Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Sukalyan Som"'
Publikováno v:
Multimedia Tools and Applications. 79:17761-17791
Detection and restoration of greatly tampered images is an important albeit difficult problem. Two schemes for the detection of tampered areas in images and their restoration have been presented. One of them works in the spatial domain and implements
Publikováno v:
2021 Devices for Integrated Circuit (DevIC).
In recent electrical power system, there is a greatest interest on operation, control and performance of AC micro-grid by research community throughout the world. In this context, this paper investigates power quality issues of grid-connected AC micr
Publikováno v:
2021 Devices for Integrated Circuit (DevIC).
In present electrical power system, there is a growing interest on study and analysis of AC grid connected wind power generation by research community throughout the world. In the same time there is always a concern for power system protection, and h
Publikováno v:
Multimedia Tools and Applications. 78:10373-10400
Partial encryption is one of the viable solutions for low power, high speed, real time secure multimedia communication. In this paper, a chaotic tent map based selective bitplane encryption technique is proposed for both gray scale and color images.
Publikováno v:
Nonlinear Dynamics. 80:615-627
In this communication, a chaos-based symmetric key encryption of RGB color images with multiple chaotic maps and pseudorandom binary number generator (PRBNG) has been proposed. The original image is first scrambled using generalized Arnold cat map to
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811034084
ACSS (1)
ACSS (1)
The traditional image encryption schemes, implementing fully layered encryption, seem to be undesirable in situations where there exists high data rate with limited bandwidth. A fully layered image encryption scheme first scrambles the image (to dest
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a76bf92f33f5f0529cc0e2642964f85f
https://doi.org/10.1007/978-981-10-3409-1_12
https://doi.org/10.1007/978-981-10-3409-1_12
Autor:
Sayani Sen, Sukalyan Som
Publikováno v:
Procedia Technology. 10:663-671
Research papers published in recent times have focused towards different kinds of image encryption techniques. Image encryption based on Chaos became very popular for cryptography since properties of Chaos are related to two basic properties of good
Autor:
Sukalyan Som, Moumita Som
Publikováno v:
International Journal of Computer Applications. 50:44-50
symmetric key cryptographic system has been proposed and it is termed as DSWLT. This proposed technique is very fast, suitable for encryption of large files. DSWLT consider the plain text (i.e. the input file) as binary string with finite no of bits.
Autor:
Sabyasachi Ghosh, Sukalyan Som
Publikováno v:
International Journal of Computer Applications. 39:53-56
Cryptography is considered to be a disciple of science of achieving security by converting sensitive information to an un-interpretable form such that it cannot be interpreted by anyone except the transmitter and intended recipient. An innumerable se
Autor:
Sukalyan Som, Diptarup Paul
Publikováno v:
International Journal of Computer Applications. 38:19-26
In this paper a Microcontroller based intelligent digital volume controller is presented to control music system and PC speaker volume digitally and change volume levels automatically in case of certain predefined incidents such as incoming or outgoi