Zobrazeno 1 - 10
of 47
pro vyhledávání: '"Har Narayan Upadhyay"'
Autor:
S. Sivaarunagirinathan, B. Ajith Bala, Shaik Fairooz, G. Sasi, Har Narayan Upadhyay, V. Elamaran
Publikováno v:
2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N).
Autor:
Har Narayan Upadhyay, R. Vijay Sai
Publikováno v:
Journal of Ambient Intelligence and Humanized Computing.
The elliptic curve cryptographic (ECC) technique is employed for various security standards like security key management, digital signature and data authentication. The ECC technique is capable of undertaking sequential and equivalent mode processes
Autor:
Sivaraman R, V. M. Padmapriya, B. Sowmya, Amirtharajan Rengarajan, Sundararaman Rajagopalan, Har Narayan Upadhyay
Publikováno v:
Emerging Technologies in Data Mining and Information Security ISBN: 9789811597732
The emerging growth in communication arena firmly demands a secure channel and needless to mention that security and privacy of the user are the top priorities in audio communication. To transmit audio signals safely, cryptography is being adopted wi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3cfcfccadf894f7042a43a8ee6568658
https://doi.org/10.1007/978-981-15-9774-9_13
https://doi.org/10.1007/978-981-15-9774-9_13
Autor:
Har Narayan Upadhyay, Sridevi Arumugham, Shriramana Sharma, Sundararaman Rajagopalan, Rengarajan Amirtharajan, John Bosco Balaguru Rayappan
Publikováno v:
Multimedia Tools and Applications. 78:10513-10541
The role of image encryption in secure communication of confidential images is quite significant and novel schemes to encrypt images always have a demand in the scientific research community. DNA coding has found a noteworthy position in various earl
Autor:
Sivaraman R, Sundararaman Rajagopalan, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan, Har Narayan Upadhyay
Publikováno v:
Microprocessors and Microsystems. 61:257-278
Image encryption is being employed as an important security provider to facilitate the communication of confidential images over various confidential networks. In this work, a RGB image encryption procedure based on Chaotic and Cellular Automata (CA)
Autor:
Dhivya Ravichandran, Rengarajan Amirtharajan, Sundararaman Rajagopalan, Har Narayan Upadhyay, John Bosco Balaguru Rayappan
Publikováno v:
Journal of Signal Processing Systems. 91:475-501
Secure transmission of medical information occupies a crucial role in the world of telemedicine applications. Reconfigurable hardware implementation offers several advantages over software implementation especially for real time security applications
Autor:
Rengarajan Amirtharajan, John Bosco Balaguru Rayappan, Sridevi Arumugham, Har Narayan Upadhyay, Sundararaman Rajagopalan, Sivaraman Rethinam
Publikováno v:
Multimedia Tools and Applications. 77:23449-23482
In multimedia communication, significance of the images for data representation is noteworthy. In this context, secure transmission of images over open channel has become a challenging task. Creation of different strategies in improving the secure im
Publikováno v:
Far East Journal of Electronics and Communications. :63-77
Publikováno v:
Microprocessors and Microsystems. 72:102891
The problem of lifetime maximization of PCM has been well studied. The arrival of non-volatile memory devices has replaced the traditional DRAM. Still the DRAM has many limitations on endurance and high power write operations. Similarly, number of de
Publikováno v:
2018 International Conference on Control, Power, Communication and Computing Technologies (ICCPCCT).
In the current semiconductor technology evolution, reliability is a primary concern especially for the applications like banking, defense, medical, etc. To improve the reliability, redundancy techniques are most commonly used by means of either in ha