Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
3 results
Search Results
Item Reliable transmission and storage of medical images with patient information using error control codes(2004) Nayak, J.; Subbanna Bhat, P.; Kumar, M.S.; Acharya, A.U.A new method for compact storage and transmission of medical Images with concealed patient Information in noisy environment if evinced. Digital Watermarking is the technique adapted here for interleaving patient Information with medical images. The patient information, which comprises of text data and signal graph, is encrypted to prevent unauthorized access of data. The latest encryption algorithm (Rijndael) is used for encrypting the text information. Signal graphs (ECG, EEG EMG etc.) are compressed using DPCM technique. To enhance the robustness of the embedded information, the patient Information Is coded by Error Correcting Codes (ECC) Reed Solomon (RS) codes. The noisy scenario Is simulated by adding salt and pepper (S&P) noise to the embedded Image. For different Signal to Noise Ratio (SNR) of the image, Bit Error Rate (BER) and Number of Character Altered (NOCA) for text data and percentage distortion (PDIST) for the signal graph is evaluated. It Is elicited that coded systems can perform better than the uncoded systems. © 2004 IEEE.Item A Secure and Lightweight Authentication Protocol for Mobile User Preserving Privacy in Global Mobility Networks(Elsevier B.V., 2020) Madhusudhan, R.; Suvidha, K.S.In two factor authentication schemes the key factor that has to be addressed is user anonymity and privacy preservation during roaming scenario in GLObal MObility NETwork. While roaming MU needs to access the services of the FA, FA grants the service request only to the authenticated MU. To verify the authenticity of the MU, FA sends the service request of MU to HA. HA verifies the authenticity of the MU after which FA allows the MU to access the services. The entire communication during roaming is carried over insecure channel. Due to this, several security concerns are raised. The main objective in GLOMONET is to secure the channel and the designed scheme should over come all active and passive security attacks. Since, the scheme is designed for mobile networks, it should be light weight with less communication cost, one such scheme has been proposed in this article. The proposed scheme is light weight with less communication cost. Additionally the proposed scheme addresses the active and passive security attacks. The scheme is efficient in terms of computational and communication cost. The proposed scheme is robust and practically implementable. © 2020 The Authors. Published by Elsevier B.V.Item The Role of Cryptography in Cryptocurrency(Institute of Electrical and Electronics Engineers Inc., 2021) Gupta, S.P.; Gupta, K.; Chandavarkar, B.R.In today's world of digital media, people are mainly sharing all of their resources via digital platforms. Today, in almost all regions across the globe, the physical exchange of money is becoming less in practice. People are more flexible with buying and paying for their necessities via digital platforms rather than exchanging physical money. Cryptocurrency, the new global money for the internet age, is also a medium of exchange similar to other currencies. Still, here, the sole purpose of the exchange is via digital means. How secure is your cryptocurrency? How anonymous are users of cryptocurrencies? Since the currency is digital, it is more prone to attacks, data theft, and money. Here comes the role of cryptography. Cryptography is an essential mechanism for securing information in computer systems. Without cryptography, cryptocurrency is just a central hub for attackers and scammers. Cryptocurrency requires cryptography for mainly two purposes; to secure the transactions and to verify these transfers. This paper discusses the types of cryptographic techniques used in cryptocurrencies, studies their characteristics, and explores the working of these techniques. © 2021 IEEE.
