R. Anitha

R. Anitha
PSG College of Technology | psg · Department of Applied Mathematics and Computational Sciences

Ph.D.

About

75
Publications
14,233
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
907
Citations
Citations since 2017
11 Research Items
709 Citations
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
Introduction
Skills and Expertise

Publications

Publications (75)
Article
Full-text available
Digital signatures are unsuitable for specific applications that are sensitive on a personal or commercial level because they are universally verifiable. Jakobsson et al. proposed the Designated Verifier Signature (DVS) system, which only allows the intended verifier to validate a message’s signature. It prohibits the disclosure of a conviction to...
Article
Full-text available
As a standard digital signature may be verified by anybody, it is unsuitable for personal or economically sensitive applications. The chameleon signature system was presented by Krawczyk and Rabin as a solution to this problem. It is based on a hash then sign model. The chameleon hash function enables the trapdoor information holder to compute a me...
Article
Full-text available
In supply chain management applications, detection of a large object is made efficient by attaching multiple RFID tags in that object. Each part contains an RFID tag attached by the corresponding vendor. In order to check the availability of the object, it is compulsory to ensure all the parts are existing as well. The RFID tags can be interrogated...
Article
Chameleon signatures introduced by Krawczyk and Rabin are based on well-established hash-and-sign paradigm. It is a non-interactive signature scheme that simultaneously provides the properties of non-transferability and non-repudiation. The chameleon hash function is a trapdoor one-way function which prevents everyone except the holder of the trapd...
Article
Full-text available
Object tracking is a fundamental problem in Supply Chain Management (SCM). Recent innovations eliminate the difficulties in traditional approach such as manual counting, locating the object, and data management. Radio Frequency Identification (RFID) implementation in SCM improves the visibility of real-time object movement and provide solutions for...
Article
Full-text available
The Session Initiation Protocol (SIP) is a communication protocol that controls multimedia communication sessions. As the Internet users widely use SIP services, mutual authentication between the user and SIP server becomes an important issue. Several authentication protocols for SIP have been proposed for enhancing security and better complexities...
Article
Full-text available
Radio frequency identification (RFID) technology enables unique identification and tracking of the tag attached to an object. Widespread usage of RFID technologies in supply chain management (SCM) has drawn attention for developing security protocols to protect data stored in the tag. In SCM objects move from one place/department to another, the sa...
Article
Full-text available
Nowadays, smartphone devices are an integral part of our lives since they enable us to access a large variety of services from personal to banking. The worldwide popularity and adoption of smartphone devices continue to approach the capabilities of traditional computing environments. The computer malware like botnets is becoming an emerging threat...
Article
Full-text available
Online Multimedia Social Networks(OSNs) are popular and efficient medium for millions of users. Unfortunately, in wrong hands, they are also effective medium for spreading social malware and propagation of social botnet. A newly proposed multimedia social network threat, Stegobot masks crucial information in a digital image by using a technique kno...
Conference Paper
Radio Frequency Identification (RFID) is a valuable technology for tracking objects in the supply chain. Security and privacy requirements arise with the fast deployment of RFID in supply chain in a heterogeneous environment. Authentication is one of the important security requirements in cloud environment. Even though several RFID cloud authentica...
Conference Paper
A Wireless sensor network (WSN) is composed of a large number of sensor nodes, which perform multiple tasks, namely sensing, data processing and forwarding of observed data. WSNs nodes may possess sensitive data that are prone to various attacks. For such a network to be viable, integrity and authenticity should be provided to the data generated by...
Article
In the current scenario, mobile web payment provides a standard platform to the Internet users for online digital goods shopping. Though the majority of online transactions use single gateway, there is a need for multi-gateway, due to insufficient balance in a customer's account in a specific bank. There are a few payment protocols which support a...
Article
Botnet is one of the most serious threats to cyber security as it provides a distributed platform for several illegal activities. Regardless of the availability of numerous methods proposed to detect botnets, still it is a challenging issue as botmasters are continuously improving bots to make them stealthier and evade detection. Most of the existi...
Article
