A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sharma, Monisha
- Generation of Quasigroup for Cryptographic Application
Authors
1 Shri Shankaracharya College of Engineering & Technology, Bhilai, (CG), IN
2 Bhilai Institute of Technology, Durg (CG), IN
Source
Indian Journal of Science and Technology, Vol 2, No 11 (2009), Pagination: 35-36Abstract
A method of generating a practically unlimited number of quasigroups of a (theoretically) arbitrary order using the computer algebra system Maple 7 is presented. This problem is crucial to cryptography and its solution permits to implement practical quasigroup-based endomorphic cryptosystems. The order of a quasigroup usually equals the number of characters of the alphabet used for recording both the plaintext and the cipher text. Moreover, it can be used for varied information viz. text, image, etc. Many of the on going algorithms uses NLFSR to generate pseudo random sequence and thus the suggested method can be integrated in any of the existing pseudo random sequence to further enhance their complexity. The implementation of PRSG using quasi group processing is highly scalable and fairly unpredictable. It has passed all publicly available random sequence generator tests. That is exactly what this paper provides: fast and easy ways of generating quasigroups of order up to 256 and a little more.Keywords
Quasigroup, Cryptography, Pseudo Random Sequence Generator (PRSG's), QPRSG, Non Linear Feedback Shift Register (NLFSR)References
- Brotherton-Ratcliffe R (April 1995, December 1994) Using quasi-random sequences in Monte-Carlo valuation of pathdependent options. Canadian Treasurer. 11 (2), 36-38.
- Dimitrova V and Markovski J (2003) On quasigroup pseudo random sequence generators, Instt. of Info. Faculty of Natural Sci. & Maths, Ss. Cyril & Methodius Univ., Arhimedova 5, Macedonia.
- Gligoroski D, Markovski S and Knapskog L (2005) A fix of the MD4 family of Hash functions - quasigroup fold. NIST Cryptographic Hash Workshop. 31 Oct-1 Nov.
- Gligoroski D, Markovski S, Kocarev L and Edon-R (2009) An infinite family of cryptographic Hash functions. Intl. J. Network Security. 8 (3), 293-300.
- Gutmann P (2001) Random number generation. Available at http://www.cypherpunks.to/~peter/06 _random.pdf
- Markovski S and Gligoroski D (2003) Differential cryptanalysis of the quasigroup cipher. Univ. of Kuopio, Finland, Ss Cyril & Methodius Univ., Republic of Macedonia.
- Markovski S and Gligoroski D (2007) Construction of quasi groups of huge order. Ss Cyril & Methodius University Skopje, Macedonia, ICDMA7. June-17-20.
- Menezes AJ, van Oorschot PC and Vanstone SA (2001) Handbook of applied cryptography. CRC Press, Canada.
- Navin Rajpal, Anil Kumar, Sureka Dudhani and Pravesh Raja Jindal (2002) Copyright protection using non-linear forward feedback shift register and error-correction technique. In: Map India Conference, Taj Palace New Delhi,India, Feb 6-8
- Ritter Terry (1991) The efficient generation of cryptographic confusion sequences. Cryptologia. l XV (2), 81-139.
- Tony Warnock (1987) Random-number generators. Los Alamos Sci. Special issue, Vol 1, issue 1.
- Implementation and Analysis of Various Symmetric Cryptosystems
Authors
1 E & Tc. Department, SSCET, Bhilai-490020, Chhattisgarh, IN
Source
Indian Journal of Science and Technology, Vol 3, No 12 (2010), Pagination: 1173-1176Abstract
This paper implements some of the widely used symmetric encryption techniques i.e. data encryption standard (DES), triple data encryption standard (3DES), advanced encryption standard (AES), BLOWFISH and RC4 in MATLAB software. After the implementation, these techniques are compared on some points. These points are avalanche effect due to one bit variation in plaintext keeping the key constant, avalanche effect due to one bit variation in key keeping the plaintext constant, memory required for implementation and simulation time required for different message lengths.Keywords
DES, 3DES, AES, Blowfish, RC4, Encryption, Decryption, Ciphertext, Deciphertext, PlaintextReferences
- Brian A. Carter, Ari Kassin and Tanja Magoc (2007) Symmetric cryptosystems and symmetric key management. CiteSeerX. 10.1.1.135.1231.
