Faculty Publications

Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736

Publications by NITK Faculty

Browse

Search Results

Now showing 1 - 10 of 12
  • Item
    Reliable transmission and storage of medical images with patient information using error control codes
    (2004) Nayak, J.; Subbanna Bhat, P.; Kumar, M.S.; Acharya, A.U.
    A new method for compact storage and transmission of medical Images with concealed patient Information in noisy environment if evinced. Digital Watermarking is the technique adapted here for interleaving patient Information with medical images. The patient information, which comprises of text data and signal graph, is encrypted to prevent unauthorized access of data. The latest encryption algorithm (Rijndael) is used for encrypting the text information. Signal graphs (ECG, EEG EMG etc.) are compressed using DPCM technique. To enhance the robustness of the embedded information, the patient Information Is coded by Error Correcting Codes (ECC) Reed Solomon (RS) codes. The noisy scenario Is simulated by adding salt and pepper (S&P) noise to the embedded Image. For different Signal to Noise Ratio (SNR) of the image, Bit Error Rate (BER) and Number of Character Altered (NOCA) for text data and percentage distortion (PDIST) for the signal graph is evaluated. It Is elicited that coded systems can perform better than the uncoded systems. © 2004 IEEE.
  • Item
    New Data Hiding Technique in Encrypted Image: DKL Algorithm (Differing Key Length)
    (Elsevier, 2015) Udhayavene, S.; Dev, A.T.; Chandrasekaran, K.
    This paper introduces a new technique to increase the information security over the network using steganography in such a way that the secret message being sent is unidentifiable. There is a comparison made to give a clear view of how the algorithm proposed is better than LSB algorithm which is used since a long time for sending concealed messages. To avoid the chances of an attacker using steganalysis to retrieve the data, the data encryption is done. S-tool is used to show the reliability of this algorithm. We will be comparing both LSB and DKL algorithms on the basis of Mean Square Error, Peak Signal Noise Ratio, Relative Payload and Rate of Embedding. Here by its shown that DKL algorithm is more efficient than LSB algorithm. © 2015 The Authors.
  • Item
    A modified secure version of the Telegram protocol (MTProto)
    (Institute of Electrical and Electronics Engineers Inc., 2016) Job, J.; Naresh, V.; Chandrasekaran, K.
    The advent of mobile phones and the spread of the internet have caused a substantial increase in the utilization of these technologies for personal communication. A wide range of mobile applications exist, most of which use their own proprietary protocol. Reports of snooping attacks have prompted the parent organizations and users to guarantee that the encrypted data sent over a public network is decrypted only by the intended recipient. Smart phone operating systems provide GPS data to these applications so that users can tag photos with this information. As these applications mostly run a daemon or service in the background to automatically receive messages, an unattended switched on location service coupled with a weak protocol leaves the user highly vulnerable of being tracked by eavesdroppers. These applications are known to, by observing their behaviour, upload the user's contact list to the server so as identify those contacts using the same application. These are but just two important data that need to be protected by tough security measures during transit. Any loop hole in security protocols will leave the user vulnerable to attacks, even outside the digital world. Online chat protocols such as the Telegram protocol ensure end-to-end security of data. Although the protocol itself has been explained in much detail by the designers, this protocol is disfavored because of its performance drawbacks and its susceptibility to man-in-the-middle attacks. In this paper, we modify the Telegram protocol in an attempt to make it more efficient and secure. © 2015 IEEE.
  • Item
    Location Privacy Using Data Obfuscation in Fog Computing
    (Institute of Electrical and Electronics Engineers Inc., 2019) Naik, C.; Sri Siddhartha, M.; Martin, J.P.; Chandrasekaran, K.
    In the past few decades, smartphones and Global Positioning System(GPS) devices have led to the popularity of Location Based Services. It is crucial for large MNCs to get a lot of data from people and provide their services accordingly. However, on the other side, the concern of privacy has also increased among the users, and they would like to hide their whereabouts. The rise of data consumption and the hunger for faster network speed has also led to the emergence of new concepts such as the Fog Computing. Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing towards the edge of the networks while removing the load on the server centers and decreasing the latency at the edge device. The fog computing will help in unlimited growth of location services and this adoption of fog computing calls for the need for more secure and robust algorithms for location privacy. One of the ways we can alter the information regarding the location of the user is Location Obfuscation. This can be done reversibly or irreversibly. In this paper, we address the problem of location privacy and present a solution based on the type of data that has to be preserved (in our case, it is distance). A mobile application has been designed and developed to test and validate the feasibility of the proposed obfuscation techniques for the Fog computing environments. © 2019 IEEE.
  • Item
    Greatest common divisor and its applications in security: Case study
    (Institute of Electrical and Electronics Engineers Inc., 2020) Sri Siddhartha, M.; Rodriques, J.; Chandavarkar, B.R.
    In this paper, we explain the importance and applications of the Greatest Common Divisor(GCD) in the field of security. GCD of two numbers is the greatest divisor that ultimately divides these two numbers. The paper initially discusses four standard algorithms used in calculating GCD: Euclidean Algorithm, Binary GCD algorithm, Dijkstra's algorithm, and Lehmer's algorithm. We then analyze the various GCD applications in computer security. Some applications like generating modular multiplicative inverse are used in various cryptographic algorithms, reducing public keys' disclosure within closed groups, the importance of GCD in cryptographic algorithms, key refreshment message authentication, and peer validation. In the end, we cover the effects arising due to not proper use of GCD according to the algorithms stated in this paper, and how a poor choice of prime numbers that we use to compute the GCD and miscalculation of GCD can affect the computer security. © 2020 IEEE.
