Syam Sankar

ORCID: 0000-0002-1535-8609
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Advanced Memory and Neural Computing
  • Interconnection Networks and Systems
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • DNA and Biological Computing
  • IoT and Edge/Fog Computing
  • Image Retrieval and Classification Techniques
  • Cellular Automata and Applications
  • Software Engineering Research
  • Fractal and DNA sequence analysis
  • AI in cancer detection
  • Cryptographic Implementations and Security
  • Quantum-Dot Cellular Automata
  • Face and Expression Recognition
  • Software Testing and Debugging Techniques
  • Chaos control and synchronization
  • Face recognition and analysis
  • Digital Media Forensic Detection
  • Software Reliability and Analysis Research
  • Neuroscience and Neural Engineering
  • Biometric Identification and Security
  • Sentiment Analysis and Opinion Mining
  • Mathematical Dynamics and Fractals
  • Engineering Education and Technology

Indian Institute of Technology Guwahati
2023-2024

Vellore Institute of Technology University
2019

Vels University
2018

NIMS University
2013

Stanford University
1991-2002

Bhabha Atomic Research Centre
1998

In this paper, we report an effective cryptosystem aimed at securing the transmission of medical images in Internet Healthcare Things (IoHT) environment. This contribution investigates dynamics a 2-D trigonometric map designed using some well-known maps: Logistic-sine-cosine maps. Stability analysis reveals that has infinite number solutions. Lyapunov exponent, bifurcation diagram, and phase portrait are used to demonstrate complex dynamic map. The sequences utilized construct robust...

10.1109/access.2020.3010794 article EN cc-by IEEE Access 2020-01-01

10.1007/s12652-019-01385-0 article EN Journal of Ambient Intelligence and Humanized Computing 2019-07-06

In this modernistic age of innovative technologies like big data processing, cloud computing, and Internet things, the utilization multimedia information is growing daily. contrast to other forms multimedia, videos are extensively utilized streamed over communication networks in numerous Multimedia Things (IoMT) applications. Consequently, there an immense necessity achieve secure video transmission modern due third-party exploitation falsification transmitted stored digital data. The...

10.1109/access.2020.3008644 article EN cc-by IEEE Access 2020-01-01

Data security plays a significant role in data transfer cloud-based smart cities. Chaotic maps are commonly used designing modern cryptographic applications, which one-dimensional (1D) chaotic systems widely due to their simple design and low computational complexity. However, 1D suffer from different kinds of attacks because discontinuous ranges small key-space. To own the benefits avoid drawbacks, cascading two integrated has been utilized. In this paper, we report an image cryptosystem...

10.1155/2021/6615512 article EN Security and Communication Networks 2021-02-25

Aerial photography involves capturing images from aircraft and other flying objects, including Unmanned Vehicles (UAV). are used in many fields can contain sensitive information that requires secure processing. We proposed an innovative new cryptosystem for the processing of aerial utilizing a chaos-based private key block cipher method so even on untrusted cloud servers. The is based hybrid technique combining Mersenne Twister (MT), Deoxyribonucleic Acid (DNA), Chaotic Dynamical Rossler...

10.3390/rs12111893 article EN cc-by Remote Sensing 2020-06-11

Multiple software and hardware intellectual property (IP) components are combined on a single chip to form Multi-Processor Systems-on-Chips (MPSoCs). Due the rigid time-to-market constraints, some of IPs from outsourced third parties. supply-chain management IP blocks being handled by unreliable third-party vendors, security has grown as crucial design concern in MPSoC. These may get exposed certain unwanted practises like insertion malicious circuits called Hardware Trojan (HT) leading...

10.1145/3639821 article EN ACM Transactions on Design Automation of Electronic Systems 2024-01-08

Breast tumor is a champion among the most broadly perceived sort of development women that creates from breast tissue. Still correct reason for disease stays obscure. Early discovery and determination best methodology to control movement. Mammography right now suggested imaging strategy early assurance danger. A mammogram can distinguish unusual areas in resemble malignancy. Mammogram pictures are observed be hard decipher so CAD turning into an undeniably essential device help radiologist...

10.1109/iccs1.2017.8326032 article EN 2017-12-01

10.1007/s40995-020-00905-4 article EN Iranian Journal of Science and Technology Transactions A Science 2020-06-28

Increasing the lifetime of low power and lossy networks (LLN) is a major challenge, as nodes have power, memory, processing capacity. Clustering technique used to minimize energy consumption sensor nodes. This article proposes fuzzy sets-based cluster routing protocol (FC-RPL) extend network in LLN. It has three processes: formation, head selection, parent selection. forms clusters based on Euclidean distance. applies set over metrics residual energy, number neighbors centrality, select each...

