Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Pradeep Kumar Reddy, R.
- Multi-Stage Encryption Using Seeded SDES
Abstract Views :137 |
PDF Views:5
Authors
Affiliations
1 Department of Computer Science and Engineering, YSREC of Y V University, Proddatur, IN
1 Department of Computer Science and Engineering, YSREC of Y V University, Proddatur, IN
Source
International Journal of Advanced Networking and Applications, Vol 7, No 2 (2015), Pagination: 2694-2699Abstract
Now-a-days the usage of internet increases tremendously so, there is a need of security for the data. Cryptography is a process of scrambling the data into unknown format which provides security to the data. Modern cryptography is mainly based on mathematical theory and computer science practice. Cryptography process is done with the help of encryption and decryption. The basic two ideas behind the cryptography technique are substitution and transposition. This paper presents a multistage encryption algorithm. At the end of each stage an intermediate cipher is produced. The key is generated by using SEEDED SDES algorithm. Final cipher text is derived from the local binary pattern (LBP).Keywords
Decryption, Encryption, Railference, SEEDED SDES Key Generation, Substitution, Transposition.- Brain Tumor MRI Using Gradient Profile Sharpness
Abstract Views :183 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, YSREC of YVU, Proddatur-516360, IN
1 Department of Computer Science and Engineering, YSREC of YVU, Proddatur-516360, IN
Source
International Journal of Advanced Networking and Applications, Vol 9, No 5 (2018), Pagination: 3557-3562Abstract
The most precious field in digital image processing is diagnosing the internal activities of human body. Brain is one of the critical part in human body. In the current era cancer is a challenging in medical field. Identification of tumor in brain is very difficult. Segmentation is a kind of method in digital image processing used to divide the image into number of parts with specific regions. It is important to notice that resolution is the key factor in identification of tumors. In this paper we proposed efficient modified K-mean clustering along with triangular model for detection of brain tumor. Modified K-mean clustering includes image enhancement for clear detection of tumor using gradient profile sharpness. Further tumor is detected using triangular model.Keywords
Image Segmentation, K-Means Clustering, Mri Images, Triangle Model, Tumor Detection.References
- V. Caselles, F. Catte , T. coll, and F. Dibos, “A geometric model of active contours,”NumerMath.,vol. 66, pp 1-31, 1993.
- Matalas, S. Roberts and H. Hatzakis, "A set of multiresolution texture features suitable for unsupervised image segmentation," European Signal Processing Conference, 1996. EUSIPCO 1996. 8th, Trieste, Italy, 1996, pp. 1-4.
- M. Masroor Ahmed, Dzulkifli Bin Mohamad, “Segmentation of Brain MR Images for Tumor Extraction by Combining Kmeans Clustering and Perona-Malik Anisotropic Diffusion Model”, International Journal of Image Processing, vol. 2 , no. 1, pp 27-34,2008.
- T. Logeswari and M. Karnan, "An Improved Implementation of Brain Tumor Detection Using Soft Computing," Communication Software and Networks, 2010. ICCSN '10. Second International Conference on, Singapore, 2010, pp. 147-151.
- Dancea O, Tsatos O, Gordan M, et al. ”Adaptive fuzzy c-means through support vector regression for segmentation of calcite deposits on concrete dam walls”, Automation Quality and Testing Robotics, 2010, 3: 1-6.
- AkanshaSingh , Krishna Kant Singh, “A Study Of Image Segmentation Algorithms For Different Types Of Images”, International Journal of Computer Science Issues, vol. 7,Issue 5, pp 414417,2010.
- G. Freedman and R. Fattal, “Image and video up scaling from local self examples,” ACM Trans.
- Graph., vol. 30, no. 2, pp. 1–12, Apr. 2011.
- J. Sun, J. Sun, Z. Xu, and H.-Y. Shum, “Gradient profile prior and its applications in image superresolution and enhancement,” IEEE Trans. Image Process., vol. 20, no. 6, pp. 1529–1542, Jun.
- Ahmed Faisal, SharminParveen, ShahriarBadsha and Hasan Sarwar, “An Improved Image Denoising and Segmentation Approach for Detecting Tumor from 2-D MRI Brain Images”, International Conference on Advanced Computer Science Applications and Technologies, pp. 452457, 2012.
- Pratibha Sharma, ManojDiwakar, SangamChoudhary, "Application of Edge Detection for Brain Tumor Detection", International Journal of ComputerApplications, vol.58, no.16, pp 21-25, 2012.
- S.M. Ali, LoayKadomAbood and Rabab SaadoonAbdoon, “Brain Tumor Extraction in MRI images using Clustering and Morphological Operations Techniques”, International Journal of Geographical Information System Applications and Remote Sensing, Vol. 4, No. 1, 2013.
