CURRICULUM VITAE
Name : K.Hariprakash Address : 5/164, Sathyamoorthy Salai,
E-mail : accfpu@r.postjobfree.com Lakshmanan Nagar,
accfpu@r.postjobfree.com Kanthanchavadi,
Phone : +91-750******* Chennai-600096.
+91-960******* Tamil Nadu.
Objective:
To learn and grow up in my career and to perform at my best in whatever role I am
positioned, which suits my present skills and work towards customer delight which will help in achieving the organizational goals..
Academic Profile:
2006-2010 : B.E in Electronics and Communication Engineering, Annamalai University.
(Chidambaram) with 80%.
10+2(HSC) : Venus Matriculation Hr. Sec. School, Chidambaram, 65%, Mar 2006.
10th (SSLC): Nirmala Matriculation Hr. Sec. School, Chidambaram, 67%, Mar 2004.
Credits: 2010 TANCET Score 42.227
Computer Proficiency:
Coding skills in C, C++, MatLab, SQL.
Proficient working with NS-2 in Linux OS, ADS, HFSS, Xilinx tools.
Experienced knowledge in Wireless Network System and Protocols, Routing, QoS,
Network Simulation and Performance Analysis.
Sound knowledge of MS Office, Excel, Photoshop.
Key skills:
Good listening and speaking skills.
Good communication skills.
Positive attitude and Confident.
Have patience and stamina.
Target oriented.
Ability to adopt to any situation and learn from it.
Work within time limit.
Courses:
IBM Mainframe-Application Programming
Modules known (OS/390, Z/OS, TSO/ISPF, JCL, VSAM, COBOL, DB2, CICS)
Certified Institute: MAPLES ESM TECHNOLOGIES PVT LTD.
Project Details:
UG Project:
Secured data hiding via Stegnography based on Text, Audio, and Video files.
ABSTRACT:
Steganography is the term used to describe the hiding of data in images to
avoid detection by attackers. It is an emerging area which is used for secured data
transmission over any public media. In this study a novel approach of image
steganography based on LSB (Least Significant Bit) insertion and RSA encryption
technique for the lossless jpeg images has been proposed. This paper discusses an
application which ranks images in a users library based on their suitability as cover
objects for some data. The data is matched to an image; so there is less chance of an
attacker being able to use steganalysis to recover the data. The application first
encrypts the data using RSA algorithm. The message bits are embedded into the
image using Least Significant Bits insertion. Before embedding, the message bits are
encrypted using RSA algorithm, resulting in increased robustness. This would
decrease the intentional attacks which try to reveal the hidden message. At the
receiver side reverse operation has been carried out to get back the original
information.
Hobbies: Reading Books, Listening Music, Playing Tennis, Prose-Writing, Surfing Net.
Personal Profile:
Father’s name : P.Kailasapathi
Mother’s name : K.Kaladevi
Date of Birth : 06-06-1989
Nationality : Indian
Marital Status : Single
Languages Known : English, Tamil, Telugu.
Declaration:
I hereby declare that the above details are true to the best of my knowledge and that I
will do my best for the good of the organization.
Date :
Place : Chennai (K.Hariprakash)