Papers by Nisheeth Saxena
Chapman and Hall/CRC eBooks, Apr 18, 2024
International Journal of Computer Applications, Nov 18, 2014
Visual cryptography allows the information to be encrypted using an encoding system. It does not ... more Visual cryptography allows the information to be encrypted using an encoding system. It does not require a computer to decode. Two transparent images are used in Visual Cryptography. One image contains the secret information and the other image contains random pixels. It is impossible to reveal the secret information from one of the images as both transparent images are required to retrieve the information. In this paper, we are working on the security of visual cryptography. Here we purpose a new scheme called three level sharing. In this case, we enhance the security of an image by dividing into shares and then after sub shares. For this purpose, stamping algorithm is used.
Advances in geospatial technologies book series, Apr 7, 2023
2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), Dec 2, 2022

Journal of Water and Climate Change
In the present work, we explored the inherent characteristics of the wind over a complex terrain ... more In the present work, we explored the inherent characteristics of the wind over a complex terrain site ‘Ranchi’ situated near a strategic location of the monsoon trough with various mathematical and statistical tools, i.e., time-series analysis, Fast Fourier transform (FFT), FFT coefficients, wavelet decomposition, and Weibull distribution. The time-series analysis showed a rapid day-to-day variability with a seasonal variation with a peak during summer. Fourier coefficients were concentrated for the winter/post-monsoon, indicating lower wind conditions, while wide spreads of the points indicate agility, i.e., high wind during the summer. The spectral features obtained using FFTs infer that wind has a prominent peak at a frequency f=0.00106724 (day−1) and f=0.00266809 (day−1). The power spectrum and wavelet decomposition show that the prominent frequencies correspond to yearly, eight, six, and four months. Weibull probability density function, cumulative probability distributions, an...
The Rabin cryptosystem is an asymmetric cryptographic algorithm. Its security is based on the pro... more The Rabin cryptosystem is an asymmetric cryptographic algorithm. Its security is based on the problem of integer factorization. Rabin cryptosystem has the advantage that the problem on which its security depends is proved to be as hard as factorization. The Rabin cryptosystem works in the domain of the odd primes which satisfy the criteria that
Received Dec 12, 2014 Revised Jan 20, 2015 Accepted Feb 26, 2015 The Rabin cryptosystem is an asy... more Received Dec 12, 2014 Revised Jan 20, 2015 Accepted Feb 26, 2015 The Rabin cryptosystem is an asymmetric cryptographic algorithm. Its security is based on the problem of integer factorization [4]. Rabin cryptosystem has the advantage that the problem on which its security depends is proved to be as hard as factorization [5]. Its minor disadvantage is that each output of the Rabin algorithm is generated by any of four possible inputs. If each output is a cipher text, extra complexity is required on decryption to identify which of the four possible inputs was the true plaintext. The process was published in January 1979 by Michael O. Rabin [2]. The Rabin cryptosystem was the first asymmetric cryptosystem where recovering the entire plaintext from the cipher text could be proven to be as hard as integer factorization. Keyword:

17 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. Abstract— Th... more 17 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. Abstract— There are two types of computing; one is conventional and another is unconventional. Turing machine is a hypothetical device and a conventional model, model of computation; it is not a random access machine, so to simulate current day’s basis systems; in a exact manner register machine had been defined, so they are conventional model of computing. Paradigms like DNA computing, Quantum computing, Membrane Computing, they are model of unconventional computing. These have comes an existence in their resent times and we have found a certain problems can tackle in a very efficient manner using this. The practical use of this is still a question and it’s being exploded. Membrane computing which biologically inspired and mathematically motivated. Membrane structure is an essential ingredient of a membrane computing, having hierarchical arrangement of membranes, like a cell or tree. This mainly de...

