Jyoti Prakash Singh

Learn More
Ad hoc network consists of a set of identical nodes that move freely and independently and communicate among themselves via wireless links. The most interesting feature of this network is that they do not require any existing infrastructure of central administration and hence it is very suitable for temporary communication links in an emergency situation.(More)
Ad-hoc network consists of a set of identical nodes that move freely and independently and communicate via wireless links. The most interesting feature of this network is that it does not require any predefined infrastructure or central administration and hence it is very suitable for establishing temporary communication links in emergency situations. This(More)
Ad hoc network consists of a set of identical nodes that move freely and independently and communicate among themselves via wireless links. The most interesting feature of this network is that they do not require any existing infrastructure of central administration and hence is very suitable for temporary communication links in an emergency situation. This(More)
Ad hoc network consists of a set of identical nodes that move freely and independently and communicate among themselves via wireless links. The most interesting feature of this network is that they do not require any existing infrastructure of central administration and hence is very suitable for temporary communication links in an emergency situation. This(More)
In this paper, we propose a novel and simple (2, n) secret sharing scheme with precise reconstruction for grayscale, binary and color image. The share construction phase is based on pixel division and XOR operation. The reconstruction is based on XOR and OR operation. The proposed scheme has no pixel expansion and can reconstruct the secret image precisely.(More)
This paper presents an image secret sharing method based on some random matrices that acts as a key for secret sharing. The technique allows a secret image to be divided into four image shares with each share individually looks meaningless. To reconstruct the secret image all four shares have to be used. Any subset m (1< m ≤ 4) shares cannot get sufficient(More)
Time division multiple access (TDMA) and frequency division multiple access (FDMA) are two popular multiple access technique that used in several wireless sensor networks. Bothe TDMA and FDMA have their own advantages and disadvantages. In this article, we have tried to use these two together for reducing the interference of inter-cluster and intra-cluster(More)