Institution
Christ University
Education•Bengaluru, India•
About: Christ University is a education organization based out in Bengaluru, India. It is known for research contribution in the topics: Computer science & Convection. The organization has 2267 authors who have published 2715 publications receiving 14575 citations. The organization is also known as: Christ College & Christ University.
Topics: Computer science, Convection, Cloud computing, Population, Heat transfer
Papers published on a yearly basis
Papers
More filters
••
01 Feb 2019TL;DR: In this paper, the time-dependent two-phase magnetohydrodynamic squeezing flow of dusty liquid is considered in a rotating channel and the flow is constructed by squeezing of a...
Abstract: This article addresses the time-dependent two-phase magnetohydrodynamic squeezing flow of dusty liquid. The fluid flow is considered in a rotating channel. The flow is constructed by squeezing of a...
13 citations
••
13 citations
••
TL;DR: A highly selective novel fluorescent probe was prepared by using surface modified ZnS:Mn nanoparticles, functionalized with morin, a flavonol which confirms the binding of morin to the nanoparticles via surface coordination.
13 citations
••
19 Feb 2021TL;DR: A one-time pad encryption algorithm is used to encrypt the medical image, then the encrypted image is implanted into a cover image to give a stego image making the system more resilient to the attacker.
Abstract: Medical imaging plays a vital role in the healthcare industry. Due to the advancements in the healthcare industry medical images are being transferred between geographically spread regions. As the medical images are transmitted through public networks several security challenges may arise such as authentication, integrity, and confidentiality. In this paper, the research focus is on preserving the confidentiality and integrity of the medical images. In general, integrity and confidentiality can be achieved by encryption (a piece of cryptography). To incorporate one more layer of security, steganography is applied to the medical image. In this paper, a one-time pad encryption algorithm is used to encrypt the medical image, then the encrypted image is implanted into a cover image to give a stego image making the system more resilient to the attacker. Further in this paper, the above said method is being implemented using MATLAB and the experimental results are compared with hiding the medical image using LSB steganography without encryption (one layer of security). Various formats of medical images have been taken into consideration such as DICOM, TIFF, BMP, and JPEG. Results show that the combination of encryption and steganography performs better than applying only steganography, concerning MSE and PSNR values.
13 citations
••
10 Aug 2015TL;DR: This paper proposes a novel two-way secure authentication scheme using DNA cryptography and steganography considering both security and usability and uses text and image password to authenticate legitimate user.
Abstract: Authentication is considered as one of the critical aspects of Information security to ensure identity. Authentication is generally carried out using conventional authentication methods such as text based passwords, but considering the increased usage of electronic services a user has to remember many id-password pairs which often leads to memorability issues. This inspire users to reuse passwords across e-services, but this practice is vulnerable to security attacks. To improve security strength, various authentication techniques have been proposed including two factor schemes based on smart card, tokens etc. and advanced biometric techniques. Graphical Image based authentication systems has received relevant diligence as it provides better usability by way of memorable image passwords. But the tradeoff between usability and security is a major concern while strengthening authentication. This paper proposes a novel two-way secure authentication scheme using DNA cryptography and steganography considering both security and usability. The protocol uses text and image password of which text password is converted into cipher text using DNA cryptography and embedded into image password by applying steganography. Hash value of the generated stego image is calculated using SHA-256 and the same will be used for verification to authenticate legitimate user.
13 citations
Authors
Showing all 2404 results
Name | H-index | Papers | Citations |
---|---|---|---|
Matt S. Owers | 56 | 217 | 8765 |
Bijjanal Jayanna Gireesha | 40 | 233 | 4748 |
Basavarajappa Mahanthesh | 38 | 158 | 3580 |
Madhavi Rangaswamy | 31 | 52 | 3063 |
Siddhartha Bhattacharyya | 30 | 251 | 3481 |
Rohan Fernandes | 28 | 55 | 2585 |
Gurumurthy Hegde | 27 | 176 | 2185 |
Pundikala Veeresha | 27 | 67 | 1825 |
Pradeep G. Siddheshwar | 26 | 156 | 2298 |
Renjith S. Pillai | 25 | 65 | 2663 |
Brij Kumar Dhindaw | 25 | 123 | 2224 |
Sukalyan Dash | 24 | 137 | 2682 |
Anil Agarwal | 21 | 185 | 1695 |
Maggi Banning | 20 | 73 | 1695 |
Lakshmi S. Iyer | 19 | 123 | 2276 |