446 results on '"Amirtharajan Rengarajan"'
Search Results
102. Chaos and DNA Blended Hybrid Encryption Algorithm for Secure Image Transmission over DCT Pre-coded OFDM
- Author
-
Ravichandran, Dhivya, primary, Padmaa, M., additional, Rajagopal, N., additional, Thanikaiselvan, V., additional, and Amirtharajan, Rengarajan, additional
- Published
- 2022
- Full Text
- View/download PDF
103. Diagnosis of breast cancer for modern mammography using artificial intelligence
- Author
-
Karthiga, R., primary, Narasimhan, K., additional, and Amirtharajan, Rengarajan, additional
- Published
- 2022
- Full Text
- View/download PDF
104. Beat Frequency Detection on Boolean Chaotic Oscillator for True Random Number Generation on FPGA
- Author
-
R. Sivaraman, N. Adithya, Siva Janakiraman, and Amirtharajan Rengarajan
- Published
- 2022
- Full Text
- View/download PDF
105. LAPE2D: Lightweight Authentication Protocol to Secure End and Edge Devices in Iot Framework.
- Author
-
Ramya, S., Doraipndian, Manivannan, and Amirtharajan, Rengarajan
- Subjects
INTERNET of things ,PUBLIC key cryptography ,QUANTUM cryptography ,CRYPTOGRAPHY - Abstract
The Internet of Things (IoT) is omnipresent in every industry and has extended its footprint in various domains. This IoT device augmentation in today's smart world demands lightweight and secure authentication mechanisms for resource-constrained types of devices. This work proposed new authentication and key management schemes to equip these devices by leveraging lightweight cryptographic mechanisms. The proposed approach utilized various multi-device authentication scenarios such as end node to (edge) gateway, Gateway to Gateway and Node to Node through the gateway. In an IoT ecosystem, two end nodes have the same session key, which may be used for more secure communication. The robustness of the proposed mechanism is instantiated with the message exchange process of various scenarios and thorough cryptanalysis of the most common network intrusion attacks. Also, this proposed methodology provides more efficiency than existing works concerning communication overhead and computing complexity. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
106. An intelligent chaotic embedding approach to enhance stego-image quality
- Author
-
Amirtharajan, Rengarajan and Balaguru Rayappan, John Bosco
- Published
- 2012
- Full Text
- View/download PDF
107. Phase for Face saving-a multicarrier Stego
- Author
-
Praveenkumar, Padmapriya, Amirtharajan, Rengarajan, Thenmozhi, K., and Rayappan, John Bosco Balaguru
- Published
- 2012
- Full Text
- View/download PDF
108. Horse Riding & Hiding in Image for Data Guarding
- Author
-
V, Thanikaiselvan, P, Arulmozhivarman, Amirtharajan, Rengarajan, and Rayappan, John Bosco Balaguru
- Published
- 2012
- Full Text
- View/download PDF
109. Two-tier search space optimisation technique for tuning of explicit plant-model mismatch in model predictive controller for industrial cement kiln process
- Author
-
Ramasamy, Valarmathi, primary, Kannan, Ramkumar, additional, Muralidharan, Guruprasath, additional, Sidharthan, Rakesh Kumar, additional, and Amirtharajan, Rengarajan, additional
- Published
- 2022
- Full Text
- View/download PDF
110. Development of low-profile spectral signature chipless flexible RFID prototype for 5G supply chain IoT applications
- Author
-
Ramya Vijay, Vijay Ramasamy, Monisha Selvaraj, Rajesh Anbazhagan, and Amirtharajan Rengarajan
- Subjects
Fluid Flow and Transfer Processes ,Biomaterials ,Computer Networks and Communications ,Hardware and Architecture ,Mechanical Engineering ,Metals and Alloys ,Civil and Structural Engineering ,Electronic, Optical and Magnetic Materials - Published
- 2022
- Full Text
- View/download PDF
111. Tracking of Health Care Waste using Global Positioning System during COVID'19
- Author
-
Chapala, Sai praneeth, primary, Sreya, Kolachalama Venkata Naga, additional, J, Avila, additional, K, Thenmozhi, additional, Amirtharajan, Rengarajan, additional, and Praveenkumar, Padmapriya, additional
- Published
- 2022
- Full Text
- View/download PDF
112. Watchful System to keep track of Hazardous waste during COVID'19 epidemic
- Author
-
Karunakaran, Aravind, primary, Amirtharajan, Rengarajan, additional, and Praveenkumar, Padmapriya, additional
- Published
- 2022
- Full Text
- View/download PDF
113. An Alert system to maintain social distancing while collecting waste from quarantined zones - COVID'19
- Author
-
Pratheek, Jayam Naga Sai, primary, Nithesh, Talari, additional, Amirtharajan, Rengarajan, additional, and Praveenkumar, Padmapriya, additional
- Published
- 2022
- Full Text
- View/download PDF
114. Smart BIN for a Smarter city: Monitoring and Alerting for a Clean Environment
- Author
-
Sreya, Kolachalama Venkata Naga, primary, Amirtharajan, Rengarajan, additional, and Praveenkumar, Padmapriya, additional
- Published
- 2022
- Full Text
- View/download PDF
115. Prediction of waste generation through Regression Analysis Procedure
- Author
-
B, Gayathri, primary, Amirtharajan, Rengarajan, additional, K, Thenmozhi, additional, and Praveenkumar, Padmapriya, additional
- Published
- 2022
- Full Text
- View/download PDF
116. Integration of genetic algorithm tuned adaptive fading memory Kalman filter with model predictive controller for active fault-tolerant control of cement kiln under sensor faults with inaccurate noise covariance
- Author
-
Veerasamy, Gomathi, primary, Kannan, Ramkumar, additional, Siddharthan, RakeshKumar, additional, Muralidharan, Guruprasath, additional, Sivanandam, Venkatesh, additional, and Amirtharajan, Rengarajan, additional
- Published
- 2022