- Grover D (1998) Forensic copyright protection. The computer Law & Security Report, 14, 121–122.
- Pratap R (2004) Getting started with MATLAB, 6. Oxford University Press.
- Schneier B (1993) Description of a new variablelength key, 64-bit block Cipher (Blowfish), Springer- Verlag, 191-204.
- Schweighofer E (1997) Downloading information filtering and copyright. Info. & Commun. Technol. Law, 6 (2) 121-135.
- System Design Approach for Heartbeat Detection and Classification of Individuals Irrespective of their Physical Condition
Authors
1 Department of Electronics and Telecommunication, Shri Shankaracharaya College of Engineering and Technology, Chhattisgarh Swami Vivekananda Technical University, Bhilai 490 020, IN
Source
Current Science, Vol 112, No 09 (2017), Pagination: 1915-1920Abstract
In an electrocardiogram (ECG), the heartbeat feature QRS is an important parameter for analysis in any heartbeat classification automated diagnosis system. In this communication the method which we have proposed is by using the counter which is used in parallel. The first level is detection of heartbeats, which uses hashing of ECG features. In the second level, the profiler profiles a person's regular and irregular ECG characteristic behaviour. The proposed method works on data related with ECG, instead of particular features of ECG. Because of parallel processing, data storage unit requirements and the processing time are less. The dependent values in the proposed method vary according to the changes in the ECG waveform. Such type of analysis is suitable for detection of heart disease. The most significant application of such characteristic plotting is to generate an alert signal for irregular ECG behaviour in a person. Such automated system will be useful in remote areas where a cardiologist may not be easily available.Keywords
Data Storage Units, Electrocardiogram Signal, Parallel Processing, QRS Detection.References
- Lilly, L. S., Pathophysiology of Heart Disease, Lippincott Williams & Wilkins, Philadelphia, USA, 2003, 3rd edn, pp. 57–90.
- SNORT Network Intrusion Detection System; www.snort.org
- MIT-BIH; http://www.physionet.org
- Senhadji, L. et al., Comparing wavelet transforms for recognizing cardiac patterns. IEEE Eng. Med. Biol., 1995, 14(2), 167–173.
- Sahambi, J. S., Tandon, S. M. and Bhatt, R. K. P., Using wavelet transforms for ECG characterization: an on-line digital signal processing system. IEEE Eng. Med. Biol., 1997, 16(1), 77–83.
- Hamilton, P. S. and Tompkins, W. J., Quantitative investigation of QRS detection rules using the MIT–BIH arrhythmia database. IEEE Trans. Biomed. Eng., 1986, 33(12), 1157–1165.
- Thakor, N. V., Webster, J. G. and Tompkins, W. J., Estimation of QRS complex power spectra for design of a QRS filter. IEEE Trans. Biomed. Eng., 1986, 31(11), 702–706.
- Li, C., Zheng, C. and Tai, C., Detection of ECG characteristic points using wavelet transforms. IEEE Trans. Biomed. Eng., 1995, 42(1), 21–28.
- Castro, K. D. and Geva, A. B., ECG feature extraction using optimal mother wavelet. In IEEE EMBE International Conference, 2000, pp. 346–350.
- Romero, I., Serrano, L. and Ayesta, ECG frequency domain features extraction: a new characteristic for arrhythmias classification. Conf. IEEE Eng. Med. Boil. Soc., 2001, p. 2.
- Kadambe, S., Murray, R. and Boudreaux-Bartels, G. F., Wavelet transform based QRS complex detector. IEEE Trans. Biomed. Eng., 1999, 46(7), 838–848.
- Romero, L., Addison, P. S. and Grubb, N., R-wave detection using continuous wavelet modulus maxima. IEEE Proc. Comp. Cardiol., 2003, 30, 565–568.
