Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
3,330
result(s) for
"Sridevi, A."
Sort by:
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs
2025
In the age of digital communication, safeguarding the security and integrity of transmitted images is crucial, especially for online and real-time applications where data privacy is paramount. This paper addresses the problem of protecting sensitive medical images during transmission by proposing a robust, lightweight encryption scheme. The proposed method uses keys derived from the Lorentz attractor for diffusion and a 16-bit Linear Feedback Shift Register (LFSR) for pseudo-random confusion. Additionally, the Cipher Block Chaining (CBC) process enhances the encryption output to ensure stronger security. A 512-bit hashing scheme using the Whirlpool algorithm is implemented to maintain data integrity, providing a robust hash comparison mechanism. The obtained hash values achieve a Hamming distance of 46.5–53.3% against the ideal value of 50%, demonstrating its high sensitivity. Furthermore, a custom-tailored lightweight symmetric key encryption secures the hash values before transmission from the sender alongside the encrypted images. At the receiver end, the hash is decrypted and compared with the extracted hash from the received cipher image to verify integrity, enabling secure decryption. The encrypted DICOM images achieve an average entropy value of 7.99752, a PSNR of 5.872 dB, NPCR of 99.66128%, and a UACI of 33.55964%, while the noise attack analysis further demonstrates its robustness. The entire process was implemented and tested on Xilinx PYNQ-Z1 System on Chip (SoC) boards, with user interaction facilitated through a custom-designed Graphical User Interface (GUI). The experimental results confirm the scheme’s effectiveness in securing medical images while maintaining integrity and resilience against attacks, making it suitable for real-time and wireless applications.
Journal Article
Novel rare-earth Eu and La co-doped ZnO nanoparticles synthesized via co-precipitation method: optical, electrical, and magnetic properties
by
Kavitha, M.
,
Sridevi, A.
,
Rubia, J. Jency
in
Characterization and Evaluation of Materials
,
Chemistry and Materials Science
,
Coprecipitation
2022
The key goal of this study is to use a simple co-precipitation technique to make pure ZnO Nanoparticles (NPs), Eu-doped ZnO NPs (1 wt%) and Eu–La co-doped ZnO NPs (1 wt%). Conventional quantitative methods were used to characterize the produced material. The synthesized nanomaterials are highly crystalline and have hexagonal wurtzite structure of ZnO, according to XRD analysis. Various functional groups present in the synthesized samples are recorded by FTIR studies. From UV–Vis DRS spectra, band gap was found to be 3.22, 3.16, and 3.10 eV, respectively, for pure ZnO, Eu-doped ZnO NPs and Eu–La co-doped ZnO NPs and it was discovered that the band gap value falls as the doping proportion in the ZnO lattice increases. The occurrence of Eu and La ions in the ZnO lattice was verified by EDS spectroscopy. PL spectrum confirms the slight variation in emission wavelength compared to pure ZnO NPs. At different temperatures, electrical conductivity measurements of synthesized samples are estimated by the dielectric constant, dielectric loss, and
ac
conductivity with different frequencies. The Eu-doped ZnO NPs and Eu–La co-doped ZnO nanocrystals displayed room temperature ferromagnetism (RTFM) in VSM tests. VSM analysis exhibits a maximum saturation magnetization (0.05198 emu/g) for La–Eu co-doped ZnO NPs (1 wt. %), which reveals the synthesized samples can be a probable candidate for optoelectronics and spintronic device fabrication.
Journal Article
Convolutional neural network and wavelet composite against geometric attacks a watermarking approach
2025
Digital e-governance has grown tremendously due to the massive information technology revolution. Banking, Healthcare, and Insurance are some sectors that rely on ownership identification during various stages of service provision. Watermarking has been employed as a primary factor in authenticating stakeholders in such circumstances. In this work, a three-layer feature-dependent image watermarking approach in the transform domain has been proposed. In this Discrete Wavelet Transform (DWT) influenced approach, the first decomposition level holds the Singular Values of a specific encrypted logo. In the second level of decomposition, the specific textual authentication signature is included in an arithmetic coding tag. The third level of decomposition has been utilised to keep the concerned identity of the owner in a compressed form using run-length coding. The proposed uniqueness of the scheme involves embedding a heavy payload watermark in the chosen grayscale cover image by utilising feature extraction and data compression, with a focus on preserving perceptual transparency and robustness. Various geometric variations and noise patterns, including Gaussian, salt and pepper, rotation, and cropping, were applied to the watermarked image to ensure its attack-resistant capability. After extracting the watermarks one by one, the reversibility of the cover image has been recovered through the Convolutional Neural Network (CNN) with a very low Mean Square Error (MSE). The proposed DWT-based scheme has achieved high perceptual transparency, as demonstrated by the Structural Similarity Index Measure (SSIM) and Normalised Correlation (NC) approach, which approaches unity. The integration of CNN enhances its robustness by recovering images against various attacks, as evidenced by achieving a PSNR of about 44 dB. Additionally, high SSIM (> 0.99) and NC (~ 1.0) values indicate enhanced perceptual transparency and robustness. The Bit error rate remained minimal post-attack, confirming reliable watermark recovery with CNN-aided restoration.