- Full Text
- View/download PDF
117. Metastability-Induced TRNG Architecture on FPGA
- Author
-
Moorthi Paramasivam Vijaya Annamalai, Amirtharajan Rengarajan, Sivaraman R, Sundararaman Rajagopalan, A. Sridevi, and John Bosco Balaguru Rayappan
- Subjects
Key generation ,Cryptographic primitive ,Computer Networks and Communications ,Random number generation ,business.industry ,Computer science ,Energy Engineering and Power Technology ,Hamming distance ,Cryptography ,Embedded system ,Signal Processing ,NIST ,Computer Vision and Pattern Recognition ,Electrical and Electronic Engineering ,business ,Field-programmable gate array ,Randomness - Abstract
Due to the emerging high-speed digital infrastructure, the protection of data being shared throughout the open networks has been a challenging task. By large, the dependency on cryptographic primitives exists to encounter cyberspace challenges. Key generation is a core process of any cryptographic application which improvises the strength of the algorithm. Reconfigurable hardware-assisted true random number generators (TRNGs) play a crucial role in key generation to provide high-speed cryptographic solutions. In this work, metastability-influenced TRNG architecture on Altera Cyclone II EP2C20F484C7 FPGA has been proposed. The 256 units of SR latches with de-synchronisation technique were the prime source used to harvest the true randomness. TRNG design consumed 1851 logic elements with a dynamic power dissipation of 4.41 mW. Proposed architecture achieves a high throughput of 26.64065 Mbps using 27 MHz onboard sampling clock. This TRNG has been validated through entropy, correlation, NIST SP 800-22 batteries of test, linear complexity test, restart experiment and hamming distance analysis.
- Published
- 2019
- Full Text
- View/download PDF
118. Design and Development of Pipelined Computational Unit for High-Speed Processors
- Author
-
Amirtharajan Rengarajan, Siva Janakiraman, N. Adithya, Sivaraman R, and Kuchi Yashwanth
- Subjects
Functional verification ,business.industry ,Computer science ,Pipeline (computing) ,Process (computing) ,Field (computer science) ,law.invention ,Microprocessor ,Parallel processing (DSP implementation) ,law ,Embedded system ,Verilog ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,business ,Field-programmable gate array ,computer ,computer.programming_language - Abstract
Microprocessors are regarded as the “heart” of an operating system. Arithmetic and Logical Unit (ALU) plays a crucial role in microprocessors, taking care of all critical tasks. Thus, considering the varied applications of the microprocessor, the security of the data and the operations performed by the microprocessor is critical. Field Programmable Gate Array (FPGA) stands in its outstanding capability due to its field re-programmability unlike the semi-custom and full-custom designs. It has also has the capabilities of parallel processing, and its ability to process data high speeds due to its high clocking frequencies. Thus, FPGA can be a fruitful prototyping agent for Microprocessors. In this work, a lightweight pipelined computational unit (ALU), an important part of the microprocessor, has been realised on Intel Cyclone V FPGA using Verilog HDL. The lightweight computational unit also includes an optional lightweight S-Box that can provide adequate non-linearity and security to the data. Also, a custom testbench has been designed for functional verification. The optimised design occupies 515 logic elements and dissipates 199.75 mW of power when including the memory. Further, it takes four clocks as an accumulation period to initialise the pipeline and produces the computational results for every subsequent instruction at the same clock instant.
- Published
- 2021
- Full Text
- View/download PDF
119. Design and Implementation of Chao-Cryptic Architecture on FPGA for Secure Audio Communication
- Author
-
Sivaraman R, V. M. Padmapriya, B. Sowmya, Amirtharajan Rengarajan, Sundararaman Rajagopalan, and Har Narayan Upadhyay
- Subjects
Audio signal ,Computer engineering ,business.industry ,Computer science ,Chaotic ,Throughput ,Cryptography ,Lorenz system ,Encryption ,business ,Field-programmable gate array ,Secure channel - Abstract
The emerging growth in communication arena firmly demands a secure channel and needless to mention that security and privacy of the user are the top priorities in audio communication. To transmit audio signals safely, cryptography is being adopted widely. Chaos-based cryptography is one of the effective strategies that attract researchers to develop more techniques. Characteristics of chaotic systems such as ergodicity and stochasticity are the main motivators for using them in encryption schemes. This work presents an field programmable gate array (FPGA) governed chaotic audio encryption scheme based on Lorenz attractor. This scheme of encryption undergoes two consecutive steps of operations, namely confusion by linear feedback shift register (LFSR) and diffusion through the random numbers generated in X, Y, and Z planes of the chaotic attractor. A study has also been carried out to analyze the best diffusion from the obtained results. Evaluation of the proposed scheme includes entropy, correlation, histogram, PSNR, and MSE. Further, NIST SP 800-22 batteries of test have been performed to ensure that the encrypted audio data possesses more randomness. Moreover, this work consumed 15,422 logic elements and 14.22 mW of dynamic power to accomplish the design. Noticeably, the proposed work has achieved 10.346 Mbps as a throughput to encrypt 216 × 16 bit samples of audio data.