- Tkacz, E. J. and Komorowski, D., An improved statistical approach to the QRS detection problem using matched filter facilities. Biomed. Technik/Biomed. Eng., 1992, 37(1), 99–109.
- Pan, J. and Tompkins, W. J., A real-time QRS detection algorithm. IEEE Trans. Biomed. Eng., 1885, 32(3), 230–236.
- Dotsinsky, I. A. and Stoyanov, T. V., Ventricular beat detection in single channel electrocardiograms. BioMed. Eng. Online, 2004, 3, 3.
- Zhang, F., Tan, J. and Lian, Y., An effective QRS detection algorithm for wearable ECG in body area network. In Proceedings of IEEE Biomedical Circuits System Conference, 2007, pp. 195– 199.
- Iliev, I., Krasteva, V. and Tabakov, S., Real-time detection of pathological cardiac events in the electrocardiogram. Physiol. Meas., 2007, 28(3), 259–276.
- Zhou, H.-Y. and Hou, K.-M., Embedded real-time QRS detection algorithm for pervasive cardiac care system. In Proceedings of 9th IEEE International Conference on Signal Process, 2008, pp. 2150–2153.
- Cvikl, M. and Zemva, A., FPGA-oriented HW/SW implementation of ECG beat detection and classification algorithm. Digital Signal Process, 2010, 20(1), 238–248.
- Ning, X. and Selesnick, I. W., ECG enhancement and QRS detection based on sparse derivatives. Biomed. Signal Process. Control., 2013, 8, 713–723.
- Jain, S., Kumar, P. and Subashini, M. M., LABVIEW based expert system for detection of heart abnormalities. In International Conference on Advances in Electrical Engineering, 2014, pp. 1–5.
- Yazdani, S. and Vesin, J.-M., Adaptive mathematical morphology for QRS fiducial points detection in the ECG. Comput. Cardiol., 2014, 38, 725–728.
- Nallathambi, G. and Principe, J. C., Integrate and fire pulse train automation for QRS detection. IEEE Trans. Biomed. Eng., 2014; 61(2), 317–326.
- Faezipour, M., Nourani, M. and Panigrahy, R., A real-time worm outbreak detection system using shared counters. In Proceedings of the 15th Annual IEEE Symposium High Performing Interconnects, Dallas, 2007, pp. 65–72.
- Song, M. H., Lee, J., Cho, S. P., Lee, K. J. and Yoo, S. K., Support vector machine based arrhythmia classification using reduced features. Int. J. Control, Autom. Syst., 2005, 3(4), 571–579.
- Besrour, R., Lachiri, Z. and Ellouze, N., ECG beat classifier using support vector machine. In Proceedings of the Third IEEE International Conference on Information and Communication Technology: From Theory Application, 2008, pp. 1–5.
- Hu, Y. H., Palreddy, S. and Tompkins, W. J., A patient adaptive ECG beat classifier using a mixture of experts approach. IEEE Trans. Biomed. Eng., 1997, 44(9), 891–900.
- de Chazal, P., O’Dwyer, M. and Reilly, R. B., Automatic classification of heartbeats using ECG morphology and heartbeat interval features. IEEE Trans. Biomed. Eng., 2004, 51(7), 1196–1206.
- Christov, I., Gómez-Herrero, G., Krasteva, V., Jekova, I., Gotchev, A. and Egiazarian, K., Comparative study of morphological and time-frequency ECG descriptors for heartbeat classification. Med. Eng. Phys., 2006, 28(9), 876–887.
- Haseena, H. H., Mathew, A. T. and Paul, J. K., Fuzzy clustered probabilistic and multi layered feed forward neural networks for electrocardiogram arrhythmia classification. J. Med. Syst., 2009, 29(4), 1–10.
- Chandrakar, C. and Sharma, M., A real time approach for ECG signal denoising and smoothing using adaptive window technique. In IEEE 9th International Conference on Industrial and Information Systems, Indian Institute of Information Technology, Gawlior, 2014, pp. 1–6.
