- Chaos-based Image/Signal Encryption
- Advanced Steganography and Watermarking Techniques
- Advanced Memory and Neural Computing
- Interconnection Networks and Systems
- Physical Unclonable Functions (PUFs) and Hardware Security
- DNA and Biological Computing
- IoT and Edge/Fog Computing
- Image Retrieval and Classification Techniques
- Cellular Automata and Applications
- Software Engineering Research
- Fractal and DNA sequence analysis
- AI in cancer detection
- Cryptographic Implementations and Security
- Quantum-Dot Cellular Automata
- Face and Expression Recognition
- Software Testing and Debugging Techniques
- Chaos control and synchronization
- Face recognition and analysis
- Digital Media Forensic Detection
- Software Reliability and Analysis Research
- Neuroscience and Neural Engineering
- Biometric Identification and Security
- Sentiment Analysis and Opinion Mining
- Mathematical Dynamics and Fractals
- Engineering Education and Technology
Indian Institute of Technology Guwahati
2023-2024
Vellore Institute of Technology University
2019
Vels University
2018
NIMS University
2013
Stanford University
1991-2002
Bhabha Atomic Research Centre
1998
In this paper, we report an effective cryptosystem aimed at securing the transmission of medical images in Internet Healthcare Things (IoHT) environment. This contribution investigates dynamics a 2-D trigonometric map designed using some well-known maps: Logistic-sine-cosine maps. Stability analysis reveals that has infinite number solutions. Lyapunov exponent, bifurcation diagram, and phase portrait are used to demonstrate complex dynamic map. The sequences utilized construct robust...
In this modernistic age of innovative technologies like big data processing, cloud computing, and Internet things, the utilization multimedia information is growing daily. contrast to other forms multimedia, videos are extensively utilized streamed over communication networks in numerous Multimedia Things (IoMT) applications. Consequently, there an immense necessity achieve secure video transmission modern due third-party exploitation falsification transmitted stored digital data. The...
Data security plays a significant role in data transfer cloud-based smart cities. Chaotic maps are commonly used designing modern cryptographic applications, which one-dimensional (1D) chaotic systems widely due to their simple design and low computational complexity. However, 1D suffer from different kinds of attacks because discontinuous ranges small key-space. To own the benefits avoid drawbacks, cascading two integrated has been utilized. In this paper, we report an image cryptosystem...
Aerial photography involves capturing images from aircraft and other flying objects, including Unmanned Vehicles (UAV). are used in many fields can contain sensitive information that requires secure processing. We proposed an innovative new cryptosystem for the processing of aerial utilizing a chaos-based private key block cipher method so even on untrusted cloud servers. The is based hybrid technique combining Mersenne Twister (MT), Deoxyribonucleic Acid (DNA), Chaotic Dynamical Rossler...
Multiple software and hardware intellectual property (IP) components are combined on a single chip to form Multi-Processor Systems-on-Chips (MPSoCs). Due the rigid time-to-market constraints, some of IPs from outsourced third parties. supply-chain management IP blocks being handled by unreliable third-party vendors, security has grown as crucial design concern in MPSoC. These may get exposed certain unwanted practises like insertion malicious circuits called Hardware Trojan (HT) leading...
Breast tumor is a champion among the most broadly perceived sort of development women that creates from breast tissue. Still correct reason for disease stays obscure. Early discovery and determination best methodology to control movement. Mammography right now suggested imaging strategy early assurance danger. A mammogram can distinguish unusual areas in resemble malignancy. Mammogram pictures are observed be hard decipher so CAD turning into an undeniably essential device help radiologist...
Increasing the lifetime of low power and lossy networks (LLN) is a major challenge, as nodes have power, memory, processing capacity. Clustering technique used to minimize energy consumption sensor nodes. This article proposes fuzzy sets-based cluster routing protocol (FC-RPL) extend network in LLN. It has three processes: formation, head selection, parent selection. forms clusters based on Euclidean distance. applies set over metrics residual energy, number neighbors centrality, select each...
Background: Content Based Image Retrieval (CBIR) has always been a demanding research area as it involves searching of digital images from the collection images. Difficulty exists in retrieving for query posed by concentrating on factors; computational complexity and accuracy. Though many works span around CBIR, Medical (CBMIR) plays vital role medical diagnosis. Keywords: Artificial bee colony algorithm, artificial neural network (ANN), content based image retrieval (CBIR), (CBMIR), grey...
Debugging techniques and tools that draw on both the high-level concepts (defined as functions) used in formal specifications abstraction information-hiding constructs modern languages are described. The technique is based two components. One a novel specification language with support tools. Ada programs specified authors created called Anna. Their tool set to check program's runtime behavior for consistency Anna specifications. other uses find missing by comparing program prototypes test...
The image encryption or the secure processing is an art of handling to provide protection from those information theft damage. It necessary maintain security for images such as medical, military, etc. So far many research work have been developed in field and prevention. However achieved level not satisfactory, thus still this find a better solution data In sense, targeted develop strategy prevention enhancement. There are cryptography technique available technical world, however adapted...
Social media is a place where users present themselves and share all type of information, ideas, experiences with world. In recent years sentiment analysis has been explored by several internet services to recommend contents accordance human emotions, which expressed through social network. Many user's on network write sentence in variety languages. This paper presents language independent music recommendation system. system suggests user depending upon the current emotional state that...
Resource allocation and optimization is one of the important characteristics in cloud computing environment. An vital goal any service provider to allocate cost effective optimized resource packages consumers that meet QOS (Quality Service) requirements. Though various set resources are available, selecting an appropriate based on their requirements a tedious task for providers. Many researchers have already discussed different algorithms finding optimal consumers. However there challenge...
Modern multi-core processors use Network-on-Chip (NoC) as the communication backbone. With aggressive product release deadlines due to competition from peers, usage of third-party intellectual property (IP) blocks for NoCs is a common practice. Hardware Trojans in NoC can lead performance degradation and exposure sensitive information through data leakage. We address this problem by devising secure, lightweight cryptosystem called Sec-NoC be used on-chip communications, ensuring...
In this paper, we present a multimodal face recognition system that fuses results from both Principal Component Analysis, Fisherface projections, minutia extraction and LBP feature on different biometric traits. The proposed identification uses the face, fingerprint iris of person for recognizing person. We use two methods comparing performance. first model used principal component analysis to extract features image fisherfaces image. second method fisherface minutiae developed possesses...
It is similar to having a very intelligent computer that capable of thought and learning. all comes down building machines are doing tasks often call for human intelligence, such as language comprehension, image recognition, decision-making. It's remarkable. Imagine being able learn reason like brain possible with machine. That's the main purpose artificial intelligence (AI). akin endowing capacity decision-making, even experience-based KEY WORDS: Artificial Intelligence. Human, Process,...
Face recognition is one of the most important applications computer vision in recent years.The developed multimodal biometric system possesses a number unique qualities, starting from utilizing principal component analysis and Fisher's linear Discriminant methods for individual matcher's identity authentication utilizes novel feature fusion method to consolidate results obtained different matchers.In this paper, we present bimodal face-finger that fuses both Principal Component Analysis...