A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Satyavathy, G.
- LSB and DCT Based Steganography in Safe Message Routing and Delivery for Structured Peer-To-Peer Systems
Authors
1 Department of Computer Science, Sri Ramakrishna College of Arts and Science for Women, Coimbatore-641 044, IN
Source
Networking and Communication Engineering, Vol 2, No 9 (2010), Pagination: 365-369Abstract
In structured P2P systems, message deliverance can be done by identifying the peer IDs of the individual systems. The initiator has to decide the destination and can route the message through one or more hops. The message passes from one hop to another correctly by identifying the IP address and finally reaches the destination. In this paper we propose an efficient routing strategy to control the routing path and to identify the malicious nodes. We also eliminate the drawbacks of encryption by introducing steganography in message deliverance. This paper proposes a new steganographic encoding scheme which separates the colour channels of the windows bitmap images and then hides messages randomly in the LSB of one colour component of a chosen pixel where the colour components of the other two are found to be equal to the key selected. In addition to this we apply DCT based Steganography which embeds the text message in least significant bits of the Discrete Cosine (DC) coefficient of digital picture. When information is hidden inside video, the program hiding the information usually performs the DCT. DCT works by slightly changing each of the images in the video, only to the extent that is not noticeable by the human eye. An implementation of both these methods and their performance analysis has been done in this paper.Keywords
Peer-To-Peer, Least Significant Bit (LSB), Discrete Cosine Transform (DCT), Steganography.- A Study on Sharing Encrypted Information in P2P Network
Authors
1 Sri Ramakrishna College of Arts & Science for Women, Coimbatore-641044, IN
Source
Fuzzy Systems, Vol 5, No 7 (2013), Pagination: 217-219Abstract
In this paper, an encryption technique is proposed based on the general idea that offers efficiency in uploading and downloading a file or data in an encrypted form between peers. The proposed method, introduces a theoretical come practical model that forecasts the act of the system and computes the values of the practical parameters that achieve a desired performance. The proposed method provides very strong security for cooperation and also improves the presentation of P2P networks considerably. In particular, theoretical and realistic models show that it reduces the query response time and file upload and download delays by organizing the magnitude, and doubles the system’s throughput.Keywords
Encryption, P2P Networks, Throughput, Response Time.- Steganography Technique for Secure Transmission of Secret Message or Image
Authors
1 Anna University, Chennai-600025, IN
2 Sri Ramakrishna Engineering College, Coimbatore-641022, IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 5, No 12 (2013), Pagination: 505-508Abstract
Steganography is a relatively new field of study in Information Technology which deals with information hiding. Steganography or Stego literally means “covered writing”. Steganography is the art and science of communicating in a way which hides the existence of the communication. In divergence to Cryptography, where the enemy is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a cryptosystem, the goal of Steganography is to camouflage messages in a way that does not allow any enemy to even detect the presence of secret messages. Steganographic research is primarily driven by the lack of strength in the cryptographic systems and the desire to have complete secrecy in an open-systems environment. This paper deals with a brief history of Steganography, various concepts and techniques of Steganography that is used for secure transmission of secret messages or images.
Keywords
Steganography, Cryptography, Camouflage, Transmission.- Mobile Banking and its Benefits
Authors
1 Department of Computer Science, Sri Ramakrishna College of Arts and Science for Women, Coimbatore, IN
2 Department of Computer Science, Sri Ramakrishna College of Arts and Science for Women, Coimbatore, IN
Source
Programmable Device Circuits and Systems, Vol 9, No 1 (2017), Pagination: 11-13Abstract
Mobile banking is one of the areas mobile commerce that has extensive communications with other areas of mobile commerce. The one hand mobile banking is associated with customers and on the other hand, is capable of other firms that are active in the field of electronic commerce, provide effective financial services. In this paper we describe the definition of mobile banking, Evolution and finally to describe number of benefits for users of these services.