- Comparative Analysis of PCA, SPIHT and Haar Methods in Medical Image Compression
Authors
1 F.E.T, SSTC, SSGI, Junwani, Bhilai, IN
Source
Digital Image Processing, Vol 10, No 4 (2018), Pagination: 53-60Abstract
Compression of medical image has acquired great attention attributable to its raising need to decrease the picture size while not compromising the diagnostically crucial medical data exhibited on the picture. PCA algorithmmay be used to help in image compression. Here PCA algorithm is characterized in two forms i.e. Standard PCA and Block-Based PCA. The block based PCA has 2 extended-PCA algorithms that manipulate the block data of the image are evaluated. The 1st algorithm is referred to as block-by-block PCA wherestandard PCA algorithm is utilized on every block of the picture. In the next algorithm- the block-to-row PCA, all of block data are initially concatenated into a row before the standard PCA algorithm is thereforeutilizedin the remodelled matrix. In this paper, the block based PCA and SPIHT primarily applied on the ROI region whereas General PCA and HAAR wavelet were applied to non-ROI region. An arbitrary shaped segmentation (Manual segmentation) is employed to trace the specified ROI on the image.The SPIHT is being compared with the block based PCA methods in terms of image quality and compression ratio while selecting either general PCA or HAAR wavelet on Non ROI. With this work, it’s observed that block-based PCA performs superior to the SPIHTwith regards toimage quality, producingsimilar compression ratio.
Keywords
Medical Image Compression, Principal Component Analysis (PCA), Block-Based PCA, Compression Ratio, Image Quality, HAAR, SPIHT.References
- Lim, S. T., Yap, D. F. W., & Manap, N. A. (2014, September). Medical image compression using block-based PCA algorithm. In Computer, Communications, and Control Technology (I4CT), 2014 International Conference on (pp. 171-175). IEEE.
- Lim, S. T., Yap, D. F. W., & Manap, N. A. (2014, August). A gui system for region-based image compression using principal component analysis. InComputational Science and Technology (ICCST), 2014 International Conference on (pp. 1-4). IEEE.
- Santo, R. D. E. (2012). Principal Component Analysis applied to digital image compression. Einstein (São Paulo), 10(2), 135-139.
- Mofarreh-Bonab, M., & Mofarreh-Bonab, M. (2012). A new technique for image compression using PCA. International Journal of Computer Science & Communication Networks IJCSCN (2249-5789), 2(1), 111-116.
- Stolevski, S. (2010). Hybrid PCA algorithm for image compression. In 18th Telecommunication forum TELFOR (pp. 685-687).
- Dwivedi, A., Tolambiya, A., Kandula, P., Bose, N. S. C., Kumar, A., & Kalra, P. K. (2006). Color image compression using 2-dimensional principal component analysis (2DPCA). A A, 2, 1.
- Costa, S., & Fiori, S. (2001). Image compression using principal component neural networks. Image and vision computing, 19(9), 649-668.
- Gokturk, S. B., Tomasi, C., Girod, B., & Beaulieu, C. (2001). Medical image compression based on region of interest, with application to colon CT images. In Engineering in Medicine and Biology Society, 2001. Proceedings of the 23rd Annual International Conference of the IEEE (Vol. 3, pp. 2453-2456). IEEE.
- Taur, J. S., & Tao, C. W. (1996, September). Medical image compression using principal component analysis. In Image Processing, 1996. Proceedings., International Conference on (Vol. 1, pp. 903-906). IEEE.
- Sadashivappa, G., Jayakar, M., & Babu, K. A. (2010, February). Analysis of SPIHT Algorithm Using Tiling Operations. In Signal Acquisition and Processing, 2010. ICSAP'10. International Conference on (pp. 332-336). IEEE.
- Jiang, C., & Yin, S. (2010, October). A Hybrid Image Compression Algorithm Based on Human Visual System. In 2010 International Conference on Computer Application and System Modeling (ICCASM 2010) (Vol. 9, pp. V9-170). IEEE.
