer, Vol. 74, Issue 23, pp 10393–10417, December 2015. doi:10.1007/s11042-014-2172-2

    • Nishanth Augustine, Sudhish N George, Deepthi P P, “An audio encryption technique through compressive sensing and Arnold transform”, International Journal of Trust Management in Computing and Communications, Inderscience, Vol. 3, No. 1, 2015.

    • Sudhish N George and Deepthi P Pattathil, “Multiple chaotic maps based secure measurement matrix generation for multimedia compressive sensing”, International Journal of Signal and Imaging Systems Engineering (Inderscience), vol. 9,no. 1, 2015.

    • Sudhish N George and Deepthi P Pattathil, “A novel approach for secure compressive sensing of images using multiple chaotic map”, Journal of Optics (Springer), Vol. 43, No. 1, pp. 1-17, 2014.

    • 20 . Sudhish N George and Deepthi P P, “A secure LFSR based random measurement matrix for compressive sensing”, Sensing and Imaging: An International Journal (Springer), Vol. 15, No. 1, pp. 1-29, 2014.

    • Sudhish N George, Arun Raj R and Deepthi P P, “A new framework for encryption and authentication multimedia data”, International Journal of Multimedia and Ubiquitous Engineering, Vol. 8, No. 5, pp. 105-118, 2013.

    • Sudhish N G and Deepthi P P, “Key Based Huffman Table for Multimedia Content Protection”, Int. Journal of Multimedia and User design and User Experience, vol.25, no.1, pp. 1103-1108, Mar 2013.

    • Anoop B N, Sudhish N G, and Deepthi P P, “Secure Image Transcoding Technique Using Chaotic Key Based Algorithm”, Int.l Journal of Advanced Computer Research, vol. 2, no.4, pp: 84-88, Dec 2012.

    • Deepthi P P and Sathidevi P S, “Design, Implementation and Analysis of Hardware Efficient Stream Ciphers Using LFSR Based Hash Functions”, Computers and Security (Elsevier Publishers), vol.28, no. 3-4, pp. 229-241, May-Jun. 2009.

    • Deepthi P P., Lakshmi V S, and Sathidevi P S, “A New Hardware Efficient Stream Cipher Based on Hash Functions”, Int. Journal of Communication Networks and Distributed Systems, (Inderscience Publishers), vol. 3, no.4, pp. 340 -361, 2009.

    • Deepthi P P and Sathidevi P S, “New Stream Ciphers Based on Elliptic Curve Point Multiplication”, Computer Communications (Elsevier Publishers), vol. 32, no. 1, pp. 25- 33, Jan. 2009.

    • Deepthi P P, Deepa S J, and Sathidevi P S, “Design and Analysis of a Highly Secure Stream Cipher Based on Linear Feedback Shift register”, Computers and Electrical Engineering, (Elsevier Publishers), vol. 35, no. 2, pp. 235-243, Mar. 2009

    • Deepthi P P , Nithin V S , and Sathidevi P S “Implementation and Analysis of Stream Ciphers Based on the Elliptic Curves” Computers and Electrical Engineering, (Elsevier Publishers), vol. 35, no. 2, pp. 300-314, Mar. 2009.

    • Deepthi P P and Sathidevi P S, “Hardware Stream Cipher Based on LFSR and Modular Division Circuit”, Int. Journal of Electronics, Circuits and Systems, vol. 2, no. 4, pp. 224-232, Fall 2008.

    • Dhanaraj K J, Deepthi P P, and Sathidevi P S, “FPGA Implementation of a Pseudo Random Bit Sequence Generator Based on Elliptic Curves”, ICGST- Programmable Devices, Circuits and Systems (PDCS) Journal, vol. 7, no. 1, pp. 23-31, May 2007

