2. Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/1/7

Browse

Search Results

Now showing 1 - 10 of 10
  • Thumbnail Image
    Item
    Generation of super-resolution video from low resolution video sequences: A novel approach
    (2008) Madhusudhan, T.; Pais, A.R.
    The term "super-resolution" refers to the process of obtaining higher-resolution images from several lower-resolution ones, i.e. resolution enhancement. The quality improvement is caused by sub-pixel shifted from each other between images. Each low resolution image contains new information about the scene and super-resolution aims at combining these to give a higher resolution image. Super-resolution allows us in overcoming the limitations of the imaging system (resolving limit of the sensors) without the need for additional hardware. This paper deals with high resolution video reconstruction from low resolution video. An algorithm for enhancing the resolution of video through histogram based segmentation and frequency domain registration is proposed. Segmentation of the video is done using Histogram method and frequency domain approach is used for registration of images. Bi-cubic interpolation is applied to this video to generate the super-resolution (SR) video. Based on the requirements additional brightness and temporal resolution can be added to the SR video. It is tested on indoor/outdoor real video data, demonstrating the feasibility of the approach, and then results are presented. Qualitative analysis is presented to analyze the quality of reconstructed Super resolution video comparing to input Low Resolution video. The results of this work can be used for object tracking and identification. � 2007 IEEE.
  • Thumbnail Image
    Item
    Design and implementation of secure Internet based voting system with user anonymity using Identity Based Encryption System
    (2009) Purushothama, B.R.; Pais, A.R.
    With Internet becoming ubiquitous, electronic transactions over the Internet have become an integral part of day to day life. The Internet is used for more and more secure transactions like banking, shopping, submitting tax returns etc. In a way, the need for a secure Internet based electronic voting system is an obvious demand. The task of designing a secure Internet based voting system is a cryptographic challenge. This paper proposes and discusses the design and implementation of secure Internet based electronic voting system using Identity Based Encryption System (IBES). This proposed system satisfies various security requirements like, privacy, anonymity, eligibility, accuracy, fairness, uniqueness, verifiability and receipt freeness. Total user anonymity is achieved using IBES. � 2009 IEEE.
  • Item
    Automatic video object plane segmentation and super resolution: A novel approach
    (2009) Pais, A.R.; Pasupuleti, N.; Gidnavar, R.; D'Souza, J.
    Detecting, segmenting and super resolving of moving object is an important subject in computer visual analysis and surveillance. This paper discusses automatic VOP (Video Object Plane) segmentation and super resolving of VOP. We have proposed a new method for automatic generation of VOP by using block matching and quantization techniques. Edge model based approach is used to generate the HR (High Resolution) image with sharper VOP boundaries. Experimental results show that the proper VOP is segmented and super resolution of VOP yields lesser blurring compared to bicubic, bilinear interpolation schemes. Copyright � 2009 by IICAI.
  • Item
    A new probabilistic rekeying method for secure dynamic groups
    (2008) Joshi, S.; Pais, A.R.
    Logical Key Hierarchy (LKH) is a basic method in secure multicast group rekeying. LKH maintains a balanced tree which provide uniform cost of O(log N) for compromise recovery, where N is group size. However, it does not distinguish the behavior of group members even though they have different probabilities of join or leave. When members have diverse changing probability the gap between LKH and the optimal rekeying algorithm will become bigger. The Probabilistic optimization of LKH (PLKH) scheme, optimized rekey cost by organizing LKH tree with user rekey characteristic. In this paper, we concentrate on further reducing the rekey cost by organizing LKH tree with respect to compromise probabilities of members using new join and leave operations. Simulation results show that our scheme performs 18% to 29% better than PLKH and 32% to 41% better than LKH.
  • Thumbnail Image
    Item
    Security-aware software development life Cycle (SaSDLC) - Processes and tools
    (2009) Talukder, A.K.; Maurya, V.K.; Babu, G, S.; Ebenezer, J.; Sekhar, V, M.; Jevitha, K.P.; Samanta, S.; Pais, A.R.
    Today an application is secured using invitro perimeter security. This is the reason for security being considered as nonfunctional requirement in Software Development Life Cycle (SDLC). In Next Generation Internet (NGI), where all applications will be networked, security needs to be in-vivo; security must be functions within the application. Applications running on any device, be it on a mobile or on a fixed platform - need to be security-aware using Securityaware Software Development Life Cycle (SaSDLC), which is the focus of this paper. We also present a tool called Suraksha that comprises of Security Designers' Workbench and Security Testers' Workbench thathelps a developer to build Security-aware applications. �2009 IEEE.
