scispace - formally typeset
Search or ask a question
Institution

North Eastern Regional Institute of Science and Technology

EducationItanagar, India
About: North Eastern Regional Institute of Science and Technology is a education organization based out in Itanagar, India. It is known for research contribution in the topics: Population & Raman spectroscopy. The organization has 813 authors who have published 1429 publications receiving 16122 citations.


Papers
More filters
Proceedings ArticleDOI
01 Feb 2014
TL;DR: The paper describes different efficient algorithms used in the implementation to perform various mathematical manipulations in the ElGamal Elliptic Curve Cryptosystem.
Abstract: Elliptic Curve Cryptography recently gained a lot of attention in industry. The principal attraction of ECC compared to RSA is that it offers equal security for a smaller key size, thereby reducing processing overhead. There is no sub exponential time algorithm in solving the Elliptic curve discrete logarithm problem. ElGamal Elliptic Curve Cryptography is a public key cryptography analogue of the ElGamal encryption schemes which uses Elliptic Curve Discrete Logarithm Problem. The ElGamal Elliptic Curve Cryptosystem is implemented using C language in our work. We divided the whole cryptosystem into seven different phases. The paper also describes different efficient algorithms used in the implementation to perform various mathematical manipulations.

18 citations

Journal ArticleDOI
TL;DR: In this article, the Simulated Annealing (SA) optimization method is introduced to estimate the parameters of Fractional Order Proportional-Integral Differential (FOPID) controller for controlling a...
Abstract: In this paper, the Simulated Annealing (SA) optimization method is introduced to estimate the parameters of Fractional Order Proportional-Integral-Differential (FOPID) controller for controlling a ...

18 citations

Journal ArticleDOI
01 Jun 2020
TL;DR: Fraud detection algorithm for on-line transactional frauds is proposed using intuitionistic fuzzy logic and C4.5 decision tree to detect the frauds and the result obtained here shows that detection rate is high and efficient, compared to the other recent works.
Abstract: As the on-line transaction has become one of most important day-to-day life activities, security issues related with the on-line transactions has become most crucial part of the financial institutions. We have proposed here fraud detection algorithm for on-line transactional frauds. We developed a decision tree IFDTC4.5 using intuitionistic fuzzy logic and C4.5 decision tree to detect the frauds. Here intuitionistic fuzzy logic helps in considering cognitive properties of attributes, so that the legitimate transactions are not treated as frauds and fraudulent transactions are not treated as legitimate. For optimality of detection process we have considered both the derived attributes and normal attributes. The result obtained here shows that detection rate is high and efficient, compared to the other recent works.

18 citations

Journal ArticleDOI
TL;DR: Vibrational assignment and potential energy distribution (PED) of individual modes have been calculated employing density functional theory (DFT) for the first time and evidence of increased possibility of C-H bending motion of the linking group and the C-C stretching of the alkyl chain in S(C) phase is given.

18 citations

Journal ArticleDOI
TL;DR: A novel transform domain method is proposed to provide a better data hiding method that uses a multi-resolution transform function, integer wavelet transform (IWT) that decomposes an image into four subbands: low-low, low-high, high-low and high-high subband.
Abstract: Steganography is a data hiding technique, which is used for securing data. Both spatial and transform domains are used to implement a steganography method. In this paper, a novel transform domain method is proposed to provide a better data hiding method. The method uses a multi-resolution transform function, integer wavelet transform (IWT) that decomposes an image into four subbands: low-low, low-high, high-low and high-high subband. The proposed method utilizes only the three subbands keeping the low-low subband untouched which helps to improve the quality of the stego image. The method applies a coefficient value differencing approach to determine the number of secret bits to be embedded in the coefficients. The method shows a good performance in terms of embedding capacity, imperceptibility and robustness. A number of metrics are computed to show the quality of the stego image. It can also withstand RS steganalysis, Chi-squared test and Subtractive Pixel Adjacency Matrix steganalysis successfully. The deformation of the histogram and Pixel Difference Histogram for different embedding percentages are also demonstrated, which show a significant similarity with the original cover image. The proposed method shows an achievement of 2.3bpp embedding capacity with a good quality of stego image.

18 citations


Authors

Showing all 824 results

NameH-indexPapersCitations
Rajendra Singh5240210732
Pramod Pandey4629210218
S. A. Hashmi401044453
Debashish Pal39908211
Santosh Kumar Sarkar351254177
Narendra Singh Raghuwanshi311364298
Suresh Kumar294073580
Mohammed Latif Khan27922495
Ashish Pandey27632311
A. K. Singh2510784880
Pradeep Kumar241122520
N. K. Goel23462115
Ayyanadar Arunachalam23731566
R. S. Tripathi22311552
S. Ravi201381338
Network Information
Related Institutions (5)
Indian Institute of Technology Roorkee
21.4K papers, 419.9K citations

89% related

Jadavpur University
27.6K papers, 422K citations

89% related

Indian Institutes of Technology
40.1K papers, 652.9K citations

89% related

Indian Institute of Technology Kharagpur
38.6K papers, 714.5K citations

87% related

Indian Institute of Technology Delhi
26.9K papers, 503.8K citations

86% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202310
202220
2021181
2020206
2019150
2018137