
Syam SankarIndian Institute of Technology Guwahati | IIT Guwahati · Department of Computer Science and Engineering
Syam Sankar
Master of Technology
About
11
Publications
5,186
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
547
Citations
Citations since 2017
Introduction
Research Scholar @IIT Guwahati.
I am also an Assistant Professor in the Department of Computer Science and Engineering at NSS College of Engineering, Palakkad, Kerala, India.
Skills and Expertise
Additional affiliations
July 2016 - present
NSS College of Engineering, Palakkad
Position
- Professor (Assistant)
Publications
Publications (11)
Stock market is a place, where shares of different companies are traded. It is a collection of buyers’ and sellers’ stocks. In this digital era, analysis and prediction in the stock market have gained an essential role in shaping today's economy. Stock market analysis can be either fundamental or technical. Technical analysis can be performed eithe...
Data security plays a significant role in data transfer in cloud-based smart cities. Chaotic maps are commonly used in designing modern cryptographic applications, in which one-dimensional (1D) chaotic systems are widely used due to their simple design and low computational complexity. However, 1D chaotic maps suffer from different kinds of attacks...
In this paper, we report an effective cryptosystem aimed at securing the transmission of medical images in an Internet of Healthcare Things (IoHT) environment. This contribution investigates the dynamics of a 2-D trigonometric map designed using some well-known maps: Logistic-sine-cosine maps. Stability analysis reveals that the map has an infinite...
In this modernistic age of innovative technologies like big data processing, cloud computing, and Internet of things, the utilization of multimedia information is growing daily. In contrast to other forms of multimedia, videos are extensively utilized and streamed over the Internet and communication networks in numerous Internet of Multimedia Thing...
The third-party misuse and manipulation of digital images are a threat to the security and privacy of human subjects. In this paper, we report a system which effectively compresses and encrypts images to achieve secure transmission of image data with minimal bandwidth. The proposed system utilizes autoencoder for compression and chaotic logistic ma...
Aerial photography involves capturing images from aircraft and other flying objects, including Unmanned Aerial Vehicles (UAV). Aerial images are used in many fields and can contain sensitive information that requires secure processing. We proposed an innovative new cryptosystem for the processing of aerial images utilizing a chaos-based private key...
The third party misuse and manipulation of digital images is a treat to security and privacy of human subjects. Image encryption in the internet of things era becomes more important with edge computing and growth in intelligent consumer electronic devices. In this paper, we report a chaos-based cryptographic algorithm using Walsh–Hadamard transform...
The third party misuse and manipulation of digital images is a threat to security and privacy of human subjects. The requirements to fulfil the security needs of digital images have led to the development of good encryption techniques. The proposed method of encryption scheme combines the techniques of chaotic image encryption and DNA (Deoxyribonuc...
Claytronics is a future technology in the field of artificial intelligence and modular robotics to create programmable nanoscale robots (catoms). Each catom acts like a computer. It has the ability to adopt different shapes. Many methods are being used for the cluster formation of catoms and are mainly based on the message passing techniques. The e...
Cloud computing allows the end users to access a set of distributed hosted resources like storage, CPU, applications (both software and hardware) and services over the internet in an on-demand basis. The interlinked servers of cloud network are responsible to deliver these services to the users. Load balancing is an inevitable challenging procedure...