- T. Peleg and M. Elad, “A statistical prediction model based on sparse representations for single image super-resolution,” IEEE Trans. Image Process, vol. 23, no. 6, pp. 2569–2582, Jun. 2014.
- Robust Lossless Secure Image Steganography Using Spiral Scan
Abstract Views :160 |
PDF Views:0
Authors
Affiliations
1 Department of CSE, Y.S.R.Engineering College of YV University, Proddatur, Andhra Pradesh, IN
2 Department of Physics, Y.S.R.Engineering College of YV University, Proddatur, Andhra Pradesh, IN
1 Department of CSE, Y.S.R.Engineering College of YV University, Proddatur, Andhra Pradesh, IN
2 Department of Physics, Y.S.R.Engineering College of YV University, Proddatur, Andhra Pradesh, IN
Source
International Journal of Advanced Networking and Applications, Vol 9, No 5 (2018), Pagination: 3596-3600Abstract
Steganography is the principles and techniques of embedding data within other data. Cryptography is the principles and techniques of changing the data one form to another form. Image Steganography is the process of hiding data within an image. Steganography along with encryption techniques provides an additional security to the data. Several techniques exist for image steganography, in this work, a new lossless image steganography technique along with cryptographic method is presented. Lossless compression is a class of algorithms that allows the original data to be perfectly reconstructed from the compressed data. Present work concentrates the lower nibble of pixels in the cover image for embedding the information; further encryption techniques will be applied. It is not possible for the hacker to retrieve the secured data from the cover image.Keywords
Compression, Cover Image, Cryptography, Lossless, Nibble, Steganograpy.References
- Petitcolas, F.A.P., Anderson, R.J. & Kuhn, M.G., “Information Hiding – A survey”, Proceedings of the IEEE, 87:07, July 1999.
- Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, 47:10, October 2004.
- Pranab Garg, Jaswinder Singh Dilawari, "A Review Paper on Cryptography and Significance of Key Length", IJCSCE Special issue on“Emerging Trends in Engineering ICETIE 2012.
- Chandramouli, R., Kharrazi, M. & Memon, N., “Image steganography and steganalysis: Concepts and Practice”, Proceedings of the 2nd International Workshop on Digital Watermarking, October 2003.
- Sumeet Kaur, Savina Bansal, "Steganography and Classification of Image Steganography Techniques", Published in: Computing for Sustainable Global Development (INDIACom), 2014 International conference.
- Gaurav Vijayvargiya, Dr. Sanjay Silakari, Dr.Rajeev Pandey, "A Survey: Various Techniques of Image Compression", (IJCSIS) International Journal of Computer Science and Information Security, Vol. 11, No. 10, October 2013.
- Rashi Singh, Gaurav Chavla, “ Data Hiding at 7th bit (RGB) with cryptography”, IJCSMC, vol 3, issue 5, may 2014.
- Chang, Chin-Chen., Lin, Iuan-Chang., and Yaun-Hui YU., “ A new Steganographic method for color and gray scale image hiding”, Computer Vision and Image Understanding, ELSEVIER, Vol. 107, No. 3, pp. 183-194,2007.
- Shreelekshmi R, Wilscy C, Madhavan V. "Cover image preprocessing for more reliable LSB replacement steganography". In: Proc. of International Conf. on Signal Acquisition and Processing; 2010. p. 153–56.
- S.S.Maniccama, N.G.Bourbakis, “Image and video encryption using SCAN patterns” Pattern Recognition Volume 37, Issue 4, April 2004, Pages 725-737.
- Performance of Evaluation for AES with ECC in Cloud Environment
Abstract Views :188 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Y.S.R Engineering College of Yogi Vemana University Proddatur, Kadapa, Andhra Pradesh - 516360, IN
2 Department of Computer Science and Engineering, JNTUA College of Engineering Pulivendula, Kadapa, Andhra Pradesh – 516390, IN
3 Department of Computer Science and Engineering,, Y.S.R Engineering College of Yogi Vemana University Proddatur, Kadapa, Andhra Pradesh - 516360, IN
1 Department of Computer Science and Engineering, Y.S.R Engineering College of Yogi Vemana University Proddatur, Kadapa, Andhra Pradesh - 516360, IN
2 Department of Computer Science and Engineering, JNTUA College of Engineering Pulivendula, Kadapa, Andhra Pradesh – 516390, IN
3 Department of Computer Science and Engineering,, Y.S.R Engineering College of Yogi Vemana University Proddatur, Kadapa, Andhra Pradesh - 516360, IN
Source
International Journal of Advanced Networking and Applications, Vol 10, No 5 (2019), Pagination: 4019-4025Abstract
During the day; Technology is Cloud, where people can share resources, services and information across the Internet. Due to information on the Internet, security is considered a major problem. The information should be protected by an unauthorized user and should be sent to a person with a private and confidential intent. On this proposed work, to provide a secure method, secure connection, authentication, confidentiality and third-party data protection in cloud computing. In the combination of the Advanced Encryption Standard (AES) and Cryptographic Curve Cryptography (ECC) analyzing of different parameters like storage, encryption time, decryption time and correlation. The results show that the impact of this integrated approach is more important than the other secure algorithms.Keywords
Security, Advanced Encryption Standard, Elliptic Curve Cryptography, Cloud Computing, Cryptography Algorithms, Authentication, Privacy, Confidentially.References
- B. Hari Krishna, S. Kiran, G. Murali, R. Pradeep Kumar Reddy. "Security Issues in Service Model of Cloud Computing Environment", Procedia Computer Science, 2016.