10.4018/ijfsa.2019070103 article EN International Journal of Fuzzy System Applications 2019-07-01

Background: Content Based Image Retrieval (CBIR) has always been a demanding research area as it involves searching of digital images from the collection images. Difficulty exists in retrieving for query posed by concentrating on factors; computational complexity and accuracy. Though many works span around CBIR, Medical (CBMIR) plays vital role medical diagnosis. Keywords: Artificial bee colony algorithm, artificial neural network (ANN), content based image retrieval (CBIR), (CBMIR), grey...

10.2174/1573405612666160617082639 article EN Current Medical Imaging Formerly Current Medical Imaging Reviews 2016-06-27

Debugging techniques and tools that draw on both the high-level concepts (defined as functions) used in formal specifications abstraction information-hiding constructs modern languages are described. The technique is based two components. One a novel specification language with support tools. Ada programs specified authors created called Anna. Their tool set to check program's runtime behavior for consistency Anna specifications. other uses find missing by comparing program prototypes test...

10.1109/52.62935 article EN IEEE Software 1991-01-01

The image encryption or the secure processing is an art of handling to provide protection from those information theft damage. It necessary maintain security for images such as medical, military, etc. So far many research work have been developed in field and prevention. However achieved level not satisfactory, thus still this find a better solution data In sense, targeted develop strategy prevention enhancement. There are cryptography technique available technical world, however adapted...

10.1109/icetietr.2018.8529014 article EN 2018 International Conference on Emerging Trends and Innovations In Engineering And Technological Research (ICETIETR) 2018-07-01

Social media is a place where users present themselves and share all type of information, ideas, experiences with world. In recent years sentiment analysis has been explored by several internet services to recommend contents accordance human emotions, which expressed through social network. Many user's on network write sentence in variety languages. This paper presents language independent music recommendation system. system suggests user depending upon the current emotional state that...

10.1109/i2c2.2017.8321803 article EN 2017-06-01

Resource allocation and optimization is one of the important characteristics in cloud computing environment. An vital goal any service provider to allocate cost effective optimized resource packages consumers that meet QOS (Quality Service) requirements. Though various set resources are available, selecting an appropriate based on their requirements a tedious task for providers. Many researchers have already discussed different algorithms finding optimal consumers. However there challenge...

10.14419/ijet.v7i3.34.18966 article EN International Journal of Engineering & Technology 2018-09-01

Modern multi-core processors use Network-on-Chip (NoC) as the communication backbone. With aggressive product release deadlines due to competition from peers, usage of third-party intellectual property (IP) blocks for NoCs is a common practice. Hardware Trojans in NoC can lead performance degradation and exposure sensitive information through data leakage. We address this problem by devising secure, lightweight cryptosystem called Sec-NoC be used on-chip communications, ensuring...

10.1109/les.2023.3333561 article EN IEEE Embedded Systems Letters 2023-11-16

In this paper, we present a multimodal face recognition system that fuses results from both Principal Component Analysis, Fisherface projections, minutia extraction and LBP feature on different biometric traits. The proposed identification uses the face, fingerprint iris of person for recognizing person. We use two methods comparing performance. first model used principal component analysis to extract features image fisherfaces image. second method fisherface minutiae developed possesses...

10.1109/icevent.2013.6496558 article EN 2013-01-01

It is similar to having a very intelligent computer that capable of thought and learning. all comes down building machines are doing tasks often call for human intelligence, such as language comprehension, image recognition, decision-making. It's remarkable. Imagine being able learn reason like brain possible with machine. That's the main purpose artificial intelligence (AI). akin endowing capacity decision-making, even experience-based KEY WORDS: Artificial Intelligence. Human, Process,...

10.36713/epra18822 article EN EPRA International Journal of Environmental Economics Commerce and Educational Management 2024-10-30

Face recognition is one of the most important applications computer vision in recent years.The developed multimodal biometric system possesses a number unique qualities, starting from utilizing principal component analysis and Fisher's linear Discriminant methods for individual matcher's identity authentication utilizes novel feature fusion method to consolidate results obtained different matchers.In this paper, we present bimodal face-finger that fuses both Principal Component Analysis...

10.7763/ijmlc.2013.v3.299 article EN International Journal of Machine Learning and Computing 2013-01-01
Coming Soon ...