- Zhu, L., & Yang, Y. M. (2011, September). Embedded Image Compression Using Differential Coding and Optimization Method. In Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on (pp. 1-4). IEEE.
- Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). Image quality assessment: from error visibility to structural similarity. IEEE transactions on image processing, 13(4), 600-612.
- Ting, L. S., Weng, D. Y. F., & Manap, N. B. A. (2015). A Novel Approach for Arbitrary-Shape ROI Compression of Medical Images Using Principal Component Analysis (PCA). Trends in Applied Sciences Research, 10(1), 68.
- Haar, A. (1910). Zur theorie der orthogonalen funktionensysteme.Mathematische Annalen, 69(3), 331-371.
- Claypoole, R. L., Davis, G., Sweldens, W., & Baraniuk, R. G. (1997, November). Adaptive Wavelet Transforms for Image Coding. In Asilomar Conference on Signals, Systems, and Computers.
- Munoz, A., Ertle, R., & Unser, M. (2002). Continuous wavelet transform with arbitrary scales and O (N) complexity. Signal Processing, 82(5), 749-757.
- Zeng, L., Jansen, C. P., Marsch, S., Unser, M., & Hunziker, P. R. (2002). Four-dimensional wavelet compression of arbitrarily sized echocardiographic data. IEEE transactions on medical imaging, 21(9), 1179-1187.
- Performance Analysis of Universal Steganalysis Based on Higher Order Statistics for Neighbourhood Pixels
Authors
1 Department of E&Tc, SSCET, Bhilai, IN
2 Department of Bio-Medical Engineering, NIT, Raipur, IN
Source
Fuzzy Systems, Vol 10, No 4 (2018), Pagination: 85-91Abstract
Universal steganalysis of grey level JPEG images is addressed by modelling the neighbourhood relationship of the image coefficients using the higher order statistical method developed by two-step Markov Transition Probability Matrix (TPM). The implementation of TPM together with the neighbouring pixel relationship provides a better detection results as justified with the help of experimental results. The detection accuracy and execution time has been evaluated on the image sets taken from Green spun library and Google website. Performance analysis has been done using SVM, J48 and Random Forest. It is practically applicable steganalysis scheme with suitable feature dimension and with appreciable detection results with low execution time.
Keywords
Steganography, Universal Steganalysis, DCT, DWT, TPM, RF, J48, Neighbour Pixel, WEKA, SVM.References
- J. Kelly. (September 2007). Terror Groups Hide Behind Web Encryption. USA Today. Available: http://www.Usatoday. Com/life/cyber/tech/.
- Anonymus. (November 2011). What is Steganography?. Available: www.tech-faq.com/steganography.html.
- https://www.deepdotweb.com/2017/01/02/steganalysis-finding-hidden-data-images/.
- V. Holub and J. Fridrich,” Digital Image Steganography using Universal Distortion,” ACM Workshop on Information Hiding and Multimedia Security, France, 2013, pp.59–68.
- J. Fridrich, T. Pevný and J. Kodovský,” Statistically Undetectable JPEG Steganography: Dead ends, Challenges, and Opportunities,” International Workshop on Multimedia & Security, Germany, 2007, pp.3–14.
- S. Bera and M. Sharma,” Frequency Domain Steganography System using Modified Quantization Table,” International Journal of Advanced 1and Innovative Research, vol. 1, issue. 7, 2012, pp.193-196.
- J. Fridrich, M. Goljan and D. Hogea,” Attacking the Outguess,” ACM Workshop on Multimedia and Security, Dec. 6, 2002.
- A.Westfeld, “F5—A Steganographic Algorithm:High Capacity Despite Better Steganalysis,” Information Hiding, 2001, pp. 289–302.
- U. Dewangan, M. Sharma and S. Bera. S,” Development and analysis of stego image using discretewavelet transform,” International Journal of Science and Research, vol. 2, issue. 1, 2013, pp.142–148.
