Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Garima Mehta is active.

Publication


Featured researches published by Garima Mehta.


2013 International Conference on Control Communication and Computing (ICCC) | 2013

An efficient and lossless fingerprint encryption algorithm using Henon map & Arnold transformation

Garima Mehta; Malay Kishore Dutta; Jan Karasek; Pyung Soo Kim

In this paper two stage biometric data protection scheme is being proposed using permutation and substitution mechanism of the chaotic theory which is lossless in nature. Arnold transformation and Henon map is used to design an efficient encryption system. The encryption method is aimed at generating an encrypted image that will have statistical properties completely dissimilar from the original image analysis which will make it difficult for any intruder to decrypt the image. The performance of the method has been experimentally analyzed using statistical analysis and correlation based methods. Correlation coefficient analysis is done to evaluate the behavior of pixels in horizontal and vertical directions and the results are found to be encouraging. This protection scheme provides the ability to encrypt the data and secure it from unauthorized users. Upon decryption the data is completely recovered making this scheme a lossless and efficient method of biometric data security.


international conference on contemporary computing | 2014

Edge based selective encryption scheme for biometric data using chaotic theory

Garima Mehta; Malay Kishore Dutta; Carlos M. Travieso-González; Pyung Soo Kim

Security of biometric data plays a major concern due to extensive use of biometric systems in many applications. This paper proposes an efficient method for encryption of iris images using edge based encryption algorithm based on chaotic theory. In this proposed technique, the iris image is segmented into significant and non significant blocks to find region of interest (ROI) i.e. to localize iris from complete eye image from which features are extracted to generate biometric template. Selective encryption is used to encrypt the region of interest and it reduces the computational overhead and processing time as compared to full encryption techniques. The experimental results prove that edge based selective encryption significantly reduces the time of encryption of iris images as compared to full encryption method without any compromise in performance. Performance of proposed algorithm has been experimentally analyzed using key sensitivity analysis and the results prove that the encryption algorithm has high key sensitivity and the algorithm is lossless in nature.


trans. computational science | 2016

A Secure Encryption Method for Biometric Templates Based on Chaotic Theory

Garima Mehta; Malay Kishore Dutta; Pyung Soo Kim

This paper presents an encryption based security solution for iris biometric template for secure transmission and database storage. Unlike conventionali¾?methods where raw biometric images are encrypted, this paperi¾?proposes method for encryption of biometric templates. The advantage of this method is reduced computational complexity as templates are smaller in size than the original biometric image making it suitable for real time applications. To increase the security of the biometric template, encryption is done by using the concept of multiple 1-D chaos and 2-D Arnold chaotic map. The proposed scheme provides a large key space and a high order of resistance against various attacks. Template matching parameters like hamming distance, weighted Euclidean distance, and normalized correlation coefficient are calculated to evaluate the performance of the encryption technique. The proposed algorithm has good key sensitivity, robustness against statistical and differential attacks and an efficient and lossless method for encrypting biometric templates.


international conference on telecommunications | 2015

Edge based block wise selective fingerprint image encryption using chaos

Garima Mehta; Malay Kishore Dutta; Radim Burget; Vaclav Uher

Security and privacy of biometric data plays major concern due to extensive use of biometric systems in high security applications like access to confidential data, information security and financial access etc. This paper proposes an efficient and lossless method for securing fingerprint images using edge based block wise selective encryption based on chaotic theory. In this proposed technique, fingerprint image is segmented into significant and non significant blocks and encryption is applied upon significant blocks which reduces the computational overhead and processing time as compared to full encryption techniques. Experimental results shows that edge based block wise selective encryption significantly reduces the time of encryption of fingerprint images as compared to full encryption method without any compromise in performance which suits real time applications. Experimental results also indicate that upon decryption data is completely recovered making the proposed scheme lossless in nature which suits the requirements of biometric pattern recognition.


international conference on telecommunications | 2016

Biometric data security using Fractional Fourier Transform and chaotic theory

Garima Mehta; Malay Kishore Dutta; Radim Burget; Lukas Povoda

In the recent past, biometrics found an extensive use in the field of data security and access control to maintain data confidentiality and restrict unauthorised access. As data theft cases are increasing the need of securing biometric data is a major concern. This paper presents an efficient and lossless encryption scheme based on transformation and chaotic domain to achieve high level of data confidentiality and security. Unlike conventional methods, the proposed scheme uses the substitution and permutation in reverse order using different domains to provide adequate security level. Experimental results shows that proposed method reduces the peak signal to noise ratio significantly making the proposed algorithm resistant to perceptual attacks. Also an increased key space is achieved due to the use of transformation domain in conjunction with spatial domain. Experimental results also show that proposed method is highly resistant to statistical and crypt analytical attacks which make it suitable for real time applications.


