A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Ramamoorthy, S.
- A New Approach for Security Enhancement of Image Data through Double Encryption
Authors
1 Department of CSE, Dr.M.G.R Educational and Research Institute University, Chennai, IN
Source
Digital Image Processing, Vol 4, No 12 (2012), Pagination: 668-672Abstract
Security is the main concern in today’s world and securing data from unauthorized access is very important. Different techniques should be used to protect confidential image data from unauthorized access as each type of data has its own features. Encryption is used to prevent data from unauthorized access and with the appalling headway in network technology seen in the past decade; it has become the need of time to encrypt the images before sending over open network. Cryptography is a very effective way to protect transmitted information. Though researchers have proposed contrastive methods to encrypt images, only few methods provide security and confidentiality. So, here we introduce a new image encryption method which encrypts the image using a key involving Armstrong numbers and Prime numbers. The basic idea is to perform double encryption of images, which involves encryption first by Armstrong number followed by Prime number. Algorithms are proposed for efficient implementation of Double Encryption. Moreover, an image-based data requires more effort during encryption and decryption. Nowadays, images are vastly used in today's world to represent information in various domains varying from corporate world, health care, document organization, military operations etc.Keywords
Armstrong Numbers, Cryptography, Double Encryption, Image Encryption, Prime Numbers.- High Secure Biometric Cipher Application for Online Ballots
Authors
1 Department of Computer Science, Dr.M.G.R University, Chennai, IN
Source
Biometrics and Bioinformatics, Vol 4, No 8 (2012), Pagination: 383-386Abstract
Voters often find the postal ballots very inconvenient and time consuming as a result the voting response rates is often lower. Online voting system is considered to facilitate the central government’s new policy of giving voting rights to the Indians living abroad so that they can cast their vote using internet and to also increase voter responses. It could reduce the expenditure involved in setting up and staffing poll sites. The method for data hiding is based on the novel approach of using Steganography and cryptography together using images as cover objects for steganography and as keys for cryptography. Most of the traditional systems have adopted a secret key to authenticate the user information. The use of secret key may direct to undesirable circumstances when the secret key is lost, or forgotten. Biometric authentication systems are considered to be more useful since it involves no secret key that might be feared to be forgotten by the user or key to be lost and not just that a single biometric trait can be used to access several accounts without the need of remembering passwords for all those accounts. In this paper Eyebrow is used as a biometric measure to enhance the security aspect of the System. Here Active contour algorithm is used to get accurate Eyebrow contour, which makes this application a highly secured biometric cipher application.Keywords
Active Contour Algorithm, Biometric, Cryptography, Cipher, Steganography.- Antidepressant-Like Effects of the Ethanolic Extract of Albizzia lebbeck (Linn) Leaves in Animal Models of Depression
Authors
1 Department of Pharmacognosy, Vels School of Pharmaceutical Sciences, Vels University, Pallavaram, Chennai–117, Tamil Nadu, IN
2 Department of Pharmacognosy, Vels School of Pharmaceutical Sciences, Vels University, Pallavaram, Chennai-117, Tamil Nadu, IN
3 Department of Pharmacology, Sri Ramachandra College of Pharmacy, Sri Ramachandra University, Porur, Chennai-600116, Tamilnadu, IN
Source
Research Journal of Pharmacognosy and Phytochemistry, Vol 2, No 1 (2010), Pagination: 30-33Abstract
The present study was designed to investigate the antidepressant effects of Albizzia lebbeck leaves in various animal depression models. The alcoholic extract (70% v/v ethanol) of Albizzia lebbeck leaves (200 and 400 mg/kg. p.o) was administered once daily for seven successive days to separate groups of young male swiss albino mice. The immobility periods of control and treated mice were recorded in two behavioral despair models forced swim test (FST), tail suspension test (TST) and the effect of extract on locomotor function of mice was studied using actophotometer. The antidepressant-like effect of tested drug was compared to that of imipramine (15 mg/kg. p.o) and fluoxetine (20mg/kg.p.o). The leaf extract at doses of 200 and 400 mg/kg significantly decreased the duration of immobility time in a dose dependent manner in both FST and TST.
The extract did not show significant effect on locomotor activity of mice. The efficacy of tested extract was found to be comparable to that of imipramine and fluoxetine. Our results suggested that the ethanolic extract of Albizzia lebbeck leaves exerts antidepressant-like effect.
