#### Filter Results:

- Full text PDF available (4)

#### Publication Year

2013

2017

- This year (2)
- Last 5 years (10)
- Last 10 years (10)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Fatema Akhter
- ArXiv
- 2013

This paper presents a new approach for hiding information in digital image in spatial domain. In this approach three bits of message is embedded in a pixel using Lucas number system but only one bit plane is allowed for alternation. The experimental results show that the proposed method has the larger capacity of embedding data, high peak signal to noise… (More)

- Ayaka Oka, Masaaki Yamamoto, +8 authors Atsushi Yoshida
- Brain research
- 2013

This study clarified the neural mechanisms underlying jaw movements in pharyngolaryngeal reflexes such as swallowing in rats. After retrograde tracer injections into the ventromedial division (Vmovm) of the trigeminal motor nucleus (Vmo) containing jaw-opening (JO) motoneurons or into the dorsolateral division (Vmodl) of Vmo containing jaw-closing (JC)… (More)

- Fatema Akhter
- 2016 International Conference on Computer…
- 2016

Graph Steganography (Graphstega) provides a method of covert communication by converting a message to plotted data in a graph. Due to numerous usages of graphs in our daily life, Graphstega can hide secret message communication without arising any suspicion. This paper proposes a secured Graphstega approach aiming at a secured method of information hiding… (More)

- Fatema Akhter
- 2016

Elliptic Curve Cryptography provides similar strength of protection comparing other public key cryptosystems but requires significantly smaller key size. This paper proposes a new faster scalar multiplication algorithm aiming at a more secured Elliptic Curve Cryptography scheme. This paper also proposes a novel Elliptic Curve Cryptography scheme where… (More)

- Fatema Akhter, Md. Selim Al Mamun
- 2016 9th International Conference on Electrical…
- 2016

This paper proposes a novel approach for pseudo random ternary sequence over finite field. The sequence is generated from a primitive polynomial over finite field applying trace function and möbius function. This paper further presents some important properties such as period, autocorrelation and cross-correlation of the generated sequence. The… (More)

- Fatema Akhter
- 2015 International Conference on Computer and…
- 2015

This paper proposes a new Elliptic Curve Cryptography (ECC) scheme and a data mapping technique on elliptic curve over a finite field using maximum length random sequence generation. While its implementation, this paper also proposes a new algorithm of scalar multiplication for ECC. The proposed scheme is tested on various bits length of prime field and the… (More)

- Fatema Akhter, Yasuyuki Nogami
- 2016 International Workshop on Computational…
- 2016

Pseudo random sequences play an important role in cryptography and network security system. This paper proposes a new approach for generation of pseudo random sequence over odd characteristic field. The sequence is generated by applying a primitive polynomial over odd characteristic field, trace function and möbius function. Then, some important… (More)

The rapid advancement of technology has changed the way of our living. Sharing information becomes inevitable in everyday life. However, it encounters many security issues when dealing with secret or private information. The transmission of such sophisticated information has become highly important and received much attention. Therefore, various techniques… (More)

- Fatema Akhter, Md. Selim Al Mamun
- 2017 International Conference on Electrical…
- 2017

The pseudo random binary sequence plays an important role in cryptography and network security system. This paper proposes a new approach to pseudo random binary sequence over finite field and evaluates some important properties of the newly generated sequence. The sequence is generated by applying a primitive polynomial over finite field, trace function… (More)

The Minimum Set Cover Problem has many practical applications in various research areas. This problem belongs to the class of NP-hard theoretical problems. Several approximation algorithms have been proposed to find approximate solutions to this problem and research is still going on to optimize the solution. This paper studies the existing algorithms of… (More)

- ‹
- 1
- ›