scispace - formally typeset
Search or ask a question
Author

P. Das

Bio: P. Das is an academic researcher from Heritage Institute of Technology. The author has contributed to research in topics: Digital watermarking & Information hiding. The author has an hindex of 5, co-authored 11 publications receiving 61 citations.

Papers
More filters
Book ChapterDOI
23 Jun 2010
TL;DR: The LSB technique for secure data transfer using least significant bits (LSB) insertion is described, one of the simplest approaches to embedding information in audio file.
Abstract: This paper describes the LSB technique for secure data transfer. Secret information can be hidden inside all sorts of cover information: text, images, audio, video and more. Embedding secret messages in digital sound is usually a more difficult process. Varieties of techniques for embedding information in digital audio have been established. These are parity coding, phase coding, spread spectrum, echo hiding, LSB. Least significant bits (LSB) insertion is one of the simplest approaches to embedding information in audio file.

14 citations

Proceedings ArticleDOI
22 Apr 2008
TL;DR: An extensive survey of the existing graphical password schemes and a novel and new alternative; Figure as a Password is proposed, which supports the application environment and could be a solid platform for future research and study.
Abstract: Most common computer authentication method is traditional 'User Name' and 'password'. There are numerous Biometric authentication methods also proposed. In this paper, we propose a novel and new alternative; Figure as a Password. In this scheme users will get complete freedom to select their Passwords. In this paper, we conduct an extensive survey of the existing graphical password schemes and propose an alternate scheme. Entire work can be divided into three phases- a. sampling of users passwords, processing and storage; b. security on transmission; and c. Recognition and authentication. Our scheme supports the application environment and we strongly believe that "User Authentication by Secured Graphical Password Implementation'' could be a solid platform for future research and study.

11 citations

Proceedings ArticleDOI
26 Apr 2007
TL;DR: This paper presents a technique for watermarking Handwritten Signature that achieves robustness by responding to complexity of copy detection, vulnerability to mark removal after revelation for ownership verification and mark integrity issues due to partial mark removal; these three weaknesses.
Abstract: In this paper, we propose a technique for embedding handwritten signature image data into color images and extracting embedded image data from color images. For the sake of security, two watermarked images will be transmitted in different times from the sender's end to the receiver's end, in due course, from two transmitted images, at the receiver's end, original handwritten signature image data will be extracted; a new way of data hiding. From 1994 onward, the use and popularity of Internet in business particular has explored the area of Intellectual Property protection techniques. This paper presents a technique for watermarking Handwritten Signature that achieves robustness by responding to complexity of copy detection, vulnerability to mark removal after revelation for ownership verification and mark integrity issues due to partial mark removal; these three weaknesses.

9 citations

Proceedings ArticleDOI
03 Jun 2008
TL;DR: A new Handwritten Signature Recognition Algorithm based on pixel-to-pixel relationship between Images that supports the application environment and could be a solid platform for future research and study based on statistics and probability theory.
Abstract: In this paper we propose a new Handwritten Signature Recognition Algorithm. The Algorithm is based on pixel-to-pixel relationship between Images. The Algorithms are based on extensive statistical analysis, Standard Deviation, variance and Theory of Cross-Correlation. This is an extension work of Handwritten Signature Identification. This Algorithm supports the application environment and we strongly believe that "User Recognition" could be a solid platform for future research and study based on statistics and probability theory.

6 citations


Cited by
More filters
Patent
Sean S. Rogers1
16 Jun 2008
TL;DR: In this paper, a method and system for electronic access security uses touches and movements on a touch sensitive surface to determine graphical passcode that are used in a manner similar to passwords.
Abstract: A method and system for electronic access security uses touches and movements on a touch sensitive surface to determine graphical passcode that are used in a manner similar to passwords. Graphical passcodes comprise various combinations of swipes, taps or drags on a touchscreen surface as defined by a user. A user's selected graphical passcode is stored in memory for comparison to subsequent entries of graphical passcode in order to authenticate the users. An envelope may be generated to define a range of acceptable pressure, speed, coordinate positions or other parameters, as a function of time or position, required for passcode authentication. The envelope may be stored in a computer memory and is used to authenticate a user by determine whether an entered graphical passcode falls within the envelope.

160 citations

Patent
17 Jun 2009
TL;DR: In this article, a user selects portions/zones that are defined within the image in a specified sequence and this sequence is stored as a lock/unlock code for unlocking the computing device.
Abstract: Utilizing an image on a computing device to serve as a template for locking/unlocking the computing device. The image includes a plurality of portions that are defined and thereafter identified and presented to a user via a touch screen. A user selects portions/zones that are defined within the image in a specified sequence and this sequence is stored as a lock/unlock code for unlocking the computing device. In an embodiment, in addition to the specified sequence of selections, a movement or sequence of movements may be also be stored as part of the lock/unlock code.

90 citations

Journal ArticleDOI
TL;DR: The target of research is to present online handwritten signature verification system based on discrete wavelet transform (DWT) features extraction and feed forward back propagation error neural network recognition.

68 citations

Journal Article
TL;DR: The aim of this book is to provide a Discussion of the Foundations of Model Hosts and their Applications in Retinal Degenerative Diseases.
Abstract: LaVail (Eds), Retinal Degenerative Diseases (Advances in Experimental Medicine and Biology 723) ISBN 978-1-4614-0630-3 7 * € (D) 213,95 | € (A) 219,94 | sFr 266,50 7 € 199,95 | £180.00 Special_SpacerSpecial_Spacer Mylonakis (Eds), Recent Advances on Model Hosts (Advances in Experimental Medicine and Biology 710) ISBN 978-1-4419-5637-8 7 * € (D) 149,75 | € (A) 153,94 | sFr 201,00 7 € 139,95 | £126.00 Special_SpacerSpecial_Spacer

54 citations

01 Jan 2012
TL;DR: The general principles of hiding secret information using audio technology, and an overview of current functions and techniques are surveyed to construct a useful and useful data hiding application.
Abstract: Steganography has proven to be one of the practical ways of securing data. It is a new kind of secret communication used mainly to hide secret data inside other innocent digital mediums. Most of existing steganographic techniques use digital multimedia files as cover mediums to hide secret data. Audio files and signals make appropriate mediums for steganography due to the high data transmission rate and the high level of redundancy. Hiding data in real time communication audio signals is not a simple mission. Steganography requirements as well as real time communication requirements are supposed to be met in order to construct a useful and useful data hiding application. In this paper we will survey the general principles of hiding secret information using audio technology, and provide an overview of current functions and techniques. These techniques will be evaluated across both, steganography and real time communication requirements.

40 citations