- Chaos-based Image/Signal Encryption
- Advanced Steganography and Watermarking Techniques
- Cellular Automata and Applications
- Cryptographic Implementations and Security
- Digital Media Forensic Detection
- Physical Unclonable Functions (PUFs) and Hardware Security
- User Authentication and Security Systems
- Biometric Identification and Security
- DNA and Biological Computing
- Embedded Systems Design Techniques
- Chaos control and synchronization
- VLSI and Analog Circuit Testing
- Quantum chaos and dynamical systems
- VLSI and FPGA Design Techniques
- Algorithms and Data Compression
- Advanced Data Compression Techniques
- Wireless Communication Security Techniques
- Internet of Things and AI
- Industrial Vision Systems and Defect Detection
- Advanced SAR Imaging Techniques
- Innovative Energy Harvesting Technologies
- Machine Learning in Bioinformatics
- Fractal and DNA sequence analysis
- Low-power high-performance VLSI design
- Quantum and Classical Electrodynamics
SASTRA University
2009-2021
Virginia Tech
2010
Cochin University of Science and Technology
1991-2001
Silicon Labs (United States)
1999
The utility of true random number generators (TRNGs) is not only restricted to session key generation, nonce OTP generation etc. in cryptography. In the proposed work, two ring oscillator (RO) based TRNG structures adopting identical and non‐identical inverters have alone been employed for confusion (scrambling) diffusion (intensity variation) processes encrypting greyscale RGB images. Cyclone IVE EP4CE115F29C7 FPGA was utilised generate a couple synthetic images using RO architectures which...
Medical image security relies upon the arrival of improved techniques for enhancing confusion as well diffusion processes in pixel level manipulations. Non‐linear circuits constructed with hardware components can be employed hardware–software co‐design medical encryption. The proposed approach has adopted Chua diode circuit generation 256 × random synthetic entropy 7.9972. This been utilised to scramble DICOM second cellular automata provides first scrambling and diffusion. average...
Steganography has become a predominantly employed information security technique in this modern era. Although the software methods which work on spatial as well transform domain steganography offer lot of data hiding options, steganographic system hardware platform shows enormous potential by means multiple advantages such high speed embedding, specific dependency etc.,. In paper we have proposed image architecture employs embedding square sized cover blocks that are stored internal/external...
A 450-Mbit/s analog front end, integrated into a 16/17 code rate EPR4 read channel for hard disk drives, uses an automatic gain control (AGC) circuit with digital feedback. Multilevel qualification and variable loop time constant enable the AGC to acquire 12-dB change within 5 data bytes. The front-end circuitry incorporates programmable amplifier (PGA), exponential multiplier (VGA), seventh-order 0.05/spl deg/ equiripple linear phase 20-120-MHz low-pass filter 0-15-dB high-frequency boost,...
The advancements happening in the domain of information technology resulted growing stature rapid communication across world. Telemedicine is one such arena which benefitted largely because revolution. DICOM images are important medical carriers shared mostly through an unsecured network hospitals and health centers. Protection significant records against unauthorized access needs attention. In this work, image stored on-chip memory FPGA upon authentication unique key received keyboard, will...