Papers by prashanti guttikonda
This work deals with the combination of cryptography and steganography to handle the problems of ... more This work deals with the combination of cryptography and steganography to handle the problems of information security. A new encryption algorithm is proposed based on matrix scrambling which uses arithmetic operations, random functions, circular shifting and exchanging operations to get the encrypted message. Further, security is enhanced by steganography method where the encrypted message is hidden in the image based on the gini index value. For each R G B component of the pixel, gini index is calculated and the component with least value will have the encrypted message. The proposed method provides dual security since the encrypted message is hidden at different positions of 4 LSB of image. Avalanche effect is used as the metric for analyzing the performance of the encryption algorithm.
This work proposes an encryption method and a spatial domain method for hiding multiple binary se... more This work proposes an encryption method and a spatial domain method for hiding multiple binary secret images in a single cover image. Here, the sender and receiver has to share a secret key and this secret key is XORed with the binary secret images resulting in scrambled images. The scrambled binary images are concealed by placing the bits in the LSB of the cover image (either in gray scale or color image).The transmission of images is more secured with this method since it requires extraction as well as decryption with the correct key. The PSNR, MSE values, and histogram of the encryption method and LSB technique are given with MATLAB.
Ingénierie des systèmes d information, 2020
The proposed work is to provide security for audio data stored in cloud data centers and online s... more The proposed work is to provide security for audio data stored in cloud data centers and online song repositories such as hungama.com, iTunes, where huge number of songs is stored for listening and downloading. When polynomial secret sharing method is applied on secret audio, audio shares are generated each with the size of secret audio. Secret is derived only when a valid subset of members in the group are compromised. The purpose of the proposed work is to reduce the dimensions of shares. This can be achieved by having the amplitude values of the secret audio as the coefficients of the polynomial instead of random values in polynomial based secret sharing scheme. But having amplitude values as coefficients does not generate meaningless shares and reveals information about the secret. In this paper, two methods are proposed for generating meaningless audio shares such that the dimensions of each share are lesser than the dimensions of confidential audio. It gives dealer an advantage to securely store and distribute the shares by hiding the shares into other media. In the first method, secret audio is encrypted and the values of these encrypted audio are taken as the coefficients of the polynomial to generate the shares. Second method is implemented to reduce the burden of encryption and decryption. In this approach, for share construction the leading term in the polynomial will have random values as coefficient and for all other terms the coefficient are amplitude values of the secret audio. In both methods, shares generated are of reduced dimensions and are meaningless. Security of shares is enhanced by providing integrity mechanism to shares and steganography effect. A novel block cipher is implemented as compression function in the hash algorithm to generate checksum which is used for verifying integrity of shares.
Research Journal of Pharmacy and Technology, 2016
Removal of toxic metals from industrial wastewaters is essential from the stand point of environm... more Removal of toxic metals from industrial wastewaters is essential from the stand point of environmental pollution control. Among all heavy toxic metals nickel, mercury, lead, chromium and cadmium are in limelight due to their major impact on environment. Heavy metals have a tendency to accumulate and end up as permanent additions to the environment. It is evident that adsorption using biomaterials is an effective method for the removal of nickel(II) from industrial wastewaters. The usage of biomaterials is simple economically viable. By this method about 100% of Ni(II) removal is possible. From our studies it is evident that as adsorption time increases % removal of Ni(II) also increases. As the temperature increases the % removal of Ni(II) decreases. The activity of adsorbent is maximum and high % removal of Ni(II) was identified at a pH of 10 because of chemical precipitation of Ni.
Research Journal of Pharmacy and Technology, 2015
Removal of toxic metals from industrial wastewaters is essential from the stand point of environm... more Removal of toxic metals from industrial wastewaters is essential from the stand point of environmental pollution control. Among all heavy toxic metals nickel, mercury, lead, chromium and cadmium are in limelight due to their major impact on environment. Heavy metals have a tendency to accumulate and end up as permanent additions to the environment. It is evident that adsorption using modified fly ash is an effective method for the removal of nickel(II) from industrial wastewaters. The usage of modified fly ash is simple and economically viable. By this method 100% of Ni(II) removal is possible. From our studies it is evident that as adsorption time increases % removal of Ni(II) also increases. As the temperature increases the % removal of Ni(II) decreases. The activity of adsorbent is maximum and high % removal of Ni(II) was identified at pH of 9.4 to 10 because of chemical precipitation of Ni.
International Journal of Advanced Research in Computer Science and Software Engineering, 2017
The digital age expects to store or communicate information in a secured way. The primary method ... more The digital age expects to store or communicate information in a secured way. The primary method of securing the information is through passwords. An individual can access the information using password. In banking applications, like Netbanking or ATM pins, the passwords are sent to the receiver through registered post or courier. Instead of personally distributing the password, automation of the password is proposed. In this paper, a password processing method is suggested using visual cryptography and steganography to securely deliver the password in the form of an image shares hidden in a cover image, to the receiver. The receiver at the destination extracts the password and uses with ease.
Journal of The Institution of Engineers (India): Series B
Confidential information can be shared in a group with secret sharing scheme where no single user... more Confidential information can be shared in a group with secret sharing scheme where no single user can retrieve the secret. Only few or more in the group together only can restore the secret. The secret could be in the form of numeric, text, image, audio, etc. There are different methods to deal with the above said secrets. In this paper, Lagrange’s interpolation method is applied in the formation and restoration of shares on numeric, text, image and audio. Constant coefficients and random coefficients are used while considering the coefficients of polynomial and dissimilarity between shares, and secret is measured using Pearson correlation coefficient.
Uploads
Papers by prashanti guttikonda