Medical image captioning provides the visual information of medical images in the form of natural... more Medical image captioning provides the visual information of medical images in the form of natural language. It requires an efficient approach to understand and evaluate the similarity between visual and textual elements and to generate a sequence of output words. A novel show, attend, and tell model (ATM) is implemented, which considers a visual attention approach using an encoder-decoder model. But the show, attend, and tell model is sensitive to its initial parameters. Therefore, a Strength Pareto Evolutionary Algorithm-II (SPEA-II) is utilized to optimize the initial parameters of the ATM. Finally, experiments are considered using the benchmark data sets and competitive medical image captioning techniques. Performance analysis shows that the SPEA-II-based ATM performs significantly better as compared to the existing models.
A Novel Approach for Concealed Data Sharing and Data Embedding for Secured Communication
This paper introduces a new method of securing image using cryptographic and steganographic techn... more This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other essages is Steganography, so that the secret's very existence is concealed. The term 'Steganography' describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a iphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
An improved mechanism of leaf node identification for radial distribution networks
2011 IEEE Power and Energy Conference at Illinois, 2011
Optimal operational & control aspects of distribution networks have been a thrust research ar... more Optimal operational & control aspects of distribution networks have been a thrust research area in academics as well as in industries since last two-three decades. In day to day practice, every one of us uses services offered by public utility distribution networks namely, water distribution network, electrical power distribution network etc. Operational topology of power distribution networks are radial in nature and hence are termed as radial distribution networks (RDNs). Network reconfiguration has been exercised as one of the prime and widely adopted approach for operational, maintenance and control activities of an RDN. Since last two decades, researchers have been using evolutionary computation based techniques (Genetic Algorithm [1], Simulating Annealing etc) for optimal network reconfiguration. The choices of network topology for the specific purpose/application requires a careful analysis of its merits and demerits. In RDNs, the ultimate performance of a specific network topology is usually assessed by an iterative algorithm known as Load flow analysis (LFA) and its execution results in estimation of voltages, currents and losses profiles which in turn decides, whether the obtained network topology is good or bad. Thus, an obvious need is in favor of developing a conceptual frame work for faster load flow algorithm especially to meet near real-time operation requirements. In this paper, a simple and computationally efficient method for terminal (leaf) nodes identification is presented and thus, by integrating this subroutine in LFA definitely leads to an efficient and faster LFA algorithm.
Signal & Image Processing : An International Journal, 2010
The science of securing a data by encryption is Cryptography whereas the method of hiding secret ... more The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret's very existence is concealed. The term 'Steganography' describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This paper introduces two new methods wherein cryptography and steganography are combined to encrypt the data as well as to hide the encrypted data in another medium so the fact that a message being sent is concealed. One of the methods shows how to secure the image by converting it into cipher text by S-DES algorithm using a secret key and conceal this text in another image by steganographic method. Another method shows a new way of hiding an image in another image by encrypting the image directly by S-DES algorithm using a key image and the data obtained is concealed in another image. The proposed method prevents the possibilities of steganalysis also.
Review of Mitigation Techniques to Overcome Security Attacks on SDN
2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)
The current rate of growth of technology requires better and modern networks which the traditiona... more The current rate of growth of technology requires better and modern networks which the traditional network is not capable of providing, which is due to issues in scaling or manual configuration of physical infrastructure. Further the lack of knowledge and the shortage of skill set or skilled professionals required with technical expertise has been one of the big issues, which is very much concerned for present scenario. This has led to the need of software defined network architecture wherein control and data plane are decoupled which helps in configuring the network for the changing demands. However this also poses some challenges like security. This brings the necessity to identify techniques to mitigate the security attacks on SDN. This research study reviews different mitigation techniques to overcome the security attack on SDN. Additionally, this research work identifies the limitations and future work, which can be done in this direction.
In the recent years, everything is in web. It may be Organization’s administration software, Cust... more In the recent years, everything is in web. It may be Organization’s administration software, Custom ERP application, Employee portals or Real estate portals. The Social networking sites like Face book, Twitter, MySpace which is a web application is been used by millions of users around the world. So web applications have become very popular among users. Hence they are observed and may be exploited by hackers. Researchers and industry experts state that the Cross-site Scripting (XSS) is the one of the top most vulnerabilities in the web application. The cross-site scripting has become a common vulnerability of many web sites and web applications. XSS consists in the exploitation of input validation flaws, with the purpose of injecting arbitrary script code which is later executed at the web browser of the victim. According to OSWAP, Cross-site scripting attacks on web applications have experienced an important rise in recent year. This demands an efficient approach on the server side...