  • Item
    Clustering Enhanced Encoder–Decoder Approach to Dimensionality Reduction and Encryption
    (Springer Science and Business Media Deutschland GmbH info@springer-sbm.com, 2021) Mukesh, B.R.; Madhumitha, N.; Aditya, N.P.; Vivek, S.; Anand Kumar, M.
    Dimensionality reduction refers to reducing the number of attributes that are being considered, by producing a set of principal variables. It can be divided into feature selection and feature extraction. Dimensionality reduction serves as one of the preliminary challenges in storage management and is useful for effective transmission over the Internet. In this paper, we propose a deep learning approach using encoder–decoder networks for effective (almost-lossless) compression and encryption. The neural network essentially encrypts data into an encoded format which can only be decrypted using the corresponding decoders. Clustering is essential to reduce the variation in the dataset to ensure overfit. Using clustering resulted in a net gain of 1% over the standard encoder architecture over three MNIST datasets. The compression ratio achieved was 24.6:1. The usage of image datasets is for visualization only and the proposed pipeline could be applied for textual and visual data as well. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
  • Item
    Prime Numbers and Its Applications in Security: Case Study
    (Springer Science and Business Media Deutschland GmbH info@springer-sbm.com, 2021) Namdeo, A.K.; Lomga, A.; Chandavarkar, B.R.
    Prime Numbers are the major building blocks in integer universe. Prime numbers play an important role in number theory and cryptography. With this unique nature of prime number, it is mainly used in security. Many security algorithms have used prime numbers because of their uniqueness. In this paper, we have discussed the importance of prime numbers and their application. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
  • Item
    Comparative Study Between RSA Algorithm and Its Variants: Inception to Date
    (Springer Science and Business Media Deutschland GmbH info@springer-sbm.com, 2021) Rathod, U.; Sreenivas, S.; Chandavarkar, B.R.
    RSA Public Key Cryptography (PKC) otherwise called asymmetric encryption, comprises of two keys known as public key and private key. While the sender utilizes receiver’s public key to encrypt the message, the receiver’s private key is utilized for decrypting the message, so there is no compelling reason to share a private key as in symmetric cryptography which requires sharing a private key. This paper means to investigate RSA and its variants, study its qualities and shortcomings, and propose inventive answers for conquer the shortcoming. RSA is extraordinary compared to other asymmetric key cryptographic algorithms in correspondence over systems. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
  • Item
    Towards a Secure Electronic Health Record System using Blockchain Technology
    (Institute of Electrical and Electronics Engineers Inc., 2021) Bhattacharyya, S.; Chandrasekaran, K.
    Blockchain has emerged as a key technology for ensuring reliability and security in several application areas primarily including the healthcare sector. Blockchain is a distributed ledger where blocks of transactions are connected in a chain using the cryptographic hash function of the previous block, making it an append-only structure. Any modification on any of the blocks will generate different hash values in other blocks in a cascading manner and different link relations. In this way the blockchain achieves immutability and security. Blockchain also involves consensus mechanisms in order to ensure synchronization among blocks and agreement between existing nodes to add a new transaction in the chain. Healthcare data is highly sensitive in nature, which consists of private information related to the diagnosis and treatment of patients. In traditional approach these data are stored by each hospital separately where sharing data is very time consuming. Also, health data is very limited to access due to the risk of disclosure of sensitive information. In order to address these issues, the objective of this paper is to integrate blockchain technology with healthcare records/data in order to provide better sharing of data without the fear of data tampering or security breach. © 2021 IEEE.
  • Item
    Generalizing a Secure Framework for Domain Transfer Network for Face Anti-spoofing
    (Springer, 2023) Chandavarkar, B.R.; Rana, A.; Ketkar, M.M.; Pai, P.G.
    An essential field in cyber-security is the technology behind the authentication of users. In the contemporary era, alphanumeric passwords have been the primary tool used. A password is easy to understand but theoretically complex to brute force and is very easy to store in large databases since, in essence, they are an array of characters. In practical use, however, passwords tend to be very ineffective as the attributes that make for “strong†passwords are generally really abstract and random. However, human memories tend to remember constructed language, which can be intelligently guessed with sufficient information regarding the person. A widely accepted remedy to this problem is to replace passwords with face recognition software which involves minimal effort for the user and, though not completely immune, is quite challenging to misuse. Misuse is often done by spoofing faces. Spoofing faces means presenting a 2D or even a 3D copy of a face to the camera, pretending it is the real face. Many discovered spoofing methods are taken into consideration and protected against in most software. Even though various methods have been suggested for anti-spoofing, there are challenges that these methods go through, e.g., washed-out images, lack of colour, poor illumination. Our proposal involves the use of OpenCV and deep learning to accurately colourize the image pre-processing and put it through the GAN framework (Wang et al., From RGB to Depth: Domain Transfer Network for Face Anti-Spoofing (2021). https://ieeexplore.ieee.org/document/9507460. Accessed 07 Feb 2022). Furthermore, to secure the image to prevent ill use, the final generated image pair will be encrypted so that only the user can access it. The aim is to combine the power of re-colourization with the GAN framework’s strong anti-spoofing capabilities and make the whole framework secure for the user. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.