    Conferences

    • Rathlavath Likhitha, Sreelakshmi P, Deepthi P P, Nujoom Sageer Karat, “User Clustering and Optimum Bandwidth allocation for Down link Multi-carrier NOMA”, Accepted in  IEEE Region 10 Conference TENCON 2023
    • N. Sai Mani Rohith and Deepthi P. P, “A Novel Scheme for Adversarial Training to Improve the Robustness of DNN Against White Box Attacks” 7th International Conference on Computer Vision and Image Processing (CVIP) Nov 2022, VNIT Nagpur
    • Sreelakshmi P,Jesy P, Nujoom Sageer Karat, Vinay Joseph, Deepthi P. P., B.S Rajan, “Optimal Index Code Design for IC-NOMA Transmission in VANETs” IEEE 96th Vehicular Technology Conference, Sept 2022
    • Sreelakshmi P, Jesy pachat, Anjana. A. Mahesh, Deepthi P. P and B. S.Rajan, “Index Coded - NOMA in Vehicular Ad Hoc Networks", IEEE 95th Vehicular Technology Conference, 2022.
    • Jesy pachat, Deepthi P. P and B. S.Rajan, “Index Coded Modulation in Network to Vehicle (N2V) communication", IEEE 95th Vehicular Technology Conference, 2022.
    • Donuru Keerthi, Sreelakshmi P and Deepthi P.P, "Optimum Power Allocation for Power Efficient NOMA." in IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), Bangalore, 2022.
    • K.M.Sankar Nampoothiri, Kalyani N Menon, Sayed Muhsin, Senna Manoj, Sooraj P, Dhanaraj K J, Deepthi P P “A High Throughput QC-LDPC Decoder Architecture for Near-Earth Satellite Communication” , Accepted in 4th IEEE-ICCSS 2021, May 2021, Malaysia
    • Liya Mary Jacob, Sreelakshmi P and Deepthi P.P, "Physical Layer Security in Power Domain NOMA through Key Extraction” Accepted in 12th ICCCNT 2021, IIT Kharagpur,WB
    • J. Pachat, N. S. Karat, A. A. Mahesh, Deepthi P. P. and B. S. Rajan, “Index Coded PSK Modulation in Vehicle to Vehicle Communication," Presented in IEEE Vehicular Technology Conference-April 2021.
    • E. Devi, Deepthi P.P., “Iris Based Privacy-Preserving Biometric Authentication Using NTRU Homomorphic Encryption”, Int. Conf. on Machine Learning, Image Processing, Network Security and Data Sciences(MIND-2019), NIT Kurukshetra March, 2019
    • Lakshmi V.S., Deepthi P.P., “Error Correction Scheme for Regenerating Code based Distributed Storage Systems”, in Proc. of Int. Conf. On Communication Engineering and Technology (ICCET 2018), pp. 5-7, Singapore, 24-26 Feb 2018. doi:10.1145/3194244.3194246
    • Deepthi S., Lakshmi V.S., Deepthi P.P., “Image processing in encrypted domain for distributed storage in cloud”, in Proc. of Int. Conf. on Wireless Communication, Signal Processing and Networking (WISPNET 2017), pp. 1478-1482, Chennai, India, 22-24 Mar 2017.doi: 10.1109/WiSPNET.2017.8300008
    • Lajitha Raj K., Lakshmi V.S., Deepthi P.P., “Secure Querying of Outsourced Medical Images”, in Proc. of Int. Conf. on Wireless Communication, Signal Processing and Networking (WISPNET 2017), pp. 1218-1222, Chennai, India, 22-24 Mar 2017.doi: 10.1109/WiSPNET.2017.8299957
    • Jilna P., Deepthi P.P. "Light weight key establishment scheme for wireless sensor networks", in Proc. Sixth International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2016), Hyderabad, India, pp. 124 – 137, Dec 2016.
    • Teena P. Jose and Deepthi P. P, “Secure Sensor Node Design for ECG in Body Area Network”, IEEE TENCON 2016, 22-25 Nov 2016, Singapore.
    • Amit Satish Unde, Ravikumar Malla and Deepthi P. P., “Low Complexity Secure Encoding and Joint Decoding for Distributed Compressive Sensing in WSNs”, 3rd IEEE International Conference on Recent Advances in Information Technology, 3-5 March 2016.
    • Jilna P., Deepthi P.P. and Jayaraj U. K., "Optimized Hardware Design and Implementation of EC based Key Management Scheme for WSN",in Proc. 10th International Conference on Internet Technology and Secured Transactions (ICITST 2015), London, UK, Dec.2015, pp. 164-169.
    • Priya Mathew, Jilna P., Deepthi P.P, "Efficient Implementation of EC based Key Management Scheme on FPGA for WSN", 9th International Conference on Telecommunication Systems Services and Applications (TSSA 2015), Bandung, Indonesia., DOI: 10. 1109/TSSA. 2015.
    • Jilna P., Deepthi P.P., Sameer Saheerudeen Mohammed, Sathidevi P.S. and Vijitha A. P., “FPGA Implementation of an Elliptic Curve Based Integrated System for Encryption and Authentication”, IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (IEEE SPICES 2015), Feb 19-21, Kerala, India, February 2015.
