R. K. Vignesh

Learn More
In this paper, we present a novel method for adaptive fusion of multimodal surveillance images, based on Non-Subsampled Contourlet Transform (NSCT), which has an improved performance over Visual Sensor Networks (VSN). In sensor networks, energy consumption and bandwidth are the main factors that determine the lifetime of the sensors. In order to reduce the(More)
Image encryption needs to be secure by resisting statistical attacks and other types of attacks. In this paper, we propose an algorithm, which applies nonlinear s-box byte substitution. Then, it performs a shuffling operation partially dependent on the input data and uses the given key. The proposed algorithm was implemented and tested with different data,(More)
The encryption standards such as DES (Data Encryption Standard), AES(Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel' [10]. Network security threat is an onerous issue that has captured lot of attention in recent times. Data transmissions between computers in(More)
Due to the increasing dependency on networked computer system, it is important to make a network reliable and dependent. This is even more relevant as new threats of attack are constantly being revealed, compromising the security of systems. This paper addresses this problem by presenting an attack injection methodology for the automatic discovery of(More)
Is the newly born quantum cryptography the ultimate solution for information security? A technique needs to be both theoretically strong and practically viable. But quantum cryptography comes to naught in the latter. We present here some of the quantum‟s theoretical weaknesses like lack of digital signatures (or any algorithm) along with its many real time(More)
An autonomous mobile robot system that can navigate from a given start point to an end point has been developed. It carves out a path and builds a two dimensional grid based map using the combination of wavefront algorithm and A∗ search algorithm for a given state of the environment. The robot can detect obstacles on its path and change its course to(More)
  • 1