scispace - formally typeset
Search or ask a question
Institution

Christ University

EducationBengaluru, India
About: Christ University is a education organization based out in Bengaluru, India. It is known for research contribution in the topics: Computer science & Convection. The organization has 2267 authors who have published 2715 publications receiving 14575 citations. The organization is also known as: Christ College & Christ University.


Papers
More filters
Journal ArticleDOI
01 Feb 2019
TL;DR: In this paper, the time-dependent two-phase magnetohydrodynamic squeezing flow of dusty liquid is considered in a rotating channel and the flow is constructed by squeezing of a...
Abstract: This article addresses the time-dependent two-phase magnetohydrodynamic squeezing flow of dusty liquid. The fluid flow is considered in a rotating channel. The flow is constructed by squeezing of a...

13 citations

Journal ArticleDOI
TL;DR: A highly selective novel fluorescent probe was prepared by using surface modified ZnS:Mn nanoparticles, functionalized with morin, a flavonol which confirms the binding of morin to the nanoparticles via surface coordination.

13 citations

Proceedings ArticleDOI
19 Feb 2021
TL;DR: A one-time pad encryption algorithm is used to encrypt the medical image, then the encrypted image is implanted into a cover image to give a stego image making the system more resilient to the attacker.
Abstract: Medical imaging plays a vital role in the healthcare industry. Due to the advancements in the healthcare industry medical images are being transferred between geographically spread regions. As the medical images are transmitted through public networks several security challenges may arise such as authentication, integrity, and confidentiality. In this paper, the research focus is on preserving the confidentiality and integrity of the medical images. In general, integrity and confidentiality can be achieved by encryption (a piece of cryptography). To incorporate one more layer of security, steganography is applied to the medical image. In this paper, a one-time pad encryption algorithm is used to encrypt the medical image, then the encrypted image is implanted into a cover image to give a stego image making the system more resilient to the attacker. Further in this paper, the above said method is being implemented using MATLAB and the experimental results are compared with hiding the medical image using LSB steganography without encryption (one layer of security). Various formats of medical images have been taken into consideration such as DICOM, TIFF, BMP, and JPEG. Results show that the combination of encryption and steganography performs better than applying only steganography, concerning MSE and PSNR values.

13 citations

Proceedings ArticleDOI
10 Aug 2015
TL;DR: This paper proposes a novel two-way secure authentication scheme using DNA cryptography and steganography considering both security and usability and uses text and image password to authenticate legitimate user.
Abstract: Authentication is considered as one of the critical aspects of Information security to ensure identity. Authentication is generally carried out using conventional authentication methods such as text based passwords, but considering the increased usage of electronic services a user has to remember many id-password pairs which often leads to memorability issues. This inspire users to reuse passwords across e-services, but this practice is vulnerable to security attacks. To improve security strength, various authentication techniques have been proposed including two factor schemes based on smart card, tokens etc. and advanced biometric techniques. Graphical Image based authentication systems has received relevant diligence as it provides better usability by way of memorable image passwords. But the tradeoff between usability and security is a major concern while strengthening authentication. This paper proposes a novel two-way secure authentication scheme using DNA cryptography and steganography considering both security and usability. The protocol uses text and image password of which text password is converted into cipher text using DNA cryptography and embedded into image password by applying steganography. Hash value of the generated stego image is calculated using SHA-256 and the same will be used for verification to authenticate legitimate user.

13 citations


Authors

Showing all 2404 results

Network Information
Related Institutions (5)
Amity University
12.7K papers, 86K citations

80% related

Amrita Vishwa Vidyapeetham
11K papers, 76.1K citations

79% related

VIT University
24.4K papers, 261.8K citations

78% related

SRM University
11.7K papers, 103.7K citations

78% related

Punjabi University
5.9K papers, 73.1K citations

77% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202371
2022172
2021795
2020479
2019360
2018239