Department of Electronics and Electrical Engineering
Indian Institute of Technology Guwahati
Guwahati-781039, India

EEE Department, IIT Guwahati

Dr. Kannan Karthik

Ph. D. University of Toronto
Designation: Associate Professor

Dr. K. Karthik joined the institute in October 2007.

Contact Details
Office Address: Room No. 202, EEE Department, IIT Guwahati, Guwahati-781039, INDIA.
Phone: +91-361-2582516 (O)
Fax: +91-361-2582542
Email: k.karthik[AT*]

Research Interests
  • Utilizing information leakage in non-perfect secret sharing schemes for traitor tracing (merging shared access control with fingerprinting).
  • Constructing traceable pseudonyms (Anonymous fingerprinting)
  • Secure biometric authentication based on partially encrypted data.
  • Encryption transparent image and video hashing.
  • Privacy preserving computation.
  • Parametric transforms for domain randomization.
  • Watermark detection in the encrypted domain.
  • Public key and asymmetric watermarking.
  • Construction of frameproof and collusion secure semi-fragile fingerprints.
  • Fine-grained access control of Multimedia.
  • Soft encryption schemes for joint fingerprinting and decryption.
Complex inter-disciplinary applications: Some of the above research issues involving privacy preserving computation, traitor tracing, access control and biometric authentication are desired in much larger systems which demand an integration with other interesting cryptographic solutions,
  • e-Voting: Secure and anonymized voting from people’s homes.
  • e-Healthcare: Entails…
    • Secure automated condition monitoring of patients,
    • Protecting privacy of health records through selective data masking,
    • Creating hierarchical and dynamic access control policies for patient records,
    • Enabling formation of audit trails to preserve patient record access history,
    • Permitting anonymized surveillance procedures using non-intrusive techniques such as human gait-recognition.
  • Audit trails: Involving de-centralized peer to peer secure content distribution enforcing access control with fingerprinting. Each access is to be logged as an imperceptible watermark in the content deterring deliberate content leakage and acts of piracy.
Challenging Signal/Image processing problems:
  • Automatic recognition of caricatures.
  • Querying songs by whistling or humming.
  • Searching through an encrypted database of images and videos.
  • Detecting pirated movie copies and finding a way to prove their inheritance from the original movie.
Implementation based problems:
  • Designing watermarks robust to scalable coding of videos (H.264/SVC).
  • Format compliant lightweight encryption schemes for securing scalable videos.
  • Fine-grained image access control through JPSEC (security extension of JPEG 2000) or some other standard.
Details regarding publications and description of ongoing research problems are in my homepage.

Courses Books
  • K. Karthik, D. Hatzinakos, “Multimedia Encoding for Access Control with Traitor Tracing: Balancing Secrecy, Privacy and Traceability”, published by VDM Verlag Dr. Muller, Germany,
    ISBN: 978-3-8364-3638-0.
    Cover PagePreface and Table of Contents
  • D. Kundur, K. Karthik, ”Video fingerprinting and encryption principles for Digital Rights Management,” Proceedings IEEE, vol. 92, no. 6. pp. 918-932, June 2004.
  • K. Karthik, D. Hatzinakos, ”Decryption Key Design for Joint Fingerprinting and Decryption in the Sign Bit plane for Multicast Content Protection”, accepted Nov 17, 2005 in the International Journal of Network Security (IJNS), published May 2007, Vol. 4, no. 3, pp. 254—265.
  • K. Karthik, D. Hatzinakos, “A Unified approach to construct Non-perfect Secret Sharing and Traitor Tracing schemes”, in Proceedings of International Conference on Security and Management (SAM’07), Las Vegas, Nevada, June 25-28, 2007.
  • K. Karthik, D. Hatzinakos, ”A novel anti-collusion coding scheme tailored to track linear collusions”, in International Workshop on Data Hiding for Information and Multimedia Security (DHIMS’07), Manchester, UK, Aug 29-31, 2007.
  • K.Karthik, D. Kundur, D. Hatzinakos, ”Joint fingerprinting and decryption for multimedia content tracing in wireless networks”, Proceedings of the SPIE, Florida, USA, April 12-16, Vol 5403, pp.360-370 (2004).
  • P. Das, K. Karthik, B. C. Garai, "A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs", Elsevier Journal on Pattern Recognition, Vol. 45, Issue 9, pp 3373-3388, 2012, DOI: 10.1016/j.patcog.2012.02.022. URL:
  • A. Talwai, D. Sengupta, and K. Karthik, "A Transparent Encryption Scheme for Watermarked Biometric and Medical Images," International Journal of Computer and Electrical Engineering vol. 4, no. 3, pp. 278-282, 2012.
  • K. Karthik, "Constructing Intrinsic Image Signatures by Random Downsampling and Differential Mean-Median Information", to appear in Special Issue on "Information and Communication Technology", Vol.22, No.1, 2013, International Journal of Tomography & Simulation (IJTS), 2013.
  • K. Karthik, S. Kashyap," Transparent Hashing in the Encrypted Domain for Privacy Preserving Image Retrieval", Accepted in Springer Journal of Signal, Image and Video Processing, Special issue on Image and Video Processing for Security, 2013.