Refine your search
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sathappan, S.
- Image Compression Using Vector Quantization-A Survey Approach
Abstract Views :147 |
PDF Views:3
Authors
Affiliations
1 Bharathiyar University, Coimbatore, IN
1 Bharathiyar University, Coimbatore, IN
Source
Digital Image Processing, Vol 1, No 8 (2009), Pagination: 338-343Abstract
This paper presents a survey on vector quantization for image compression which provides a means of decomposition of the signal in a manner which takes the advantage of inter and intra band correlation as more flexible partition for higher dimension vector spaces. Thus, the image is compressed with or without information loss. Since 1988, a growing body of research has examined the use of VQ for the image compression. This paper discusses about vector quantization, its principle and examples, its various techniques and image compression its advantages and applications. We present the survey on different methods of vector quantization for image compression.Keywords
Image Compression, Vector Quantization and Multiple Codebooks.- Efficient Lossless Image Compression using Modified Hierarchical Forecast and Context Adaptive System
Abstract Views :191 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Erode Arts and Science College, Erode - 638009, Tamil Nadu, IN
1 Department of Computer Science and Engineering, Erode Arts and Science College, Erode - 638009, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 34 (2015), Pagination:Abstract
Objective: The main intention of this investigation is to protect the sharpness of image through decreasing the bit rates in compression image. Also this scenario intends to accomplish the high compression ratio by using the lossless compression approaches. Methods: In this research, Hierarchical Forecast and Context Adaptive systems are introduced to provide the lossless compression color image. Modified Hierarchical Prediction Scheme is enhanced which overcomes the issue of enormous prediction error rate near edges and preserves the sharpness of images. This scenario considers the vertical, horizontal and diagonal (left up, left down and right up, right down) predictors to predict pixels. Diagonal predictor enhances the perdition accuracy of pixels in Hierarchical Prediction. Findings: In this work the methods used namely Context Adaptive Coding and Modified Hierarchical Prediction Scheme are used to preserve the sharpness of an image. The experimental tests conducted were proves that the proposed methodology can preserve the sharpness of the image efficiently rather than existing method. The experimental results of this work prove that the proposed methodology is improved in terms of all performance metrics called Bits Per Pixel (BPP), Compression Ratio, Mean Square Error rate (MSE) and Peak Signal to Noise Ratio (PSNR). Application/Improvement: The findings demonstrate that by using proposed MHPCA scheme the bit rates in compressed images are reduced significantly which preserves the sharpness of the image. MHPCA coding scheme also reduces the error rate considerably and produces higher compression ratio than the existing HPCA scheme.Keywords
Context Adaptive Coding, Lossless Color Image Compression, Modified Hierarchical Prediction- Multi Aspect Sparse Time Integrated Cut-off Authentication (STI-CA) for Cloud Data Storage
Abstract Views :237 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Erode Arts and Science College, Erode–638009, Tamil Nadu, IN
1 Department of Computer Science, Erode Arts and Science College, Erode–638009, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 10, No 4 (2017), Pagination:Abstract
Objectives/Background: Cloud infrastructure is a pool of commuting resources such as information storage servers, application progress platforms, load balancers and virtual machines that are shared between the users for transactional processes with on demand process. However, transactional process lacks a secure authentication system, while it does not attest the trustworthiness of dynamic contents threats which outlaw the cloud system. Methods/Statistical Analysis: To establish the authenticity and avoiding improper data modification on cloud based data transactions, a framework called, multi aspect Sparse Time Integrated Cut-off Authentication (STI-CA) for Cloud Data Storage is designed. STI-CA framework commences with the password registry for each cloud user on the basis of two dimensional service matrices reducing the overhead incurred during user authentication by applying Sparse Vector Cloud User Registry. Next, by utilizing Time Integrated One Time Password, which is unique for each cloud user and each login reduces the execution time