Syam Sankar

Syam Sankar
Indian Institute of Technology Guwahati | IIT Guwahati · Department of Computer Science and Engineering

Master of Technology

About

11
Publications
4,178
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
326
Citations
Introduction
Research Scholar @IIT Guwahati. I am also an Assistant Professor in the Department of Computer Science and Engineering at NSS College of Engineering, Palakkad, Kerala, India.
Skills and Expertise
Additional affiliations
July 2016 - present
NSS College of Engineering, Palakkad
Position
  • Professor (Assistant)

Publications

Publications (11)
Article
Full-text available
Stock market is a place, where shares of different companies are traded. It is a collection of buyers’ and sellers’ stocks. In this digital era, analysis and prediction in the stock market have gained an essential role in shaping today's economy. Stock market analysis can be either fundamental or technical. Technical analysis can be performed eithe...
Article
Full-text available
Data security plays a significant role in data transfer in cloud-based smart cities. Chaotic maps are commonly used in designing modern cryptographic applications, in which one-dimensional (1D) chaotic systems are widely used due to their simple design and low computational complexity. However, 1D chaotic maps suffer from different kinds of attacks...
Article
Full-text available
In this paper, we report an effective cryptosystem aimed at securing the transmission of medical images in an Internet of Healthcare Things (IoHT) environment. This contribution investigates the dynamics of a 2-D trigonometric map designed using some well-known maps: Logistic-sine-cosine maps. Stability analysis reveals that the map has an infinite...
Article
Full-text available
In this modernistic age of innovative technologies like big data processing, cloud computing, and Internet of things, the utilization of multimedia information is growing daily. In contrast to other forms of multimedia, videos are extensively utilized and streamed over the Internet and communication networks in numerous Internet of Multimedia Thing...
Article
The third-party misuse and manipulation of digital images are a threat to the security and privacy of human subjects. In this paper, we report a system which effectively compresses and encrypts images to achieve secure transmission of image data with minimal bandwidth. The proposed system utilizes autoencoder for compression and chaotic logistic ma...
Article
Full-text available
Aerial photography involves capturing images from aircraft and other flying objects, including Unmanned Aerial Vehicles (UAV). Aerial images are used in many fields and can contain sensitive information that requires secure processing. We proposed an innovative new cryptosystem for the processing of aerial images utilizing a chaos-based private key...
Article
Full-text available
The third party misuse and manipulation of digital images is a treat to security and privacy of human subjects. Image encryption in the internet of things era becomes more important with edge computing and growth in intelligent consumer electronic devices. In this paper, we report a chaos-based cryptographic algorithm using Walsh–Hadamard transform...
Article
The third party misuse and manipulation of digital images is a threat to security and privacy of human subjects. The requirements to fulfil the security needs of digital images have led to the development of good encryption techniques. The proposed method of encryption scheme combines the techniques of chaotic image encryption and DNA (Deoxyribonuc...
Chapter
Claytronics is a future technology in the field of artificial intelligence and modular robotics to create programmable nanoscale robots (catoms). Each catom acts like a computer. It has the ability to adopt different shapes. Many methods are being used for the cluster formation of catoms and are mainly based on the message passing techniques. The e...
Article
Full-text available
Cloud computing allows the end users to access a set of distributed hosted resources like storage, CPU, applications (both software and hardware) and services over the internet in an on-demand basis. The interlinked servers of cloud network are responsible to deliver these services to the users. Load balancing is an inevitable challenging procedure...

Network

Cited By

Projects

Projects (5)
Archived project
Dear Colleagues, A quick survey is underway to gather feedback from scholarly authors on their current research on COVID-19. This google form should take no longer than 3 minutes to complete. In appreciation of your time, we will donate $2 for each completed questionnaire for vaccination in low-income countries. And also, respondents will be rewarded with the option to enter a competition to win a $500 Amazon gift card (value in USD). It would be great if you complete this 3-minute survey on your views. The survey will be open until 20th February, 2022 at 23:45 BST. Click on the link below: https://forms.gle/4NSpULbktC3cQ7s3A or copy and paste the following into your browser: https://forms.gle/4NSpULbktC3cQ7s3A With thanks for your time and consideration.
Project
The Goal of this project is to design new chaotic oscillators with complex dynamical behavior and apply to image encryption.