A. Shajin Nargunam
Noorul Islam University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by A. Shajin Nargunam.
international conference on computing electronics and electrical technologies | 2012
R. Suji Pramila; A. Shajin Nargunam; Academic Affairs
The rapidly aging population causes long hospital waiting time, expensive hospital stays and increases the workload of doctors and medical practitioners. Managing the cost and quality of treatment and caring for seniors are important in all countries. This phenomenon has a demand for electronic healthcare (e-healthcare). A Bluetooth enabled in-home patient monitoring system facilitates early detection of Alzheimers disease. With the help of short-range Bluetooth communications, the location and movement pattern of a patient can be tracked and recorded in a local database. Thus a medical practitioner is able to perform remote diagnosis via the internet. This system is not suitable for long-range outdoor environments. The e-healthcare solution has a number of issues like security and privacy that are hard to accomplish in an effective way. The proposed e-healthcare solution can be enhanced for long range outdoor environments with location tracking technology like GPS (Global Positioning System). Data security issues can be considered with two important aspects like secure and dependable distributed data storage and fine-grained distributed data access control for sensitive and private patient medical data. Different methods are analyzed to improve the security and efficiency of data sharing. This work facilitates better medical treatments, improve the quality of treatments and reduce healthcare costs.
international conference on computing electronics and electrical technologies | 2012
R. Sarath; A. Shajin Nargunam; R. P. Sumithra
A quantum digital authentication scheme based on hash function is proposed in this paper. The security of the quantum protocol lies on the existence of quantum one way function by fundamental quantum principle. The practical difficulties in quantum control and quantum computation made quantum protocol hard to implement. Lack of authentication made the quantum protocol vulnerable to hackers. By introducing two level quantum system, authentications can be achieved with the help of hash function. To guarantee the authenticity, hash codes are split in to two parts and exchange of code is made through two quantum channels. This scheme uses a programmable polarizer ensuring the quantum one way function and removing the practical difficulties of quantum control and quantum computation. The proposed scheme presents a novel method to construct secure quantum authentication for future communication.
Applied Mechanics and Materials | 2014
G.R. Rajesh; A. Shajin Nargunam
This paper presents an algorithm for hiding information’s in raw video steams using art of steganography using discrete wavelet transform. While mostly applied to still images in the past, it has become very popular for video streams recently. When steganographic methods are applied to digital video streams, the selection of target pixels, which are used to store the secret data, is especially crucial for an effective and successful-embedding process; if pixels are not selected carefully, undesired spatial and temporal perception problems occur in the stegno-video. Typically, an irrecoverable steganography algorithm is the algorithm that makes it hard for malicious third parties to discover how it works and how to recover the secret data out of the carrier file. In this paper, a new embedding algorithm is proposed to hide the secret data in moving videos. The 2D-DCT of the video is taken and the secret message is embedded. The performance measures are evaluated for the quality of the video after the data hiding and show good results.
International Journal of Mobile Network Design and Innovation | 2017
Reni K. Cherian; A. Shajin Nargunam
Due to dynamic and infrastructure less nature of mobile adhoc network, it is prone to various kinds of attacks. In this paper, we have proposed a distributed agent-based detection system for network layer attacks using PSO and neural network in MANET. In the proposed technique four agents are considered with different complementary role in order to detect attack. For efficient detection of the intrusion, the network is divided into small zones. In each zone one detection agent is presents to manage and detect the irregularity in node activities. Detection agent is found by using particle swarm optimisation PSO technique. After the detection of invader, response agent is generated and is reacted with the invader to avoid future damage. Also, back propagation neural BPN network is collaborated with the detection agent to detect the network attacks.
Archive | 2016
J. Arul Linsely; A. Shajin Nargunam
The rapid growth of wireless technologies requires compact, easily designed, and fabricated high-frequency antennas with a new technique. The antenna is designed using nano silver material which is coated on flexible cellulosic paper and then sintered to make a low-profile monopole paper antenna for UHF and VHF applications. Previously, metal antennas were used for receiving signals which have been replaced by using nano particles. The monopole antennas thus developed will be flexible, cost effective, biodegradable, and easy to be fabricated. Nowadays, due to rapid development in communication, flexible antennas are required for RF applications. This can be eco-friendly and also biodegradable. This monopole antenna is tested by using Antenna Training System (ATS-2002) developed by FALCON. These results are discussed here in this research work.
