Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Padma, T.
- IAR: Bio Inspired Intelligent Ant Routing Algorithm for Mobile Ad-Hoc Networks
Abstract Views :147 |
PDF Views:3
Authors
Affiliations
1 Sona College of Technology, Salem, IN
1 Sona College of Technology, Salem, IN
Source
Wireless Communication, Vol 4, No 8 (2012), Pagination: 437-441Abstract
The paper presents a novel proactive algorithm for routing called Intelligent Ant Routing (IAR), in mobile ad hoc networks, which is inspired by Ant Colony Optimization (ACO) framework and uses "ants" for route discovery, maintenance and improvement. The design for the protocol lies in a heuristic, based on bio inspired routing, which takes into account the limited resources in highly dynamic environment. The algorithm is based on a modification of the state transition rule of ACO routing algorithm which results in maintaining higher degree of investigation leads to reduced end-to-end delay and also lowers the overhead at high node density. The comparative result of proposed algorithm IAR with AODV reactive routing algorithm exhibits superior performance with respect to reactive AODV routing algorithm in terms of end-to end delay. It is also tested for different network sizes and node mobility.Keywords
Intelligent Ant Routing, Mobile Ad Hoc Networks, Ant Colony Optimization (ACO), Ad Hoc on Demand Distance Vector Routing (AODV).- Secure Watermarking using Diophantine Equations for Authentication and Recovery
Abstract Views :207 |
PDF Views:0
Authors
Jayashree Nair
1,
T. Padma
2
Affiliations
1 Acharya Institute of Management & Sciences, Peenya, Bangalore, Karnataka, IN
2 Sona College of Engineering, Salem, Tamil Nadu, IN
1 Acharya Institute of Management & Sciences, Peenya, Bangalore, Karnataka, IN
2 Sona College of Engineering, Salem, Tamil Nadu, IN
Source
Journal of Network and Information Security, Vol 3, No 2 (2015), Pagination: 1-9Abstract
This paper describes an authentication scheme that uses Diophantine equations based generation of the secret locations to embed the authentication and recovery watermark in the DWT sub-bands. The security lies in the difficulty of finding a solution to the Diophantine equation. The scheme uses the content invariant features of the image as a selfauthenticating watermark and a quantized down sampled approximation of the original image as a recovery watermark for visual authentication, both embedded securely using secret locations generated from solution of the Diophantine equations formed from the PQ sequences. The scheme is mildly robust to Jpeg compression and highly robust to Jpeg2000 compression. The scheme also ensures highly imperceptible watermarked images as the spatio - frequency properties of DWT are utilized to embed the dual watermarks.Keywords
Diophantine Equations, Content Authentication, Authentication Watermark, Recovery Watermark, PQ Vector, DWT.- Performance Analysis of a Novel Image Content Authentication Scheme Using Multiple Watermarks in Dual Domains
Abstract Views :251 |
PDF Views:153
Authors
Jayashree Nair
1,
T. Padma
2
Affiliations
1 AIMS Institutes, Bangalore, IN
2 Sona College of Technology, Salem, IN
1 AIMS Institutes, Bangalore, IN
2 Sona College of Technology, Salem, IN
Source
Adarsh Journal of Information Technology, Vol 5, No 2 (2016), Pagination: 10-16Abstract
This paper presents a multiple watermark based semi-fragile watermarking scheme that tries to balance the requirements of an effective authentication scheme ensuring imperceptibility, tamper detection and localization of tampered areas. The proposed scheme uses multiple watermarks to enable authentication at multiple levels in the wavelet domain. The scheme is flexible and permits the user to decide on the number of watermarks to be embedded based on the nature of the application. It can also accurately locate the tampered locations.Keywords
Content Authentication, Authentication Watermark, Recovery Watermark, DWT, Tamper Localization, Robustness, Feature Vector.References
- Hu M., Lou D. and Chang M., “DualWrapped Digital Watermarking Scheme for Image Copyright Protection,” Computers & Security, Vol.26, pp.319-330, 2007.
- Lin, C.Y. and S.F. Chang, “SARI: SelfAuthentication-and-Recovery Image Watermarking System,” ACM Multimedia, Ottawa, Canada: ACM Press. pp.628-629, 2001
- Woo Chaw Seng1 et.al., “Semi-Fragile Watermark with Self Authentication and Self Recovery, “ Malaysian Journal of Computer Science, Vol. 22(1), pp 64-84, 2009.
- Yuping, H., Guangjun, G.: Watermarkingbased authentication with recovery mechanism. In: 2nd International Workshop on Computer Science and Engineering. doi:10.1109/WCSE. 2009.856 (2009)
- D. Kundur and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1167–1180,1999.
- C. S. Lu and H. Y. M. Laio, “Multipurpose watermarking for image authentication and protection,” IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 435-439, 2001
- Hui, L., Yuping, H.: A wavelet-based watermarking scheme with authentication and recovery mechanism. In: International Conference on Electrical and Control Engineering (ICECE). doi:10.1109/iCECE. 2010.86 (2010)
- Chen, T.S., Chen, J., Chen, J.G.: Tamper detection and retrieval technique based on JPEG 2000 with LL subband. In Proceedings of IEEE International Conference OD Networking, Sensing & Control, Taipei, Taiwan (2004)
- J. C. Patra, J. E. Phua and C. Bornand, “Anovel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression,” Digital Signal Processing, vol. 20, no. 6, pp. 1597–1611, 2010.
- X. Qi and X. Xin, “A quantization-based semi-fragile watermarking scheme for image content authentication,” Journal of Visual Communication and Image Representation, vol. 22, no. 2, pp. 187–200, 2011.
- Tsai, M.J., Chien, C.C.: A wavelet-based semi-fragile watermarking with recovery mechanism. In: IEEE International Symposium on Circuits and Systems, ISCAS 2008. doi:10.1109/ISCAS.2008. 4542097 (2008)
- De Rosa A., Barni M., Bartolini F., Cappellini V. and Piva A., “Optimum Decoding of Non-additive Full Frame DFT Watermarks”, Proceedings of the 3rd Workshop of Information Hiding, pp.159-171,1999.
- Parthasarathy A. K. and Subhash Kak, “An Improved Method of Content Based Image Watermarking.” IEEE Transactions on Broadcasting, Vol.53, No.2, pp.468-479, 2007.
- Chamlawi R., Khan A., Idris A. and Munir Z., “A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform,” World Academy of Science, Engineering and Technology, Vol.23, pp.49-53, 2006.
- Qi, X., Xin, X., Chang, R. “Image authentication and tamper detection using two complementary watermarks,” 16th IEEE International Conference on Image Processing (ICIP). doi:10.1109/ICIP.2009. 5413681, 2009.
- A Chen, B., Wornell, G.W., “Digital watermarking and information embedding using dither modulation,” Proceedings of the IEEE workshop on Multimedia Signal Processing, Redondo Beach, CA, December, 1998.Transl. J. Magn. Japan, vol. 2, pp. 740-741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 198.
- J. S. Pillai, T. Padma. “The analysis of PQ sequences generated from continued fractions for use as pseudorandom sequences in Cryptographic Applications.” In Proc. Advances in Intelligent Systems and Computing, Springer, Vol. 394, Dec. 2015, pp. 633-644.
- Intelligent Fuzzy Analytic Hierarchy Processing Decision Support System-An Aid in Expert Analysis of Shoulder and Neck Pain Occupational Risk Factors
Abstract Views :143 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Applications, Sona College of Technology, Salem - 636 005, IN
1 Department of Computer Applications, Sona College of Technology, Salem - 636 005, IN