- Published
- 2021
- Full Text
- View/download PDF
120. Chaos Blend LFSR—Duo Approach on FPGA for Medical Image Security
- Author
-
Amirtharajan Rengarajan, Sivaraman R, Sundararaman Rajagopalan, Hemanth Kumar Nalajala, N. Adithya, and A. Sridevi
- Subjects
Functional verification ,Secure communication ,business.industry ,Computer science ,Electronic design automation ,Cryptography ,Field-programmable gate array ,business ,Encryption ,Computer hardware ,ModelSim ,Scrambling - Abstract
In recent years, encryption of medical images has been given much importance and several cryptographic algorithms and principles have been made and designed for secure communication. One such approach has been proposed in this work using pixel scrambling and diffusion techniques governed through linear feedback shift register (LFSR) and modified logistic map (MLM). The main advantage of this work is its concurrent encryption through which the scrambling and diffusion have been performed on the fly without any additional delays. The proposed design has been implemented on Intel Cyclone IV E FPGA using Quartus II Electronic Design Automation (EDA) tool. Further, the functional verification of LFSR and MLM has been carried out through ModelSim simulation. The design occupies 3580 logic elements and 135 logic registers to encrypt 256 × 256 × 16 bits of DICOM image at 216 mS when it was operated with 50 MHz frequency. Also, this work achieves near-zero correlation, and the statistical properties of the encryption have been tested through standard metrics.
- Published
- 2021
- Full Text
- View/download PDF
121. A Dual 32 Nibble Specific Cipher Model for RGB Images Using Lorenz Attractor
- Author
-
Amirtharajan Rengarajan, T. Avinash, and Nithya Chidambaram
- Subjects
Computational complexity theory ,Cipher ,Computer engineering ,Computer science ,Color image ,business.industry ,Digital data ,RGB color model ,Lorenz system ,Nibble ,Encryption ,business - Abstract
In the modern age, where the digital communication systems play a vital part in our day-to-day activities the amount of digital data generated has increased exponentially. Limited security and bandwidth are the major constraints that have to be faced. One of the most excessively used multimedia data are images. A lot of studies indicate that the confidentiality and authenticity of the data are vulnerable from attacks no matter the level or method proposed to secure the data. In this paper, an algorithm is proposed to encrypt color image where Lorenz attractor is used to generate keys that are used in the process of image encryption. The proposed solution is focused of reducing the computational complexity by reducing the encryption process to most significant nibble plane of the image.
- Published
- 2021
- Full Text
- View/download PDF
122. Optimal concurrency on FPGA for lightweight medical image encryption
- Author
-
Raj, Vinoth, primary, Janakiraman, Siva, additional, and Amirtharajan, Rengarajan, additional
- Published
- 2021
- Full Text
- View/download PDF
123. Medical Image Encryption
- Author
-
Amirtharajan Rengarajan, Sundararaman Rajagopalan, and Siva Janakiraman
- Subjects
Microcontroller ,business.industry ,Computer science ,Perspective (graphical) ,020208 electrical & electronic engineering ,0202 electrical engineering, electronic engineering, information engineering ,020206 networking & telecommunications ,02 engineering and technology ,Encryption ,business ,Field-programmable gate array ,Computer hardware ,Image (mathematics) - Abstract
The healthcare industry has been facing a lot of challenges in securing electronic health records (EHR). Medical images have found a noteworthy position for diagnosis leading to therapeutic requirements. Millions of medical images of various modalities are generally safeguarded through software-based encryption. DICOM format is a widely used medical image type. In this chapter, DICOM image encryption implemented on cyclone FPGA and ARM microcontroller platforms is discussed. The methodology includes logistic map, DNA coding, and LFSR towards a balanced confusion – diffusion processes for encrypting 8-bit depth 256 × 256 resolution of DICOM images. For FPGA realization of this algorithm, the concurrency feature has been utilized by simultaneous processing of 128 × 128 pixel blocks which yielded a throughput of 79.4375 Mbps. Noticeably, the ARM controller which replicated this approach through sequential embedded “C” code took 1248 bytes in flash code memory and Cyclone IV FPGA consumed 21,870 logic elements for implementing the proposed encryption scheme with 50 MHz operating clock.
- Published
- 2020
- Full Text
- View/download PDF
124. A Crypto Model for Confuse-Cum-Diffuse RGB Images: A Near Zero Correlation Approach
- Author
-
Amirtharajan Rengarajan, R. Ashwin Kumar, Nithya Chidambaram, and T. Avinash
- Subjects
Pixel ,business.industry ,Color image ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Image sharing ,Encryption ,Image (mathematics) ,RGB color model ,Computer vision ,Artificial intelligence ,Confusion and diffusion ,Logistic map ,business - Abstract
Image sharing has been quite common in recent days. With advancements in image sharing technology, the vulnerabilities of a cyber attack on these have also increased. Thus an effective method for encrypting these images is required. This paper proposes an Image Encryption algorithm for a color image using the Logistic Map. The correlation between the adjacent pixels is the major concern in image encryption. In this algorithm, the encryption is done using both confusion and diffusion. Statistical analysis and qualitative analysis are used for showing the feasibility and effectiveness of the algorithm.
- Published
- 2020
- Full Text
- View/download PDF
125. Robust Image Encryption in Transform Domain Using Duo Chaotic Maps—A Secure Communication
- Author
-
Lankipalli Nithya, Y. Leela Soundarya, M. S. Sucharita, R. Dhivya, Amirtharajan Rengarajan, and S. Aashiq Banu
- Subjects
Digital image ,Keyspace ,Wavelet ,Secure communication ,Robustness (computer science) ,Computer science ,business.industry ,Confusion and diffusion ,business ,Encryption ,Grayscale ,Algorithm - Abstract
The increase of cyberattacks in the field of information security leads to high attention in the digitalized environment. There is a demand for well-organised methods to transmit data securely over the Internet. In the proposed algorithm, a greyscale image is secured by an encryption technique by two stages, i.e. confusion and diffusion. Digital images can be expressed in terms of numeric values called pixels. The images are converted by the integer wavelet transform-domain technique, where the images are separated by approximation and detailed sub-bands. The proposed encryption algorithm is implemented for the approximated sub-bands which contain significant information of the digital image. 1D logistic and 2D tent maps generate chaotic random keys. By various statistical and differential analyses, the robustness of the proposed algorithm is examined by achieving a maximum entropy of 7.997, near-zero correlation and larger keyspace of 1080. With the results, it has confirmed that the enhanced chaos-based Integer Wavelet Transform (IWT) encryption has succeeded to resist any cyberattacks.
