• Publications
  • Influence
Non-blind watermarking scheme for color images in RGB space using DWT-SVD
TLDR
This scheme embeds the watermark into cover image in (Red, Green, Blue) RGB space and the combinations of DWT and SVD increases the security, robustness and imperceptibility of the scheme.
DCT based reversible data embedding for MPEG-4 video using HVS characteristics
TLDR
Two reversible data embedding schemes which embed the data during the process of MPEG-4 compression of video are proposed which achieves good visual quality in terms of HVS based metrics which can be useful for high fidelity watermarking applications and the second scheme achieves higher embedding capacity by maintaining better visual quality which can been useful for the steganographic applications.
Secure data collection using mobile data collector in clustered wireless sensor networks
TLDR
The theoretical analysis shows that the protocols are invulnerable to the compromised MDC and replayed messages, and the protocols show varying resiliency to compromised CH.
A key management scheme for secure group communication using binomial key trees
TLDR
A new scheme to manage the secure group using the binomial key tree approach, where the number of encryptions performed and rekey messages constructed during membership change are fewer compared to the scheme proposed by Wong and others and it is not required to balance the tree after each membership change.
Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud
TLDR
This paper proposes and implements a secure storage service providing a cryptographic guarantee for the security to store, access and share the user's data, and uses the proposed limited proxy re-encryption scheme as the primitive and design an improved and efficient sharing method for the securestorage service.
Secure Watermarking Scheme for Color Image Using Intensity of Pixel and LSB Substitution
TLDR
A novel spatial domain LSB based watermarking scheme for color Images that is robust to various image processing operations such as image compression, blurring, salt and pepper noise, filtering and cropping.
Provable data possession scheme with constant proof size for outsourced data in public cloud
TLDR
This work has proposed a provable data possession scheme with reduced proof size to save the network bandwidth, and proved the security of the scheme under Knowledge of Exponent and Discrete Logarithm assumptions against a cheating cloud server.
A DCT based reversible data embedding scheme for MPEG-4 video using HVS characteristics
TLDR
A reversible data embedding scheme which embed the data during the process of MPEG-4 compression of video and achieves higher embedding capacity and better visual quality in terms of HVS based metrics is proposed.
Secure group and multi-layer group communication schemes based on polynomial interpolation
TLDR
It is shown that the proposed share-based group key management scheme and the multilayer key management schemes are efficient in terms of storage and rekeying cost in comparison with two schemes based on threshold secret-sharing method available in the literature.
Analysis of Key Management Schemes for Secure Group Communication and Their Classification
TLDR
This paper discusses some of the key management schemes proposed earlier and analyzes the schemes with respect to storage, communication and computation costs.
...
1
2
3
4
5
...