International Journal of E-health and Medical Communications | 2016

An Efficient and Lossless Cryptosystem for Security in Tele-Ophthalmology Applications Using Chaotic Theory

Garima Mehta; Malay Kishore Dutta; Pyung Soo Kim

Tele-ophthalmology has gained a lot of popularity as it involves retinal fundus images which can be analyzed for identification of severe diseases like diabetic retinopathy and glaucoma. With this increasing popularity, requirement for medical data confidentiality and privacy has also increased during transmission or storage. To meet this challenge, this paper propose an efficient and lossless cryptosystem based upon chaotic theory for encryption of medical fundus images. In the proposed encryption scheme a strategic combination of scrambling and substitution architecture is proposed which complements each other. The proposed scheme of encryption for fundus images is challenging as these images are 3-D color image and cannot be compressed as compression may not be able to retain all relevant medical information. For performance analysis, the proposed algorithm has been evaluated for perceptual and cryptographic security. The experimental results indicate that the proposed method is lossless and resistant against attacks making the proposed scheme suitable for real time applications.


international conference on cloud computing | 2017

Comparative analysis of joint encryption and watermarking algorithms for security of biomedical images

Siddhant Bansal; Garima Mehta

The security of multimedia content such as images while transmission is a cause of concern in current times. Traditional watermarking techniques help in identification of source as well as maintaining patient metadata for biomedical images. Similarly, traditional image encryption techniques allow privacy of patients. There is a need for a two-layer security approach with joint watermarking and encryption, to improve over contemporary methods. This paper presents comparative analysis of various joint encryption and watermarking algorithms of biomedical images to fin d the best pair of algorithms based on previous research. Comparative results also indicate that joint encryption and watermarking algorithms are suitable for security of biomedical images.


international conference on cloud computing | 2017

Automated transcription of instrumental music using sheetscore-mapping API and fuzzy classification technique

Pooja Maheshwari; Garima Mehta

In the area of digital audio processing, automated music transcription stands as a major enabler in decoding of chord schema so as to facilitate re-arrangement of music. The success rates were found to be largely dependent on the complexity of supplied audio files. Many methodologies can be taken as a base of this purpose of audio transcription, namely genetic transcription algorithm, Wu Pitch Tracking System, Auto-correlation etc. This paper presents an elaborate mapping schema for sheet music transcription which can upon through user acceptance testing be used as an external library for all transcription related research. This paper introduces a new approach to transcription which is simple at its core but requires complete understanding of the nature of sound waves. In this paper fuzzy classification method is used for automated music transcription. Proposed audio processing algorithm takes a monophonic instrumental audio as an input, generates edge detection and stem detection matrices and graphs. The experimental results prove that it gives encouraging results for songs of different tempos.


Information Security Journal: A Global Perspective | 2017

Combinational domain-based encryption using FrWT and hyper-chaotic system for biometric data security

Garima Mehta; Malay Kishore Dutta; Pyung Soo Kim

ABSTRACT An efficient hyperchaos-based combinational domain encryption scheme for securing iris images during transmission over unsecured data networks or database storage is presented in this article. From the region of interest (ROI) of an iris image, distinctive features are strategically extracted for template creation. The significant part, i.e., the ROI of an iris image, is encrypted in a transformational domain and the nonsignificant region is encrypted in a spatial domain. The advantage of this encryption scheme is increased key space and high degree of security compared to 1-D chaos-based systems. Apart from security, another advantage is reduced computational time compared to conventional encryption schemes implemented in either the spatial or frequency domain. The proposed scheme inherits the advantages of increased key space due to transform orders of the fractional wavelet transform (FrWT) and complex dynamical characteristics of hyperchaos, making the proposed scheme resistant to attacks. The properties of the FrWT and hyperchaos complement each other, making the system efficient and highly robust. Experimental results indicate that the proposed scheme reduces the computational time without compromising the security. Further security analysis is done for various attacks such as differential, statistical, and perceptual attacks, which give promising results and indicate that the proposed encryption scheme is efficient and robust.


international conference on computer communications | 2016

PSO and GA parameters estimation for digital watermarking algorithm

Varsha Parashar; Garima Mehta

The digital watermarking schemes provide multimedia exchanged between parties with copyright protection and authentication especially to digital media. In this paper a secured watermarking algorithm for strengthening of digital media using Particle Swan Optimization and Genetic Algorithm search optimization meta-heuristic techniques is proposed. Image quality is computed using Mean Squared Error, Normalized Cross Correlation and Peak Signal-to-Noise Ratio to calculate the distortion or noise in the image with respect to parameters like luminance, contrast and correlation loss. The coefficient is selected using Particle Swan Optimization and Genetic Algorithm to embed Discrete Wavelet Transformed high level coefficients on the host image. Different attacks are modelled to access the imperceptibility and robustness. The experimental results are reported to demonstrate the effective solution of the proposed schemes.

Collaboration


Dive into the Garima Mehta's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Pyung Soo Kim

Korea Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

Radim Burget

Brno University of Technology

View shared research outputs
Top Co-Authors

Avatar

Pooja Maheshwari

Guru Gobind Singh Indraprastha University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jan Karasek

Brno University of Technology

View shared research outputs
Top Co-Authors

Avatar

Lukas Povoda

Brno University of Technology

View shared research outputs
Top Co-Authors

Avatar

Vaclav Uher

Brno University of Technology

View shared research outputs
Top Co-Authors

Avatar

Carlos M. Travieso-González

University of Las Palmas de Gran Canaria

View shared research outputs
Researchain Logo
Decentralizing Knowledge