K. Thenmozhi
Shanmugha Arts, Science, Technology & Research Academy
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by K. Thenmozhi.
Computers in Biology and Medicine | 2015
Padmapriya Praveenkumar; Rengarajan Amirtharajan; K. Thenmozhi; John Bosco Balaguru Rayappan
Secured sharing of the diagnostic reports and scan images of patients among doctors with complementary expertise for collaborative treatment will help to provide maximum care through faster and decisive decisions. In this context, a tri-layer cryptic solution has been proposed and implemented on Digital Imaging and Communications in Medicine (DICOM) images to establish a secured communication for effective referrals among peers without compromising the privacy of patients. In this approach, a blend of three cryptic schemes, namely Latin square image cipher (LSIC), discrete Gould transform (DGT) and Rubik׳s encryption, has been adopted. Among them, LSIC provides better substitution, confusion and shuffling of the image blocks; DGT incorporates tamper proofing with authentication; and Rubik renders a permutation of DICOM image pixels. The developed algorithm has been successfully implemented and tested in both the software (MATLAB 7) and hardware Universal Software Radio Peripheral (USRP) environments. Specifically, the encrypted data were tested by transmitting them through an additive white Gaussian noise (AWGN) channel model. Furthermore, the sternness of the implemented algorithm was validated by employing standard metrics such as the unified average changing intensity (UACI), number of pixels change rate (NPCR), correlation values and histograms. The estimated metrics have also been compared with the existing methods and dominate in terms of large key space to defy brute force attack, cropping attack, strong key sensitivity and uniform pixel value distribution on encryption.
Security and Communication Networks | 2015
Padmapriya Praveenkumar; Rengarajan Amirtharajan; K. Thenmozhi; John Bosco Balaguru Rayappan
Multimedia is ruling the digital era where data storage and transmission have gained huge importance. The refuge of such data transfer has been a chief apprehension and becomes the study in the limelight, probably, forever. The universal phenomenon is to send the desired data in disguise so that only the beneficiary can avail it. In this paper, a combination of space-filling curve with chaos has been used for encryption process. Initially, three chaotic sequences were generated using Chuas equations followed by quantification of those sequences. Key based on Hilbert curve is used for scrambling. For introducing confusion, the image is further scrambled using row and column shifting operations using the first two chaotic sequences used with space-filling curve. Then pixel replacement has been done by bit XOR between scrambled image and the third chaotic sequence. Finally, Gould transform is applied to enhance image authentication and tamper proofing of the encrypted image. In addition, deoxyribonucleic acid-based complementary addition rule is integrated to make the proposed scheme robust against statistical attacks, which also provides immense parallelism to generate the final encrypted image. The proposed methodology has been implemented in MATLAB 7.1. The results are compared with the existing methods. To validate the proposed system, image metrics like correlation coefficient, number of pixels change rate, unified average changing intensity, key sensitivity, cropping attacks, and noise have been computed. Copyright
international conference on computer communication and informatics | 2012
Padmapriya Praveenkumar; Rengarajan Amirtharajan; Yamini Ravishankar; K. Thenmozhi; John Bosco; Balaguru Rayappan
The safety of confidential information has always been a major concern everywhere ranging from the government, and defense details to our personal details. The increase in the illegal activities like financial theft, infringement, etc has necessitated the need for more secure systems. The level of safety required is also higher with the increase in the level of confidentiality of the data. In this paper, a novel information hiding method has been proposed for CDMA and MCCDMA in signal mapper block. In this paper different modulation scheme like BPSK, QPSK and 8-QAM are employed to study the performance of the proposed embedding method. It is found that introducing additional information in the signal mapper block is not affecting the performance of the regular transmission and also if the Signal to Noise Ration (SNR) is good enough then additional information would reveal itself in extraction on the receiver.