- Published
- 2020
- Full Text
- View/download PDF
126. Reversible data hiding in an encrypted image using the homomorphic property of elliptic curve cryptography
- Author
-
Anushiadevi, R., primary and Amirtharajan, Rengarajan, additional
- Published
- 2021
- Full Text
- View/download PDF
127. Neural-assisted image-dependent encryption scheme for medical image cloud storage
- Author
-
Lakshmi, C., primary, Thenmozhi, K., additional, Rayappan, John Bosco Balaguru, additional, Rajagopalan, Sundararaman, additional, Amirtharajan, Rengarajan, additional, and Chidambaram, Nithya, additional
- Published
- 2020
- Full Text
- View/download PDF
128. Genetic and chaotic signatures in offspring – an encrypted generation of image family
- Author
-
Lakshmi, C., primary, Thenmozhi, K., additional, Rayappan, John Bosco Balaguru, additional, and Amirtharajan, Rengarajan, additional
- Published
- 2020
- Full Text
- View/download PDF
129. Reversible data hiding method based on pixel expansion and homomorphic encryption
- Author
-
Anushiadevi, R., primary, Praveenkumar, Padmapriya, additional, Rayappan, John Bosco Balaguru, additional, and Amirtharajan, Rengarajan, additional
- Published
- 2020
- Full Text
- View/download PDF
130. Ring oscillator as confusion – diffusion agent: a complete TRNG drove image security
- Author
-
Sivaraman, Rethinam, primary, Rajagopalan, Sundararaman, additional, Rayappan, John Bosco Balaguru, additional, and Amirtharajan, Rengarajan, additional
- Published
- 2020
- Full Text
- View/download PDF
131. Advanced framework for highly secure and cloud‐based storage of colour images
- Author
-
Chidambaram, Nithya, primary, Raj, Pethuru, additional, Thenmozhi, Karruppuswamy, additional, and Amirtharajan, Rengarajan, additional
- Published
- 2020
- Full Text
- View/download PDF
132. Predictive Controller Design for a Cement Ball Mill Grinding Process under Larger Heterogeneities in Clinker Using State-Space Models
- Author
-
Venkatesh, Sivanandam, primary, Ramkumar, Kannan, additional, and Amirtharajan, Rengarajan, additional
- Published
- 2020
- Full Text
- View/download PDF
133. A high payload separable reversible data hiding in cipher image with good decipher image quality
- Author
-
Anushiadevi, R., primary, Pravinkumar, Padmapriya, additional, Rayappan, John Bosco Balaguru, additional, and Amirtharajan, Rengarajan, additional
- Published
- 2020
- Full Text
- View/download PDF
134. Chaos triggered image encryption - a reconfigurable security solution
- Author
-
John Bosco Balaguru Rayappan, Arun Adhithiya Annadurai, Dhivya Ravichandran, Balakrishnan Ramalingam, and Amirtharajan Rengarajan
- Subjects
Security solution ,Computer Networks and Communications ,Computer science ,business.industry ,Distributed computing ,Key space ,Chaotic ,020207 software engineering ,02 engineering and technology ,Encryption ,Computer Science::Hardware Architecture ,Hardware and Architecture ,Robustness (computer science) ,Computer Science::Multimedia ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,020201 artificial intelligence & image processing ,business ,Field-programmable gate array ,Software ,Computer hardware ,Computer Science::Cryptography and Security - Abstract
Recently, diverse types of chaotic image encryption algorithms have been explored to meet the high demands in realizing secured real time image sharing applications. In this context, to achieve high sensitivity and superior key space, a multiple chaotic map based image encryption algorithm has been proposed. The proposed algorithm employs three-stage permutation and diffusion to withstand several attacks and the same is modelled in reconfigurable platform namely Field Programmable Gate Array (FPGA). The comprehensive analysis is done with various parameters to exhibit the robustness of the proposed algorithm and its ability to withstand brute-force, differential and statistical attacks. The synthesized result demonstrates that the reconfigurable hardware architecture takes approximately 0.098 ms for encrypting an image of size 256 × 256. Further the resource utilization and timing analyzer results are reported.
- Published
- 2017
- Full Text
- View/download PDF
135. Hybrid image crypto system for secure image communication– A VLSI approach
- Author
-
John Bosco Balaguru Rayappan, Balakrishnan Ramalingam, and Amirtharajan Rengarajan
- Subjects
Very-large-scale integration ,Hybrid image ,Theoretical computer science ,Computer Networks and Communications ,business.industry ,Computer science ,Chaotic ,020206 networking & telecommunications ,02 engineering and technology ,Encryption ,Multiple encryption ,Artificial Intelligence ,Hardware and Architecture ,Robustness (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Field-programmable gate array ,Algorithm ,Software ,Computer Science::Cryptography and Security - Abstract
This work presents permutation and diffusion based hybrid image crypto system in transform domain using combined chaotic maps and Haar Integer Wavelet Transform (HIWT). HIWT is used to transform the plain image and four sub-bands of the image coefficients are encrypted by combined chaotic maps. The combination of two one-dimensional chaotic maps results in better chaotic behavior and generates unpredictable large random sequence that can be used for the encryption of the image. To manage the trade-offs between security, speed and power consumption, the proposed encryption algorithm is modeled in Cyclone II Field Programmable Gate Array (FPGA). The proposed design occupies only 4025 logical elements and takes 0.28 ms for encrypting an image of size 256 × 256. Robustness of the algorithm is estimated using quality metrics including statistical and differential attack analysis. The proposed scheme is resistant to most of the known attacks and is more secure than other image encryption schemes.