Ordinary digital signatures are universally verifiable but they are unsuitable for certain applications that are personally or commercially sensitive. Chameleon signature introduced by Krawczyk and Rabin is non interactive and prevents the receiver of a signed document from disclosing its contents to third parties. Most of the efficient chameleon s...
Chapter
Mobile web payment for online shopping is done using only single gateway. If a customer wants to use balances of two different bank accounts in a single transaction then the customer has to transfer this fund to any one of the bank account and then he/she can start the transaction. This is a time consuming process. In this situation, the facility o...
Conference Paper
Mobile web payment for online shopping is done using only single gateway. If a customer wants to use balances of two different bank accounts in a single transaction then the customer has to transfer this fund to any one of the bank account and then he/she can start the transaction. This is a time consuming process. In this situation, the facility o...
Conference Paper
Nowadays payment protocols are facing difficulties in its implementation, as the parties involved in the execution deny their performed actions. In this context, there should be a provision to link the action to the concerned party, which is addressed by the accountability property. In this paper, a new framework in strand space model for the analy...
Article
Smart mobile device usage has expanded at a very high rate all over the world. Since the mobile devices nowadays are used for a wide variety of application areas like personal communication, data storage and entertainment, security threats emerge, comparable to those which a conventional PC is exposed to. Mobile malware has been growing in scale an...
Conference Paper
SPam over IP Telephony (SPIT) is an emerging threat in the telecom era of Voice over IP Networks (VoIP). Though evolved from email spam, SPIT is more obstructive and intrusive in nature as they require response from the callee. Contemplating the behavior of SPIT, a provider based system is contributed with the proposed mechanism installed on the SI...
Article
Botnets are an emerging phenomenon that is becoming one of the most significant threats to cyber security and cyber crimes as they provide a distributed platform for several illegal activities such as launching distributed denial of service (DDoS), malware dissemination, phishing, identity theft, spamming, and click fraud. The characteristic of bot...
Conference Paper
This paper presents an efficient, robust and blind approach to detect watermarks embedded in spatial and frequency domains of images. Spatial and transform domain energy features are extracted from the images using Tree Structured Wavelet Transform. An efficient classifier, Totalboost is used to classify the images as watermarked or unwatermarked....
Conference Paper
Protection of critical information infrastructure is a major task for the network security experts in any part of the globe. There are certain threats that will never evade away despite sophisticated advancements in defense strategy. Among them, Distributed Denial of Service (DDoS) attacks have witnessed continual growth in scale, frequency and int...
Conference Paper
Voice over Internet Protocol (VoIP) has become a very popular technology as it allows the users to make phone calls over the public internet. Some of its predominant features such as efficiency, cost-effectiveness and long distance communication made VoIP to stand apart from the traditional Public Switched Telephone Networks (PSTN). Session Initiat...
Conference Paper
SPam over IP Telephony (SPIT) is an emerging threat in the telecom era of Voice over IP Networks (VoIP). Though evolved from email spam, SPIT is more obstructive and intrusive in nature as they require response from the callee. Contemplating the behavior of SPIT, a provider based system is contributed with the proposed mechanism installed on the SI...
Article
In this paper, we present a blind and highly robust watermarking scheme method for color images by combining the advantages of both spatial and frequency domain. Watermark is generated for each channel (RGB) of the color image by extracting spatial domain features using Gray Level Co-occurence Matrix as well as a unique identification number. The w...
Article
In recent years, social botnets have become a major security threat to both online social networking websites and their users. Social bots communicate over probabilistically unobservable communication channels and steal sensitive information from its victims. Stegobot is a social botnet which uses image steganography to hide the presence of communi...
Conference Paper
In this paper, we studied the electronic voting protocol to formalize and verify its fairness, privacy type properties in the strand space model. Also we established a suitable attacker model, the concept of pair bundles and equivalence of pair bundles which are used to frame the formalization and verification of fairness, privacy type properties i...
Article
Full-text available
This paper proposes a new high capacity Steganographic scheme using 3D geometric models. The novel algorithm re-triangulates a part of a triangle mesh and embeds the secret information into newly added position of triangle meshes. Up to nine bits of secret data can be embedded into vertices of a triangle without causing any changes in the visual qu...
Article
Identity-based broadcast encryption is tool for communicating multiple copies of a single message to a selective group of users, identified by their identities in such a manner that others are unable to access the content. A multi-privileged group is a group of users where the users have different access privileges. This paper proposes an identity-...
Conference Paper
Detection of malware using soft computing methods has been explored extensively by many malware researchers to enable fast and infallible detection of newly released malware. In this work, we did a comparative study of two- and multi-class-classification-based detection of malicious executables using soft computing techniques on exhaustive feature...
Article
Botnet has become a prevalent platform for many malicious attacks and hence it is considered as a serious threat to internet security. A botmaster can control millions of compromised systems using command & control C&C infrastructure. At early time IRC protocol-based botnets were used by the attackers. Recently attackers have shifted their paradigm...
Article
Detection of malware using data mining techniques has been explored extensively. Techniques used for detecting malware based on structural features rely on being able to identify anomalies in the structure of executable files. The structural attributes of an executable that can be extracted include byte ngrams, Portable Executable (PE) features, AP...
Article
A spanning tree T of a graph G is said to be a A-Degree Preserving Spanning Tree (A-DPST) if deg T (v i) = deg G (v i), for all v i in A, a non empty subset of V. A subset A of the vertex set V (G) is said to be Degree Preserving Spanning Tree (DPST)-set, if A-DPST exists. Any DPST-set A is called a maximal DPST set if, A ∪ {v} is not a DPST set fo...
Conference Paper
With increasing trend in application services on large-scale internet scenario of both wired and wireless interface, intimidation to restrain the application service by Distributed Denial of Service (DDoS) attacks become a high-flying issue. Most of the present DDoS attacks resistance method work on application services in wired network and wireles...
Article
In this paper, a robust and blind watermarking scheme for three dimensional (3-D) anaglyph images is proposed. Since the computational cost of Red–Green–Blue (RGB) processing is quite high, we have used 3-D Discrete Wavelet Transform (3-D DWT) to decompose the image and process it directly. The watermark to be embedded is computed from the image an...
Book
The rapid development of network technologies and computing machines has broadened the scope of research and development in computer science and allied areas. To provide a broad interdisciplinary research forum, the International Conference on Computational Intelligence, Cyber Security, and Computational Models (ICC3-2013) has been organized by...
Conference Paper
The performance of detectors using decision trees can be improved by reducing the average height of the tree for faster detection. We propose a new attribute splitting criteria for decision tree construction using the concept of Theil index. The Theil index is a statistic used to measure economic inequality. Results show a decrease in average heigh...
Conference Paper
An identity-based broadcast encryption scheme (IBBE), is the one in which the broadcasting sender combines the public identities of receivers and system parameters and then encrypts a message. Attacks on user privacy may happen as the user identity is not preserved. This paper presents an IBBE scheme for multi-privileged users using Chinese Remaind...
Conference Paper
StegoBot is a recently discovered social network security threat that allows probabilistically unobservable communication through social network. The main aim of a Stegobot is to spread social malware and steal the information from targeted machines. Stegobot takes the advantage of image Steganography to hide the presence of communication within th...
Conference Paper
Botnets have become a rampant platform for malicious attacks, which poses a significant threat to internet security. The recent botnets have begun using common protocols such as HTTP which makes it even harder to distinguish their communication patterns. Most of the HTTP bot communications are based on TCP connections. In this work some TCP related...
Article
Many internet applications are based on group communication model. For secure group communication scenario, key management is an important issue. In a hierarchical architecture, key trees are used. When users join or leave a key tree, all the ancestor nodes in the leave path till root gets affected. It encroaches threat to forward secrecy as well a...
Article
In sensor networks, it is an important task to periodically collect data from an area of interest for time-sensitive applications. The sensed data must be gathered and transmitted to a base station for further processing to meet the end-user queries. Since the network consists of low-cost nodes with limited battery power, it is a challenging task t...
Conference Paper