Journal Article
Studies on electrochemical properties of ZnO/CuMn2O4 NCs as electrode material for supercapacitor application
by
Chinnusamy, T. R.
,
Sridevi, A.
,
Meivel, S.
in
Bending vibration
,
Characterization and Evaluation of Materials
,
Chemistry and Materials Science
2024
The current study involved a two-step process to create nanocomposites (NCs) of Zinc oxide (ZnO)
/
Copper manganite (CuMn
2
O
4
). Pure ZnO, CuMn
2
O
4
nanoparticles, and ZnO/CuMn
2
O
4
NCs were synthesized through co-precipitation and hydrothermal techniques. The Power X-ray Diffraction (PXRD) pattern indicates the existence of hexagonal wurtzite and spinel cubic phase structures of ZnO and CuMn
2
O
4
in ZnO/CuMn
2
O
4
NCs. The appearance of three peaks at 542 cm
−1
, 634 cm
−1
, and 439 cm
−1
in ZnO/CuMn
2
O
4
NCs can be attributed to the stretching and bending vibration bands of Mn–O, Cu–O, and Zn–O metal oxides as revealed by the FTIR studies. FESEM analysis revealed that the ZnO, CuMn
2
O
4
and ZnO/CuMn
2
O
4
NCs had a spherical morphology, while EDAX analysis identified the elemental composition of Zn, Cu, Mn, and O in the prepared materials. Cyclic voltammetry (CV), galvanostatic charge discharge (GCD), and electrochemical impedance spectroscopy (EIS) measurements were used to investigate the electrochemical performance of the prepared material. According to the electrochemical findings, the ZnO/CuMn
2
O
4
electrode exhibited Faradic behavior similar to that of a battery, and at a current density of 0.4 Ag
−1
in a 2 M KOH electrolyte, it recorded the highest specific capacitance value of 562.36 Fg
−1
compared to ZnO and CuMn
2
O
4
. Based on the observed results, prepared ZnO/CuMn
2
O
4
NCs are well suited for ultrafast redox kinetics due to their improved ionic conductivity and electrochemical stability.
Journal Article
Improving Quality of Service (QoS) in Wireless Multimedia Sensor Networks using Epsilon Greedy Strategy
2024
Wireless Multimedia Sensor Networks (WMSNs) are networks consisting of sensors that have limitations in terms of memory, computational power, bandwidth and battery life. Multimedia transmission using Wireless Sensor Network (WSN) is a difficult task because certain Quality of Service (QoS) guarantees are required. These guarantees include a large quantity of bandwidth, rigorous latency requirements, improved packet delivery and lower loss ratio. The main area of research would be to investigate the process of greedy techniques that could be modified to guarantee QoS provisioning for multimedia traffic in WSNs. This could include optimization of routing decisions, dynamic allocation of resources and effective congestion management. This study introduces a framework called Epsilon Greedy Strategy based Routing Protocol (EGS-RP) for multimedia content transmission over WSN. The framework focuses on energy efficiency and QoS by using reinforcement learning to optimize rewards. These incentives are determined by a number of variables, including node residual energy, communication energy and the effectiveness of sensor type-dependent data collection. Experimental analysis was conducted to evaluate the effectiveness of the proposed routing strategy and compare it with the performance of standard energy-aware routing algorithms. The proposed EGS-RP achieves a throughput of 217 kbps, a bandwidth of 985 bps, a packet delivery ratio of 94.45% and an energy consumption of 32%.
Journal Article
On Chaos based duo confusion duo diffusion for colour images
2022
In recent years, owing to the frequent flow of digital images worldwide over the transmission media, it has become essential to secure them from leakages. Moreover, many applications like military image databases, confidential video conferencing, medical imaging systems, cable TV, online personal photograph albums, etc., require reliable, fast and robust security systems to transmit digital images. Among the available encryption schemes, chaos-based (Chaos means randomness) encryption techniques are considered acceptable, which provides randomness and high security. In this work, chaos assisted Color image encryption has been proposed. Initially, the Colour image is split into its RGB planes. To accomplish the encryption on RGB planes, duo confusion and duo diffusion through chaotic maps and attractors have been performed. Confusion and diffusion have been carried out in each plane in two stages, namely – block and plane, for which Logistic Map, Lorenz Attractor, Tent map and Lu attractor with different initial conditions and seeds are used. Finally, the separated RGB planes have been merged to produce an encrypted image. Standard encryption analyses such as – statistical attack analyses, encryption quality analyses, keyspace analyses, and chi-square tests have been performed to evaluate the proposed work. To evidence, the proposed method’s attack resistance capability, chosen plain text, noise and cropping attacks have been conducted
Journal Article
Design of tri-layer image encryption scheme using Calendar Month Vowel Count (CMVC) approach
by
Manikandan, C.
