About
43
Publications
9,571
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
503
Citations
Publications
Publications (43)
In the dynamic field of agriculture, the prompt and accurate identification of plant diseases plays a crucial role in ensuring strong crop yields. To address this need, we present an innovative framework that combines Model Agnostic Meta-Learning (MAML) with DeepLabV3 to identify plant diseases precisely and assess their severity. Deep Plant Guard...
In the domain of multi-focus (MF) and multi-model image fusion (MMIF), accurately merging focused regions from various images remains a challenge. Existing methods often fall short of capturing the nuances of depth-of-field variations, leading to sub-optimal fusion outcomes. This research introduces a novel approach, utilizing both supervised and u...
Nuclear power plants' instrumentation and control systems (I&Cs) are essential for guaranteeing secure and dependable operations. If these systems fail, there could be serious accidents, radiation exposure risks, and environmental damage. To avoid catastrophic outcomes, the dependability of I&C systems in NPPs is of the utmost importance. With the...
In wireless sensor networks, cluster-based routing plays a key role in data transmission which increases the network lifetime and scalability of networks. Many researchers provide a quality contribution in this area. Still, there are many challenges related to residual energy, stability of routes, network lifetime, and local optima. According to th...
There has been considerable development in the domain of dependability engineering and analysis in recent decades. The quality guidelines related to dependability attributes such as safety, reliability, maintainability, and availability have evolved into recommending progressively stricter prerequisites and requirements related to the quality of pr...
With the exponential growth of social media platforms and online communication, the necessity of using automated sentiment analysis techniques has significantly increased. Deep learning techniques have emerged in extracting complex patterns and features from unstructured text data, which makes them a powerful tool for sentiment analysis. This resea...
Mobile ad hoc networks (MANETs) are comprised of wireless mobile nodes and are gaining popularity due to their ease of deployment, low cost, and simple communication. However, MANETs face numerous challenges such as limited node energy, high mobility, and dynamic topologies, leading to frequent link breakage and route discovery. Although several re...
Digital watermarking can be used to ensure the authenticity and copyright protection of images. In watermarking balancing the trade-offs between its features is an important issue. To address this issue, in this work an adaptive hybrid domain color image watermarking based on Discrete Wavelet Transform (DWT), Walsh Hadamard Transform (WHT), and Sin...
The emerging technology cloud computing has become a strong pillar beneath the digital healthcare systems. Storing and maintaining the medical records in cloud has been proven beneficiary for smooth and efficient running of the digital healthcare systems. Almost every large private and public healthcare organizations have evolved their system into...
In current scenario, we have multiple technologies are available to transmit the data in wireless ad hoc network (WANET).But, compare to other existing models, we have proposed a new model where not only this model helps to reduce the energy consumption of nodes while transmitting the data but also our model focus on security aspect where it will h...
Digitization is the way of transforming the information into computer understandable format. If we want to think about our modern digital society, we have come a long way to mould our society into a digitised society. When these all started, there were so many issues in the communication of our societal information among various segments of our soc...
At present, underwater wireless ad hoc networks (UWAN) are widely used in enormous applications. At the same time, UWAN faced many security issues, like energy leaks. The energy hole will make the network lifetime end soon. However, most existing underwater research has not taken security as serious threat. This article aims to provide a new secure...
In today’s scenario, data transmission is established through the single or multi-hop relay nodes in Wireless Ad-Hoc Networks (WANET). Traditional relay node selection techniques undergo collusion attacks, increased energy consumption, delay, and reduced network lifetime. To cope with these problems, we propose a Quantum Atom Search Optimization co...
Due to the advancement of the internet and image correcting software, the problem of integrity and authenticity of the image has become crucial. Forensics of digital image plays a crucial part in verifying the integrity and authenticity of computerized images. Digital watermarking is one of the computationally efficient techniques to verify the dig...
Social media has become a vital platform for individuals, organizations, and governments worldwide to communicate and express their views. During the coronavirus disease 2019 (COVID-19) pandemic, social media sites play a crucial role in people communicating, sharing, and expressing their perceptions on various topics. Analyzing such textual data c...
The most crucial matter to be taken care of while deploying biometric systems is the security of the biometric template. Several algorithms that do not store the original template have been formulated in recent years to protect biometric templates from various attacks. Most of the existing algorithms offer a trade-off between matching performance a...
This paper proposes a robust and secure watermarking method for a color image in Y CbCr color space. In this study, watermarking is performed using Lifting Wavelet Transform (LWT). Here, edge entropy and information entropy is used to find the block to embed watermark. In this work alpha blending scheme is used for embedding and extraction of water...
