By Topic

Recent Advances in Information Technology (RAIT), 2012 1st International Conference on

Date 15-17 March 2012

Filter Results

Displaying Results 1 - 25 of 185
  • [Front cover]

    Publication Year: 2012, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • Front inside cover]

    Publication Year: 2012, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (7 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (13 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (208 KB)
    Freely Available from IEEE
  • About the department

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (182 KB)
    Freely Available from IEEE
  • Conference Committees

    Publication Year: 2012, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • List of reviewers

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):1 - 11
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Author's index

    Publication Year: 2012, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2012, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE
  • Symmetric encryption using logistic map

    Publication Year: 2012, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (785 KB) | HTML iconHTML

    In Symmetric cryptography both the sender and receiver agree with the same key before they start communicating secretly. Same key is used for encryption and decryption. The communication is secret as long as the key is kept secret. A desirable property of symmetric encryption is termed as avalanche effect by which two different keys produces different ciphertext for the same message. Essential pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel time-stamped signature scheme based upon DLP

    Publication Year: 2012, Page(s):6 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB) | HTML iconHTML

    This paper presents a time-stamped signature scheme based upon discrete logarithm problem. The signature consists of authenticated timestamp provided by a trusted authority, known as Time-Stamping Service (TSS), which provides time-stamp without knowing the content of the document.. The signature is universally verifiable, i.e., anyone can verify the validity of the signature using system's public... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CRT based secured encryption scheme

    Publication Year: 2012, Page(s):11 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    This paper presents a simple but novel Cryptography system that is based on Chinese remainder theorem. This scheme is the one that uses little or limited computation power for encryption and much lesser requirements for decryption. Also space requirements will not add any more cost as many other systems. Also it is secure for use as good alternate encryption system to deal with multiple secrets an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An expeditious chaos based digital image encryption algorithm

    Publication Year: 2012, Page(s):14 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (413 KB) | HTML iconHTML

    Chaos based encryption techniques have been gaining immense attraction for the past few years with a view of enhancing security coupled with reduction in computational complexity. This paper explores the drawbacks of chaotic key based algorithm (CKBA) which was primarily designed for monochrome images. We put forth an improved chaotic key based image encryption algorithm for monochrome and color i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two key signature scheme with application to Digital Certificates

    Publication Year: 2012, Page(s):19 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (129 KB) | HTML iconHTML

    Elliptic curves offer all the features of the conventional cryptography like digital signatures, data encryption / decryption, key exchange, identification, etc. at a reduced key size. Standardized elliptic curve based signature schemes are described in ANSI X9.62, IEEE 1363-2000, etc. We propose a two key digital signature scheme using elliptic curves and compare our scheme with the standard sche... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient implementation of Advanced Encryption Standard (AES) for ARM based platforms

    Publication Year: 2012, Page(s):23 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (149 KB) | HTML iconHTML

    Now a days, hi-tech secure products need more services and more security. Furthermore, the corresponding market is now oriented towards more flexibility. In this paper, we have implemented Advanced Encryption Algorithm for ARM based platforms. The Advanced Encryption Standard (AES) contest, started by the U.S. National Institute of Standards and Technology (NIST), saw the Rijndael algorithm as its... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing security & integrity of data using watermarking & digital signature

    Publication Year: 2012, Page(s):28 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    Modern communications networks have many challenges and opportunities for improvement. Data integrity and its Security over a communication network is one of such challenges. Digital Watermarking have been proposed as a new method to impose ownership verification and protect data from tempering by illegitimate user. To make digital watermarking more effective digital signature or message authentic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Random sequence based secret sharing of an encrypted color image

    Publication Year: 2012, Page(s):33 - 37
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (845 KB) | HTML iconHTML

    Secret sharing was first proposed by Shamir and Blakley individually. It refers to a method of distributing secret information amongst a group of individuals say n, each of whom is allocated a share of the secret information. The secret can only be reconstructed when a sufficient number of individuals' shares say k are combined together. The existing Secret sharing schemes are complex and depend o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Color image authentication scheme in Linear Canonical Transform domain

    Publication Year: 2012, Page(s):38 - 42
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (724 KB) | HTML iconHTML

    In this paper, encryption/decryption of color image is proposed by using Linear Canonical Transform (LCT). The color image is to be encrypted, firstly separated into its three primary channels: red, green, and blue and then each channel are encrypted independently using double random phase encoding technique. The parameters which generate the LCT domain during encryption / decryption are considere... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis on various factors affecting the biometrics authentication

    Publication Year: 2012, Page(s):43 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (174 KB) | HTML iconHTML

    Many authentication schemes are being strategized which at least involves minimum two authentication procedures. For instance many multi Factor Based authentication implies that simply authentication mechanism is not sufficient, either serial or parallel implementation of few or best of them is necessary. However many authentication schemes become a success in one case may terribly fail in another... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of an efficient ID-based short designated verifier proxy signature scheme

    Publication Year: 2012, Page(s):48 - 53
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    In a designated verifier proxy signature scheme, the original signer delegates his signing capability to a designated person, called proxy signer. The proxy signer generates a valid signature, called proxy signature on behalf of the original signer. The designated verifier checks the correctness of the signature and convinces the original signer's agreement on the signed message. In this paper, we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Medical image enhancement using intuitionistic fuzzy set

    Publication Year: 2012, Page(s):54 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1449 KB) | HTML iconHTML

    In this paper, a novel image enhancement of medical images using intuitionistic fuzzy set theory is presented. In many image processing problems, preprocessing is required to improve the quality of images before processing. But for medical images, image enhancement is very useful as medical images are poorly illuminated and many of the important structures are hardly visible. Enhancement will impr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wavelet based features of circular scan lines for mammographic mass classification

    Publication Year: 2012, Page(s):58 - 61
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    Breast cancer is reported as the second most deadly cancer in the world on which public awareness has been increasing during the last few decades. Early detection can play an effective role in prevention and the most reliable detection technology is mammography. At the early stages of breast cancer, the clinical signs are very mild and vary in appearance, making diagnosis difficult even for specia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient illumination invariant face recognition technique using two dimensional linear discriminant analysis

    Publication Year: 2012, Page(s):62 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (442 KB) | HTML iconHTML

    An efficient illumination invariant face recognition method based on two-stage two dimensional linear discriminant analysis (2S2DLDA) is presented in this paper. The proposed method uses a reflectance-illumination model (RI-Model) based on maximum filter to obtain illumination invariants of an image. Various combinations of two dimensional feature extraction techniques (PCA, 2DPCA family and 2DLDA... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.