Keywords
Albizzia lebbeck, Depression, Forced Swim Test, Tail Suspension Test.- Embedded Lockets for Multipurpose Tracking System using GPS, GPRS and GSM
Authors
1 Department of Computer Applications, Dr. M. G. R. Educational and Research Institute University, Chennai - 600095, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 10, No 3 (2017), Pagination:Abstract
Objectives: To obtain a classical tracking device for helping common people with the aim of providing security and precaution. Methods: Multipurpose tracking system allows to track different types of people namely children, women and elderly people by insisting three buttons one for children, other for women and another for elderly people. These system alerts the receiver end people by using signals of GPS and sending message and calls through GSM and GPRS. In this work, voice recorder and a camera is initiated to know the actual situation in the front end as an image through email and voice through speaker. Findings: To tackle the above problem and safeguard them, we have found a small device in a locket model with advanced technologies like GPS (Global Positioning System), GSM (Global System for Mobile Communication), GPRS (General Package for Radio Service) which helps to track them latitudinal and longitudinal directions through satellite where the alert message and calls through voice playback are send to the receiver end like parents, police control room and attender and a camera which helps in taking visual images and send to the receiver end through email at the time of risk.Keywords
Camera, GPS, GSM, GPRS, Microcontroller, Voice Board.- Improving the Service Solutions on Hybrid Clouds at Edge Network using Fuzzy Approaches
Authors
1 Department of CSE, Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya University, Kanchipuram, Tamil Nadu, IN
Source
International Journal of Knowledge Based Computer System, Vol 6, No 1 (2018), Pagination: 7-11Abstract
So far in cloud computing environment, all the resources and services are used as an on-demand request basis from the client end. All typical service issues have been solved with the optimal cloud resource customization policies. The role of edge computing is enabling the data processing operations at the edge network which will operate in the cloud computing platforms. Due to increased amount of usage in the client location the proper devices need to be well connected with an internet. Edge mechanism is implemented in the real-time service based operation which will examine the upstream and downstream functional units will apply the real-time local data analysis in the data centre locations. The hybrid clouds will execute the service request form both the private cloud and public cloud users. These services and request based resources can be literally focused by the cloud service provider (CSP) and managed service provider (MSP) who will provide the cloud services uninterruptedly to the requested users. When the multiple services are executes in the edge network then the cloud vendor does not properly handle the services through the secured environment. Such kind of problem will lead the user to loss their control activities on the hybrid cloud solutions location. The proposed approaches of edge computing in hybrid cloud solutions are improving the service by applying the fuzzy logic control implementation factors. The cloud sim can be used as a simulator in the proposed model.Keywords
Cloud Service Provider, Cloud Sim, Cloud Vendor, Data Centre, Edge Network, Hybrid Clouds, Location Identity, Managed Service Provider, Process Segment Identity.References
- T. G. Rodrigues, and K. Suto, “Hybrid method for minimizing service delay in edge cloud computing through VM migration and transmission power control,” IEEE Transactions on Computers, vol. 66, no. 5, pp. 810-819, 2017.
- A. Rahman, and E. Hassanain, “Towards a secure mobile edge computing framework for Hajj,” IEEE Access, vol. 5, pp. 11768-11781, 2017.
- Z. Yan, and J. Xue, “Prius: Hybrid edge cloud and client adaptation for HTTP adaptive streaming in cellular networks,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 27, no. 1, pp. 209-222, 2017.
- K. Bhaskar, R. Jayashree, R. Sathiyavathi, L. M. Gladence, and V. M. Anu, “A novel approach for securing data de-duplication methodology in hybrid cloud storage,” International Conference on Innovations in Information Embedded and Communication Systems, pp. 1-5, 2017.
- L. Zuo, and L. Shu, “A multi-objective hybrid cloud resource scheduling method based on deadline and cost constraints”, IEEE Access, vol. 5, pp. 22067-22080, 2017.
- R. Garcia, “Federated identity hybrid cloud security considerations supporting first responders,” IEEE Conference on Dependable and Secure Computing, pp. 326-333, 2017
- C. Gopinaath, and A. Kiruthika, “A server side encryption for cloud storage with federation sharing in hybrid cloud environment,” International Conference on Technical Advancements in Computers and Communications, pp. 128-130, 2017.
- C. Hongbing, and R. Chunming, “Secure big data storage and sharing scheme for cloud tenants,” IEEE Transactions on Communication Systems, vol. 12, no. 6, 2015.
- J. Baek, and Q. H. Vu, “A secure cloud computing based framework for big data information management of smart grid,” IEEE Transactions on Cloud Computing, vol 3, no. 2, 2015.
- N. V. Juliadotter, and K. K. R. Choo, “Cloud attack and risk assessment taxonomy,” IEEE Transactions on Cloud Computing, vol. 2, no. 1, pp. 14-20, January-February 2015.
- Y. Xuanxia, H. Liu, H. Ning, L. T. Yang, and Y. Xiang, “Anonymous credential-based access control scheme for clouds,” IEEE Transactions on Cloud Computing, vol. 2, no. 4, pp. 34-43, 2015.
- H. Liu, and H. Ning, “Shared authority based privacy-preserving authentication protocol in cloud computing,” IEEE Transactions on Systems, vol. 26, no. 1, pp. 241-251, 2015.