Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Raajan, N. R.
- Security for an Image Using Bit-slice Rotation Method-image Encryption
Abstract Views :235 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics & Communication Engineering, School of Electrical & Electronics Communication, SASTRA University, Thanjavur, Tamil Nadu- 613401, IN
1 Department of Electronics & Communication Engineering, School of Electrical & Electronics Communication, SASTRA University, Thanjavur, Tamil Nadu- 613401, IN
Source
Indian Journal of Science and Technology, Vol 7, No S4 (2014), Pagination: 1-7Abstract
Image encryption plays a major role in information security. It is mainly used to convert the original image into another form. In this work, we propose a bit plane slicing of digital image to provide the more security. The main aim of BPS is used to divide the digital image into 8 bit planes. The bit plane is further rotated in order to provide better encrypted image and to make hacking more difficult. It focuses on two techniques such as bit plane slicing and image rotation for efficient image encryption. The classification of bit plane is used for analyzing the importance played by each bit of an image. It is used to estimate the each pixel of an image. The proposed technique involves rotation of bit planes is employed to make highly secure image encryption. By this method scrambling of an image is based on efficient technique even it is intercepted, the information cannot be understood. It is mainly useful for image compression because it exhibits high coding efficiency. This method which makes the decryption of an image more difficult compared to other techniques.Keywords
Bit Plane Slicing, Image Encryption, Rotation, Scrambling- Image and Video Error Rate Analysis in Full Duplex Communication Using Phase Offset
Abstract Views :236 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics and Communication Engineering,School of Electrical & Electronics Communication, SASTRA University,Thanjavur,Tamil Nadu- 613401, IN
2 Department of Electronics and Communication Engineering,School of Electrical & Electronics Communication,SASTRA University,Thanjavur,Tamil Nadu- 613401, IN
1 Department of Electronics and Communication Engineering,School of Electrical & Electronics Communication, SASTRA University,Thanjavur,Tamil Nadu- 613401, IN
2 Department of Electronics and Communication Engineering,School of Electrical & Electronics Communication,SASTRA University,Thanjavur,Tamil Nadu- 613401, IN
Source
Indian Journal of Science and Technology, Vol 7, No S4 (2014), Pagination: 24-27Abstract
ne of the most efficient way to utilize the bandwidth in wireless communication systems is Full- duplex communication. It is proposed for full duplex wireless communication over a single channel. The signals are transmitted and received at a same time and same frequency. It creates the large self-interference over the transmitted and received signals and lead to large loss of data. We used different values of phase offset to reduce the self-interference between the transmitted and received signals. The full duplex communication system is designed for input as image and by using wavelet transform. The performance of full-duplex communication system using various modulations like 16-QAM, QPSK and 64-QAM along with Haar, Daubechies2 and Daubechies 4 wavelets over different values of phase offset are evaluated by bit error rate.Keywords
BER, Full-duplex Communication, OHWDM, QAM, QPSK, Wavelet Transform- Flip Flop and Double Substitution Based Textual Encryption
Abstract Views :246 |
PDF Views:0
Authors
Affiliations
1 School of Electrical & Electronics Communication, SASTRA University, Thanjavur, Tamil Nadu, IN
1 School of Electrical & Electronics Communication, SASTRA University, Thanjavur, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 7, No S4 (2014), Pagination: 52-55Abstract
Data transmission has become very common in human's daily life. This data transmission can be confidential or the data may be intended for a section of people. The data that is intended to be transmitted to a particular recipient should be read only by the corresponding person and not anyone else. For this reason, the best way to protect the data is by encryption. This provides security from stealing of data. This paper deals with a mechanism to encrypt a data using flip-flops and double substitution method. The basic idea to obtain blocks of plain text and then use T-flip-flops along with double substitution to result in a convincing cipher text. The result is a cipher text obtained by using plaintext itself for encryption. This algorithm can be used to transmit bit sequence of any length, thus ensuring the usage of bandwidth to desirable level. This method may result in an Electronic Code Book (ECB). The keys used will be asymmetric. The receiver just follows the steps in reverse order to retrieve the data or plaintext from the received cipher text.Keywords
Cipher Text, ECB, Encryption, Plaintext, Substitution Method, T-flip-flop- Rayleigh-Benard Attractor for OFDM
Abstract Views :158 |
PDF Views:0
Authors
K. V. Sriharsha
1,
R. Abishek Arun
1,
C. Ramanathan
1,
R. Abirami
1,
S. Hamsavaahini
1,
J. N. Saranya
1,
R. Subhathira
1,
K. Kalaiselvan
1,
N. R. Raajan
1
Affiliations
1 Department of Electronics and Communication Engineering, School of Electrical and Electronics Engineering, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 Department of Electronics and Communication Engineering, School of Electrical and Electronics Engineering, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 42 (2016), Pagination:Abstract
Objectives: Emerging trends in non-linearity has resulted in “Strange Attractors” which is highly chaotic in nature. In this paper the strange attractor – chaotic signal is being applied on the Orthogonal Frequency Divisional Multiplexing (OFDM) system and its performance is measured. Methods/Statistical Analysis: The work is divided into two parts– generation of the strange attractor, application of the attractor on the OFDM System. After generating strange attractor from Rayleigh-Bernard System, it is utilized by OFDM with different modulation techniques such as 16-QAM, 64-QAM and QPSK. A chaotic signal in OFDM transmission is seems to be rare combination for secured communication and that gains the novelty in this paper by applying strange attractors to OFDM technique. Findings: Performance of the Rayleigh Bernard Attractor with OFDM system has been estimated with BER vs Eb/N0 plot and its security has been verified by calculating password decoding time. Application/Improvements: Rayleigh Bernard Attractor for OFDM system helps in the secured transmission and reception of the signal.Keywords
Attractors, BER, Chaos, OFDM.- Image Encryption based on the Reflected Binary Code Method with the Combination of FFT
Abstract Views :164 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics and Communication Engineering, School of Electrical and Electronics Communication, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 Department of Electronics and Communication Engineering, School of Electrical and Electronics Communication, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN