scispace - formally typeset
Search or ask a question
Author

K. Brindha

Bio: K. Brindha is an academic researcher from VIT University. The author has contributed to research in topics: Visual cryptography & Encryption. The author has an hindex of 4, co-authored 10 publications receiving 39 citations.

Papers
More filters
Journal ArticleDOI
K. Brindha1, N. Jeyanthi1
TL;DR: Secured Document Sharing Using Visual Cryptography (SDSUVC) technique proposes an efficient storage scheme in a cloud for storing and retrieving a document file without any mathematical computations and also ensures data confidentiality and integrity.
Abstract: Security has emerged as the most concerned aspect of cloud computing environment and a prime challenge for the cloud users. The stored data can be retrieved by the user whenever and wherever required. But there is no guarantee that the data stored in the cloud server has not been accessed by any unauthorized user. The current cloud framework does not allow encrypted data to be stored due to the space and storage cost. Storing secret data in an unencrypted form is vulnerable to external attacks by both illegitimate customers and a Cloud Service Provider (CSP). Traditional encryption techniques require more computation and storage space. Hence, protecting cloud data with minimal computations is the prime task. Secured Document Sharing Using Visual Cryptography (SDSUVC) technique proposes an efficient storage scheme in a cloud for storing and retrieving a document file without any mathematical computations and also ensures data confidentiality and integrity.

11 citations

Journal ArticleDOI
TL;DR: The researcher is planned to make an inter-net of things for health care system which can monitor health of human being and in emergency situation notification will be send to doctors immediately.
Abstract: The past health survey shows death of few thousand people due to their heavy workload and mental pressure. Death of more patients is unavailability of doctors in critical situation. With the advancement in technology, the proposed system can monitor the patient's body condition uninterruptedly from anywhere in the world. The researcher is planned to make an inter-net of things for health care system which can monitor health of human being. In emergency situation notification will be send to doctors immediately. It takes the body parameters like Temperature, humidity, and pulse sensor and body movements. Analysis of patients’ body data is done against the normal situation to track abnormal physiological parameters.

7 citations

Journal Article
TL;DR: An analysis on DES algorithm for image encryption will reproduce the original image with no information loss and a comparative study of the DES algorithm with the present image encryption algorithms is done.
Abstract: In this paper we present image encryption using symmetric algorithm (SA). Encryption is a method to protect data against destruction by involving special algorithm and keys to transform digital data into unreadable format before transmission over the network. The Decryption keys are used to get the original digital data back from the transmitted encrypted data form. Data encryption standard (DES) is one of the symmetric algorithms. This paper presents an analysis on DES algorithm for image encryption. The proposed idea will reproduce the original image with no information loss. A comparative study of the DES algorithm with the present image encryption algorithms is also done in this paper.

6 citations

Proceedings ArticleDOI
K. Brindha1, N. Jeyanthi1
01 Feb 2015
TL;DR: This paper has proposed the idea how the data could be made more secured using visual cryptographic techniques, which not only increases the trust among the users to send their information with full reliability and also helps in the authorization of the users.
Abstract: Cloud computing model allows the customers to access the secured information from the cloud server without the help of using the hardware or the software. For the effective usage of the data from the cloud provider, the data owner encrypts the data and then its ends to the cloud server. To secure the data in the cloud we have dealt through lots of security issues earlier. In this paper we have proposed the idea how the data could be made more secured using visual cryptographic techniques. This model not only increases the trust among the users to send their information with full reliability and also helps in the authorization of the users.

6 citations

01 Jan 2017
TL;DR: The Securing Portable Document Format file Using Extended Visual Cryptography (SPDFUEVC) technique proposes efficient storage to achieve data confidentiality and integrity verification with minimal computation, time complexity and storage space.
Abstract: With the vast development in cloud computing model, various organizations and individuals often deploy the cloud without reviewing the security policies and procedures which can cause great risk in their business. Securing data in cloud storage becomes a challenging task not only for the cloud user but also to the Cloud Service Provider (CSP). Storing secret data in unencrypted form is susceptible to easy access to both the unauthorized people and the CSP. Standard encryption algorithms require more computational primitives, storage space and cost. Therefore protecting cloud data with minimal computation and storage space is of paramount significance. The Securing Portable Document Format file Using Extended Visual Cryptography (SPDFUEVC) technique proposes efficient storage to achieve data confidentiality and integrity verification with minimal computation, time complexity and storage space.

6 citations


Cited by
More filters
Posted Content
TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Abstract: In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier) can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.A POR may be viewed as a kind of cryptographic proof of knowledge (POK), but one specially designed to handle a large file (or bitstring) F. We explore POR protocols here in which the communication costs, number of memory accesses for the prover, and storage requirements of the user (verifier) are small parameters essentially independent of the length of F. In addition to proposing new, practical POR constructions, we explore implementation considerations and optimizations that bear on previously explored, related schemes.In a POR, unlike a POK, neither the prover nor the verifier need actually have knowledge of F. PORs give rise to a new and unusual security definition whose formulation is another contribution of our work.We view PORs as an important tool for semi-trusted online archives. Existing cryptographic techniques help users ensure the privacy and integrity of files they retrieve. It is also natural, however, for users to want to verify that archives do not delete or modify files prior to retrieval. The goal of a POR is to accomplish these checks without users having to download the files themselves. A POR can also provide quality-of-service guarantees, i.e., show that a file is retrievable within a certain time bound.