international conference on computer communication and informatics | 2012
Siva Janakiraman; A Anitha Mary.; Jagannathan Chakravarthy; Rengarajan Amirtharajan; K. Thenmozhi; John Bosco Balaguru Rayappan
Steganography is a science dealing with the hiding of the secured information in a harmless signal. The information may be embedded in an image, audio or video file. For image steganography, binary, gray scale or color images may be used as cover-images for hiding the secret data. In this paper a novel information hiding method has been proposed in spatial domain, to improve Imperceptibility, Security and payload using specialized Encoder/Decoder circuit for gray image. In this proposed method, a maximum of 1 or 2 bits has been altered to embed 4 bits of secret data. Furthermore this method would not just embed secret data in Least Significant Bits, it might be embedding the data in 1, 2, 3 and 5 or any one of the 15 possible combinations. This would heighten the security of the proposed method with reasonable imperceptibility.
international conference on computer communication and informatics | 2012
J. Avila; E. Vinoth; K. Thenmozhi
In a world where every single aspect is driven by technology and where the importance and Need of communication in every form is at its zenith, there expectedly arises an exigent need for faster and more efficient techniques of communication to effectively back the myriad utilizations of technology. With burgeoning demand for wireless connectivity, the stress put on an already scarce resource (namely spectrum) is reaching a breaking point. Hence, it has become pivotal to find ways for the efficient and equitable utilization of spectrum. Multiband Orthogonal Frequency Division Multiplexing (MBOFDM) is a technique that is primarily under consideration to tackle the problem of effective utilization of spectrum. One of the most popular systems in usage, the Ultra Wideband (UWB) systems, has a serious flaw. It poses a threat to other wireless connectors such as Wi-Fi, WiMax etc. As such interferences go against the scheme of equitable use; complicated interference cancellation schemes become necessary for the isolation of such networks. Traditionally, error control codes were used to make such troublesome or noisy channels available for reliable communication. But the other method that has recognizably more potential for solving the problem of spectrum congestion is Cognitive Radio. This paper mainly focuses on the MB-OFDM systems with the following enhancements: 1) Concatenation of convolutional code with Reed Solomon code and to analyze the performance of MBOFDM systems under various modulation schemes 2) Active interference cancellation between primary and secondary users using AIC tones and 3) Spectrum sensing using energy detection method and to train a classifier to do the same using neural network in order to solve the problem of spectrum.
Telecommunication Systems | 2017
Padmapriya Praveenkumar; Rengarajan Amirtharajan; K. Thenmozhi; John Bosco Balaguru Rayappan
Recently, the development of confidentiality and authenticity ensured by image encryption has been one of the key advancements in the field of secured wireless communication. The proposed work focuses on providing confusion, diffusion and permutation inherently in the system. The input grayscale image is shuffled by employing the Henon algorithm and subsequently separated into 8 bit planes. With the aid of a secret key of 256 bits, chaotic sequences are generated for each bit plane. Later, the logistic map is adapted on the chaotic sequences to obtain the scrambled image. Furthermore, this image is shuffled with Zaslavskii and Hilbert Space Filling Curve algorithms, which establishes the confusion stage. To incorporate the diffusion stage, a self-invertible matrix is generated by a latin square image cipher and a secret key. This matrix and the scrambled image underwent the Hill cipher to build the encrypted image followed by a row-column transformation to ensure multifold security. The proposed compound activities of encryption are successfully implemented on the laboratory virtual instrumentation engineering workbench 2013 platform. Noticeably, the established processes of image encryption are tested in the universal software radio peripheral environment and transceived via an additive white Gaussian noise (AWGN) channel. More specifically, the influence of natural and unnatural (cropping attack) noise on the characteristics of the encrypted image while sharing through AWGN channel has been investigated. Security analysis is performed by computing the unified average changing intensity, number of pixels change rate, correlation value, large key space to defy brute force attack, strong key sensitivity and uniform gray value distribution on encryption.
