Author
P. Das
Bio: P. Das is an academic researcher from Heritage Institute of Technology. The author has contributed to research in topics: Digital watermarking & Information hiding. The author has an hindex of 5, co-authored 11 publications receiving 61 citations.
Papers
More filters
••
23 Jun 2010TL;DR: The LSB technique for secure data transfer using least significant bits (LSB) insertion is described, one of the simplest approaches to embedding information in audio file.
Abstract: This paper describes the LSB technique for secure data transfer. Secret information can be hidden inside all sorts of cover information: text, images, audio, video and more. Embedding secret messages in digital sound is usually a more difficult process. Varieties of techniques for embedding information in digital audio have been established. These are parity coding, phase coding, spread spectrum, echo hiding, LSB. Least significant bits (LSB) insertion is one of the simplest approaches to embedding information in audio file.
14 citations
••
22 Apr 2008TL;DR: An extensive survey of the existing graphical password schemes and a novel and new alternative; Figure as a Password is proposed, which supports the application environment and could be a solid platform for future research and study.
Abstract: Most common computer authentication method is traditional 'User Name' and 'password'. There are numerous Biometric authentication methods also proposed. In this paper, we propose a novel and new alternative; Figure as a Password. In this scheme users will get complete freedom to select their Passwords. In this paper, we conduct an extensive survey of the existing graphical password schemes and propose an alternate scheme. Entire work can be divided into three phases- a. sampling of users passwords, processing and storage; b. security on transmission; and c. Recognition and authentication. Our scheme supports the application environment and we strongly believe that "User Authentication by Secured Graphical Password Implementation'' could be a solid platform for future research and study.
11 citations
••
26 Apr 2007TL;DR: This paper presents a technique for watermarking Handwritten Signature that achieves robustness by responding to complexity of copy detection, vulnerability to mark removal after revelation for ownership verification and mark integrity issues due to partial mark removal; these three weaknesses.
Abstract: In this paper, we propose a technique for embedding handwritten signature image data into color images and extracting embedded image data from color images. For the sake of security, two watermarked images will be transmitted in different times from the sender's end to the receiver's end, in due course, from two transmitted images, at the receiver's end, original handwritten signature image data will be extracted; a new way of data hiding. From 1994 onward, the use and popularity of Internet in business particular has explored the area of Intellectual Property protection techniques. This paper presents a technique for watermarking Handwritten Signature that achieves robustness by responding to complexity of copy detection, vulnerability to mark removal after revelation for ownership verification and mark integrity issues due to partial mark removal; these three weaknesses.
9 citations
••
03 Jun 2008TL;DR: A new Handwritten Signature Recognition Algorithm based on pixel-to-pixel relationship between Images that supports the application environment and could be a solid platform for future research and study based on statistics and probability theory.
Abstract: In this paper we propose a new Handwritten Signature Recognition Algorithm. The Algorithm is based on pixel-to-pixel relationship between Images. The Algorithms are based on extensive statistical analysis, Standard Deviation, variance and Theory of Cross-Correlation. This is an extension work of Handwritten Signature Identification. This Algorithm supports the application environment and we strongly believe that "User Recognition" could be a solid platform for future research and study based on statistics and probability theory.
6 citations
Cited by
More filters
•
16 Jun 2008TL;DR: In this paper, a method and system for electronic access security uses touches and movements on a touch sensitive surface to determine graphical passcode that are used in a manner similar to passwords.
Abstract: A method and system for electronic access security uses touches and movements on a touch sensitive surface to determine graphical passcode that are used in a manner similar to passwords. Graphical passcodes comprise various combinations of swipes, taps or drags on a touchscreen surface as defined by a user. A user's selected graphical passcode is stored in memory for comparison to subsequent entries of graphical passcode in order to authenticate the users. An envelope may be generated to define a range of acceptable pressure, speed, coordinate positions or other parameters, as a function of time or position, required for passcode authentication. The envelope may be stored in a computer memory and is used to authenticate a user by determine whether an entered graphical passcode falls within the envelope.
160 citations
•
17 Jun 2009TL;DR: In this article, a user selects portions/zones that are defined within the image in a specified sequence and this sequence is stored as a lock/unlock code for unlocking the computing device.
Abstract: Utilizing an image on a computing device to serve as a template for locking/unlocking the computing device. The image includes a plurality of portions that are defined and thereafter identified and presented to a user via a touch screen. A user selects portions/zones that are defined within the image in a specified sequence and this sequence is stored as a lock/unlock code for unlocking the computing device. In an embodiment, in addition to the specified sequence of selections, a movement or sequence of movements may be also be stored as part of the lock/unlock code.
90 citations
••
TL;DR: The target of research is to present online handwritten signature verification system based on discrete wavelet transform (DWT) features extraction and feed forward back propagation error neural network recognition.
68 citations
•
TL;DR: The aim of this book is to provide a Discussion of the Foundations of Model Hosts and their Applications in Retinal Degenerative Diseases.
Abstract: LaVail (Eds), Retinal Degenerative Diseases (Advances in Experimental Medicine and Biology 723) ISBN 978-1-4614-0630-3 7 * € (D) 213,95 | € (A) 219,94 | sFr 266,50 7 € 199,95 | £180.00 Special_SpacerSpecial_Spacer Mylonakis (Eds), Recent Advances on Model Hosts (Advances in Experimental Medicine and Biology 710) ISBN 978-1-4419-5637-8 7 * € (D) 149,75 | € (A) 153,94 | sFr 201,00 7 € 139,95 | £126.00 Special_SpacerSpecial_Spacer
54 citations
01 Jan 2012
TL;DR: The general principles of hiding secret information using audio technology, and an overview of current functions and techniques are surveyed to construct a useful and useful data hiding application.
Abstract: Steganography has proven to be one of the practical ways of securing data. It is a new kind of secret communication used mainly to hide secret data inside other innocent digital mediums. Most of existing steganographic techniques use digital multimedia files as cover mediums to hide secret data. Audio files and signals make appropriate mediums for steganography due to the high data transmission rate and the high level of redundancy. Hiding data in real time communication audio signals is not a simple mission. Steganography requirements as well as real time communication requirements are supposed to be met in order to construct a useful and useful data hiding application. In this paper we will survey the general principles of hiding secret information using audio technology, and provide an overview of current functions and techniques. These techniques will be evaluated across both, steganography and real time communication requirements.
40 citations