- B. Harikrishna, S. Kiran, R. Pradeep kumar Reddy. "Protection on sensitive information in cloud — Cryptography algorithms", 2016 International Conference on Communication and Electronics Systems (ICCES), 2016.
- D. E. Denning, “Cryptography and Data Security”, Addison-Wesley Publishing Company, America, (1982).
- G. C. Kessler, “An overview of cryptography”, [Online], Available: ,http://www.garykessler.net/ library/crypto.html# purpose, (1998).
- P. Patil, P. Narayankar, N. D. G. and M. S. M, “A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish”, Procedia Computer Science, (2016); Nagpur, India.
- P. Prajapati, N. Patel, R. Macwan, N. Kachhiya and P. Shah, “Comparative Analysis of DES, AES, RSA Encryption Algorithms”, International Journal of Engineering and Management Research, vol. 4, no. 1, (2014), pp. 132-134.
- P. Mahajan and A. Sachdeva, “A study of Encryption algorithms AES, DES and RSA for security”, Global Journal of Computer Science and Technology, vol. 13, no. 15, (2013).
- Y. Wang and M. Hu, “Timing evaluation of the known cryptographic algorithms”, International Conference on Computational Intelligence and Security, (2009).
- V. R. Pancholi and B. P. Patel, “Enhancement of Cloud Computing Security with Secure Data Storage using AES”, International Journal for Innovative Research in Science and Technology, vol. 2, no. 09, (2016), pp. 18-21.
- P. Kumar and S. B. Rana, “Development of modified AES algorithm for data security”, Optik-International Journal for Light and Electron Optics, vol. 127, no. 04, (2016), pp. 2341-2345.
- A. K. Mandal, C. Parakash and A. Tiwari, “Performance evaluation of cryptographic algorithms: DES and AES”, Electrical, Electronics and Computer Science (SCEECS), (2012).
- A. A. Hasib and A. A. M. Haque, “A comparative study of the performance and security issues of AES and RSA cryptography”, Third International Conference on Convergence and Hybrid Information Technology, (2008).
- K. Rege, N. Goenka, P. Bhutada and S. Mane, “Bluetooth Communication using Hybrid Encryption Algorithm based on AES and RSA”, International Journal of Computer Applications, vol. 71, no. 22, (2013).
- R. R. Ahirwal and M. Ahke, “Elliptic curve diffiehellman key exchange algorithm for securing hypertext information on wide area network”, International Journal of Computer Science and Information Technologies, vol. 4, no. 2, (2013), pp. 363-368.
- A. Pourali, M. V. Malakooti and M. H. Yektaie, “A Secure SMS Model in E-Commerce Payment using Combined AES and ECC Encryption Algorithms”, The International Conference on Computing Technology and Information Management (ICCTIM), (2014).
- B. Ji, L. Wang and Q. Yang, “New Version of AES-ECC Encryption System Based on FPGA in WSNs”, Journal of Software Engineering, vol. 9, no. 1, (2015), pp. 87-95.
- N. Jha and B. Patel, “Forward Secrecy For Google HTTPS using Elliptic Curve Diffie-Hellman Key”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 1, no. 9, (2012).
- Dr.Smith Jones.” AN EMPIRICAL CRYPTOGRAPHY ALGORITHM FOR CLOUD SECURITY BASED ON HASH ENCRYPTION”, International Journal of Computing and Corporate Research ISSN (Online) : 2249- 054X Volume 4 Issue 4 July 2014 International Manuscript ID : 2249054XV4I4072014-43.
- A method for obtaining digital signatures and public key cryptosystems, R.Rivest, A.Shamir and L.Adleman “communication of the association for computing machinery “ 1978, pp 120-126.
- RSA algorithm using modified subset sum cryptosystem, Sonal Sharma, Computer and Communication Technology (ICCCT), pp-457-461, IEEE 2011.
- Harikrishna, B. (2018). Network as a Service Model in Cloud Authentication by HMAC Algorithm.
- Harikrishna Bommala, S. Kiran (2018). Client Authentication as a Service in Microsoft Azure, vol 8, issues 2, IJEAT.