Keywords
Mobile Banking, Customer, Mobile Technology, E-Banking.- Overview of Sensor Network
Authors
1 Department of Computer Science, Sri Ramakrishna College of Arts and Science for Women, Coimbatore, IN
2 Department of Computer Science, Sri Ramakrishna College of Arts and Science for Women, Coimbatore, IN
Source
Networking and Communication Engineering, Vol 9, No 1 (2017), Pagination: 5-7Abstract
This paper gives an impression of sensor network and its technology and fields of application of sensor networks. It reflects in aspect selected fields of application that have high probability. However studies clearly guess an overall strong positive effect in smart buildings, smart industrial applications as well as precision agriculture and agricultural, consequences for the arena of smart conveyance are diversified due to recoil effects [1]. As significance, demand for transference and thus the consumption of properties both increase which can lead to an overall negative effect.
Keywords
Networks, Programmers, Production, Grid, Environment, Sensors, Technology, Process.- Multimedia and Virtual Reality
Authors
1 Department of Computer Science, Sri Ramakrishna College of Arts and Science for Women, Coimbatore, IN
Source
Digital Image Processing, Vol 9, No 1 (2017), Pagination: 4-7Abstract
Multimedia has recognized its abilities of inspiring handlers and capturing their helpfulness, which are important features when it provide a developed gradation of engagement and wisdom skills inside Virtual Reality applications. Most of the tools and languages for exhibiting Virtual Reality environments, such as VRML, X3D, Java3D, etc. It do not provide the corresponding presentation of multimedia content inside these environments. This paper presents a multimedia and virtual reality for the combined presentation of poles apart kinds of media objects inside virtual environments based on the Graphical Engine OGRE and how this resolution can be applied approximately for provided that customizable multimedia and virtual learning environments. Multimedia boundary design: models, principles and a design method for multimedia presentation and discussion. A basis for fascinating user's attention, corresponding media to the message and precluding information overworking. The multimedia unit also analyses the aesthetics of design and extracts elementary principles for planning smart and attractive user boundaries. The future development of interactive technology.
Keywords
Virtual Reality, Multimedia Synchronization, OGRE, XML.- Human-Computer Interaction
Authors
1 Department of Computer Science, Sri Ramakrishna College of Arts and Science for Women, Coimbatore, IN
Source
Digital Signal Processing, Vol 9, No 1 (2017), Pagination: 4-6Abstract
Human–Computer Interaction (commonly referred to as HCI) researches the design and use of computer technology, focused on the interfaces between people (users) and computers. Researchers in the field of HCI both observe the ways in which humans interact with computers and design technologies that let humans interact with computers in novel ways.
The term was popularized by Stuart K. Card, Allen Newell, and Thomas P. Moran in their seminal 1983 book, The Psychology of Human-Computer Interaction, although the authors first used the term in 1980and the first known use was in 1975.The term connotes that, unlike other tools with only limited uses (such as a hammer, useful for driving nails but not much else), a computer has many uses and this takes place as an open-ended dialog between the user and the computer. The notion of dialog likens human-computer interaction to human-to-human interaction, an analogy which is crucial to theoretical considerations in the field.
Keywords
Human-Computer Interaction, Multimodal HCI, Ubiquitous Computing.- Mobile Application Development
Authors
1 Department of Computer Science, Sri Ramakrishna College of Arts and Science for Women, Coimbatore, IN
Source
Automation and Autonomous Systems, Vol 9, No 1 (2017), Pagination: 6-10Abstract
Billon mobile devices are used worldwide, and half of mobile application on offer, software developers must make a choice between developing any one of the applications like hybrid, native or web application. This paper provides a comparison between these three developments and this paper compares development approaches across these three options and compiles a devices that can be used in critical development decisions. Features and challenges of mobile application development are discussed and advantages and disadvantages of each approach are discussed.
Keywords
Mobile Application, Hybrid Mobile Application, Native Mobile Application Development, Web Mobile Application Development, Apple, iOS.- A Study on Cyber Physical System and Network Security
Authors
1 Department of Computer Science, Sri Ramakrishna College of Arts and Science for Women, Coimbatore, IN
Source
Networking and Communication Engineering, Vol 9, No 3 (2017), Pagination: 59-61Abstract
Cyber-Physical (CPSs) are characterized by integrating computation and physical processes. The theories and applications of CPSs face the enormous challenges. The aim of this work is to provide a better understanding of this emerging multi-disciplinary methodology. The research progresses are summarized from different perspectives such as energy control, secure control, transmission and management, control technique, system resource allocation, and model-based software design. The research challenges and some suggestions for future work are in brief outlined. The computer network technology is developing rapidly, and the development of internet technology is more quickly, people more aware of the importance of the network security.
