Sridevi Arumugham

ORCID: 0000-0002-5334-6510
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Cellular Automata and Applications
  • Digital Media Forensic Detection
  • Cryptographic Implementations and Security
  • DNA and Biological Computing
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Advanced Data Compression Techniques
  • Biometric Identification and Security

SASTRA University
2018-2020

Medical image encryption plays a pivotal role in telemedicine and healthcare applications. Authentication of medical images require must attention owing to the amount data being communicated number digital records created maintained. In this work, server - client model authenticated communication is proposed. Initially, AES encrypted further secured by embedding One Time Password (OTP) generated through Tent map. This OTP embedded shared intended user via intranet. Upon receiving GSM,...

10.1109/iccci.2018.8441284 article EN 2022 International Conference on Computer Communication and Informatics (ICCCI) 2018-01-01

True random number generators (TRNG) have an appreciable demand in key generation of crypto processors. FPGA based TRNGs offer various advantages for generation, packing and storage. Metastability, jitter, race around memory collision are some the entropy sources extraction true randomness. In this work, jitter is prime focus randomness harvesting. Two different frequencies been generated by Onchip PLL which were used asynchronous manner bit generation. Flip-flops design after post...

10.1109/iccci.2018.8441393 article EN 2022 International Conference on Computer Communication and Informatics (ICCCI) 2018-01-01

Looking at the demands of secure communication schemes, new platforms for information security have a significant role in data protection. In this paper, image encryption on reconfigurable hardware FPGA has been proposed with confluence chaotic map and DNA schemes. Confusion diffusion were performed both Chaotic approaches. The architecture 128 × grayscale which was implemented Cyclone II EP2C35F672C6 consumed 23,877 (72%) logic elements, 131,072 (27%) internal M4KRAM memory units total...

10.1109/iccci.2018.8441328 article EN 2022 International Conference on Computer Communication and Informatics (ICCCI) 2018-01-01

Digital data is a fundamental source of multimedia platform where image communication substantial part it. Through communication, information transmitted and received on network in various fields like armed forces, military, healthcare, entertainment, many more. To protect information, security architectures are necessary. This work proposes an enhanced method gray scale encryption chaotic selection algorithm takes the priority. Confusion diffusion performed with four pseudo random sequence...

10.1109/iccci.2018.8441267 article EN 2022 International Conference on Computer Communication and Informatics (ICCCI) 2018-01-01

With the rapid development in field of communication, confidential transfer information become vital as they are passing through an unsecure public channel. The contidentiality can be greatly achieved by means encryption. As images most important multimedia content need to transmitted, concept image encryption emerged and raise a hot topic research area well for real time applications. In this proposed work, performance analysis various chaotic maps such Logistic, Sinus, Circle Chebyshev...

10.1109/iccci.2019.8822032 article EN 2022 International Conference on Computer Communication and Informatics (ICCCI) 2019-01-01

Due to the rapid growth in communication, transmittal of multimedia contents over open unsecured channel became vital. Hence mechanism which provides confidentiality these is needed and that can be achieved with help Image Encryption. In this paper, secured grayscale image encryption was performed using combined chaotic maps namely Logistic Sine-Sine (LS-S) Logistic-Sine (LL-S) transform domain Integer Wavelet Transform (IWT)approach. To validate proposed algorithm, certain analyses such as...

10.1109/iccci.2019.8821828 article EN 2022 International Conference on Computer Communication and Informatics (ICCCI) 2019-01-01
Coming Soon ...