Sonali Patil

Learn More
BACKGROUND Dendritic cells are antigen-presenting cells that play an essential role in linking the innate and adaptive immune systems. Much research has focused on the signaling pathways triggered upon infection of dendritic cells by various pathogens. The high level of activity in the field makes it desirable to have a pathway-based resource to access the(More)
BACKGROUND Cellular processes depend on the function of intracellular molecular networks. The curation of the literature relevant to specific biological pathways is important for many theoretical and experimental research teams and communities. No current tool supports web publication or hosting of user-developed large scale annotated pathway diagrams.(More)
Secret Sharing Schemes (SSS) refers to method for distributing a secret amongst a group of participants, each of whom is allocated a share of the secret. The secret can be reconstructed only when a sufficient number of shares are combined together; individual shares are of no use on their own. Secret sharing has been an active research field for many years(More)
A 2-out-of-2 audio cr yptogr aphy is a secret shar ing scheme that can be used to hide a digital message into 2 sounds and human ear s can perceive the message by playing these 2 sounds simultaneously. In this paper a new (2, 2) Audio Cr yptogr aphy Scheme is proposed. The proposed scheme hides a digital secret message into two specified cadence. The or(More)
Visual cryptography is a secret sharing scheme where a secret image gets divided into number of pieces called shares and not a single share disclose any information about secret image. There are some automated methods to identify and verify the user based on the physiological characteristics. To deal with such methods, there is a technology called(More)
  • Sonali Patil, Sandip Sathe, Pravin Mehetre, Deepak Shinde, Kiran Bhalerao, Pawankumar Pandey +1 other
  • 2013
Visual Cryptography is a technique in which a secret is encrypted into several image shares and then decrypted later using a human visual system to stack all the share images. Conventional visual cryptography methods divide a secret image into n shares (shadows) and distribute these shares to n participants. But in network while transmission the shadows can(More)
Threshold schemes are ideally suited to situations where a group of mutually suspicious individuals with conflicting interests must cooperate. The schemes allow a user to divide portions of a secret among a participants group. Any t or more participants from a participants group of n members can cooperate to regain the original secret while (t-1) or fewer(More)