Network security is main issue of computing because many types of attacks are increasing day by day. Protecting computer and network security are critical issues. The malicious nodes create a problem in the network. This malicious nodes acts as selfishness. After analyzing and quantifying the network information security elements confidentiality, integrity and availability. This paper describes the network security confidentiality vector, network security integrity vector and network security availability vector and also some major type of attacks in networks.
Keywords
Cyber Physical System (CPS), CPS Attacks, CPS Security, Network Security Threats, Network Security Components.- Energy-Aware Optimal Clustering and Secure Routing Protocol for Heterogeneous Wireless Sensor Network
Authors
1 Department of Computer Science, Sri Ramakrishna College of Arts & Science for Women, Coimbatore, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 9, No 1 (2022), Pagination: 12-21Abstract
Wireless Sensor Network (WSN) is a collection of low energy sensor nodes deployed in hostile complex environments. Their functionality gathers requisite data from the environment and transmits it to the base station for further processing. To enhance the performance of WSN, sensor nodes with different energy levels, capabilities and functionalities are deployed, leading to Heterogeneous WSN (HWSN). The initial energy, energy consumption rate, and residual energy differ for each node in a heterogeneous WSN. Many algorithms were proposed to accomplish an energy-efficient steady HWSN, but the performance level is not satisfactory. This paper presents a novel integrated approach, Energy-Aware Optimal Clustering & Securing Routing (EAOCSR). The algorithm amalgamated three techniques optimal clustering, reliable routing and secured transmission, considering energy retention and network lifetime as the vital parameters. Unequal clustering scheme, trust-based reliable and secure routing forms the core of EAOCSR. The performance of EAOCSR is analyzed using MATLAB simulations. It reveals that the proposed routing protocol EAOCSR has superior performance to existing protocols regarding energy utilization, throughput, network lifetime, stability and security.Keywords
HWSN, Unequal Clustering, Trust, Blockchain, Stability, Security.References
- S. De and B. Chakraborty, “An energy-efficient wireless sensor network construction algorithm for air quality condition detection system,” Comput. Electr. Eng., vol. 91, p. 107064, 2021, doi: https://doi.org/10.1016/j.compeleceng.2021.107064.
- A. I. Saleh, K. M. Abo-Al-Ez, and A. A. Abdullah, “A Multi-Aware Query Driven (MAQD) routing protocol for mobile wireless sensor networks based on neuro-fuzzy inference,” J. Netw. Comput. Appl., vol. 88, pp. 72–98, 2017, doi: https://doi.org/10.1016/j.jnca.2017.02.016.
- M. Farsi, M. Badawy, M. Moustafa, H. A. Ali, and Y. Abdulazeem, “A Congestion-Aware Clustering and Routing (CCR) Protocol for Mitigating Congestion in WSN,” IEEE Access, vol. 7, pp. 105402– 105419, 2019, doi: 10.1109/ACCESS.2019.2932951.
- Z. Zhou, B. Yao, R. Xing, L. Shu, and S. Bu, “E-CARP: An Energy Efficient Routing Protocol for UWSNs in the Internet of Underwater Things,” IEEE Sens. J., vol. 16, no. 11, pp. 4072–4082, 2016, doi: 10.1109/JSEN.2015.2437904.
- K. Kalaivanan and V. Bhanumathi, “Reliable location aware and Cluster-Tap Root based data collection protocol for large scale wireless sensor networks,” J. Netw. Comput. Appl., vol. 118, pp. 83–101, 2018, doi: https://doi.org/10.1016/j.jnca.2018.06.005.
- J. Ramkumar and R. Vadivel, “CSIP—cuckoo search inspired protocol for routing in cognitive radio ad hoc networks,” in Advances in Intelligent Systems and Computing, 2017, vol. 556, pp. 145–153, doi: 10.1007/978-981-10-3874-7_14.
- J. Ramkumar and R. Vadivel, “Improved frog leap inspired protocol (IFLIP) – for routing in cognitive radio ad hoc networks (CRAHN),” World J. Eng., vol. 15, no. 2, pp. 306–311, 2018, doi: 10.1108/WJE-082017-0260.
