About
19
Publications
6,189
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,108
Citations
Current institution
IIIT bhopal
Current position
- Assistant Professor
Publications
Publications (19)
Physical activity can be monitored via small low-power sensor nodes (SNs) that are widely dispersed over the earth. For WSN sensor nodes, GPS is one of the most commonly utilised localization algorithms. Military, industrial, and more recently, consumer and civil uses of GPS are all examples of its vast range of applications. Wi-Fi enabled smart se...
In wireless sensor networks (WSNs), the data must reach a processing node with less energy consumption and delay rate. However, with the specific consideration of the unique properties of sensor networks such as limited power, stringent bandwidth, dynamic topology due to node failures, adding/removing nodes, or even physical mobility, high network...
The Internet of Things (IoT) is a new revolution defined by heterogeneous devices made up of intelligent, omnipresent items that are all hooked up to The internet. These devices are frequently implemented in different areas to offer innovative programs in various industrial applications, including intelligent urban, medicine, and societies. Such In...
The electroencephalogram (EEG) signals are a big data which are frequently corrupted by motion artifacts. As human neural diseases, diagnosis and analysis need a robust neurological signal. Consequently, the EEG artifacts’ eradication is a vital step. In this research paper, the primary motion artifact is detected from a single-channel EEG signal u...
This work utilizes a novel image encryption technique for block image encryption with the help of nonlinear 2D chaotic map and DNA sequences (NL2DCM-DNA). 2D chaotic map has generated the several key sequences for encryption, and DNA rules are applied to perform fast block encryption of image. Nonlinearity of 2D chaotic map and complexity of DNA se...
In last few decades, a lot of work has been done in the field of cryptography; it is being considered one of the safe methods to protect data. It was first used to protect communication by individuals, armies, and organizational companies. With the help encryption method, anyone can protect their data from a third-party attack. Images are used in v...
The COVID-19 infection is increasing at a rapid rate, but, there is a limited number of testing kits available. Therefore, the development of COVID-19 testing kits is still an open area of research. Recently, many studies have shown that chest Computed Tomography (CT) images can be used for COVID-19 testing, as chest CT images show a bilateral chan...
This paper proposes an innovative image cryptosystem algorithm using the properties of the block encryption, 4D logistic map and DNA systems. Multiple key sequences are generated and pixel substitution is performed by using nonlinear 4D logistic map, then encryption is performed by using DNA rules to ensure that the different blocks are encrypted s...
Recently, it is one of the concerns to protect multimedia applications with storage of images being an important security issue. The process used to encrypt data and protect these multimedia applications is encryption. Present cryptography provides crucial techniques in order to secure information and these encryption techniques are utilized for pr...
In last few decades, a lot of work has been done in the field of cryptography; it is being considered one of the safe methods to protect data. It was first used to protect communication by individuals, armies, and organizational companies. With the help encryption method, anyone can protect their data from a third-party attack. Images are used in v...
Delays added by the encryption process represent an overhead for smart computing devices in ad-hoc and ubiquitous computing intelligent systems. Digital Logic Circuits are faster than other computing techniques, so these can be used for fast encryption to minimize processing delays. Chaotic Encryption is more attack-resilient than other encryption...
Security over Vehicular ad hoc network using Wi-Fi IEEE 802.11p standard and identifying accurate attacker vehicle is a major challenge over VANET. Reducing cost of computation, effective consumption of limited resources and providing uncompromised security has always been a challenge over VANET. In this paper RSA algorithm based encryption and dec...
Recently, chaotic dynamics-based data encryption techniques for wired and wireless networks have become a topic of active research in computer science and network security such as robotic systems, encryption, and communication. The main aim of deploying a chaos-based cryptosystem is to provide encryption with several advantages over traditional enc...
Recently, chaotic dynamics-based data encryption techniques for wired and wireless networks have become a topic of active research in computer science and network security such as robotic systems, encryption, and communication. The main aim of deploying a chaos-based cryptosystem is to provide encryption with several advantages over traditional enc...