Institution
North Eastern Regional Institute of Science and Technology
Education•Itanagar, India•
About: North Eastern Regional Institute of Science and Technology is a education organization based out in Itanagar, India. It is known for research contribution in the topics: Population & Raman spectroscopy. The organization has 813 authors who have published 1429 publications receiving 16122 citations.
Papers published on a yearly basis
Papers
More filters
••
01 Feb 2014TL;DR: The paper describes different efficient algorithms used in the implementation to perform various mathematical manipulations in the ElGamal Elliptic Curve Cryptosystem.
Abstract: Elliptic Curve Cryptography recently gained a lot of attention in industry. The principal attraction of ECC compared to RSA is that it offers equal security for a smaller key size, thereby reducing processing overhead. There is no sub exponential time algorithm in solving the Elliptic curve discrete logarithm problem. ElGamal Elliptic Curve Cryptography is a public key cryptography analogue of the ElGamal encryption schemes which uses Elliptic Curve Discrete Logarithm Problem. The ElGamal Elliptic Curve Cryptosystem is implemented using C language in our work. We divided the whole cryptosystem into seven different phases. The paper also describes different efficient algorithms used in the implementation to perform various mathematical manipulations.
18 citations
••
TL;DR: In this article, the Simulated Annealing (SA) optimization method is introduced to estimate the parameters of Fractional Order Proportional-Integral Differential (FOPID) controller for controlling a...
Abstract: In this paper, the Simulated Annealing (SA) optimization method is introduced to estimate the parameters of Fractional Order Proportional-Integral-Differential (FOPID) controller for controlling a ...
18 citations
••
01 Jun 2020
TL;DR: Fraud detection algorithm for on-line transactional frauds is proposed using intuitionistic fuzzy logic and C4.5 decision tree to detect the frauds and the result obtained here shows that detection rate is high and efficient, compared to the other recent works.
Abstract: As the on-line transaction has become one of most important day-to-day life activities, security issues related with the on-line transactions has become most crucial part of the financial institutions. We have proposed here fraud detection algorithm for on-line transactional frauds. We developed a decision tree IFDTC4.5 using intuitionistic fuzzy logic and C4.5 decision tree to detect the frauds. Here intuitionistic fuzzy logic helps in considering cognitive properties of attributes, so that the legitimate transactions are not treated as frauds and fraudulent transactions are not treated as legitimate. For optimality of detection process we have considered both the derived attributes and normal attributes. The result obtained here shows that detection rate is high and efficient, compared to the other recent works.
18 citations
••
TL;DR: Vibrational assignment and potential energy distribution (PED) of individual modes have been calculated employing density functional theory (DFT) for the first time and evidence of increased possibility of C-H bending motion of the linking group and the C-C stretching of the alkyl chain in S(C) phase is given.
18 citations
••
TL;DR: A novel transform domain method is proposed to provide a better data hiding method that uses a multi-resolution transform function, integer wavelet transform (IWT) that decomposes an image into four subbands: low-low, low-high, high-low and high-high subband.
Abstract:
Steganography is a data hiding technique, which is used for securing data. Both spatial and transform domains are used to implement a steganography method. In this paper, a novel transform domain method is proposed to provide a better data hiding method. The method uses a multi-resolution transform function, integer wavelet transform (IWT) that decomposes an image into four subbands: low-low, low-high, high-low and high-high subband. The proposed method utilizes only the three subbands keeping the low-low subband untouched which helps to improve the quality of the stego image. The method applies a coefficient value differencing approach to determine the number of secret bits to be embedded in the coefficients. The method shows a good performance in terms of embedding capacity, imperceptibility and robustness. A number of metrics are computed to show the quality of the stego image. It can also withstand RS steganalysis, Chi-squared test and Subtractive Pixel Adjacency Matrix steganalysis successfully. The deformation of the histogram and Pixel Difference Histogram for different embedding percentages are also demonstrated, which show a significant similarity with the original cover image. The proposed method shows an achievement of 2.3bpp embedding capacity with a good quality of stego image.
18 citations
Authors
Showing all 824 results
Name | H-index | Papers | Citations |
---|---|---|---|
Rajendra Singh | 52 | 402 | 10732 |
Pramod Pandey | 46 | 292 | 10218 |
S. A. Hashmi | 40 | 104 | 4453 |
Debashish Pal | 39 | 90 | 8211 |
Santosh Kumar Sarkar | 35 | 125 | 4177 |
Narendra Singh Raghuwanshi | 31 | 136 | 4298 |
Suresh Kumar | 29 | 407 | 3580 |
Mohammed Latif Khan | 27 | 92 | 2495 |
Ashish Pandey | 27 | 63 | 2311 |
A. K. Singh | 25 | 1078 | 4880 |
Pradeep Kumar | 24 | 112 | 2520 |
N. K. Goel | 23 | 46 | 2115 |
Ayyanadar Arunachalam | 23 | 73 | 1566 |
R. S. Tripathi | 22 | 31 | 1552 |
S. Ravi | 20 | 138 | 1338 |