A smart grid is a technologically advanced and up-graded version of traditional power grid which ... more A smart grid is a technologically advanced and up-graded version of traditional power grid which uses Information and Communication Technology (ICT) to improve reliability, cost efficiency and sustainability of the power grid.Smart Grid Technology (SGT) is a promising evolving technology which will help us, in saving the energy, better utilizing our energy as well as in protecting our environment. Since SGT uses ICT, it is vulnerable to cyber-attacks and security threats, which may cause a lot of damage such as power outages during peak hours. Also consumers data need to be protected, since there is two way flow of information in smart grid from utilities to consumers and vice versa. Cryptography can play a very crucial role in refuting cyber-attacks and preserving the confidentiality and integrity of consumers data. In this paper we have proposed a signcryption scheme based on elliptic curves for the security of data packets in the smart grid. Our scheme alleviates the need of certification authority (CA), thus reducing the communication overhead. Also users (devices) need not generate their private keys, it is issued by the key generating center(KGC).Use of Signcryption in our scheme reduces computational cost and makes our scheme suitable for Smart Grids resource constrained environment.

Journal of Water and Climate Change, 2021
Aerosols are an integral part of Earth's climate system and their effect on climate makes thi... more Aerosols are an integral part of Earth's climate system and their effect on climate makes this field a relevant research problem. The artificial neural network (ANN) technique is an upcoming technique in different research fields. In the current work, we have evaluated the performance of an ANN with its parameters in simulating the aerosol's properties. ANN evaluation is performed over three sites (Kanpur, Jaipur, and Gandhi College) in the Indian region. We evaluated the performance of ANN for model's hyperparameter (number of hidden layers) and optimizer's hyperparameters (learning rate and number of iterations). The optical properties of aerosols from AERONET (AErosol RObotic NETwork) are used as input to ANN to estimate the aerosol optical depth (AOD) and Angstrom exponent. Results emphasized the need for optimal learning rate values and the number of iterations to get accurate results with low computational cost and to avoid overfitting. We observed a 23–25% inc...
In today's world several image manipulation software's are available. Manipulation of digital ima... more In today's world several image manipulation software's are available. Manipulation of digital images has become a serious problem nowadays. There are many areas like medical imaging, digital forensics, journalism, scientific publications, etc, where image forgery can be done very easily. To determine whether a digital image is original or doctored is a big challenge. To find the marks of tampering in a digital image is a challenging task. The detection methods can be very useful in image forensics which can be used as a proof for the authenticity of a digital image. In this paper we propose the method to detect region duplication forgery by dividing the image into overlapping block and then perform searching to find out the duplicated region in the image.

The use of digital photography has increased over the past few years, a trend which opens the doo... more The use of digital photography has increased over the past few years, a trend which opens the door for new and creative ways to forge images. Now a day's several software's are available that are used to manipulate image so that the image is look like as original. Images are used as authenticated proof for any crime and if these image does not remain genuine than it will create a problem. Detecting these types of forgeries has become serious problem at present. To determine whether a digital image is original or doctored is a big challenge. To find the marks of tampering in a digital image is a challenging task. A copy-move image forgery is done either for hiding some image entity, or adding more minutiae resulting in forgery. In both the case, image reliability is lost. Although this technology brings many advantages but it can be used as a confusing tool for hiding facts and evidences. In this paper we detect region duplication forgery by applying Discrete Cosine Transform. We divide the image into overlapping blocks and then search for the duplicated blocks in the image.
International Journal of Computer Applications, Nov 18, 2014
Visual cryptography allows the information to be encrypted using an encoding system. It does not ... more Visual cryptography allows the information to be encrypted using an encoding system. It does not require a computer to decode. Two transparent images are used in Visual Cryptography. One image contains the secret information and the other image contains random pixels. It is impossible to reveal the secret information from one of the images as both transparent images are required to retrieve the information. In this paper, we are working on the security of visual cryptography. Here we purpose a new scheme called three level sharing. In this case, we enhance the security of an image by dividing into shares and then after sub shares. For this purpose, stamping algorithm is used.
2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)
Uploads
Papers by Nisheeth Saxena