Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Srinivasan, B.
- Development of Internet Passport Registration and E-passport Identification Using Authentication Protocols and Multiple Biometric Technologies
Abstract Views :483 |
PDF Views:24
Authors
Affiliations
1 Department of Information Technology, Gobi Arts & Science College (Autonomous), Gobichettipalayam – 638 453, Erode District, Tamil Nadu., IN
2 PG & Research Department of Computer Science, Gobi Arts & Science College (Autonomous), Gobichettipalayam – 638 453, Erode District, Tamil Nadu., IN
1 Department of Information Technology, Gobi Arts & Science College (Autonomous), Gobichettipalayam – 638 453, Erode District, Tamil Nadu., IN
2 PG & Research Department of Computer Science, Gobi Arts & Science College (Autonomous), Gobichettipalayam – 638 453, Erode District, Tamil Nadu., IN
Source
Indian Journal of Computer Science Theory & Practical, Vol 1, No 1 (2013), Pagination: 47-62Abstract
Electronic passports (e-Passports) have known a wide and fast deployment all around the world since the International Civil Aviation Organization (ICAO) the world has adopted standards whereby passports can store biometric identifiers. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: Cryptography security and multiple biometrics (face, fingerprints, palm prints and iris). A passport contains the important personal information of holder such as photo, name, date of birth and place, nationality, date of issue, date of expiry, authority and so on. The goal of the adoption of the electronic passport is not only to expedite processing at border crossings, but also to increase security. Important in their own right, e-passports are also the harbinger of a wave of next-generation e-passport: several national governments plan to deploy e-passport integrating cryptography algorithm and multiple biometrics. The paper consider only those passport scenarios whose passport protocols base on public-key cryptography, certificates, and a public key infrastructure without addressing the protocols itself detailed, but this is no strong constraint. Furthermore assume the potential passport applier to use ordinary PCs with Windows or Linux software and an arbitrary connection to the Internet. Technological securities issues are to be found in several dimension, but below paper focus on hardware, software, and infrastructure as some of the most critical issues.Keywords
Biometrics, E-passport, Internet, Face, Iris, Palmprint And FingerprintReferences
- A. K. Jain, R. Bolle, "Biometric personal identification in networked society" 1999, Norwell, MA: Kluwer.
- C.Hesher, A.Srivastava, G.Erlebacher, "A novel technique for face recognition using range images" in the Proceedings of Seventh International Symposium on Signal Processing and Its Application, 2003.
- HOME AFFAIRS JUSTICE, "EU standard specifications for security features and biometrics in passports and travel documents", Technical report, European Union, 2006.
- ICAO, "Machine readable travel documents", Technical report, ICAO 2006.
- KLUGLER, D., "Advance security mechanisms for machine readable travel documents, Technical report", Federal Office for Information Security (BSI), Germany, 2005.
- ICAO, "Machine Readable Travel Documents", Part 1 Machine Readable Passports. ICAO, Fifth Edition, 2003
- Riscure Security Lab, "E-passport privacy attack”, at the Cards Asia Singapore, April 2006.
- D. Monar, A. Juels, and D. Wagner, "Security and privacy issues in epassports", Cryptology ePrint Archive, Report 2005/095, 2005.
- ICAO, "Biometrics Deployment of Machine Readable Travel Documents", Version 2.0, May 2004.
- A Novel Approach for Color Image, Steganography Using Nubasi and Randomized, Secret Sharing Algorithm
Abstract Views :171 |
PDF Views:0
Authors
Affiliations
1 Department of Information Technology, School of Computing, SASTRA University, IN
2 Department of Computer Science and Engineering, School of Computing, SASTRA University, IN
1 Department of Information Technology, School of Computing, SASTRA University, IN
2 Department of Computer Science and Engineering, School of Computing, SASTRA University, IN
Source
Indian Journal of Science and Technology, Vol 8, No S7 (2015), Pagination: 228-235Abstract
In this paper, we present a new approach for concealing secret message in a digital image by adding three layer securities. In the first layer, the secret image is encrypted by using the famed AES algorithm. In the second layer, we establish a Non-Uniform Block Adaptive Segmentation on Image (NUBASI) algorithm for generating segments of the cover image. This algorithm accept a Key from sender and by using this key, split the cover image into small pieces each with different dimension. In the third layer, a new randomized secret sharing algorithm hide the secret data into the different segments. This algorithm defines 32 different patterns for selecting the segments order to implant the cipher data. This proposed method was implemented and tested for various size cover images and secret messages. The quality of the final stego-image and original image are compared and analyzed through their PSNR values.Keywords
Cryptography, Image Segmentation, Non-Uniform Block, Randomized Algorithm, Steganography.- Increased Security in Image Cryptography using Wavelet Transforms
Abstract Views :158 |
PDF Views:0
Authors
Affiliations
1 School of computing, SASTRA University, Tamil Nadu - 613401, IN
2 SASTRA University, Tamil Nadu - 613401, IN
1 School of computing, SASTRA University, Tamil Nadu - 613401, IN
2 SASTRA University, Tamil Nadu - 613401, IN
