- Biometric Identification and Security
- EEG and Brain-Computer Interfaces
- User Authentication and Security Systems
- Interactive and Immersive Displays
- Tactile and Sensory Interactions
- Gaze Tracking and Assistive Technology
- Software Engineering Research
- Software Testing and Debugging Techniques
- Software Reliability and Analysis Research
- Advanced Steganography and Watermarking Techniques
- Low-power high-performance VLSI design
- Blind Source Separation Techniques
- Functional Brain Connectivity Studies
- Software System Performance and Reliability
- Neuroscience and Neural Engineering
- Advanced Authentication Protocols Security
- Advancements in Semiconductor Devices and Circuit Design
- Image Retrieval and Classification Techniques
- Usability and User Interface Design
- Neural dynamics and brain function
- Handwritten Text Recognition Techniques
- Multimedia Communication and Technology
- Artificial Intelligence in Healthcare
- Face and Expression Recognition
- Chaos-based Image/Signal Encryption
Indian Institute of Technology Kharagpur
2016-2025
Robert Bosch (Germany)
2024
Marymount University
2022
J. S. Ayurveda Mahavidyalaya and P.D. Patel Ayurveda Hospital
2015
Indian Institute of Technology Kanpur
2011-2013
AAA College of Engineering and Technology
2012
Shri Dharmasthala Manjunatheswara College of Ayurveda and Hospital
2012
Indian Institute of Technology Indore
2007
North Eastern Regional Institute of Science and Technology
2004
Deep learning is gaining importance in many applications. However, Neural Networks face several security and privacy threats. This particularly significant the scenario where Cloud infrastructures deploy a service with Network model at back end. Here, an adversary can extract parameters, infer regularization hyperparameter, identify if data point was part of training data, generate effective transferable adversarial examples to evade classifiers. paper shows how susceptible timing side...
Model-based test case generation is gaining acceptance to the software practitioners.Advantages of this are early detection faults, reducing development time etc.In recent times, researchers have considered different UML diagrams for generating cases.Few work on using activity reported in literatures.However, existing consider method scope and mainly follow 1.x modeling.In paper, we present an approach cases from 2.0 syntax with use scope.We a coverage criterion, called path criterion.The...
Smart card-based remote authentication schemes are widely used in multi-medical-server-based telecare medicine information systems (TMISs). Biometric is one of the most trustworthy authenticators and presently being advocated to use TMIS. However, existing TMISs consider a single-server-environment-based system. Therefore, patients need register log into every server separately for different services. Furthermore, these do not employ error correction technique remove errors from biometric...
Neural activities recorded using electroencephalography (EEG) are mostly contaminated with eye blink (EB) artifact. This results in undesired activation of brain-computer interface (BCI) systems. Hence, removal EB artifact is an important issue EEG signal analysis. Of late, several methods have been reported the literature and they based on independent component analysis (ICA), thresholding, wavelet transformation, etc. These computationally expensive result information loss which makes them...
Of late, emotion detection from brain signal has become a topic of research. Various machine learning algorithms have been applied to classify the as psychological measurement. However, good accuracy in measurements is yet be achieved. This work proposes an approach different type estimation human being with improved accuracy. extracts several features EEG signals and then optimize set using correlation matrix, information gain calculation, recursive feature elimination method. The optimized...
Abstract To ensure the secure transmission of data, cryptography is treated as most effective solution. Cryptographic key an important entity in this process. In general, randomly generated cryptographic (of 256 bits) difficult to remember. However, such a needs be stored protected place or transported through shared communication line which, fact, poses another threat security. As alternative this, researchers advocate generation using biometric traits both sender and receiver during...
Remote user authentication is a cryptographic mechanism through which remote server verifies the legitimacy of an authorized over insecure communication channel. Most existing schemes consider single-server environments and require multiple registrations same for servers. Moreover, most these do not biometric template revocation error correction noisy signals. In addition, have several weaknesses, including stolen smart card attack, lack anonymity, impersonation non-diversification data. To...
Model based testing techniques are used to generate test scenarios from a behavioral description of system under tests.For large and complex system, there usually number hence paths also called specifications.To automate execution, each specification should be augmented with appropriate input data.In this paper, we propose an approach synthesizing data the information embedded in model elements such as class diagrams, sequence diagrams OCL constraints.In our approach, enrich diagram...
Unified modelling language (UML) is a visual language, which has gained popularity among software practitioners. In model-driven development environment, the existing UML tools mainly support automatic generation of structural code from class diagrams. However, diagrams such as statechart, activity, collaboration and sequence (SDs) are not supported by most also have scarcely been reported in literatures. This work proposes an approach to 2.x SDs use cases. From XML metadata interchange...
Motor imagery (MI) signals recorded via electroencephalography (EEG) is the most convenient basis for designing brain-computer interfaces (BCIs). As MI based BCI provides high degree of freedom, it helps motor disabled people to communicate with device by performing sequence tasks. But inter-subject variability, extracting user-specific features and increasing accuracy classifier still a challenging task in BCIs. In this work, we propose an approach overcome above mentioned issues. The...
Virtual scanning keyboards are commonly used augmentative communication aids by persons with severe speech and motion impairments. Designers of virtual face problems in evaluating alternate designs hence choosing the better design among alternatives. Automatic evaluation will be helpful to designers making appropriate choice. In this paper, we present performance models for that can automatic evaluation. The proposed address limitations reported work on similar models. We compared model...
The concept of multimodal biometrics is gaining importance to realise reliable, accurate and robust authentication systems. In biometrics, information fusion can be done at various levels: sensor level, feature match-score rank level decision level. This paper surveys the issues different levels recent researches addressing these issues. Furthermore, there are several rules available combine biometric traits fusion. We have reviewed approaches rules. A comparison state-of-the-art techniques...
Biometric features are extracted from a complex pattern and stored as high dimensional data. These data do not follow traditional sorting order like numerical alphabetical Hence, linear search method makes the identification process extremely slow well increases false acceptance rate beyond an acceptable range. To address this problem, we propose efficient indexing mechanism to retrieve iris biometric templates using Gabor energy features. The calculated preprocessed texture in different...
Over the last three decades, eye gaze has become an important modality of text entry in large and small display digital devices covering people with disabilities beside able-bodied. Despite many tools being developed, issues like dwell time optimization, visual search interface area minimization, eye-controlled mouse movement stability etc. are still points concern making any typing more user friendly, accurate robust. In this paper, we propose EyeBoard, gaze-based system which optimizes...