  • Thumbnail Image
    Item
    Secure web based Single Sign-On (SSO) framework using identity based encryption system
    (2009) Singh, R.K.; Pais, A.R.
    Due to the vulnerability caused by poor password selection it is very important to have a secure authentication and authorization infrastructure for web based applications. In the current scenario it is very difficult to remember different passwords for different web based applications. We propose centralized password based multiuser and multi-application Single Sign-On (SSO) framework for such applications. Unlike traditional Single Sign-On architectures we are using Identity Based Encryption System (IBES) instead of Public key infrastructure (PKI). Our proposed design provides better security for the users and the system is efficient. This framework is deployed as a web service and can be deployed on a web server. � 2009 IEEE.
  • Item
    Secure and efficient protocol for mobile payments
    (2008) Godbole, R.M.; Pais, A.R.
    Electronic Payments have gained tremendous popularity in the modern world. Credit/debit cards and online payments are in widespread use. Bringing electronic payments to the mobile world offers huge utility for mobile users. Lack of standardized protocols, interoperability and security are major roadblocks in developing a mobile payment infrastructure. A scheme called SEMOPS (Secure Mobile Payment Service) has already been proposed by A. Vilmos and S. Karnouskos. This proposed SEMOPS architecture addresses these problems. However, it will work inefficiently for micropayments due to a lot of computation and communication for every payment. Good micropayment support is extremely important for mobile payment systems to succeed. This work focusses on enabling efficient micropayment support in SEMOPS scheme. An analysis of the security and efficiency of the proposed method is given in this paper. Our new proposed method has been found to be very efficient for micropayments in SEMOPS. Copyright 2008 ACM.
  • Item
    Throttling DDoS attacks
    (2009) Gujjunoori, S.; Syed, T.A.; Madhu, B.J.; Avinash, D.; Mohandas, R.; Pais, A.R.
    Distributed Denial of Service poses a significant threat to the Internet today. In these attacks, an attacker runs a malicious process in compromised systems under his control and generates enormous number of requests, which in turn can easily exhaust the computing resources of a victim web server within a short period of time. Many mechanisms have been proposed till date to combat this attack. In this paper we propose a new solution to reduce the impact of a distributed denial of service attack on a web server by throttling the client's CPU. The concept of source throttling is used to make the client pay a resource stamp fee, which is negligible when the client is making a limited number of requests but becomes a limiting restriction when he is making a large number of requests. The proposed solution makes use of the integer factorization problem to generate the CPU stamps. We have packaged our solution as an API so that existing web applications can easily deploy our solution in a layer that is transparent to the underlying application.
  • Item
    Throttling DDoS attacks
    (2009) Gujjunoori, S.; Syed, T.A.; Babu, J, M.; Avinash, D.; Mohandas, R.; Pais, A.R.
    Distributed Denial of Service poses a significant threat to the Internet today. In these attacks, an attacker runs a malicious process in compromised systems under his control and generates enormous number of requests, which in turn can easily exhaust the computing resources of a victim web server within a short period of time. Many mechanisms have been proposed till date to combat this attack. In this paper we propose a new solution to reduce the impact of a distributed denial of service attack on a web server by throttling the client's CPU. The concept of source throttling is used to make the client pay a resource stamp fee, which is negligible when the client is making a limited number of requests but becomes a limiting restriction when he is making a large number of requests. The proposed solution makes use of the integer factorization problem to generate the CPU stamps. We have packaged our solution as an API so that existing web applications can easily deploy our solution in a layer that is transparent to the underlying application.
  • Thumbnail Image
    Item
    Super resolution of video with sharpened edges using multiple frames - A novel approach
    (2009) Pais, A.R.; D'Souza, J.; Ram Mohana Reddy, Guddeti; Patil, S.B.
    In most electronic video applications, video with Higher Resolution(HR) are often required. HR video can offer more details that may be critical in various applications like Video Surveillance. Super resolution technique refers to generation of high resolution image from low resolution image by adding some extra information. Super resolution allows us to reduce the need of extra hardware to obtain HR image. This paper proposes a new method for super resolution video generation with sharpened edges using multiple frames. Unique information present in subpixel shifted frames is extracted and used for frequency domain registration process. � 2009 IEEE.