A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Praveen Kumar, V.
- Security Enhancement of Multimedia System by Means of Novel Multiple Huffman Tables Approach
Authors
1 Velagapudi Ramakrishna Siddhartha Engineering College in the Department of Computer Science & Engg., Vijayawada – 520 007, IN
2 Prasad V. Potluri Siddhartha Institute of Technology in the Department of Computer Science and Engineering, Vijayawada – 520 007, IN
3 Velagapudi Ramakrishna Siddhartha Engineering College in Department of Computer Applications, Vijayawada-520007, IN
Source
Networking and Communication Engineering, Vol 2, No 9 (2010), Pagination: 323-327Abstract
Efficient multimedia encryption algorithms play a key role in multimedia security protection. We introducing multiple Huffman Tables (MHT), which performs both compression and encryption by using multiple statistical models (i.e. Huffman coding tables) in the entropy encoder and multiple Huffman tables, are kept secret. A known-plaintext attack is presented to show that the MHTs used for encryption should be carefully selected to avoid the weak keys problem.
We then propose chosen-plaintext attacks on the basic MHT algorithm as well as the advanced scheme with random bit insertion. In addition, we suggest two empirical criteria for Huffman table selection, based on which we can simplify the stream cipher integrated scheme, while ensuring a high level of security.
Keywords
Cryptanalysis, Encryption, Entropy Encoding, Multiple Huffman Tables (MHT), Selective Encryption.- C-Means with Fuzzy Local Information
Authors
1 PVP Siddartha Institute of Engineering and Technology, University of JNTUK, IN
2 Pragati Engineering College, University of JNTUK, IN
3 Central University of Hyderabad, IN
4 Dept. CSE, Pragati Engineering College, University of JNTUK, Surampalem, IN
Source
Data Mining and Knowledge Engineering, Vol 3, No 16 (2011), Pagination: 952-960Abstract
This paper presents a variation of Fuzzy c-Means (FCM) algorithm that provides image clustering. The proposed algorithm incorporates the local spatial information and gray level information in a novel fuzzy way. The new algorithm is called C-Means with Fuzzy Local Information (CMFLI). CMFLI can overcome the disadvantages of known fuzzy c-means algorithm and at the same time enhances the clustering performance. The major characteristic of CMFLI is the use of fuzzy local information (both spatial and gray level) similarity measure, aiming to guarantee noise insensitiveness and image detail preservation. Furthermore, the proposed algorithm is fully free of empirically adjusted parameters (a, λg , λs etc.) incorporated into all other fuzzy c-means algorithms proposed in the literature. Experiments performed on synthetic and real world images show that CMFLI algorithm is efficient,providing robustness to noisy images.Keywords
Clustering, Fuzzy C-Means, Fuzzy Constraints, Graylevel Constraints, Image Segmentation, Spatial Constraints.- Distributed Search in P2P Networks Through Secure-Authenticated Content Management Systems
Authors
1 Department of Computer Science & Engineering, P.V.P. Siddhartha Institute of Technology, Vijayawada, IN
Source
Data Mining and Knowledge Engineering, Vol 3, No 9 (2011), Pagination: 532-538Abstract
Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques developed for the centralized distributed systems like client-server networks are insufficient for P2P networks by the virtue of their centralized nature. The absence of a central authority in a P2P network poses unique challenges for reputation management in the network. These challenges include identity management of the peers, secure reputation data management, Sybil attacks, and above all, availability of reputation data. In this paper, we present a cryptographic protocol for ensuring secure and timely availability of the reputation data of a peer to other peers at extremely low costs. The past behavior of the peer is encapsulated in its digital reputation, and is subsequently used to predict its future actions. As a result, a peer's reputation motivates it to cooperate and desist from malicious activities. The cryptographic protocol is coupled with self-certification and cryptographic mechanisms for identity management and countering Sybil attack. We illustrate the security and the efficiency of the system analytically and by means of simulations in a completely decentralized Gnutella-like P2P network.Keywords
Like A Certificate Peer-To-Peer Networks, Distributed Systems, Security, Reputations and Identity Management.- Antibiotic Suscepyibility Pattern of Staphylococcus Aureus and Methicillin–Resistant Staphylococcus Aureus Isolated from Various Clinical Specimens in a Tertiary Care Teaching Hospital, Pondicherry
Authors
1 Bharath University, Agaram Road, Selaiyur, Chennai, Tamilnadu, IN
2 Dept. of Microbiology, Sri Lakshmi NarayanaInstitite of Medical Sciences, Pondicherry, IN
Source
Indian Journal of Public Health Research & Development, Vol 10, No 12 (2019), Pagination: 266-271Abstract
Introduction: Staphylococcus aureus is one of the most common human pathogen capable of causing a wide range of infections. Staphylococcus aureus is a common cause of both community and hospital infections. It was the endemic microorganism in several reports of nosocomial infections which induced high mortality and morbidity. This microorganism is a virulent bacterium that can cause serious infections including skin and soft tissue infections, wound infection, bacteremia, pneumonia and endocarditis. It is estimated that Staphylococcus aureushas developed the ability toacquire resistance to all classes of antimicrobial agents and methicillin-resistant S. aureus (MRSA) has become a major problem in many hospitals worldwide. Hospital acquired infection (HAI) due to multidrug resistant bacteria like MRSA are a growing problem in many health care institutes. Materials and Method A total of 568 clinical isolates of Staphylococcus aureus were isolated from various clinical specimens received in the Department of Microbiology, Sri Lakshmi Narayana Institute of Medical Sciences, Pondicherry from April 2014 to December 2017, were included in the study. Isolation and identification of Staphylococcus aureus was done by standard conventional microbiological method. Identification of MRSA was done as per standard guidelines of CLSI by using Oxacillin broth microdilution method. Antibiogram was determined by Kirby-Bauer disc diffusion method on Mueller-Hinton agar with zones of inhibition.
Results: Staphyloccusaureus was susceptible to Vancomycin (94.7%), followed by Teicoplanin (91.7%), Linezolid (88.5%), Amikacin (85.7%).In case of MRSA all the isolates showed 100% susceptibility tovancomycin, followed by Teicoplanin (97.5%), Amikacin (84.7%) linezolid (80.3%) and Clindamycin (54.8%).In case of MRSA all the isolates were 100% susceptible to vancomycin followed by teicoplanin (97.5%), amikacin (84.7%) linezolid (80.3%) and clindamycin (54.8%).
Conclusion: MRSA infections are emerging as a serious health problem in health care set up. Joint efforts by clinicians,clinical microbiologists, hospital management and public health authorities are required to meet the challenge of MRSA on the forefront.