- Published
- 2017
- Full Text
- View/download PDF
136. Grey-Level Text Encryption Using Chaotic Maps and Arnold Transform
- Author
-
Sridevi Arumugham, Nishi Prasad, Amirtharajan Rengarajan, Vasudharini Moranam Ravi, Sivaraman Rethinam, and C. Lakshmi
- Subjects
Computer science ,business.industry ,Chaotic ,Encryption ,computer.software_genre ,Histogram ,Entropy (information theory) ,Communication source ,Chosen-plaintext attack ,Data mining ,Arnold transform ,business ,computer ,Bit plane - Abstract
Data in today’s world is ubiquitous and often regarded more valuable than the paper currency itself. More often than not, sensitive data needs to be transmitted from a sender to a receiver in an encrypted format. This paper proposes a novel secret message transmission method through image encryption. The proposed system highlights four techniques; Bit Plane Splicing (BPS), Arnold Transform, a combination of logistic and tent maps. The original text is obtained after decryption, reinforcing its efficiency, security and reliability of this scheme. The security of this scheme has been rigorously analysed through image metrics like Correlation, Entropy, NPCR and UACI, histogram deviation and are tabulated for reference. The results show good security performance against threats. Chosen plaintext attack has been carried out, on two sets of different plain texts, and the results obtained have been favourable.
- Published
- 2020
- Full Text
- View/download PDF
137. Pyramid Entropy Source for True Random Number Generator on FPGA
- Author
-
C. Lakshmi, Sridevi Arumugham, Amirtharajan Rengarajan, Sundararaman Rajagopalan, Siva Janakiraman, and Sivaraman Rethinam
- Subjects
Cryptographic primitive ,Symmetric-key algorithm ,Random number generation ,Computer science ,business.industry ,Principle of maximum entropy ,Entropy (information theory) ,business ,Algorithm ,Randomness ,Shift register ,Cryptographic nonce - Abstract
True random number generator (TRNG) is a crucial part of any modern cryptographic primitives. Designing high entropy TRNG is still a challenging task to compete. Usually, TRNGs use physical mean as random source to generate random numbers which are unpredictable. TRNG has different application but not limited to symmetric key cryptography, random simulation, nonce, user authentication protocols, and gaming. In this work, ring oscillator (RO)-based pyramid entropy source is proposed for generating device-independent true random numbers. The de-synchronization technique has been utilized for extracting the randomness from entropy source wherein linear-feedback shift register (LFSR) is used as post-processor to improve the statistical characteristics of proposed TRNG. The design of TRNG has been implemented on Altera Cyclone II EP2C20F484C6 FPGA which consumed 892 logic elements (5%), 67.75 mW power to generate 131,072 true random bits. It yields maximum entropy of 0.999987 through entropy analysis. Statistical properties of the proposed TRNG have been evaluated using NIST tests. Restart experiment is also conducted to evidence the true randomness of the proposed TRNG.
- Published
- 2020
- Full Text
- View/download PDF
138. Synthetic Image and Strange Attractor: Two Folded Encryption Approach for Secure Image Communication
- Author
-
Sridevi Arumugham, Sivaraman Rethinam, Siva Janakiraman, C. Lakshmi, Sundararaman Rajagopalan, and Amirtharajan Rengarajan
- Subjects
Computer science ,business.industry ,Computer Science::Computer Vision and Pattern Recognition ,Histogram ,Attractor ,Chaotic ,Entropy (information theory) ,Confusion and diffusion ,Field-programmable gate array ,Encryption ,business ,Grayscale ,Algorithm - Abstract
Chaotic attractors are used in variety of applications especially in image encryption due to their sensitivity, confusion and diffusion properties. Such attractors are continuous form of chaos which can be described using differential equations. In this work, an image encryption technique employing Chen attractor and FPGA generated synthetic image has been discussed. Altera Cyclone II FPGA was used to generate synthetic image that consumed 438 logic elements and 34.03 mW of power consumption. The simulation was carried out on LabVIEW platform. The performance of the algorithm was evaluated through statistical (Entropy, Histogram, Correlation) and differential analyses (NPCR and UACI) for grayscale images of various sizes 128 × 128, 256 × 256 and 512 × 512 which yielded good figures.
- Published
- 2020
- Full Text
- View/download PDF
139. Implementation of Image Encryption based on Chaos-IWT– An Image security
- Author
-
Amirtharajan Rengarajan, Harini M, R. Dhivya, Noorul Nilofer A, and Aashiq Banu S
- Subjects
Pixel ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Chaotic ,020206 networking & telecommunications ,Cryptography ,02 engineering and technology ,Encryption ,Digital image ,0202 electrical engineering, electronic engineering, information engineering ,Entropy (information theory) ,020201 artificial intelligence & image processing ,Computer vision ,Confusion and diffusion ,Artificial intelligence ,Logistic map ,business - Abstract
Nowadays, digital image communication through internet has become essential in public network as images can give a clear vision than describing something through text. Data such as medical images, military images, etc. which are highly prone to intruders are mandatory to be maintained confidential to transmit and receive data safely without being intruded by unauthorised persons. This technique can be provided by encrypting these digital images through cryptographic techniques. The proposed image encryption is performed in the transform domain, where Integer Wavelet Transform is adopted to separate the image into approximation coefficients and detailed coefficients. In IWT, most of the significant pixels are in the low-frequency band where confusion and diffusion is performed with chaotic logistic keys. The experimental results achieved entropy of 7.97 and near-zero correlation to verify it is able to resist any statistical attacks.