In recent years, a number of works proposing the combination of multiple classifiers to produce a single classification have been reported. The resulting classifier, referred to as an ensemble classifier, is generally found to be more accurate than any of the individual classifiers making up the ensemble. In an ensemble of classifiers, it is hoped...
Chapter
Distributed denial-of-service (DDoS) is a very powerful attack on Internet resources as well as system resources. Hence, it is imperative to detect these attacks in real time else the impact will be irresistible.In this work we propose a new method of applying cumulative sum (CUSUM) algorithm to track variations of the attack characteristic variabl...
Article
Key pre-distribution based on combinatorial set systems has become an emerging area in recent past. Besides the existing key metrics, we evaluate some of the existing combinatorial schemes under selective capture of nodes. In this paper, we present a deterministic key pre-distribution based on finite projective planes with an objective to improve t...
Chapter
This paper proposes a new universal steganalysis method based on contourlet transform with high detection rate. An important aspect of this paper is that it uses the minimum number of features in the transform domain and gives a better accuracy than many of the existing steganalysis methods. Only five features have been extracted from the contourle...
Article
In group communication scenario, key management is important to preserve forward and backward secrecy. In order to achieve it keys need to be changed during user join/leave which is done by an operation called rekeying. In a centralized key management scheme, the server thereafter passes the new keys to the existing users who are affected via unica...
Conference Paper
Full-text available
Recently, as the serious damage caused by DDoS attacks increases, the rapid detection of the attack and the proper response mechanisms are urgent. Signature based DDoS detection systems cannot detect new attacks. Current anomaly based detection systems are also unable to detect all kinds of new attacks, because they are designed to restricted appli...
Article
Security and privacy are key challenges for every computer user. While various security mechanisms, such as anti-virus, anti-spyware, updates and patches, are extensively applied, they cannot provide total security. Software keyloggers represent a fast-growing class of malware. Keylogging software records the user's typed keystrokes and saves them...
Conference Paper
The task of identification of encryption algorithm from cipher text alone is considered to be a challenging one. Very few works have been done in this area by considering block ciphers or symmetric key ciphers. In this paper, we propose an approach for identification of encryption algorithm for various ciphers using the decision tree generated by C...
Conference Paper
A new efficacious Speaker Verification System is proposed in this paper. Scrutinized study is made on different features and finally a combination of them is used. These combinational features have been modeled with ANFIS and SVM classifier. The performance of both the systems are evaluated with detection error trade-off curves and Bayes Risk funct...
Article
Full-text available
Botnet distinguishes itself from the previous malware by having the characteristics of a C&C channel,using which a Botmaster can control the constituents of the botnet. Even though protocols like IRC,HTTP and DNS are exploited to incorporate C&C channels, previous analysis have shown that themajority of the botnets are usually based on IRC. Consequ...
Article
Full-text available
In sensor networks, it is an important task to periodically collect data from an area of interest for time-sensitive applications. The sensed data must be gathered and transmitted to a base station for further processing to meet the end-user queries. Since the network consists of low-cost nodes with limited battery power, it is a challenging task t...
Article
In a blind signature scheme, a user A can obtain the signature of any given message,from the other entity B without revealing any information about the message or its signature to B. In a proxy signature scheme, a potential signer delegates his signing capability to a proxy entity, who signs a message on behalf of the original signer. In a distribu...
Article
The need for dominating cycles is continuously growing, with the intensification of applied sciences, due to their immense applications especially in networks of all kind. In this paper, new concepts like perfect matching sequences, perfect matching dominating cycles and perfect matching minor are introduced for undirected, loopless, connected even...
Conference Paper
This paper provides a new secured, invisible approach to watermark text documents. For integrity verification of text documents, the watermark has to depend on a secret key and on the original document. It is important that the dependence on the key should be sensitive. In this paper, a novel watermarking technique is proposed for content authentic...
Conference Paper
