Fatema Akhter

  • Citations Per Year
Learn More
This study clarified the neural mechanisms underlying jaw movements in pharyngolaryngeal reflexes such as swallowing in rats. After retrograde tracer injections into the ventromedial division (Vmovm) of the trigeminal motor nucleus (Vmo) containing jaw-opening (JO) motoneurons or into the dorsolateral division (Vmodl) of Vmo containing jaw-closing (JC)(More)
Graph Steganography (Graphstega) provides a method of covert communication by converting a message to plotted data in a graph. Due to numerous usages of graphs in our daily life, Graphstega can hide secret message communication without arising any suspicion. This paper proposes a secured Graphstega approach aiming at a secured method of information hiding(More)
Elliptic Curve Cryptography provides similar strength of protection comparing other public key cryptosystems but requires significantly smaller key size. This paper proposes a new faster scalar multiplication algorithm aiming at a more secured Elliptic Curve Cryptography scheme. This paper also proposes a novel Elliptic Curve Cryptography scheme where(More)
This paper proposes a novel approach for pseudo random ternary sequence over finite field. The sequence is generated from a primitive polynomial over finite field applying trace function and möbius function. This paper further presents some important properties such as period, autocorrelation and cross-correlation of the generated sequence. The(More)
  • Fatema Akhter
  • 2015 International Conference on Computer and…
  • 2015
This paper proposes a new Elliptic Curve Cryptography (ECC) scheme and a data mapping technique on elliptic curve over a finite field using maximum length random sequence generation. While its implementation, this paper also proposes a new algorithm of scalar multiplication for ECC. The proposed scheme is tested on various bits length of prime field and the(More)
Pseudo random sequences play an important role in cryptography and network security system. This paper proposes a new approach for generation of pseudo random sequence over odd characteristic field. The sequence is generated by applying a primitive polynomial over odd characteristic field, trace function and möbius function. Then, some important(More)
The rapid advancement of technology has changed the way of our living. Sharing information becomes inevitable in everyday life. However, it encounters many security issues when dealing with secret or private information. The transmission of such sophisticated information has become highly important and received much attention. Therefore, various techniques(More)
The pseudo random binary sequence plays an important role in cryptography and network security system. This paper proposes a new approach to pseudo random binary sequence over finite field and evaluates some important properties of the newly generated sequence. The sequence is generated by applying a primitive polynomial over finite field, trace function(More)
  • 1