- Published
- 2020
- Full Text
- View/download PDF
140. Transform Domain Influenced Variable Bit - Variable Pixel Medical Image Watermarking Scheme
- Author
-
Sivaraman R, Sundararaman Rajagopalan, Amirtharajan Rengarajan, Sai Dileep Chowdary. N, and A. Sridevi
- Subjects
Pseudorandom number generator ,Pixel ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,020207 software engineering ,02 engineering and technology ,Peak signal-to-noise ratio ,DICOM ,Least significant bit ,Histogram ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Digital watermarking ,Algorithm ,Shift register - Abstract
Image watermarking plays an important role in the field of medical image security and also provides a safe pathway for transfer of medical information through public networks such as internet. In this work, variable pixel and variable bit -medical image watermarking scheme has been proposed to protect the Electronic Patient Record (EPR). The proposed algorithm uses a Linear Feedback Shift Registers (LFSR) to generate pseudo random sequences for randomly selecting the image pixels of 16 bit Digital Imaging and Communications in Medicine (DICOM) image and modified logistic map has been utilized for selecting the bits to achieve adaptive Least Significant Bit (LSB) embedding. Integer Wavelet Transform (IWT) has been applied on original image to decompose it to its sub – bands where EPR has been embedded. The algorithm comprises four phases namely, pixel separation, random pixel selection, variable bit selection and LSB embedding. Proposed watermarking scheme has been achieved a near zero Mean Square Error (MSE) and histogram analysis confirms the imperceptibility of the algorithm. The algorithm requires only 0.235542 S to perform LSB embedding on 512 × 512 DICOM images. Peak Signal to Noise Ratio (PSNR), Normalized Cross Correlation (NCC) and Structural Similarity Index (SSIM) analyses also have been performed to evaluate the efficiency of the watermarking scheme.
- Published
- 2020
- Full Text
- View/download PDF
141. LFSR-Keyed MUX for Random Number Generation in Nano Communication Using QCA
- Author
-
Amirtharajan Rengarajan, Padmapriya Praveenkumar, John Bosco Balaguru Rayappan, and R. Santhiya Devi
- Subjects
Nano communication ,Random number generation ,Computer science ,Hardware_PERFORMANCEANDRELIABILITY ,02 engineering and technology ,021001 nanoscience & nanotechnology ,Multiplexer ,020202 computer hardware & architecture ,Hardware_INTEGRATEDCIRCUITS ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,0210 nano-technology ,Linear feedback shift register ,Hardware_LOGICDESIGN - Abstract
Nano industries have been successful trendsetters for the past 30 years, in escalating the speed and dropping the power necessities of nanoelectronic devices. According to Moore's law and the assessment created by the international technology roadmap for semiconductors, beyond 2020, there will be considerable restrictions in manufacturing IC's based on CMOS technologies. As a result, the next prototype to get over these effects is quantum-dot cellular automata (QCA). In this chapter, an efficient quantum cellular automata (QCA) based random number generator (RNG) is proposed. QCA is an innovative technology in the nano regime which guarantees large device density, less power dissipation, and minimal size as compared to the various CMOS technologies. With the aim to maximise the randomness in the proposed nano communication, a linear feedback shift register (LFSR) keyed multiplexer with ring oscillators is developed. The developed RNG is simulated using a quantum cellular automata (QCA) simulator tool.
- Published
- 2020
- Full Text
- View/download PDF
142. Fridrich Structure Implementation on Gray Scale Images in an Embedded FPGA Platform
- Author
-
Sivaraman Rethinam, Sai Bhanuj, Amirtharajan Rengarajan, Mohan Sai, K. Thenmozhi, Anudeep Bdj, Vaishnavi Kumar, Padmapriya Praveenkumar, and R. Santhiya Devi
- Subjects
Digital image ,Security analysis ,Cipher ,Computer engineering ,Computer science ,business.industry ,Cryptosystem ,Confusion and diffusion ,Logistic map ,Encryption ,business ,Grayscale - Abstract
These days, a countless number of digital images are made in many fields, such as military, medicine, education, and personal affairs. As digital images usually contain secret or private data, image encryption has grown into a hot issue in theoretical study and in its practical presentation. In this paper an image encryption algorithm based on Logistic map will be used. Contrasting most of the existing image encryption algorithms, the proposed algorithm gives the original image as an integer pixel, and uses Logistic map for confusion and Galois field LFSR for diffusion. The consumption of logistic map and Galois field LFSR makes the proposed algorithm achieves not only a desirable level of security, but also high effectiveness, so the algorithm is suitable for practical application. Apart from this, the algorithm accepts a "confusion-diffusion-confusion" structure to yield good confusion and diffusion things which are the goods of the operation of a secure cipher. Simulation results and security analysis advice that the proposed algorithm has many desirable things of a perfect cryptosystem, thus it is very suitable for practical applications. The security analyses performed are Histogram analysis, Correlation analysis, Entropy analysis, Encryption Quality analysis, Differential analysis, Error metric analysis.
