Jyoti Prakash Singh

Learn More
Image encryption is a suitable method to protect image data. Image and text data has their unique features. The available encryption algorithms are good for text data. They may not be suitable for multimedia data. In fact the pixels of natural images are highly correlated to their neighboring pixels. Due to this strong correlation any pixel can be(More)
As models of immune system dynamics are developed, it is important to validate them with specific experimental data in order to understand their shortcomings and guide them toward becoming predictive. In this paper, we examine whether a particular mathematical model of germinal center dynamics, proposed by Oprea and Perelson, can reproduce experimental data(More)
Ad-hoc network consists of a set of identical nodes that move freely and independently and communicate via wireless links. The most interesting feature of this network is that it does not require any predefined infrastructure or central administration and hence it is very suitable for establishing temporary communication links in emergency situations. This(More)
Ad hoc network consists of a set of identical nodes that move freely and independently and communicate among themselves via wireless links. The most interesting feature of this network is that they do not require any existing infrastructure of central administration and hence is very suitable for temporary communication links in an emergency situation. This(More)
Visual cryptography scheme is a cryptographic technique which allows visual information to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. In this article, we propose a novel scheme for copyright protection for digital images based on visual cryptography. The proposed method employs(More)
Ad hoc network consists of a set of identical nodes that move freely and independently and communicate among themselves via wireless links. The most interesting feature of this network is that they do not require any existing infrastructure of central administration and hence it is very suitable for temporary communication links in an emergency situation.(More)