Inception stage of devastating attacks like DDoS attacks and botnet hosted attacks includes compromising numerous computers or networks over the Internet. The Port scanning tools are often used by the attackers not only to identify the vulnerable servers but also to identify the vulnerable network or vulnerable computers over the Internet. If the a...
Conference Paper
Most attractive and easy to operate ICMP based DoS/DDoS attacks are amplification attacks. Permitting ICMP traffic in a conservative manner will help defending the flooding attacks. Existing methods try to control the ICMP traffic with bandwidth limitation, sometimes the limitation is prodigal and in other cases the limitation is stringent which de...
Article
Graph decompositions are vital in the study of combinatorial design theory. Given two graphs G and H, an H- decomposition of G is a partition of the edge set of G into disjoint isomorphic copies of H. An n-sun is a cycle Cn with an edge terminating in a vertex of degree one attached to each vertex. In this paper we have proved that the complete gra...
Article
Graph decompositions are vital in the study of combinatorial design theory. A decomposition of a graph G is a partition of its edge set. An n-sun graph is a cycle Cn with an edge terminating in a vertex of degree one attached to each vertex. In this paper, we define n-sun decomposition of some even order graphs with a perfect matching. We have prov...
Article
Full-text available
This paper presents a new simple scheme for theft-protected proprietary certificate problem by introducing a mobile phone as an additional requirement for the proprietor and this scheme is analyzed to be more secured than the one presented by M. Jakobsson, et al. Secondly we present the proprietary certification process using Elliptic Curve Discret...
Article
Graphs having a particular structure always attracts and find application in sciences. If G is a simple graph with a perfect matching M, then a perfect matching minor of G with respect to M is the graph obtained by contracting all the edges of M. A perfect matching dominating cycle of G is a dominating cycle to which the edges of M are either in th...
Article
In this paper, a k-out-of-n system with spares and repair is considered. Repair starts the moment a unit fails and the a vailable spare units replace the failed units one at a time. Standby units deteriorate only when they are put into operation. The system fails only when thereare (k-1) operational units. It is assumed that the life time of compon...
Chapter
This chapter presents a new simple scheme for verifiable encryption of elliptic curve digital signature algorithm (ECDSA). The protocol we present is an adjudicated protocol, that is, the trusted third party (TTP) takes part in the protocol only when there is a dispute. This scheme can be used to build efficient fair exchanges and certified email p...
Article
In this paper, we have found the number of distinct perfect matching dominating cycles for complete, complete bipartite, Petersen's and Wheel graphs. For a particular choice of perfect matching, the number is found for the hypercube graph. Since the necessary and sufficient condition for the existence of perfect matching dominating cycles is that t...
Chapter
This chapter presents a new simple scheme for verifiable encryption of elliptic curve digital signature algorithm (ECDSA). The protocol we present is an adjudicated protocol, that is, the trusted third party (TTP) takes part in the protocol only when there is a dispute. This scheme can be used to build efficient fair exchanges and certified e--mail...
Article
This paper studies two non-Markovian queueing systems with bulk service and server vacations. The first model considered is an M|G(a,b)|1 system and the second model studied is the accessible batch service model M|G(a,d,b)|1 with control limit ‘d’. This paper is concentrated on a multiple vacation system in which the first vacation is differently d...
Article
We analyse an M/G(a,b)/1 queue with M different types of vacation polices. Whenever the server goes on vacation, he selects the i-th (1=1,2,⋯,M) type of vacation with probability α i (1=1,2,⋯,M). The successive vacations are assumed to be independent but not necessarily identical. The Laplace transform of the joint distribution of the queue length...
Article
Scope and purpose This model deals with the study of a general bulk service queueing system with repeated server vacation and changeover time. Whenever the server finds a−1 customers waiting in the queue, instead of going for vacation immediately, the server will wait in the system for some time which is called the changeover time. If there is an a...
Article
Spanning trees play an important role in networks. There are many kinds of spanning trees in the literature. A new class of spanning trees called Vertex Subset Degree Preserving Spanning Tree (A-DPST) is defined as a spanning tree T of the graph G(V,E) such that deg T(vi) = degG(vi) for all v i in A which is a nonempty subset of V(1). A-DPST's are...
Article
The degree constrained minimum spanning tree problem is to determine a spanning tree of the minimum total edge cost and degree not more than a given value d (d-MST). A number of algorithms have been proposed for this problem. This paper presents two algorithms to generate all degree constrained spanning trees and all vertex subset degree preserving...

Network

Cited By

Projects

Projects (4)