Digital watermarking techniques can be used to solve the authenticity and copyright protection issue of images. In this work, the authors have proposed an adaptive color image watermarking scheme based on DWT by combining alpha blending and entropy concept. Entropy is one of the important features of images and can be used for watermark insertion....
Digital image watermarking technique based on LSB Substitution and Hill Cipher is presented and examined in this paper. For better imperceptibility watermark is inserted in the spatial domain. Further the watermark is implanted in the Cover Image block having the highest entropy value. To improve the security of the watermark hill cipher encryption...
The generation of cryptographic keys using the biometric features of both communicating parties throughout the sessions of communication avoids the process of key sharing through some insecure channel, difficulty in remembering the large key(256 or 1024 bits key), and storing the key in some safe place. At the same time preserving the safety of cry...
Recently, transformation of information is an emerging area of interest because of efficient Internet technology and faster communication medium. Nowadays, huge numbers of data transferred over many transferring mediums, out of which image is one of them. To maintain confidentiality and provide ownership of the data, we need to do any cryptographic...
Identifying a person based on their behavioral and biological qualities in an automated manner is called biometrics. The authentication system substituting traditional password and token for authentication and relies gradually on biometric authentication methods for verification of the identity of an individual. This proves the fact that society ha...
WSN has been exhilarated in many application areas such as military, medical, environment, etc. Due to the rapid increase in applications, it causes proportionality to security threats. Mostly, nodes used, are independent of human reach and dependent on their limited resources, the major challenges can be framed as energy consumption and resource r...
In today’s digital era, it is very easy to copy, manipulate and distribute multimedia data over an open channel. Copyright protection, content authentication, identity theft, and ownership identification have become challenging issues for content owners/distributors. Off late data hiding methods have gained prominence in areas such as medical/healt...
Internet of things (IoT) is one of the emerging paradigms in the current era that has attracted many researchers due to its widespread applications. Due to the open nature of the device accessibility and heterogeneity, a rapid increase in connected devices leads to several vulnerabilities and threats in the IoT devices. Hence, security is one of th...
Security of information is provided by various cryptographic techniques.
Symmetric key cryptography is one of such methods which require a shared secret
key between two parties to communicate. Distribution of such secret key is the
main challenge in symmetric key cryptography. Efficient and reliable techniques
are needed to distribute the shared se...
Biometrics is a universally used automatic identification of persons, depending on their behavioural and biological quality. Biometric authentication plays a crucial role in the identity management system. Safety of biometric authentication systems needs to be addressed as there are still some points related to the integrity and public receiving of...
Symmetric key cryptography needs the communicating parties to share a secret key. It is desired that a different shared key is established for each communication session. A trusted third party distributes these shared keys through a communication link between communicating parties. As the key is transferred through an insecure communication link at...
During last few years, the electronic medical records can be effortlessly stored with the fast development of healthcare technology. However, the patient's medical information security is current prime concern. Massive volumes of health data are generated in the development of treatment in medical centers such hospitals, clinics, or other instituti...
Cryptography is the common compelling recommendation for reliable communication of data. A cryptographic key is a meaningful thing in this system. Despite, such key demands to be collected in a secured place or carried through a distributed communication line which, in actuality, poses another alert to safety. As a substitute, researchers affirm th...
Communicating the information between different people distributed over various geographical locations is a very difficult task, especially in sparse and highly crowded areas. Sparse areas lack regular network and follow highly intermittent connectivity, whereas overcrowded areas contain overlapped bandwidth. Opportunistic network (Oppnet) has the...
During last few years, the electronic medical records can be effortlessly stored with the fast development of healthcare technology. However, the patient's medical information security is current prime concern. Massive volumes of health data are generated in the development of treatment in medical centers such hospitals, clinics, or other instituti...
This chapter describes various existing real-life applications and case studies of opportunistic networks. Opportunistic networks are also applied to interdisciplinary projects focusing on wildlife monitoring to perform novel studies of animal migrations and interspecies interactions. Opportunistic networks represent an easy-to-deploy and extremely...
Communicating the information between different people distributed over various geographical locations is a very difficult task, especially in sparse and highly crowded areas. Sparse areas lack regular network and follow highly intermittent connectivity, whereas overcrowded areas contain overlapped bandwidth. Opportunistic network (Oppnet) has the...
Key Management is the critical issue of a cryptographic system and it requires a better security mechanism. Bio-cryptology provides a strong solution for the said critical issue. Fuzzy vault scheme is a popular scheme to design bio-cryptosystems. Key is secured with the biometric data mixed up with some noise points known as chaff points in a secur...