- Chaos-based Image/Signal Encryption
- Advanced Steganography and Watermarking Techniques
- Cellular Automata and Applications
- Cryptographic Implementations and Security
- Physical Unclonable Functions (PUFs) and Hardware Security
- Digital Media Forensic Detection
- Fractal and DNA sequence analysis
- Algorithms and Data Compression
- Video Analysis and Summarization
- Advancements in Semiconductor Devices and Circuit Design
- Image Retrieval and Classification Techniques
- Low-power high-performance VLSI design
- Analog and Mixed-Signal Circuit Design
- Brain Tumor Detection and Classification
- IoT and GPS-based Vehicle Safety Systems
- Advanced Neural Network Applications
- DNA and Biological Computing
- Advanced Data Compression Techniques
- Advanced Image and Video Retrieval Techniques
- Quantum-Dot Cellular Automata
- Advanced DC-DC Converters
- Error Correcting Code Techniques
- Hand Gesture Recognition Systems
- Semiconductor Quantum Structures and Devices
- Currency Recognition and Detection
SASTRA University
2016-2025
Sathyabama Institute of Science and Technology
2015
Amrita Vishwa Vidyapeetham
2013
Dhanalakshmi Srinivasan Group of Institutions
2013
Abstract This work investigates the potential for using Grammatical Evolution (GE) to generate an initial seed construction of a pseudo-random number generator (PRNG) and cryptographically secure (CS) PRNG. We demonstrate suitability GE as entropy source show that seeds exhibit average value 7.940560934 8-bit , which is close ideal 8. then construct two random generators, GE-PRNG GE-CSPRNG, both employ these seeds. use Monte Carlo simulations establish efficacy experimental setup designed...
The utility of true random number generators (TRNGs) is not only restricted to session key generation, nonce OTP generation etc. in cryptography. In the proposed work, two ring oscillator (RO) based TRNG structures adopting identical and non‐identical inverters have alone been employed for confusion (scrambling) diffusion (intensity variation) processes encrypting greyscale RGB images. Cyclone IVE EP4CE115F29C7 FPGA was utilised generate a couple synthetic images using RO architectures which...
Medical image security relies upon the arrival of improved techniques for enhancing confusion as well diffusion processes in pixel level manipulations. Non‐linear circuits constructed with hardware components can be employed hardware–software co‐design medical encryption. The proposed approach has adopted Chua diode circuit generation 256 × random synthetic entropy 7.9972. This been utilised to scramble DICOM second cellular automata provides first scrambling and diffusion. average...
Artificial intelligence (AI) and sensor technology developments have sparked revolutionary shifts in a number of fields, including biometric Identification. In order to improve human identification processes, this research offers novel method that integrates AI many image sensors. The accuracy, robustness, susceptibility spoofing assaults conventional single-modal systems are among their drawbacks. To overcome these challenges, we introduce secure multi-biometric system relies on...
In the healthcare sector, e-diagnosis through medical images is essential in a multi-speciality hospital; securing becomes crucial for preserving an individual's privacy e-healthcare applications. So, this paper has proposed novel encryption scheme implemented on reconfigurable hardware. Realising image schemes FPGA hardware platforms offers substantial advantages over software implementations. The image-specific key and Hopfield Neural Network (HNN) carry out diffusion process using...
In the age of digital communication, safeguarding security and integrity transmitted images is crucial, especially for online real-time applications where data privacy paramount. This paper addresses problem protecting sensitive medical during transmission by proposing a robust, lightweight encryption scheme. The proposed method uses keys derived from Lorentz attractor diffusion 16-bit Linear Feedback Shift Register (LFSR) pseudo-random confusion. Additionally, Cipher Block Chaining (CBC)...
True random key generator (TRNG) architectures play a notable role in strengthening information security infrastructure. The development of new entropy sources based on reconfigurable hardware is always demand, especially for the integrity devices IoT applications. TRNGs can be adopted generating unique device IDs that form data network IoT. A ring oscillator (RO) an efficient source which implemented FPGAs or realised as ASIC hardware. This work proposes non-identical RO array source. TRNG...
The advancements happening in the domain of information technology resulted growing stature rapid communication across world. Telemedicine is one such arena which benefitted largely because revolution. DICOM images are important medical carriers shared mostly through an unsecured network hospitals and health centers. Protection significant records against unauthorized access needs attention. In this work, image stored on-chip memory FPGA upon authentication unique key received keyboard, will...
Medical image encryption plays a pivotal role in telemedicine and healthcare applications. Authentication of medical images require must attention owing to the amount data being communicated number digital records created maintained. In this work, server - client model authenticated communication is proposed. Initially, AES encrypted further secured by embedding One Time Password (OTP) generated through Tent map. This OTP embedded shared intended user via intranet. Upon receiving GSM,...
Along with the ageing of population, low cost and high efficiency physiological information monitor systems for realization long-term community guardianship are great significance.This system can improve life quality reduce medical expense.Our paper is a working model which incorporates sensors to measure parameters like body temperature, heart beat rate, blood pressure; transfer it computer so that patient's health condition be analyzed by doctors in any part hospital.Thus, reduces doctor's...
True Random Number Generator (TRNG) occupies a commendable position in various information security applications. numbers are the one which need to possess properties of uniform distribution and statically independent. Diffused bit (DBG) is reliable entropy source core component produce sequence random bits. The bits emanating from DBG usually further sampled for n-bit number generation. In this work, an ASIC implementation unit constructed with integration LFSR (Linear Feedback Shift...