    • Celine Mary Stuart and Deepthi P. P., “Hardware Efficient Scheme for Generating Error Vector to Enhance the Performance of Secure Channel Code”, IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (IEEE SPICES 2015), Feb 19-21, Kerala, India, February 2015
    • Stuart, C. M., Deepthi, P. P., “Low Complex System for Physical Layer Security Using NLFG and QCLDPC Code”, Second International Symposium on Security in Computing and Communications, (SSCC 2014), September 24 – 27, 2014, New Delhi, Springer Berlin Heidelberg Proceedings pp. 313-324.
    • Abhishek, Sudhish N George, Deepthi P P, “PWLCM based secure measurement matrix generation for secure video compressive sensing”, Springer, Second Int. Symposium Security in Computing and Communications (SSCC-14), New Delhi, India, September 2014
    • Nishant Augustine, Sudhish N George, Deepthi P P, “Compressive Sensing based Audio Watermarking using SVD and DM Quantization", Elsevier Int. Conf. Signal and Speech Processing (ICSSP-14), Kerala, India.
    • Jesy P, Deepthi.P.P, "Joint Source channel Network Coding Using QCLDPC codes", IEEE Int. Conf. Communication and Signal Processing (ICCSP-2014)
    • Anoop B N, Dr. Sudhish N George, Dr. Deepthi P P,” Secure video transcoder based on correlation preserving sorting algorithm”, IEEE Int. Conf. Control, Instrumentation, Communication and Computational Technologies (ICCICCT-2014), pp. 771 – 775, May 14, 2014, Tamilnadu, India.
    • Sarika T, Deepthi P P, “A channel coder design for a high speed and less complex communication system using QC-LDPC codes”, IEEE Int. Conf. Communication and Signal Processing (ICCSP-2014), pp. 326-330, April 3-4 2014, India
    • Nishant Augustine, Sudhish N George and Deepthi P P, “Compressive sensing based Audio Scrambling using Arnold Transform”, Springer, Int. Conf. Security in Computer Networks and Distributed Systems (SNDS-2014), pp. 172- 183, Mar 2014.
    • Jilna P and Deepthi P P, “Implementation of an Elliptic Curve Based Message Authentication Code for Constrained Environments”, Springer, Int. Conf. Security in Computer Networks and Distributed Systems (SNDS-2014), pp. 520-529, Mar 2014.
    • Nishant Augustine, Sudhish N George and Deepthi P P, “Compressive sensing based audio scrambling using cellular automata”, IEEE Int. Conf. Electronics, Computing and Communication Technologies (CONECCT-2014), pp. 1-5.
    • Shine P James, Sudhish N George and Deepthi P P, “An audio encryption technique based on LFSR based alternating step generator”, IEEE Int. Conf. Electronics, Computing and Communication Technologies (CONECCT-2014), pp. 1-6, Jan 2014.
    • Abhishek, Sudhish N George and Deepthi P. P, “PWLCM based image encryption through compressive sensing”, IEEE Int. Conf. Recent Advances in Intelligent Computational Systems (RAICS-2013), pp. 48-52, Dec 2013.
    • Sruthi K and Deepthi P P “FPGA Implementation of Regular Parallel LDPC Decoder Using Min Sum Algorithm” in Proc. 2nd International Conference on Recent Advances in Sciences and Engineering, ICRASE 2013, pp 201-204, Hyderabad, India, Apr. 2013
    • Sarika K T andDeepthi P P “A Novel High Speed Communication System Based on the Concatenation of RS and QC-LDPC Codes” in Proc. IEEE International Conference on Microelectronics, Communications and Renewable Energy (ICMiCR) 2013, pp 1-5, Kerala, India, Jun. 2013.
    • Shine P James, Sudhish N George, and Deepthi P P, “Secure Selective Encryption of Compressed Audio” in Proc. IEEE International Conference on Microelectronics, Communications and Renewable Energy (ICMiCR) 2013, pp 1-6, Kerala, India, Jun. 2013.
    • Athira A, Sudhish N G, and Deepthi P P,” A Novel Encryption Method Based on Compressive Sensing”, in Proc. Int. Multi Conference on Automation, Computing, Control, Communication and Compressed Sensing- 2013, pp.271 – 275, Kerala, India, Mar. 2013.
    • Anoop B N, Sudhish N G, and Deepthi P P, “Secure Image Transcoding Technique Using Chaotic Key Based Algorithm with Improved Security”, in Proc. Int. Multi Conference on Automation, Computing, Control, Communication and Compressed Sensing- 2013, pp. 693 – 697, Kerala, India, Mar. 2013.