- J. Ramkumar and R. Vadivel, “Performance Modeling of Bio-Inspired Routing Protocols in Cognitive Radio Ad Hoc Network to Reduce Endto-End Delay,” Int. J. Intell. Eng. Syst., vol. 12, no. 1, pp. 221–231, 2019, doi: 10.22266/ijies2019.0228.22.
- J. Ramkumar and R. Vadivel, “Multi-Adaptive Routing Protocol for Internet of Things based Ad-hoc Networks,” Wirel. Pers. Commun., pp. 1–23, Apr. 2021, doi: 10.1007/s11277-021-08495-z.
- J. Ramkumar and R. Vadivel, “Bee inspired secured protocol for routing in cognitive radio ad hoc networks,” INDIAN J. Sci. Technol., vol. 13, no. 30, pp. 3059–3069, 2020, doi: 10.17485/IJST/v13i30.1152.
- J. Ramkumar and R. Vadivel, “Intelligent Fish Swarm Inspired Protocol (IFSIP) For Dynamic Ideal Routing in Cognitive Radio Ad-Hoc Networks,” Int. J. Comput. Digit. Syst., vol. 10, no. 1, pp. 1063–1074, 2020, doi: http://dx.doi.org/10.12785/ijcds/100196.
- R. Vadivel and J. Ramkumar, “QoS-Enabled Improved Cuckoo SearchInspired Protocol (ICSIP) for IoT-Based Healthcare Applications,” pp. 109–121, 2019, doi: 10.4018/978-1-7998-1090-2.ch006.
- D. Sharma and A. P. Bhondekar, “Traffic and Energy Aware Routing for Heterogeneous Wireless Sensor Networks,” IEEE Commun. Lett., vol. 22, no. 8, pp. 1608–1611, Aug. 2018, doi:10.1109/LCOMM.2018.2841911.
- S. Al-Sodairi and R. Ouni, “Reliable and energy-efficient multi-hop LEACH-based clustering protocol for wireless sensor networks,” Sustain. Comput. Informatics Syst., vol. 20, pp. 1–13, Dec. 2018, doi: 10.1016/j.suscom.2018.08.007.
- A. Benzerbadj, B. Kechar, A. Bounceur, and M. Hammoudeh, “Surveillance of sensitive fenced areas using duty-cycled wireless sensor networks with asymmetrical links,” J. Netw. Comput. Appl., vol. 112, pp. 41–52, 2018, doi: https://doi.org/10.1016/j.jnca.2018.03.027.
- R. Yarinezhad and S. N. Hashemi, “Solving the load balanced clustering and routing problems in WSNs with an fpt-approximation algorithm and a grid structure,” Pervasive Mob. Comput., vol. 58, p. 101033, 2019, doi: https://doi.org/10.1016/j.pmcj.2019.101033.
- S. Chinnaswamy and A. K, “Trust aggregation authentication protocol using machine learning for IoT wireless sensor networks,” Comput. Electr. Eng., vol. 91, p. 107130, 2021, doi: https://doi.org/10.1016/j.compeleceng.2021.107130.
- B. Shah et al., “Guaranteed lifetime protocol for IoT based wireless sensor networks with multiple constraints,” Ad Hoc Networks, vol. 104, p. 102158, 2020, doi: https://doi.org/10.1016/j.adhoc.2020.102158.
- A. Chowdhury and D. De, “FIS-RGSO: Dynamic Fuzzy Inference System Based Reverse Glowworm Swarm Optimization of energy and coverage in green mobile wireless sensor networks,” Comput.
- Commun., vol. 163, pp. 12–34, 2020, doi: https://doi.org/10.1016/j.comcom.2020.09.002.
- G. D. O’Mahony, K. G. McCarthy, P. J. Harris, and C. C. Murphy, “Developing novel low complexity models using received in-phase and quadrature-phase samples for interference detection and classification in Wireless Sensor Network and GPS edge devices,” Ad Hoc Networks, vol. 120, p. 102562, 2021, doi: https://doi.org/10.1016/j.adhoc.2021.102562.