and space complexity as the cloud server does not maintain the password. Finally, the Cut-off Potential Cryptography prevents the unauthorized user modification on transactional data, therefore improving the security. Here the Amazon Simple Storage Service (Amazon S3) dataset is used for experiment using the JAVA coding with Cloudsim3. A series of simulation results are performed to test the data confidentiality, execution time, communication overhead and space complexity for obtaining transactional data and measure the effectiveness of STI-CA framework. Findings: STI-CA framework offers better performance with an improvement of the data confidentiality by 31%, reduces execution time by 20%, reduce communication overhead by 30% and also minimize space complexity by 22% compared to existing models of DRAFT and iCloud native Mac OS X respectively. Applications/Improvements: It can be further extended with implementation of new model with different parameters which improves more confidentiality and integrity.Keywords
Authentication, Cloud Data Storage, Cut-off, Multi Aspect, Password registry, Potential Cryptography, Sparse, Time Integrated.- Self Organized Quantum Key Authentication Technique for Secure Data Communication in Mobile Ad Hoc Network
Abstract Views :153 |
PDF Views:0
Authors
S. Sangeetha
1,
S. Sathappan
1
Affiliations
1 Department of Computer Science, Erode Arts and Science College, Erode - 638112, Tamil Nadu, IN
1 Department of Computer Science, Erode Arts and Science College, Erode - 638112, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 10, No 22 (2017), Pagination:Abstract
Background /Objectives: To improve the security in Mobile Ad Hoc network (MANET) by means of a Self Organized Quantum Key Authentication (SO-QKA). Methods/Statistical Analysis: The key objective of SO-QKA technique is to improve data security and mobile node authentication in MANET. Initially, SO-QKA technique generates quantum key for mobile node data transmission along the route path in MANET. Next, SO-QKA technique formulates self organized key for every mobile node with its quantum key for corresponding data transmission at specific instances. With the help of generated self organized key, SO-QKA technique finds secure route for transmitting the data in MANET. Finally, SOQKA technique is performs key matching at the destination node where the verification of the mobile node is checked with the mobile node id of self organized key and data authentication is verified with quantum key and destination id. Findings: Experimental evaluation of SO-QKA technique is done with the performance metrics such as data loss rate, data transmission rate, security, execution time. Experimental analysis shows that the SO-QKA technique is able to improve the security and also improves the data transmission rate comparable to the state-of-the-art works. Applications/ Improvements: It can be further enlarged with implementation of new algorithm model with different parameters which improves high authentication and confidentiality.Keywords
Data Communication, Key Matching, Mobile Ad Hoc Network, Mobile Node, Quantum Key, Self Organized Key- Quantum based Cryptography for Secured Data Communication in Mobile Ad-Hoc Network
Abstract Views :469 |
PDF Views:339
Authors
S. Sangeetha
1,
S. Sathappan
1
Affiliations
1 Department of Computer Science, Erode Arts and Science College, Erode – 638112, Tamil Nadu, IN
1 Department of Computer Science, Erode Arts and Science College, Erode – 638112, Tamil Nadu, IN
Source
ScieXplore: International Journal of Research in Science, Vol 3, No 2 (2016), Pagination: 57-65Abstract
A Mobile Ad-Hoc Network (MANET) is an infrastructure-less network of mobile devices that are linked without any wire. Every mobile device in MANET moves in any direction. Security is a key problem in MANET of providing the secured communication with routing and packet forwarding process. In order to improve the security during the data communication, Quantum Key Distribution based Secured Data Communication (QKD-SDC) technique is designed in MANET. In QKD-SDC technique, quantum based cryptography used the quantum mechanics for secured data communication. Initially, Quantum based Cryptography performs Quantum Key Generation and Quantum Key distribution process. In Quantum Key Generation process, quantum key is generated and the key is shared to the receiver. With help of the quantum key, the original data gets encrypted as qubits. In Quantum Key distribution process, the qubits are sent to the receiver end through quantum communication channel along with the quantum key. At the receiver end, when the quantum key gets matched with receiver's quantum key, the qubits are decrypted to obtain the original data. When the key is not matched, the qubits get dropped. This in turn helps to improve the secured data communication in quantum communication channel. Experimental evaluation of QKD-SDC technique is carried out with the performance metrics such as data loss rate, throughput and time for secured data delivery. Experimental analysis shows that the QKD-SDC technique is able to reduce the data loss rate and also improves the throughput when compared to the state-of-the-art works.Keywords