- Published
- 2020
- Full Text
- View/download PDF
143. Reversible Hiding with Quick Response Code - A Responsible Security
- Author
-
R. Santhiya Devi, Vaishnavi Kumar, Mohan Sai N, Amirtharajan Rengarajan, Sai Bhanuj T, Anudeep Bdj, Padmapriya Praveenkumar, and K. Thenmozhi
- Subjects
Pixel ,Computer science ,Payload (computing) ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,020206 networking & telecommunications ,020207 software engineering ,02 engineering and technology ,Peak signal-to-noise ratio ,Redundancy (information theory) ,Feature (computer vision) ,Information hiding ,Histogram ,0202 electrical engineering, electronic engineering, information engineering ,Code (cryptography) ,Algorithm - Abstract
In this paper, Reversible data hiding using difference statistics technique incorporating QR codes was proposed. Here, Quick Response (QR) codes were employed as an additional feature and were hidden in the corners of the original image to direct to the hyperlink after authentication and then embedding the secret data bits was carried out. At the receiver side, when the QR codes were scanned by the user, the link to the webpage was accessed, and then the original image and the secret data bits were recovered by using the proposed reversible data hiding scheme. In the proposed scheme, the pixels of the cover image were scanned in row-major order fashion, and the differences between the adjacent pixels were computed, keeping the first pixel unaltered to maintain the size of the host and the difference image same. Now, the histogram was shifted towards the right or left to reduce the redundancy and then to embed the secret data bits were done. Due to the similarity exists between the pixel values, the difference between the host and the secret image reconstructs the marked image. The proposed scheme was carried out using MATLAB 2013. PSNR (Peak Signal to Noise Ratio) and payload have been computed for various test images to validate the proposed scheme and found to be better than the available literature.
- Published
- 2020
- Full Text
- View/download PDF
144. IoT based Waste Management for Smart Cities
- Author
-
R. Santhiya Devi, Amirtharajan Rengarajan, Pathan Mahammed Abdul Azeez, Vaishnavi Kumar, Sai Sasank Peri, Padmakshi Venkateswara Rao, K. Thenmozhi, and Padmapriya Praveenkumar
- Subjects
education.field_of_study ,Waste management ,Computer science ,business.industry ,Maximum level ,Population ,Waste collection ,02 engineering and technology ,021001 nanoscience & nanotechnology ,Flooding (computer networking) ,Waste generation ,020401 chemical engineering ,The Internet ,0204 chemical engineering ,0210 nano-technology ,education ,business ,Internet of Things ,Garbage - Abstract
Our country is facing vast challenges in the environment due to waste generation some of them were: inadequate waste collection, transport, treatment, and disposal. One of the important challenges is from its inception till its disposal. Our country can’t cope with the current systems by an increasing urban population with the volumes of waste, and this result on the public and environmental health pollution. Unhygienic conditions are created due to the flooding of the dustbins each day. This paper is for the commenting of the challenges, barriers, and opportunities for the betterment of collection, and segregation in the field of waste management. When it senses the nearby trash the dustbin that function automatically, and it is built through a prototype. Dustbins are placed all over the city, and delivered with low cost embedded method to help in tracking of the garbage bins. The Blynk app indicates through SMS as soon as dustbin has reached its maximum level, to the unwanted management department. An immediate action would be taken by the alarmed authorities once the position of the bin is sent via the Internet. The proposed system is developed by using ultrasonic sensors, nodemcu, servo motor, Blynk app
- Published
- 2020
- Full Text
- View/download PDF
145. Intelligent Braking System
- Author
-
Vaishnavi Kumar, Varanasi Venkata, Naga Srivani, K. Thenmozhi, Padmapriya Praveenkumar, R. Vandana, Amirtharajan Rengarajan, and R. Santhiya Devi
- Subjects
010504 meteorology & atmospheric sciences ,Computer science ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,020206 networking & telecommunications ,02 engineering and technology ,Collision ,01 natural sciences ,people.cause_of_death ,Automotive engineering ,Microcontroller ,Reckless driving ,Arduino ,Limit (music) ,Braking system ,0202 electrical engineering, electronic engineering, information engineering ,State information ,people ,0105 earth and related environmental sciences - Abstract
In the present scenario, accidents are due to speeding, reckless driving, dogging etc. Many fatal car accidents have occurred due to the speeding of other vehicles. This paper focuses on preventing car collision using Intelligent Braking. The vehicle state information is being equipped with sensors to envisage the possibility of the accident and accordingly reduces the vehicle speed. This methodology reduces the speed of motors and vehicle when the distance is reduced than the safety limit, and these modules are interfaced through a microcontroller. This is in line with present technology in manufacturing smart cars and the desires of individuals who continuously needs to have a contented and secure ride in their vehicles. Moreover, this type of cars can be suitable and are much better into the intelligent highway.
- Published
- 2020
- Full Text
- View/download PDF
146. Chaotic Based Adaptive Inter Planar Confusion for Color Images
- Author
-
Ketineni Tejaswini, Keertipati Vishal Varma, Avija Sharan Reddy, Kona Sai Harshavardhan Reddy, Amirtharajan Rengarajan, and Nithya Chidambaram
- Subjects
Diffusion (acoustics) ,Computer science ,business.industry ,Chaotic ,Data security ,020207 software engineering ,Pattern recognition ,02 engineering and technology ,Tent map ,Encryption ,Classified information ,Image (mathematics) ,Transfer (computing) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,business - Abstract
Data security remains to be one of the most discussed issues in the modern, fast-paced technological ecosystem. This paves way to a lot of endangerment to the transfer of data over various channels, which can be considered reliable and confidential. Classified information cannot be compromised by transmitting it through common channels as they are prone to attack by certain groups, which might to lead to catastrophic circumstances. The most commonly transmitted type of data is in the form of images and classified images have to be transmitted in such a way that it is highly imperceptible. This paper discusses about an encryption algorithm which follows an unconventional method of encryption, followed by diffusion by Ex-OR addition. The confusion is carried out among different planes of the image and can be termed as inter-planar confusion. There are two different ways in which inter-planar confusion can be done and that depends on a chaotic tent map random number generator. The viability and the overall performance of the proposed algorithm is marked as a trade-off between various combinational metrics and good results shows the imperceptibility of the encrypted image
- Published
- 2020
- Full Text
- View/download PDF
147. IoT based Healthcare Monitoring and Intravenous Flow Control
- Author
-
K. Thenmozhi, Amirtharajan Rengarajan, Haripriya Seshadri, Padmapriya Praveenkumar, R. Santhiya Devi, Preethi S, Vaishnavi Kumar, and Akshaya A
- Subjects
Flow control (data) ,IV Infusion ,Computer science ,business.industry ,020208 electrical & electronic engineering ,Cyber-physical system ,020207 software engineering ,02 engineering and technology ,medicine.disease ,Pulse rate ,Health care ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,Systems architecture ,Medical emergency ,Internet of Things ,business - Abstract
Technology has revolutionized the field of medicine with the IOT automating the various features of healthcare. The objective here is to create a wireless system which enables real-time healthcare monitoring of patients with primary focus on Intra Venous (IV) fluid flow control and regulation. The system also records the pulse rate and constantly monitors the body temperature of the patient. In conventional methods, doctors or nurses need to be present physically to monitor a patient’s condition and also to stop the IV infusion to prevent the backflow of blood into the IV tubing. The current method intends to automatically stop the IV infusion once it is completed and notify the doctor and nurse about the same via an app which would also contain the patient’s primary details. This will reduce the need for constant human intervention for these purposes and hence, would avoid the risk of emergencies. In this project, a cyber-physical system architecture based on ontology will be designed and developed. Also, it will be capable of automatically monitoring the health conditions of the patient with lesser manpower in a secured manner.