Multimedia Tools and Applications | 2016
Bakkiam David Deebak; K. Thenmozhi; Pitchai Iyer Swaminathan
Authenticated key agreement (AKA) is useful to preserve the secret (private) key for the data being transmitted over an insecure Thus, this paper proposes the strategies, such as short-term and long-term private keys for the three party authentication and key agreement (3PAKA) protocol. Recently, the IP Multimedia server and client systems have been sprung up for the Telecom Industry, though the systems have not had any proficient authentication mechanism for the fulfillment of security properties and mitigation of signal congestion, bandwidth consumption and end-to-end voice call delay. To address this issue, we present a novel 3PAKA that duplicates the long-term and short-term private keys to alleviate the signal congestion of the multimedia systems. It is then analyzed in the real time multimedia server–client systems to examine the metrics realistically. Besides, we employ the strategy of random Challenge-Response (CR) technique to declare the clock synchronization as invalid.
3rd International Conference on Trendz in Information Sciences & Computing (TISC2011) | 2011
Siva Janakiraman; A Anitha Mary.; Jagannathan Chakravarthy; Rengarajan Amirtharajan; K. Thenmozhi; John Bosco Balaguru Rayappan
Due to the technological advancements and menace of hacking, security has become the most important criterion in all fields. In order to achieve high information security in this regard, a method called steganography is employed. Steganography is the science of embedding data in any cover object without causing any discrepancy in the cover. In this paper, a novel information hiding method has been proposed using image steganography in spatial domain to improve the security and the payload in a gray scale image. In the proposed method, the maximum number of bits that has to be altered is two for embedding three bits in a pixel. It is also found that the proposed method has improved capacity with good imperceptibility.
Multimedia Tools and Applications | 2016
Bakkiam David Deebak; K. Thenmozhi; Pitchai Iyer Swaminathan
Recently, Session Initiation Protocol (SIP) has become a prime signaling protocol for the multimedia communication systems, though none of the researchers have analyzed its promising features, namely access independence, authentication scheme verification, AKA (Authentication and Key Agreement) security properties, 3GPP security properties, signal congestion, bandwidth consumption and computation overhead using the physical multimedia server-client platform. To examine the issues realistically, the existing authentication schemes, such as UMTS AKA, EPS AKA, Cocktail AKA, S AKA, HL AKA and ZZ AKA were designed and developed in the multimedia server-client systems deployed on Linux platform. The cross-examination revealed that the existing schemes failed to satisfy the IMS (IP Multimedia Subsystem) promising features, like mutual authentication, session-key sharing, (perfect) forward secrecy and implicit-key authentication. Thus, this paper proposes a Secure-Key Authentication and Key Agreement protocol (SK AKA) to meet out the standard demands of IMS. To curtail its authentication steps, the secure authentication vector SAV computes and dispenses the generated vectors between the multimedia server-client systems in advance, through the serving call session control function SCSCF. As a result, the execution steps of UMTS AKA are annulled for the sake of accomplishment of the IMS features. In addition, the protocol of SK AKA integrates the strategies of Context Identity CID and Elliptic Curve – Diffie Hellman (EC-DH) to resist most of the potential attacks like SIP flooding, forgery, man-in-the-middle, password guessing and key impersonation. To analyze the parameters, such as (SIP) Flooding Attack Detection Rate, End-To-End Delay of Multiple Voice Call Session, Call Success Rate, SIP Utilization, RTP Utilization, Call Response Time, Bandwidth Consumption and Signalling Congestion realistically, the proposed and existing authentication schemes have been coded and integrated in the real-time IMS client-server system. Above all, the thoroughgoing research has revealed that the proposed protocol of SK AKA accomplishes all the IMS challenges: 1. Adhere the promising features of IMS; 2. Attack resiliency; and 3. Fulfill the promising parameters of IMS, in comparison with the other existing schemes.
international conference on computer communication and informatics | 2016
Padmapriya Praveenkumar; P. Catherine Priya; K. Thenmozhi; John Bosco Balaguru Rayappan; Rengarajan Amirtharajan
Nowadays information is shared through online resources. It is necessary to provide security to the shared information. To maintain the secrecy of the information shared various techniques are used. Enabling multiple encryptions will disable the interloper to recover the information and to strengthen the security multi fold. Multiple Encryption are performed by shifting the particular block of the image using quantum polarization states, then the shifted output are coded using Convolution encoder and finally encrypted using Rubiks encryption algorithm. Result analysis was performed for DICOM images based on the statistical and security analysis.