Mobile Ad-Hoc Network (manet), Quantum Key Generation Process, Quantum Key Distribution Process, Quantum Communication Channel, Secured Data Communication.References
- Wang N, Zhang N, Gulliver TA. Cooperative key agreement for wireless networking: key rates and practical protocol design. IEEE Transactions on Information Forensics and Security. 2014; 9(2):272–84. https://doi.org/10.1109/ TIFS.2013.2293113
- Ning H, Liu H, Yang LT. Aggregated-proof based hierarchical authentication scheme for the internet of things. IEEE Transactions on Parallel and Distributed Systems. 2015 Mar; 26(3):657–67. https://doi.org/10.1109/TPDS.2014.2311791
- Sangeetha S, Sathappan S. Securing data retrieval based on tree indexed self organized key in mobile ad- hoc network. IEEE Computation System and Information Technology for Sustainable Solutions (CSITSS). 2016 Dec; 11(2):191–4. https://doi.org/10.1109/csitss.2016.7779412
- Bhosle A, Pandey Y. Applying security to data using symmetric encryption in MANET. International Journal of Emerging Technology and Advanced Engineering. 2013 Jan; 3(1):426–30
- Yang S, Yeo CK, Lee BS. Toward reliable data delivery for highly dynamic mobile ad-hoc networks. IEEE Transactions on Mobile Computing. 2012 Jan; 11(1):111–24. https://doi.org/10.1109/TMC.2011.55
- Patwari N, Croft J, Jana S, Kasera SK. High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Transactions on Mobile Computing. 2010 Jan; 9(1):17–30. https://doi.org/10.1109/ TMC.2009.88
- Papadimitratos P, Haas ZJ. Secure data transmission in mobile ad-hoc networks. WiSe ‘03 Proceedings of the 2nd ACM Workshop on Wireless security; 2003. p. 41–50. https://doi.org/10.1145/941311.941318
- Gunasekaran M, Premalatha K. SPAWN: A secure privacypreserving architecture in wireless mobile ad-hoc networks. Springer, EURASIP Journal on Wireless Communications and Networking. 2013 Sep; 2013:1–12. https://doi.org/10.1186/1687-1499-2013-220
- Singh R, Singh P, Duhan M. An effective implementation of security based algorithmic approach in mobile ad-hoc networks. Springer, Human-Centric Computing and Information Sciences. 2014 Dec; 4(7):1–14.
- Abdelhaq M, Alsaqour R, Abdelhaq S. Securing mobile adhoc networks using danger theory-based artificial immune algorithm. PLoS ONE. 2015 May; 10(5):1–16. https://doi.org/10.1371/journal.pone.0120715
- Borkar GM, Mahajan AR. A secure and trust based ondemand multipath routing scheme for self-organized mobile ad-hoc networks. Wireless Networks, Springer. 2016 May; 1–18.
- Ghosh U, Datta R. A secure addressing scheme for large scale managed MANETs. IEEE Transactions on Network and Service Management. 2015; 12(3):483–95. https://doi.org/10.1109/TNSM.2015.2452292
- Saha HN, Bhattacharyya D, Banerjee PK. Modified Fidelity Based On-Demand Secure (MFBOD) routing protocol in mobile ad-hoc network. International Journal of Foundations of Computing and Decision Sciences (FCDS), De Grurter. 2015 Dec; 40(4):267–98.
- Sarkar S, Dattab R. A secure and energy-efficient stochastic multipath routing for self-organized mobile ad-hoc networks. Ad-hoc Networks, Elsevier. 2016 Feb; 37(P2):209–27. https://doi.org/10.1016/j.adhoc.2015.08.020
- Alnumay WS, Ghos U. Secure routing and data transmission in mobile ad-hoc networks. International Journal of Computer Networks and Communications (IJCNC); 2014 Jan; 6(1):111–27. https://doi.org/10.5121/ijcnc.2014.6108
- Di Pietro R, Guarino S, Verde NV, Domingo-Ferrer J. Security in wireless ad-hoc networks – A survey. Computer Communications, Elsevier. 2014 Sep; 51:1–20. https://doi.org/10.1016/j.comcom.2014.06.003
- Katiravan J, Sylvia D, Rao DS. Energy efficient link aware routing with power control in wireless ad-hoc networks. The Scientific World Journal. 2015; 2015:1–7. PMid:26167529 PMCid:PMC4475759. https://doi.org/10.1155/2015/576754
- Bose D, Banerjee A, Bhattacharyya A, Saha HN, Bhattacharyya D, Banerjee PK. An efficient approach to secure routing in MANET. Advances in Computing and Information Technology, Springer. 765–76. https://doi.org/10.1007/978-3-642-31513-8_78
- Sherin Z, Soni MK. Secure routing in MANET through crypt-biometric technique. International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA); 2014. p. 713–20.