- M. Faheem, M. A. Ngadi, and V. C. Gungor, “Energy efficient multiobjective evolutionary routing scheme for reliable data gathering in Internet of underwater acoustic sensor networks,” Ad Hoc Networks, vol. 93, p. 101912, 2019, doi: https://doi.org/10.1016/j.adhoc.2019.101912.
- J. Lu, L. Feng, J. Yang, M. M. Hassan, A. Alelaiwi, and I. Humar, “Artificial agent: The fusion of artificial intelligence and a mobile agent for energy-efficient traffic control in wireless sensor networks,” Futur. Gener. Comput. Syst., vol. 95, pp. 45–51, 2019, doi: https://doi.org/10.1016/j.future.2018.12.024.
- S. Chouikhi, I. El Korbi, Y. Ghamri-Doudane, and L. Azouz Saidane, “Distributed connectivity restoration in multichannel wireless sensor networks,” Comput. Networks, vol. 127, pp. 282–295, 2017, doi: https://doi.org/10.1016/j.comnet.2017.08.016.
- S. Priyadarshani, A. Tomar, and P. K. Jana, “An efficient partial charging scheme using multiple mobile chargers in wireless rechargeable sensor networks,” Ad Hoc Networks, vol. 113, p. 102407, 2021, doi: https://doi.org/10.1016/j.adhoc.2020.102407.
- P. S. Uma Priyadarsini and P. Sriramya, “Disaster management using evidence-based interactive trust management system for wireless sensor networks by Internet of Things,” Comput. Electr. Eng., vol. 75, pp. 164–174, 2019, doi: https://doi.org/10.1016/j.compeleceng.2019.02.020.
- O. A. Khashan, R. Ahmad, and N. M. Khafajah, “An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks,” Ad Hoc Networks, vol. 115, p. 102448, 2021, doi:https://doi.org/10.1016/j.adhoc.2021.102448.
- C. Luo, J. Yu, D. Li, H. Chen, Y. Hong, and L. Ni, “A Novel Distributed algorithm for constructing virtual backbones in wireless sensor networks,” Comput. Networks, vol. 146, pp. 104–114, 2018, doi: https://doi.org/10.1016/j.comnet.2018.09.016.
- N. Kaur and S. Singh, “Optimized cost effective and energy efficient routing protocol for wireless body area networks,” Ad Hoc Networks, vol. 61, pp. 65–84, 2017, doi: https://doi.org/10.1016/j.adhoc.2017.03.008.
- G. J., S. J., S. Y., and M. V., “Data consistency matrix based data processing model for efficient data storage in wireless sensor networks,” Comput. Commun., vol. 151, pp. 172–182, 2020, doi: https://doi.org/10.1016/j.comcom.2019.12.060.
- M. M. Ahmed, E. H. Houssein, A. E. Hassanien, A. Taha, and E. Hassanien, “Maximizing lifetime of wireless sensor networks based on whale optimization algorithm,” Adv. Intell. Syst. Comput., vol. 639, pp. 724–733, 2018, doi: 10.1007/978-3-319-64861-3_68.
- J. Sengupta, S. Ruj, and S. Das Bit, “End to end secure anonymous communication for secure directed diffusion in IoT,” Pervasive Health Pervasive Comput. Technol. Healthc., pp. 445–450, Jan. 2019, doi: 10.1145/3288599.3295577.
- X. Yu, F. Li, T. Li, N. Wu, H. Wang, and H. Zhou, “Trust-based secure directed diffusion routing protocol in WSN,” J. Ambient Intell. Humaniz. Comput. 2020, pp. 1–13, Nov. 2020, doi:10.1007/S12652-020-02638-Z.
- S. M. Pournaghi, M. Bayat, and Y. Farjami, “MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption,” J. Ambient Intell. Humaniz. Comput.
- 1111, vol. 11, no. 11, pp. 4613–4641, Jan. 2020, doi: 10.1007/S12652-020-01710-Y.
- M. Hema Kumar, V. Mohanraj, Y. Suresh, J. Senthilkumar, and G. Nagalalli, “Trust aware localized routing and class based dynamic block chain encryption scheme for improved security in WSN,” J. Ambient Intell. Humaniz. Comput. 2020 125, vol. 12, no. 5, pp. 5287–5295, Apr. 2020, doi: 10.1007/S12652-020-02007-W.