    • Nisha P K N, Deepthi P P, and Lalmohan K S, “Design and Analysis of Stream Cipher of Low Hardware Complexity” Proc. 2012 International Conference on Communication Systems and Network Technologies (CSNT-2012), Rajkot, India, pp. 858 – 862, May 2012.
    • Nandan S, Deepthi, P P, and Celine M S, “Low Complex Crypto Based Channel Coding”, Proc. 2012 International Conference on Communication Systems and Network Technologies (CSNT-2012), Rajkot, India, pp. 863-868, May 2012.
    • Subeesh V, Sudhish N G, and Deepthi P P, “An Integrity Verification System for Images using Hashing and Watermarking”, Proc. 2012 International Conference on Communication Systems and Network Technologies (CSNT-2012), Rajkot, India, pp. 85-89 May 2012.
    • Raghu I and Deepthi P P, “Multimodal Biometric Encryption Using Ridge and Iris Feature Map”, in Proc. 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science (SCEECS), pp 1-5, MANIT Madhya Pradesh, India, Mar. 2012
    • Arun Raj R, Sudhish N. G, and Deepthi P P “An Expeditious Chaos Based Digital Image Encryption”, in Proc. IEEE International Conference on Recent Advances in Information Technology (RAIT – 2012), Indian School of Mines, Dhanbad, India, pp 14-18, Mar. 2012.
    • Jithendra K B, Lalmohan K S, and Deepthi P P “FPGA Implementation of Secure Time Shared Hash Stream Cipher”, in Proc. International Conference on Computational Intelligence and Communication Systems, Gwalior, India., pp 381-385, Oct. 2011.
    • Shanthini K S and Deepthi P. P. “Ridge Feature Map Based Biometric Encryption”, in Proc. IASTED International Conference on Signal and Image Processing and Applications (SIPA 2011), Crete, Greece, pp. 208- 214, Jun. 2011.
    • Resmi K R, Deepthi P P, and Sudhish N G “A New Scheme for Digital Fingerprinting of Images Based on Low Density Parity Check Codes”, in Proc. IASTED International Conference on Signal and Image Processing and Applications (SIPA 2011), Crete, Greece, pp. 215- 222, Jun. 2011
    • Jilna P, Lalmohan K S, and Deepthi P P “Hardware Efficient Implementation of Encryption and Key Exchange Based on Elliptic Curves”, in Proc. IASTED International Conference on Signal and Image Processing and Applications (SIPA 2011), Crete, Greece, pp. 230- 235, Jun. 2011
    • Ashok L, Deepthi P P, and Celine M S, “Embedding Secrecy in Channel Coding with Low Density Parity Check Codes”, in Proc. IASTED International Conference on Signal and Image Processing and Applications (SIPA 2011), Crete, Greece, pp. 236- 241, Jun. 2011
    • Ancy S A, Deepthi PP, and P S Sathidevi, "Cryptanalysis and Security Comparison of Two Clock Controlled Generators", in Proc. International Conference on Computer Networks and Security ICCNS 08, Pune, India, pp. 264 – 269, Sep. 2008.
    • Lakshmi V S, Deepthi P P, and Sathidevi P S, “Hardware Efficient Stream Cipher Based on Hash Function”, in Proc. International Conference on Computer Networks and Security ICCNS 08, Pune, India, pp. 274 – 279, Sep. 2008.
    • Deepa S J, Deepthi P P, and Sathidevi P S “Linear Feedback Shift Register Based Stream Ciphers” in Proc. IASTED International Conference on Communication, Network and Information Security (CNIS 2007), Berkeley, USA, pp. 22-27, Sep. 2007.
    • Nithin V S, Deepthi P P , Dhanaraj K J, and P S Sathidevi “Stream Ciphers Based on the Elliptic Curves” in Proc. International Conference on Computational Intelligence & Multimedia Applications ICCIMA 07, Tamil Nadu, India, pp. 99-104, Dec. 2007.
    • Abida K, Deepthi P P and P S Sathidevi, “New Methods for Gray Level and Color Visual Cryptography”, in Proc. International conference on Advanced Computing and Communication ICACC, Tamilnadu, India, pp.716-719, Feb. 2007.
    • Deepthi.P P, Vidya S B and P S Sathidevi, “Generation of innocent shares for visual cryptography”, in Proc. IEEE International Conference on Signal & Image Processing, Karnataka, India, pp. 659-661, Dec. 2006.
    • Deepthi.P P, Celine M S, Sreelekha.G and P S Sathidevi, “Compression Tolerant DCT Based Perceptual Image Hash Incorporating Human Visual System Model”, in Proc. IEEE International Conference on Signal & Image Processing, Karnataka, pp. 662-665, Dec. 2006.
    • Rama Krishna J, P S Sathidevi and Deepthi P P, “Partial Encryption of Subband Coded Speech Using Psychoacoustic Analysis” in Proc. First International Conference on Emerging Applications of IT, EAIT 2006, Kolkata, India, pp.31-34, Feb. 2006.