,
Sridevi, A.
,
Gamana, A.
in
Algorithms
,
Computer Communication Networks
,
Computer Science
2022
Along with the growth of the internet, multimedia communication has also increased rapidly over the years. The digital image is an essential part of multimedia technology; thus, secure image transmission is essential to maintain privacy. To achieve privacy, several image encryption schemes have been developed. Inspired by those techniques, a new tri-layer image encryption algorithm based on CMVC (Calendar Month Vowel Count) coding logic has been proposed. The key used in this algorithm is generated based on the number of vowels in each month of the year. Using this concept, the scheme has ended up with a 24-bit key. This key has been used to encrypt the image using three-level substitution, scrambling, and cyclic shift. Further, the Chen attractor has been utilized to induce more randomness in the pixel values. The encryption technique proposed is much more robust, which resist unauthorized users from decrypting the image. This encryption technique offers good resistance to ciphertext attacks, which was a significant disadvantage in DNA coding. Also, this proposed scheme yields an average entropy of 7.99 and a near-zero correlation. It has a maximum keyspace of 3(33.24915 × 10
168
) to resist the brute force attack.
Journal Article
Pullikolam assisted medical image watermarking on reconfigurable hardware
by
Sridevi, A
,
Raj, Vinoth
,
Bhogi, Tarunraj
in
Algorithms
,
Chips (memory devices)
,
Cross correlation
2023
This paper proposes that Pullikolam influenced medical image watermarking on Field Programmable Gate Array (FPGA). This watermarking scheme undergoes three successive operations: Look Up Table (LUT) formation for Pullikolam, Pixel localisation and Least Significant Bit (LSB) substitution. Additionally, this data hiding strategy employs on-chip embedded memory to store the data. This proposed architecture has been designed using Verilog HDL and implemented on Altera Cyclone IV E EP4CE115F29C7 FPGA. This watermarking scheme is consumed 3269 Logic Elements (LEs) which is 3% of the available LEs. Also, it requires only 5.24 mS to perform watermarking on 256 × 256 medical images. This work has achieved an average Mean Square Error (MSE) of < 5, and Normalized Cross-Correlation (NCC) is close to an ideal which is evidence of the robustness of the algorithm. Further, near-zero perceptual transparency has been attained through the Structural Similarity Index Matrix (SSIM) and histogram analyses that confirm the strength of the scheme.
Journal Article
Investigations on the Physical Parameters and Real Time Protection of Distributed Transformers using Internet of Things
by
Amuthameena, S
,
Sridevi, A
,
Elizabeth Caroline, B
in
Distributed transformer
,
Internet of Things
,
Real time protection
2021
This paper presents the design and implementation of a mobile embedded system to monitor load currents, over voltage and transformer temperature. The on-line supervising system integrates global system for mobile communication (GSM) modem, with node microcontroller unit (MCU), sensors and transformers. It was installed at the distribution transformer site. The output values of sensors and transformers were processed and recorded in the cloud using internet on things. System programmed with some predefined instructions to check abnormal conditions. If there is any abnormal value found in the system, the GSM module will send messages to selected mobile at the same time it cut off the supply form the load. Every half an hour it send actual value of current, voltage and temperature of transformer. This mobile system will help the utilities to protect transformer and identify problems before any extremely failure happens. For future analysis it retrieve data from cloud using think speak platform. This system will be an advanced step to the automation by reducing human dependency and increases the reliability of distribution network.
Journal Article
Biobleaching of paper pulp with xylanase produced by Trichoderma asperellum
by
Ramanjaneyulu, G.
,
Sridevi, A.
,
Suvarnalatha Devi, P.
in
Agriculture
,
biobleaching
,
Bioinformatics
2017
This study is aimed at assessing the biobleaching activity of fungal xylanase on paper pulp isolated from Tirumala forest, Eastern Ghats of India. Of the 98 fungal isolates obtained after initial screening, eight isolates were selected and one potential strain was further cultivated under submerged fermentation for production of xylanase. The biobleaching efficiency on waste paper pulp and paper industry effluent was tested with crude enzyme. Xylanolytic activity by the chosen organism in submerged fermentation reached the maximum (981.1 U ml
−1
) on the 5th day of incubation. Molecular characterisation of the isolate led to its identification as
Trichoderma asperellum
which exhibited the production of enzyme even at alkaline pH of the culture medium. Xylanase pretreatment of paper pulp had shown reduction in the Kappa number by 4.2 points and increased brightness by 4.0 points. FTIR and SEM studies revealed loosening of pulp fibres after enzyme treatment. In conclusion, xylanase of
Trichoderma asperellum
was effective as a pulp biobleaching agent and the process is economical as well as eco-friendly.
Journal Article