1,783 citations

Proceedings ArticleDOI
28 Apr 2021
TL;DR: In this paper, the authors proposed a multilevel cryptography based security system for cloud computing, which is a hybrid approach of symmetric and asymmetric key cryptography algorithms, which increases the data security up to a maximum extant and takes less time in uploading and downloading the text file as compared to existing system.
Abstract: Security in cloud computing is the emerging research issues nowadays. A lot of organization are moving from their traditional data storage to cloud storage, which provides an efficient way to access the data anywhere and anytime. But, the main hitch of organization to use cloud computing is data security. This paper proposed a multilevel cryptography based security system for cloud computing. The model is hybrid approach of symmetric and asymmetric key cryptography algorithms. In this Data Encryption Standard (DES) and RSA are implemented to provide the multilevel of encryption and decryption at both sender and receiver side which increase the security of the cloud storage. This security model gives the transparency to the cloud user as well as cloud service provider in order to reduce the security threats. The proposed model is implemented in java and cloudsim cloud simulator tool. This model increases the data security up to a maximum extant and it takes less time in uploading and downloading the text file as compare to existing system.

32 citations

Journal ArticleDOI
02 Mar 2020
TL;DR: The basic comparison between the traditional secret sharing scheme and Visual cryptography is presented and the threshold-based share generation schemes are explained mathematically and the comparative analysis of these schemes also presented.
Abstract: Secret Sharing (SS) scheme divides a secret image into shadow images (referred to as shares) in a way that requires the shadows in a certain privileged coalition for the secret reconstruction. However, the secret image cannot be revealed if they are not combined in a prescribed way. In this paper, the evolution of the traditional secret sharing scheme to the contemporary of secret sharing scheme has been presented based on its technology adoption. The basic comparison between the traditional secret sharing scheme and Visual cryptography is presented. The image-based share generation process has been explained in the context of pixel sharing patterns and its process. The reconstruction image is obtained by the XOR /OR Boolean operation. The threshold-based share generation schemes are explained mathematically and the comparative analysis of these schemes also presented.

28 citations

Journal ArticleDOI
TL;DR: The main aim is to provide a suitable device recommended by doctors for patients suffering from obesity, such that doctors can examine patient’s health trends over a period from the stored data for monitoring any changes that could be a symptom of an underlying unnoticed health condition.
Abstract: Obesity is a global epidemic, often considered an impending disaster for the world’s population. Healthcare organizations and professionals repeatedly emphasize the negative impacts on obesity in the development of cardiovascular diseases, hypertension and diabetes. The continuous monitoring of physiological parameters; namely SpO2, blood pressure, body temperature and pulse rate are imperative for obese adult patients. IoT is a dynamic field, used extensively in all fields: agriculture, automobile, manufacturing and retail industry primarily for automated remote real-time monitoring. This paper focuses on the implementation of IoT in the healthcare industry for monitoring and evaluating health conditions of obese adults, along with emphasis on the importance of medical data storage. Furthermore, a device is developed with a novel design and system, which not only allows real-time monitoring but also the storage of medical records for multiple patients simultaneously. The device facilitates measurements of these parameters using an Arduino environment and then transmits the data onto an IoT dashboard using a Wi-fi module for remote monitoring for healthcare professionals. The main aim is to provide a suitable device recommended by doctors for patients suffering from obesity, such that doctors can examine patient’s health trends over a period from the stored data for monitoring any changes that could be a symptom of an underlying unnoticed health condition.

27 citations

Journal ArticleDOI
TL;DR: In this paper, a multi-physical parameter wireless telemedicine health monitoring system solution is proposed, and analyzes the overall structure and functional requirements of the system, including body temperature, respiration, blood oxygen saturation, pulse, blood pressure, and electrocardiogram.
Abstract: Telemedicine, as a new technical means and medical model, can truly realize the sharing and monitoring of telemedicine information, and ultimately ensure that everyone has equal access to medical and health resources. Based on the research on the status of telemedicine application and wireless communication technology, this paper proposes a multi-physical parameter wireless telemedicine health monitoring system solution, and analyzes the overall structure and functional requirements of the system. Human physiological parameters of the wireless remote medical system for health monitoring include body temperature, respiration, blood oxygen saturation, pulse, blood pressure, and electrocardiogram. In this paper, fabric electrodes are used to extract human bioimpedance signals, discrete Fourier transform algorithm is used to detect human respiratory signals, and respiratory rate is detected based on dynamic differential threshold peak detection technology. The reflection type photoelectric sensor is used to realize the reflection of the human pulse signal, and the continuous measurement of the cuff-free blood pressure based on the pulse wave conduction time is combined with the ECG (Electrocardiogram) data. A self-learning threshold algorithm based on near-infrared photo plethysmo graphy signal trough detection is designed on the reflective blood oxygen saturation calculation algorithm. The difference threshold method is used to extract the QRS band feature points. We tested the overall operation of the system. The results show that the collected human physiological signal data is accurate. After a series of tests, the validity and reliability of the collected physiological signals have been proven.

25 citations