scispace - formally typeset
Search or ask a question
Author

S. Harish

Bio: S. Harish is an academic researcher from Tamil Nadu Agricultural University. The author has contributed to research in topics: Data security & Encryption. The author has an hindex of 2, co-authored 2 publications receiving 27 citations.

Papers
More filters
01 Jan 2010
TL;DR: An overview of the emerging Visual Cryptography (VC), a new technique which provides information security which uses simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography.
Abstract: Security has become an inseparable issue as information technology is ruling the world now. Cryptography is the study of mathematical techniques related aspects of Information Security such as confidentiality, data security, entity authentication and data origin authentication, but it is not the only means of providing information security, rather one of the techniques. Visual cryptography is a new technique which provides information security which uses simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. This technique allows Visual information (pictures, text, etc) to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique encrypts a secret image into shares such that stacking a sufficient number of shares reveals the secret image. Shares are usually presented in transparencies. In this paper we provide an overview of the emerging Visual Cryptography (VC) and related security research work done in this area.

25 citations

Journal ArticleDOI
TL;DR: The shelf life study revealed that there were much less significant changes in the physico-chemical properties under both storage conditions, and the appearance and texture of the products stored in ambient storage conditions rather than in refrigerated conditions were found to be good.
Abstract: The present study focuses on the replacement of wheat and the development of ethnic RTE Indian products. Gluten, a protein complex present in wheat, causes celiac disease and gluten sensitivity in people. Foxtail Millet is one such cereal, which can be substituted for wheat due to its availability and nutritional importance. Halwa is a delicious sweet dessert rich in fat and carbohydrates, which is prepared mainly in North India. Through retort processing, the shelf life of halwa can be increased to make these products available for an increased period. The RTE foxtail millet halwa was prepared and retorted to the total lethality value of 5.26 minutes. Retorting has significantly reduced the total microbial population and much less physico-chemical changes were recorded after processing, when compared to the control. The retorted products were stored under refrigerated and ambient conditions and the changes in physico-chemical properties were evaluated. During the storage period, the shelf life study revealed that there were much less significant changes in the physico-chemical properties under both storage conditions. Though, there was a comparatively equal amount of changes occurring in both the refrigerated storage and ambient storage conditions, the appearance and texture of the products stored in ambient storage conditions rather than in refrigerated conditions were found to be good...

4 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Due to its low cost and excellent functional properties of flour and protein concentrate, foxtail millet can be considered as good candidate for replacing animal protein foods.
Abstract: Foxtail millet (Setaria italica), an annual grass plant, produces seeds that possess health-promoting properties owing to its unique protein composition containing a high content of essential amino acids. The mature foxtail seeds mainly consist of proline-rich, alcohol-soluble proteins (prolamin) called setarins, comprising about 60% of the total protein, with less content of disulfide cross-linked proteins than with other cereal and millets. Protein fractionation schemes are an important tool and provide preliminary information on the nature of foxtail proteins for their applications in the field of agriculture, food pharma, and bio-based materials. Variation in the methods of preparation can influence the composition, structure, and nutritional quality of the protein concentrate. Moreover, foxtail protein or its hydrolysate has shown several bioactive effects that can be explored further for the management of chronic diseases in humans. Additionally, owing to its low cost and excellent functional properties of flour and protein concentrate, foxtail millet can be considered as good candidate for replacing animal protein foods. Furthermore, there is huge potential for successfully developing low-cost, protein-rich functional food products helpful in the prevention and management of lifestyle-related chronic diseases. © 2020 Society of Chemical Industry.

42 citations

Journal ArticleDOI
TL;DR: A survey of electronic voting schemes and systems available to date, classifying them and pointing out advantages and drawbacks of each class is presented, and improvements on some recent e-voting systems are suggested.
Abstract: Voting is a fundamental decision making instrument in any consensus-based society and democracy depends on the proper administration of popular elections. In any election, there exists a set of requirements among which voters should receive assurance that their intent was correctly captured and that all eligible votes were correctly tallied. On the other hand, the election system as a whole should ensure that voter coercion is unlikely. These conflicting requirements present a significant challenge: how can voters receive enough assurance to trust the election result, but not so much that they can prove to a potential coercer how they voted. The challenge of changing the traditional paper based voting methods used in many developing countries into electronic voting raises a set of functional and constitutional requirements. These requirements are governed by the country in which they operate and are usually not limited to privacy, authentication, fairness, transparency, integrity and incoercibility. This paper presents a survey of electronic voting schemes and systems available to date, classifying them and pointing out advantages and drawbacks of each class. The survey is concluded by presenting a comparative analysis on electronic voting and suggests improvements on some recent e-voting schemes and systems.

38 citations

Proceedings ArticleDOI
13 May 2013
TL;DR: The project presents an approach for encrypting visual cryptographically generated image shares using Public Key Encryption, which provides more secure secret shares that are robust against a number of attacks & the system provides a strong security for the handwritten text, images and printed documents over the public network.
Abstract: The Visual Cryptography Scheme is a secure method that encrypts a secret document or image by breaking it into shares. A distinctive property of Visual Cryptography Scheme is that one can visually decode the secret image by superimposing shares without computation. By taking the advantage of this property, third person can easily retrieve the secret image if shares are passing in sequence over the network. The project presents an approach for encrypting visual cryptographically generated image shares using Public Key Encryption. RSA algorithm is used for providing the double security of secret document. Thus secret share are not available in their actual form for any alteration by the adversaries who try to create fake shares. The scheme provides more secure secret shares that are robust against a number of attacks & the system provides a strong security for the handwritten text, images and printed documents over the public network.

21 citations

Proceedings ArticleDOI
15 Nov 2011
TL;DR: A secure electronic voting system that provides enhanced security by implementing cryptography and steganography in Java is proposed.
Abstract: As information technology evolves over time, the need for a better, faster, more convenient and secure electronic voting is relevant since the traditional election procedures cannot satisfy all of voter's demands. To increase the number of voters and to offer an enhanced procedure in an election, many researchers have been introducing novel and advanced approaches to secure electronic voting systems. This paper proposes a secure electronic voting system that provides enhanced security by implementing cryptography and steganography in Java. As a preliminary investigation, two steganography techniques are considered and their performances are compared for different image file formats.

19 citations

Proceedings ArticleDOI
31 Dec 2012
TL;DR: This paper proposes a new VC scheme for color images that makes use of Jarvis error filter, a key table and specialized tables for coding, thereby reducing the suspicion of data encryption.
Abstract: Visual cryptography (VC) schemes encrypt a secret image into two or more cover images, called shares. The secret image can be reconstructed by stacking the shares together, with no complex cryptographic calculations. This paper proposes a new VC scheme for color images. The shares generated are similar to the cover images, thereby reducing the suspicion of data encryption. The proposed scheme makes use of Jarvis error filter, a key table and specialized tables for coding. High visual quality is achieved as up to 50 percent of the secret image can be recovered.

16 citations