Syam Sankar

Syam Sankar
Verified
Syam verified their affiliation via an institutional email.
Verified
Syam verified their affiliation via an institutional email.
  • Master of Technology
  • Professor (Assistant) at NSS College of Engineering

About

16
Publications
6,484
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
753
Citations
Introduction
Research Scholar @IIT Guwahati. I am also an Assistant Professor in the Department of Computer Science and Engineering at NSS College of Engineering, Palakkad, Kerala, India.
Skills and Expertise
Current institution
NSS College of Engineering
Current position
  • Professor (Assistant)
Additional affiliations
July 2021 - present
Indian Institute of Technology Guwahati
Position
  • Research Scholar

Publications

Publications (16)
Article
Multiple software and hardware intellectual property (IP) components are combined on a single chip to form Multi-Processor Systems-on-Chips (MPSoCs). Due to the rigid time-to-market constraints, some of the IPs are from outsourced third parties. Due to the supply-chain management of IP blocks being handled by unreliable third-party vendors, securit...
Article
Modern multi-core processors use Network-on-Chip (NoC) as the communication backbone. With aggressive product release deadlines due to competition from peers, the usage of third-party intellectual property (IP) blocks for NoCs is a common practice. Hardware Trojans in NoC can lead to performance degradation and the exposure of sensitive information...
Article
Full-text available
Stock market is a place, where shares of different companies are traded. It is a collection of buyers’ and sellers’ stocks. In this digital era, analysis and prediction in the stock market have gained an essential role in shaping today's economy. Stock market analysis can be either fundamental or technical. Technical analysis can be performed eithe...
Article
Full-text available
Data security plays a significant role in data transfer in cloud-based smart cities. Chaotic maps are commonly used in designing modern cryptographic applications, in which one-dimensional (1D) chaotic systems are widely used due to their simple design and low computational complexity. However, 1D chaotic maps suffer from different kinds of attacks...
Article
Full-text available
In this paper, we report an effective cryptosystem aimed at securing the transmission of medical images in an Internet of Healthcare Things (IoHT) environment. This contribution investigates the dynamics of a 2-D trigonometric map designed using some well-known maps: Logistic-sine-cosine maps. Stability analysis reveals that the map has an infinite...
Article
Full-text available
In this modernistic age of innovative technologies like big data processing, cloud computing, and Internet of things, the utilization of multimedia information is growing daily. In contrast to other forms of multimedia, videos are extensively utilized and streamed over the Internet and communication networks in numerous Internet of Multimedia Thing...
Article
The third-party misuse and manipulation of digital images are a threat to the security and privacy of human subjects. In this paper, we report a system which effectively compresses and encrypts images to achieve secure transmission of image data with minimal bandwidth. The proposed system utilizes autoencoder for compression and chaotic logistic ma...
Article
Full-text available
Aerial photography involves capturing images from aircraft and other flying objects, including Unmanned Aerial Vehicles (UAV). Aerial images are used in many fields and can contain sensitive information that requires secure processing. We proposed an innovative new cryptosystem for the processing of aerial images utilizing a chaos-based private key...
Article
Full-text available
The third party misuse and manipulation of digital images is a treat to security and privacy of human subjects. Image encryption in the internet of things era becomes more important with edge computing and growth in intelligent consumer electronic devices. In this paper, we report a chaos-based cryptographic algorithm using Walsh–Hadamard transform...
Article
The third party misuse and manipulation of digital images is a threat to security and privacy of human subjects. The requirements to fulfil the security needs of digital images have led to the development of good encryption techniques. The proposed method of encryption scheme combines the techniques of chaotic image encryption and DNA (Deoxyribonuc...
Chapter
Claytronics is a future technology in the field of artificial intelligence and modular robotics to create programmable nanoscale robots (catoms). Each catom acts like a computer. It has the ability to adopt different shapes. Many methods are being used for the cluster formation of catoms and are mainly based on the message passing techniques. The e...
Article
Full-text available
Cloud computing allows the end users to access a set of distributed hosted resources like storage, CPU, applications (both software and hardware) and services over the internet in an on-demand basis. The interlinked servers of cloud network are responsible to deliver these services to the users. Load balancing is an inevitable challenging procedure...

Network

Cited By