- Liu W, Yu M. AASR: Authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Transactions on Vehicular Technology. 2014; 63(9):4585– 93. https://doi.org/10.1109/TVT.2014.2313180
- Aluvala S, Sekhar KR, Vodnala D. A novel technique for node authentication in mobile ad-hoc networks. Perspectives in Science, Elsevier. 2016; 8:680–2. https://doi.org/10.1016/j.pisc.2016.06.057
- DCR-based Hybrid Black-Hole and Gray-Hole Attack Detection in Manet
Abstract Views :157 |
PDF Views:0
Authors
P. Rathiga
1,
S. Sathappan
2
Affiliations
1 Department of Computer Applications, Navarasam Arts and Science College for Women, IN
2 Department of Computer Science, Erode Arts and Science College, IN
1 Department of Computer Applications, Navarasam Arts and Science College for Women, IN
2 Department of Computer Science, Erode Arts and Science College, IN
Source
ICTACT Journal on Communication Technology, Vol 10, No 4 (2019), Pagination: 2096-2101Abstract
Security of wireless network is a highly stimulating issue of today’s life. The validation of all route messages is very problematic one due to the mobility and frequently modifying topology of the MANET. So in this paper, a DCR-based hybrid Black-hole/Gray-hole attack detection (HDCR) is proposed. In this approach, the malicious node attacks are identified by the Data to Control Packet Ratio value to avoid false detection. Data-to-Control Packet Ratio (DCR) is the ratio of number of data packet send by the node to number of control packet sent by the node. Each node will calculate the DCR value of its neighbour nodes in its own routing table. The maximum number of RREQ sent by any node is proportional to the DCR value of the node maintained by its neighbours. The experimental results compared the proposed HDCR detection with Hybrid detection method.Keywords
Data-to-Control Packet Ratio, HDCR, MANET, Hybrid Black-Hole or Gray-Hole Attack.References
- F.H. Tseng, L.D. Chou and H.C. Chao, “A Survey of Black Hole Attacks in Wireless Mobile Ad Hoc Networks”, Human Centric Computing and Information Sciences, Vol. 1, No. 4, pp. 1-16, 2011.
- Lalbihari Barik, “A Survey on Detecting Co-Operative Black Hole Attack on Multicast in Mobile Ad-Hoc Network”, International Journal of Current Engineering and Scientific Research, Vol. 5, No. 11, pp. 149-155, 2018.
- Subhashis Banerjee and Koushik Majumder, “A Survey of Blackhole Attacks and Countermeasures in Wireless Mobile Ad-hoc Networks”, Proceedings of International Conference on Security in Computer Networks and Distributed Systems, pp. 396-407, 2012.
- H. Khattak and Nizamuddin, “A Hybrid Approach for Preventing Black and Gray-Hole Attacks in MANET”, Proceedings of 8th International Conference on Digital Information Management, pp. 1-12, 2013.
- V.A. Hiremani and M.M. Jadhao, “Eliminating Co-Operative Black-Hole and Gray-Hole Attacks using Modified EDRI Table in MANET”, Proceedings of International Conference on Green Computing, Communication and Conservation of Energy, pp. 944-948, 2013.
- T. Lathies Bhasker, “A Scope for MANET Routing and Security Threats”, ICTACT Journal on Communication Technology, Vol. 4, No. 4, pp. 840-848, 2013.
- A. Dhaka, A. Nandal and R.S. Dhaka, “Gray and Black-Hole Attack Identification using Control Packets in MANETs”, Procedia Computer Science, Vol. 54, pp. 83-91, 2015.
- A. Dorri, S. Vaseghi and O. Gharib, “DEBH: Detecting and Eliminating Black Holes in Mobile Ad Hoc Network”, Wireless Networks, Vol. 24, pp. 2943-2955, 2016.
- A. Dorri and S. Reza, “A Fuzzy Congestion Controller to Detect and Balance Congestion in WSN”, International Journal of Wireless and Mobile Networks, Vol. 7, No. 1, pp. 137-145, 2015.
- R.H. Jhaveri, “MR-AODV: A Solution to Mitigate Blackhole and Grayhole Attacks in AODV based MANETs”, Proceedings of 3rd International Conference on Advanced Computing and Communication Technologies, pp. 254-260, 2013.
- M. Mohanapriya and I. Krishnamurthi, “Modified DSR Protocol for Detection and Removal of Selective Black Hole Attack IN MANET”, Computers and Electrical Engineering, Vol. 40, No. 2, pp. 530-538, 2014.