     

    1. Title : Wavelet Based Speech Enhancement for the hearing impaired  (CO-PI)

        Funding Agency: MHRD 

        Duration: 2003-07

    2.Title :Design and Implementation of a Secure Communication System for Reduced Complexity (PI)

        Funding Agency: DIT

        Duration: 2013-15

    3. Title: VLSI implementation of Low Density Parity Check (LDPC) Encoder/Decoder (PI)

        Funding Agency: ISRO - RESPOND

        Duration: 2019-22

    4. Title: High-Fidelity Sinusoidal Synthesizer for HRG Whole Angle Tracking (CO-PI)

        Funding Agency: ISRO - RESPOND

        Duration: 2023-25

    Ph.D Scholars

    1. Sreelakshmi P:  Secure and efficient communication in V2X networks with NOMA and Index Coding
    2. Aiswarya S – Secure communication in networks
    3. Arun K Nath – Index coding in coded caching problems
    4. Sadina K – Deep learning for coded caching

    M.Tech Students

    1. Amna Jasmin K - Private Information Retrieval
    2. Naman Kumar Jain - Deep learning Based Image Denoising

    B Tech Students

    1. Polishetti Varshasri, Mogili Sai Dakshita, Dungavath Hima Bindu Bai, Chitturi Sakshvith Sanjeev - Intrusion Detection 

    Ph.D:

    1. Sudhish N. George: Design and Development of Low Complexity Schemes for Multimedia Information Security
    2. Celine Mary Stuart: Design and Development of Hardware Efficient Schemes for Secure Channel Coding
    3. Jilna P. : Design and Implementation of Elliptic Curve Based Integrated Cryptosystem for Resource Constrained Applications
    4. Amit Satish Unde: Compressive Sensing Based Secure and Lightweight Source Coding Scheme for Wireless Camera Sensors
    5. Lakshmi V.S. : Design and Analysis of Cryptographic Schemes for Secure Data Processing in Distributed Storage Systems
    6. Aneesh M. Koya : Efficient and secure lightweight system for ECG telemonitoring in wireless body area network
    7. Jesy P.: Design and development of index coding based schemes for efficient infotainment message dissemination in vehicle to everything networks
    8. Sona Alex : Design and Development of Secure and Energy Efficient Schemes for Health Data Processing in Mobile Healthcare Networks

     

    M.Tech:

    1. HMM Based Isolated Word Recognition (2002 -2003)
    2. Implementation of Wideband Adaptive Multirate Speech Codec on Blackfin Processors- ADSP BF535 (2003 - 2004)
    3. Implementation of Visual Cryptography (2005 - 2006)
    4. Perceptual Image Hashing (2005 - 2006)
    5. FPGA Implementation of Elliptic Curve Cryptosystem (2005 - 2006)
    6. Visual Cryptography for Gray Scale and Color Images (2006 - 2007)
    7. Implementation and Analysis of Linear Feedback Shift Register Based Stream Ciphers (2006 - 2007)
    8. Implementation and Analysis of a Cryptographically Strong Pseudorandom Number Generator based on the Elliptic Curve Discrete Logarithm Problem (2006 - 2007)
    9. Cryptanalysis of Linear Feedback Shift Register Based Stream Ciphers (2007 - 2008)
    10. Pseudorandom Number Generators Based on One-Way Functions (2007 - 2008)
    11. Design and Analysis of Stream Ciphers (2008 - 2009)
    12. Biometric Encryption (2008 - 2009)
    13. Combining Cryptographic Operations for complexity reduction (2009 - 2010)
    14. Belief Propagation Methods for Error Correction in Communication Systems (2009 - 2010)
    15. Joint Channel Coding and Cryptography (2010 - 2011)
    16. Joint Fingerprinting & Decryption (2010 - 2011)
    17. Design & Implementation of a Secure Communication System of Low Hardware Complexity (2010 - 2011)
    18. Estimation Problems of Fighter aircraft at high angles of attack (2010 - 2011)
    19. Low Complex Crypto Based Channel Coding (2011 - 2012)
    20. Multimedia Compression & Encryption (2011 - 2012)
    21. Image & Video Encryption (2011 - 2012)
    22. Design & Analysis of Cryptographic Tools of Low Hardware Complexity (2011 - 2012)
    23. Image and Video Hashing (2011 - 2012)
    24. Digital Fingerprinting (2011 - 2012)
    25. Joint Source Channel Coding (2011 - 2012)
    26. Multimodal Biometric Encryption (2011 - 2012)
    27. A Channel Coder Design for Low Error, Less Complex and High Speed Communication Systems (2012 - 2013)
    28. Digital Fingerprinting in Encrypted Domain (2012 - 2013)
    29. Visual Cryptography Based Image Authentication and Copyright Protection (2012 - 2013)
    30. FPGA Implementation of Regular Parallel LDPC Decoder (2012 - 2013)
    31. Signal Processing in Encrypted Domain (2013 - 2014)
    32. Audio Algorithm Development & Optimization on Set-Top Box Chip with Dual-Core SIMD Processor (2013 - 2014)
    33. Distributed Joint Source Channel Network Coding (2013 - 2014)
    34. Non-Binary Source Channel Network Coding (2014 - 2015)
    35. Joint Reconstruction of Correlated Signals in Sensor Networks Using Distributed Compressive Sensing (2014 - 2015)
    36. Unequal Error Protection for Multimedia Communication (2014 - 2015)
    37. Body Area Network: Sensor Node Design (2015 - 2016)
    38. Distributed Source Coding in Wireless Sensor Network (2015 - 2016)
    39. Storage and Bandwidth Efficient Codes for Distributed Storage (2015 - 2016)
    40. Secure signal processing for cloud computing (2016-17)
    41. Secure querying of outsourced images for cloud storage (2016-17)
    42. Biometric authentication system in Encrypted domain using finger print (2017-18)
    43. Channel Coding for 5G – Polar Codes  (2017-18)
    44. Hardware Implementation of Polar code encoder & decoder - Nikita (2018-19)
    45. Iris Based Privacy-Preserving Biometric Authentication - Devi E (2018-19)
    46. Cloud Based Privacy-Preserving Remote HealthMonitoring system for IoT (2018-19)
    47. Cloud-Based Privacy-Preserving Computer-Aided Disease Diagnosis System - Ramya B  (2019-20)
    48. Blockchain Based Secure Decentralized Vehicle Communication - Haritha V (2019-20)
    49. Hardware Implementation of LDPC Encoder and Decoder for Space Applications - Abhishek Kumar Singh (2019-20)
    50. Physical Layer Security in Power-Domain Noma Through Key Extraction - Liya Mary Jacob (2020-21)
    51. Securing Deep Learning Based Classification Against Adversarial Attack - Mane Pooja (2020-21)
    52. Clustering schemes for efficient transmission in power domain NOMA- Donuru Keerthi – (2021-22)
    53. Analysis and development of defense methods for adversarial machine learning - Sai Mani Rohit – (2021-22)
    54. X-Ray Image Denoising for Baggage Screening Using Learning Based Methods - V. V. Poorna Sekhar (2022-23)
    55. User Clustering and Optimum Bandwidth Allocation for Downlink MC-NOMA - Rathlavath Likhitha (2022-23)

     B.Tech:

    1. Automatic Speech Recognition (2001 - 2002)
    2. Implementation of PC Based Logic Analyser using FPGA (2002 - 2003)
    3. Microcontroller Based GPIB Interface Card (2002 - 2003)
    4. Microcontroller Based Direct Digital Synthesis (2002 - 2003)
    5. Robust Image Hashing (2003 - 2004)
    6. Implementation of JPEG 2000 Standard (2003 - 2004)
    7. Selective Image Encryption (2004 - 2005)
    8. Implementation of Secure Communication System on TMS 320C6711 DSK (2004 - 2005)
    9. Hardware Implementation of Stream Cipher (2005 - 2006)
    10. Secure Multimedia Multicast with Dynamic Key Engine (2005 - 2006)
    11. Joint Source Channel Coding (2006 - 2007)
    12. Color Image Encryption (2007 - 2008)
    13. Image Hashing (2008 - 2009)
    14. Embedding Security in Channel Coding (2009 - 2010)
    15. Digital Fingerprinting (2010 - 2011)
    16. Audio & Image Steganography and Steganalysis (2010 - 2011)
    17. Joint Scheme for Physical Layer Error Correction and Security (2011 - 2012)
    18. Design & Analysis of a Conditional Access System for Secure Communication in Pay TV (2011 - 2012)
    19. Signal Processing in Encrypted Domain (2012 - 2013)
    20. Unequal Error Protection using LDPC Codes (2014 - 2015)
    21. Efficient Key Exchange Scheme for Wireless Sensor Networks (2014 - 2015)
    22. Joint Source Network Coding for Large Scale Sensor Networks (2014 - 2015)
    23. Secure Source Coding for Body Area Networks (2015 - 2016)
    24. Error and Erasure Correcting Codes for Distributed Storage Systems (2015 - 2016)
    25. Distributed Source Coding of Correlated Sources (2015 - 2016)
    26. Implementation of PUF based RFID tags (2016-17)
    27. Virtual integrated environment based driving simulator (2016-17)
    28. Privacy Preserving Data Mining for Health data (2018-19)
    29. Enhanced Data Security Using Blockchain (2018-19)
    30. Privacy Preserving Health Decision Support System (2019-20)
    31. Privacy Preserving Disease Detection using Neural Networks (2020-21)
    32.  Cybersecurity in IoT Devices (2022-23)

    Memberships

    1. Member, IEEE
    2. Life member, ISTE

    UG Courses

    1. Electromagnetic Field Theory 

    2. Industrial Electronics 

    3. Linear Integrated Circuits 

    4. Signals and Systems 

    5. Digital Communication 

    6. Cryptography: Theory & Practice 

    7. Information Theory & Coding 

    PG Courses

    1. Information Theory

    2. Coding Theory 

    3. Digital Communication Techniques 

    4. Theory of Error Control Coding 

    5. Estimation & Detection Theory 

    6. Adaptive Signal Processing

    7. Statistical Signal Processing

    8. Mathematical Techniques for Electronics Design

    1.Communication Theory and Systems II

    Department Responsibilities

    Lab in Charge of UG lab (2001 - 2019)

    Time Table in-charge (1/6/2006 – 30/07/2015)

    M.Tech Program Coordinator for Signal Processing stream (1/6/2010 – 30/07/2015)

    Purchase Coordinator (2015 - 2018 )

    Faculty Advisor and Class Chairperson of B Tech (2001 – 2005, 2006 – 2010, 2015 -19)

    Department NBA Coordinator (June 2022 onwards)

    Institute Responsibilities

    Member of Institute Research and Consultancy Committee (17/10/2011 – 16/10/2012)

    Member of Women Complaint Cell (04/10/2012 – 04/04/2014)

    Associate Dean (Faculty Welfare) (4/3/2013 – 3/3/2015)

    Convener of Screening Committee (10/7/2014 – 3/3/2015)

    TEQIP nodal officer for Training & Development  (2013 - 2018)

    Member of NBA Accreditation Committee 

    NSS Programme Officer (2017- 19)

    Ladies Hostel Warden (2017-18)

    Chairperson (PG Admissions) - (2018 - 20)

    Head of Department of ECE (2020 - 22)

    Vice Chair, Centre for Quality Assurance and Enhancement (June 2022 onwards)

    Institute NBA Coordinator (March 2023 onwards)