- Published
- 2020
- Full Text
- View/download PDF
148. Automatic Waste Segregation and Management
- Author
-
Kishanth A, Ajay V P, Amirtharajan Rengarajan, Bradeep Kumar M, R. Santhiya Devi, Vaishnavi Kumar, K. Thenmozhi, and Padmapriya Praveenkumar
- Subjects
Work (electrical) ,Waste management ,Computer science ,Domestic waste ,Garbage disposal ,Industrial waste - Abstract
Garbage disposal has become a vast cause for concern in the world these days. Waste that is generated is disposed of by means which hurt the environment is a very big amount. Industrial and domestic waste are major sources of waste. Since people are not concentrating on the segregation waste into their basic streams is the cause for the unrecognition of the industrial waste, so the work is mainly concentrating on industrial waste. So, it is easy to use a solution for a segregation system through the smart dustbin which is also very cheap, at small and medium companies or industries which are sent directly for processing. The metallic and non-metallic waste is sorted through the design. The use of the microcontroller controls the circuit.
- Published
- 2020
- Full Text
- View/download PDF
149. Automatic Person Count Indication System using IoT in a Hotel Infrastructure
- Author
-
Vaishnavi Kumar, Tanveer Ahmad H, Madhu Riswanth K, Amirtharajan Rengarajan, K. Thenmozhi, R. Santhiya Devi, Vishwarup S, and Padmapriya Praveenkumar
- Subjects
business.industry ,Computer science ,010401 analytical chemistry ,Real-time computing ,020206 networking & telecommunications ,02 engineering and technology ,01 natural sciences ,0104 chemical sciences ,law.invention ,Power (physics) ,Microcontroller ,law ,Relay ,0202 electrical engineering, electronic engineering, information engineering ,Passive infrared sensor ,Internet of Things ,business ,Hotel management ,Power management system - Abstract
This paper aims to provide the most efficient and automatic Power Management System with no human intervention in hotels and lodges. A passive infrared (PIR) sensor is used to detect the presence of people in the room by receiving the infrared (IR) rays emitted from the human body. The PIR sensor is connected to the microcontroller to which the relay is also connected. When the presence/motion of people has detected the relay triggers and power supply to the room is switched ‘on’. And when any motion has not been detected for 5 minutes or more the main power supply to the room is switched ‘off’. This can prevent unwanted usage of power in hotels /lodges when no one is in the room. The hotel management can also remotely monitor the availability of people in the room by monitoring the output of the Sensors through IoT.
- Published
- 2020
- Full Text
- View/download PDF
150. Metastability Influenced PUF for Cryptographic Key Generation: A FPGA Approach
- Author
-
Poorna Sai Meka, Amirtharajan Rengarajan, Sivaraman R, and Sundararaman Rajagopalan
- Subjects
Key generation ,Computer science ,business.industry ,020208 electrical & electronic engineering ,Physical unclonable function ,02 engineering and technology ,Integrated circuit ,law.invention ,law ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,NIST ,Verilog ,020201 artificial intelligence & image processing ,Electronic design automation ,business ,Field-programmable gate array ,computer ,Randomness ,computer.programming_language - Abstract
This paper presents a true random key generation using Physically Unclonable Function (PUF). PUFs are considered as "physical fingerprint" of anys Integrated Circuit (IC) through which they can be differentiated from others. They offer a plenty of applications namely Hardware authentication, Identification, Anti – counterfeiting to safeguard the hardware as well as the sensitive data being processed or stored in the hardware. A deeper insight is required into the design and implementation of hardware efficient FPGA based PUF with a focus on low area overhead. In this work, PUF architecture for key generation on Intel Cyclone II FPGA using Verilog HDL and Quartus II 13.0 Electronic Design Automation (EDA) tool has been proposed. SR latch based metastability is the main concern of PUF generation. Metastability on SR latch act as entropy source to generate true randomness. This design requires only four SR latches to produce adequate true randomness. Further, true randomness is extracted through harvesting mechanism where Meta beat counting and De - synchronization techniques have been investigated with respect to equidistribution property. Post processing unit has been incorporated to enhance the statistical properties of PUF. This design consumes 881 logic elements and dissipates 4.41 mW of power for implementing the PUF architecture on Cyclone II EP2C3F484C7 FPGA. Entropy, restart experiment and NIST SP 800 – 22 tests have been performed to evidence the true randomness.
- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.