International Journal of Enterprise Network Management | 2016
R. Suji Pramila; A. Shajin Nargunam
In-home patient monitoring is one of the recent technology to monitor patients body parameters continuously. Wireless body sensor network (WBSN) is designed in patients home for real-time monitoring. Group of body sensors is fitted to the patients body to collect the vital signs of the patient. These parameters are stored in a local database and personal computer (PC) is acting as a local database. But Android mobile phone is used as a local database here to avoid the use of a PC. The mobile phone collects these details and transmitted to the hospital through internet for remote analysis. Security and privacy are very important features during the transmission of this confidential information. Here, a variation of cipher-text policy attribute-based encryption (CP-ABE) is used to ensure the security. It supports double encryption technique to enhance the security. Thus, this work provides a secure system for patients real-time health monitoring.
Archive | 2015
R. Suji Pramila; A. Shajin Nargunam
Recently wireless body area networks (WBAN) has been designed to monitor and collect patient’s vital parameters continuously and send them to the remote healthcare center or hospital. It is very important to protect the confidential data while transferring them. Different steganography techniques have been proposed for that. In a wavelet-based steganography, ECG signals were used to hide the patient’s confidential data and there is system degradation and it is not suitable to see the smoothness along the contours of the image. Here, contourlet transform is proposed, where image can be used as a host medium to improve the system performance. It combines encryption and scrambling technique to protect patient’s confidential data. The proposed method allows images to efficiently hide the patient’s confidential data and other physiological information. Typically, patient’s biological signals and other physiological readings are collected using sensors. The host image can be obtained from the technique called wireless capsule endoscopy (WCE). Capsule endoscopy is a way to record images of the digestive tract which is used in medical field. The capsule looks like a pill and contains a tiny camera. After a patient swallows the capsule, it takes pictures of the inside of the gastrointestinal tract. Encryption of patient’s confidential data prevents an unauthorized person who does not have the shared key from accessing patient’s confidential data. Therefore, the proposed contourlet technique guarantees secure medical data transfer.
international conference on control instrumentation communication and computational technologies | 2014
R. Manju; A. Shajin Nargunam; A. Rajendran
In real time applications, single modal biometric system have the limitations, due to noise sensitivity, intra class variability, non universality, data quality etc. These difficulties can be rectified by Multibiometric system. This paper presents effective fusion methodologies by multiple traits. The proposed multimodal biometric authenticated system have a number of incomparable merits, starts from Borda count method, principle component analysis(PCA) and Fishers linear Discriminant methods for entity matchers (face, iris, and fingerprint). For traits authentication from the different fusion method, to fuse different biometric results obtained from matches. This result shows that fusion of entity can the growth of biometric system performance.
international conference on signal processing | 2011
R. Altis Raja; P. G. Scholar; A. Shajin Nargunam
Node compromise is a serious threat in wireless sensor networks. Once a node is compromised an adversary can inject false data into the network and drop the data by pinpointing to a particular route. In this paper a scheme based on virtual energy based encryption using RC4 encryption mechanism is presented. The key to the RC4 encryption mechanism dynamically changes as the function of the residual virtual energy of the sensor changes. This residual virtual energy gets depleted as the node traverses different functional states. Thus different keys are generated based on the current residual virtual energy of the sensor node for successive data transmission. The sensed data is encrypted using RC4 algorithm and propagates from source node to the cluster head using randomized multipath algorithm. Due to the random propagation of data, even if the adversary pin points to a particular route he cannot collect all the data since, it takes different path for the same source node to the cluster head each time. The cluster head verifies the authenticity and integrity of the incoming data using the predicted value of the key generated by the senders virtual energy and forwards the data to sink, thus preventing the need for any control messages for key exchange. The simulation result shows that the average end to end delay and packet loss probability remain constant for any number of nodes and for varying no of event regions.
Indian journal of science and technology | 2016
R. Manju; A. Shajin Nargunam