- S. Lyu and H. Farid, “Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines,” Information Hiding, 2003, pp. 340–354.
- G. T. Kumar, R. Jithin and D. Deepa,” Feature Based Steganalysis Using Wavelet Decomposition and Magnitude Statistics,” International Conference on Advances in Computer Engineering, 2010, pp.298 - 300.
- Y. Q. Shi, C. Chen, W. Chen and G. Xuan, “Statistical Moments Based Universal Steganalysis usingJPEG2-d Array and 2-D Characteristic Function,” IEEE International Conference on Image Processing, 2006, 105-108.
- J. Fridrich, “Feature-Based Steganalysis for JPEG Images and its Implication for Future Design of Steganographic Schemes, “Information Hiding, 2005, pp. 67–81.
- T. Pevny and J. Fridrich, “Merging Markov and DCT features for Multiclass JPEG Steganalysis,” Electronic Imaging, Security, Steganography and Watermarking of Multimedia Contents,SPIE, CA, vol.6505,pp.1–13.
- Y. Q. Shi, C. Chen and W. Chen, “A Markov Process Based Approach to Effective Attacking JPEG Steganography, “Information Hiding, Springer, 2006, pp. 249–264.
- M. Kumar, “Steganography and Steganalysis of Joint Picture Expert Group (JPEG) Images, Doctoral Dissertation, Florida University, 2012.
- H. Farid, “Detecting Hidden Messages Using Higher-Order Statistical Models, “IEEE International Conference on Image Processing, 2002, pp. 905–908.
- Z. M. He, W. Ng and P.P.K. Chan, “. Steganography Detection using Localized Generalization Error Model,” IEEE International Conference on Systems Man and Cybernetics, 2010, pp. 1544 - 1549.
- J. Fridrich and J. Kodovsky, “Ensemble Classifiers for Steganalysis of Digital Media, “IEEE Transactions Forensic and Security, vol. 7, issue. 2, 2012, pp.432-444.
- F. Li, X. Zhang, B. Chen and G. Feng, “JPEG Steganalysis with High-Dimensional Features and Bayesian Ensemble Classifier,” IEEE Signal processing Letters, vol. 20, issue.3, 2013,pp. 233 - 236.
- K. Sullivan and B.S. Manjunath, “Steganalysis for Markov Cover Data with Applications to Images, “ IEEE Transaction on Information Forensic and Security, vol.1, issue.2, 2006,pp. 275-287.
- D. Fu, Y. Shi and D. Zou, “JPEG Steganalysis using Empirical Transition Matrix in Block DCT Domain,” IEEE Workshop on Multimedia Signal Processing, 2007, pp. 310–313.
- C. Chen and Y.Q.Shi, “JPEG Image Steganalysis Utilizing Both Intrablock and Inter-block Correlations,” IEEE International Symposium on Circuits and Systems, 2008, pp.3029 –3032.
- Z. Zhou and M. Hui, “Steganalysis for Markov feature of Difference Array in DCT Domain, “International Conference on Fuzzy Systems and Knowledge Discovery, 2009, pp.581–584.
- S. Cho, B. Cha, J.Wang and J. Kuo, “Block-Based Image Steganalysis: Algorithm and Performance Evaluation,” IEEE International Symposium on Circuits and Systems Proceedings, 2010, pp.1679 - 1682.
- J. Fridrich, “Rich Model for Steganalysis of Digital Images,” IEEE Transaction on Information Forensics and Security, vol. 7, issue. 3, 2012, pp.868-882.
- S. Jinyang, Z. Xianting and W. Lei, “Steganalysis using Regional Correlation and Second - Order Markov Features,” International Journal of Security and its Applications, vol.9, issue. 1, 2015, pp.69-76.
- Machine Learning Project at the University of Waikato in New Zealand.( February 2016). Avalable: http://www.cs.waikato.ac.nz/ml/index.html. [Accessed: 14-Feb-2016].
- P. Greenspun. (November 2011). JPEG Images. Available: www.philip.greenspun.com.