Source
Indian Journal of Science and Technology, Vol 8, No 12 (2015), Pagination:Abstract
Objective: The main objective of the paper is to enhance the security of the images using three different wavelet while transmission of the images. Method: In the Existing system, images are directly encrypted using HAAR wavelet which provides frequency sub bands and they are exchanged in single level deliberately. Hence, it is prone to guess the wavelet and can be applied to detect the process to retrieve the original image. In our proposed work, three different wavelets are used to encrypt the image along with a password. The main advantage of the method is to enhance the security level in encryption process. Result: A password will be assigned to the image a key will be generated through the password using a key generation algorithm. Key is used to select the wavelet mechanism and two levels of frequency sub band exchange process will be carried out to ensure the security of the image. The originality of the image is compared through their PSNR Values. There will be no loss of data in the process is an additional advantage of our proposed work. Conclusion: Thus the original image is retrieved in the process and the method is highly secure for transmitting the image. Only intended users can retrieve the original image by using password.Keywords
Image Cryptography, Image Encryption, Image Encoding with Key, Image Security, Wavelet Image Encryption- Improved Person Identification System using Face Biometric Detection
Abstract Views :108 |
PDF Views:5
Authors
Affiliations
1 PG and Research Department of Computer Science, Gobi Arts and Science College (Autonomous), Gobichettipalayam – 638 453, Erode District, Tamil Nadu, IN
1 PG and Research Department of Computer Science, Gobi Arts and Science College (Autonomous), Gobichettipalayam – 638 453, Erode District, Tamil Nadu, IN
Source
International Journal of Advanced Networking and Applications, Vol 4, No 5 (2013), Pagination: 1731-1736Abstract
Biometrics is measurable characteristics specific to an individual. Face detection has diverse applications especially as an identification solution which can meet the crying needs in security areas. While traditionally 2D images of faces have been used, 3D scans that contain both 3D data and registered color are becoming easier to acquire. Before 3D face images can be used to identify an individual, they require some form of initial alignment information, typically based on facial feature locations. We follow this by a discussion of the algorithms performance when constrained to frontal images and an analysis of its performance on a more complex dataset with significant head pose variation using 3D face data for detection provides a promising route to improved performance.Keywords
Biometrics, Face, Face Sensor, Feature Extraction, Template Matching.- Fast Corrector Magnets for Fast Orbit Feedback System of Indus-2 Synchrotron
Abstract Views :164 |
PDF Views:0
Authors
Affiliations
1 Accelerator Magnet Technology Division, Raja Ramanna Centre for Advanced Technology, Indore -452013, IN
1 Accelerator Magnet Technology Division, Raja Ramanna Centre for Advanced Technology, Indore -452013, IN
Source
International Journal of Scientific Engineering and Technology, Vol 6, No 8 (2017), Pagination: 298-302Abstract
Synchrotron users in Indus-2 require stable photon beams for performing various scientific experiments. At the source points of the photons, typical requirement of the beam position stability is ≤ 10 % of the r.m.s size of the electron beam. This stability requirement demands correction of beam orbit disturbances in the range from DC to 100 Hz. The existing slow corrector magnets in Indus-2 are used for correction of very slow disturbances e.g. thermal drift. Therefore a separate set of combined function corrector magnets of high bandwidth were developed for correction of short term perturbations (from low to high frequency up to 100 Hz). These fast corrector magnets have relatively weak kick strengths of ≥ ± 50 μrad at 15 A DC. The magnetic measurements show no appreciable attenuation in the field strength of these magnets up to 200 Hz. The design, development of the fast corrector magnets and the results achieved by using them in the fast orbit feedback system of Indus-2 will be discussed in this paper.Keywords
Fast Correctors, Synchrotron, Air Core Magnets, Beam Stability, Feedback System.References
- i. G. Singh et al, “Status of indus-2 synchrotron radiation source - IUAC, www.iuac.res.in/event/InPAC11/proceedings/.../I30/GurnamSingh.pdf
- ii. Opera-3D version 12, Vector Fields Limited, 24 Bankside, Kidlington, Oxford OX5 1JE, England
- iii. N. Hubert et al, “Commissioning of Soleil Fast orbit feedback System” EPAC,2008, p.3248-3250.
- iv. S.K. Shukla, “Vacuum Systems of Accelerators at Indus Complex”, IVS-2012 -February 15, 2012, VECC Kolkata.
- v. Singh S.N et al, “Corrector magnet power supplies for Indus2” InPac-2013, VECC, Kolkata, 19-22 Nov. 2013, pp 666-668.
- vi. Pravin Fatnani et al,” Status of Indus-2 Control system” Proceedings of PCaPAC2014, Karlsruhe, Germany, ISBN 978-395450-146-5, pp 138-140.
- Indigenous Development of Close-Type Quadrupole Magnets for a 2.5 GeV Synchrotron Radiation Source
Abstract Views :110 |
PDF Views:0
Authors
K. Sreeramulu
1,
P. K. Kulshreshta
1,
Vanshree Thakur
1,
Kailash Ruwali
1,
Lakshman Singh
1,
Ashok Kumar
1,
B. Srinivasan
1,
Anil Kumar Mishra
1,
R. S. Shinde
1
Affiliations
1 Raja Ramanna Centre for Advanced Technology, Indore-452013, IN
1 Raja Ramanna Centre for Advanced Technology, Indore-452013, IN