A Semantic Approach to Text Steganography in Sanskrit Using Numerical Encoding
Steganography is the art of hiding a message within another so that the presence of the hidden me... more Steganography is the art of hiding a message within another so that the presence of the hidden message is indiscernible. People who are not intended to be the recipients of the message should not even suspect that a hidden message exists. Text steganography is challenging as it is difficult to hide data in text without affecting the semantics. Retention of the semantics in the generated stego-text is crucial to minimize suspicion.This paper proposes a technique for text steganography using classical language Sanskrit. As Sanskrit is morphologically rich with a very large vocabulary, it is possible to modify the cover text without affecting the semantics. In addition numerical encoding is used to map a Sanskrit character to a numerical value. This helps in hiding the message effectively. Moreover, in this technique, a key is used for additional security. The key is generated dynamically and is appended to the final message to further add security to the proposed method. The proposed ...
Smartphones have evolved over the years from simple devices to communicate with each other to ful... more Smartphones have evolved over the years from simple devices to communicate with each other to fully functional portable computers although with comparatively less computational power but inholding multiple applications within. With the smartphone revolution, the value of personal data has increased. As technological complexities increase, so do the vulnerabilities in the system. Smartphones are the latest target for attacks. Android being an open source platform and also the most widely used smartphone OS draws the attention of many malware writers to exploit the vulnerabilities of it. Attackers try to take advantage of these vulnerabilities and fool the user and misuse their data. Malwares have come a long way from simple worms to sophisticated DDOS using Botnets, the latest trends in computer malware tend to go in the distributed direction, to evade the multiple anti-virus apps developed to counter generic viruses and Trojans. However, the recent trend in android system is to have...
International Journal of Computer Network and Information Security, 2012
In the past decades, focus of computation has shifted to high performance computing like Grid Com... more In the past decades, focus of computation has shifted to high performance computing like Grid Computing and Cloud Computing. In Grid computing, grid server is responsible for managing the all resources like processor, memory and CPU cycles. Grids are basically networks that pool resources, CPU cycles, storage or data from many different nodes used to solve the complex or scientific problem. However in this case, security is a major concern. Even most grid security researches focus on user authentication, authorization and secure communication. This paper presents DDoS and Data Modification attack scenario and also provides the solution to prevent it. In case of data modification attack, it shows how easy to read/forward/modify the data exchanged between a cluster head node and computing nodes. Therefore this paper provides the solution to protect the grid computing environment against Data Modification and DDOS attack.
Computer Science & Information Technology (CS & IT), 2012
In the recent years, everything is in web. It may be Organization's administration software, Cust... more In the recent years, everything is in web. It may be Organization's administration software, Custom ERP application, Employee portals or Real estate portals. The Social networking sites like Face book, Twitter, MySpace which is a web application is been used by millions of users around the world. So web applications have become very popular among users. Hence they are observed and may be exploited by hackers. Researchers and industry experts state that the Cross-site Scripting (XSS) is the one of the top most vulnerabilities in the web application. The cross-site scripting has become a common vulnerability of many web sites and web applications. XSS consists in the exploitation of input validation flaws, with the purpose of injecting arbitrary script code which is later executed at the web browser of the victim. According to OSWAP, Cross-site scripting attacks on web applications have experienced an important rise in recent year. This demands an efficient approach on the server side to protect the users of the application as the reason for the vulnerability primarily lies on the server side. The actual exploitation is within the victim's web browser on the client-side. Therefore, an operator of a web application has only very limited evidence of XSS issues. However, there are many solutions for this vulnerability. But such techniques may degrade the performance of the system. In such scenarios challenge is to decide which method, platform, browser and middleware can be used to overcome the vulnerabilities, with reasonable performance over head to the system. Inspired by this problem, we present performance comparison of two mitigation techniques for Cross-site Scripting (XSS) at the server side based on the parameters like application's platform, middleware technology and browser used by the end user. We implemented Mitigation parsing technique using database and replace technique in different platforms, middleware and checked its performance. We calculated the time taken by different browsers to render the pages using two techniques under different platform and middleware. In this paper we proposed the best combination of development platform, browser and the middleware for the two mitigation technique with respect to developer and end users.
The science of securing a data by encryption is Cryptography whereas the method of hiding secret ... more The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This paper introduces two new methods wherein cryptography and steganography are combined to encrypt the data as well as to hide the encrypted data in another medium so the fact that a message being sent is concealed. One of the methods shows how to secure the image by converting it into cipher text by S-DES algorithm using a secret key and conceal this text in another image by steganographic method. Another method shows a new way of hiding an image in another image by encrypting the image directly by S-DES algorithm using a key image and the data obtained is concealed in another image. The proposed method prevents the possibilities of steganalysis also.
Uploads
Papers by Gaurav Prasad