Papers by Saroj Panigrahy
2008 7th IEEE International Conference on Cognitive Informatics, 2008
In this paper a novel offline signature verification scheme has been proposed. The scheme is base... more In this paper a novel offline signature verification scheme has been proposed. The scheme is based on selecting 60 feature points from the geometric centre of the signature and compares them with the already trained feature points. The classification of the feature points utilizes statistical parameters like mean and variance. The suggested scheme discriminates between two types of originals and forged signatures. The method takes care of skill, simple and random forgeries. The objective of the work is to reduce the two vital parameters False Acceptance Rate (FAR) and False Rejection Rate (FRR) normally used in any signature verification scheme. In the end comparative analysis has been made with standard existing schemes.
Comparative Study of ECG-Based Key Agreement Schemes in Wireless Body Sensor Networks
Advances in Intelligent Systems and Computing
A Biometric based Anonymous User Authentication Technique in Wireless Body Area Networks
2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)
An ANN based approach for wireless device fingerprinting
2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)
Study and analysis of human mental stress detection using galvanic skin response and heart rate sensors in wired and wireless environments
Research Journal of Pharmacy and Technology

Study and Analysis of Human Stress Detection using Galvanic Skin Response (GSR) Sensor in Wired and Wireless Environments
Research Journal of Pharmacy and Technology
Continuous monitoring of the chronic stress is an infeasible task for physicians and hence its di... more Continuous monitoring of the chronic stress is an infeasible task for physicians and hence its diagnosis is also nontrivial. Recent development in biological sensor and wireless technology has attracted researchers to carry out research in wireless body sensor networks (WBSN). This has enabled medical science in improving real-time monitoring and maintaining human health in a better way. In this work, a system has been developed for sensing human stress, based on acquisition, processing and analysis of the Galvanic Skin Response (GSR) signal collected from human bodies. The system detects human stress condition using the GSR signal acquired by wearable biological sensing devices when the person is in sitting, standing or sleeping conditions using a wired environment. Also the system is capable of remotely sensing human stress (while the person is in remote place within the range of wireless medium) with wireless sensor network technology. Popular supervised binary classifiers have been used for classifying the GSR data from the physiological dataset available in literature into binary classes, i.e., stress condition or relaxed condition and the results are presented.
This is to certify that the work in the thesis entitled A Secure Template Generation Scheme for P... more This is to certify that the work in the thesis entitled A Secure Template Generation Scheme for Palmprint Recognition Systems by Saroj Kumar Panigrahy is a record of an original research work carried out by him under my supervision and guidance in partial fulfillment of the requirements for the award of the degree of Master of Technology in Computer Science and Engineering in the department of Computer Science and Engineering, National Institute of Technology Rourkela. Neither this thesis nor any part of it has been submitted for any degree or academic award elsewhere.
A Novel Ecdlp-Based Blind Signature Scheme
AbstractIn this paper, a novel Blind Signature Scheme (BSS) based on Elliptic Curve Discrete Log... more AbstractIn this paper, a novel Blind Signature Scheme (BSS) based on Elliptic Curve Discrete Logarithm Problem (ECDLP) has been proposed. The signer signs the encrypted message after receiving it from the requester. Hence the signer has no scope to learn the contents of the ...
An Efficient Palmimprint Image Recognition System
... Sanjay Kumar Jena Department of CSE National Institute of Technology Rourkela, India-769 008 ... more ... Sanjay Kumar Jena Department of CSE National Institute of Technology Rourkela, India-769 008 [email protected] Abstract: Biometric identification is an emerging technology that can solve security problems in our networked society. ...
Man-in-the-Middle Attack and its Countermeasure in Bluetooth Secure Simple Pairing
... MITM attack and achieving all the security needs like authenticity, confidentiality, integrit... more ... MITM attack and achieving all the security needs like authenticity, confidentiality, integrity and availability as well as it is an improvement to the existing Bluetooth secure simple pairing in order to make it more secure. Page 7. Contents Certificate iii Acknowledgement iv Abstract v ...
A Novel Approach for Message Authentication to Prevent Parameter Tampering Attack in Web Applications
Procedia Engineering, 2012

Biometric identification is an emerging technology that can solve security problems in our networ... more Biometric identification is an emerging technology that can solve security problems in our networked society. As the important implementation of biometric technology, palmprint verification is one of the most reliable personal identification methods. Human palmprint recognition has become an active area of research over the last decade. In this paper, a new efficient approach to the palmprint preprocessing scheme is presented. In real-time palmprint verification the input subject to the scanner for image acquisition may suffer rotational as well as translational variation. Because when the user puts his/her palm on the scanner, the angle and position of the palm may change. So, different images are acquired by the scanner according to the input each time. But in our paper we have suggested a rotationalas well as translational-invariant scheme by which the above problem can be overcome while preprocessing the image before the feature extraction of the palmprint. With several palmprint images, we tested our proposed preprocessing system and the experimental results found good.
Recently, new families of wireless ad hoc networks have emerged for specialized applications-pers... more Recently, new families of wireless ad hoc networks have emerged for specialized applications-personal area networks. Wireless personal area networks (WPAN) is rapidly gaining popularity. A wide variety of traditional computing devices and embedded Internet appliances are networked around us. However, due to the broadcast nature of these networks and the heterogeneity of devices on these networks, new security problems will arise, because the different types of devices have different capabilities and security requirements. In this paper, an overview of security issues like attacks and its countermeasures for wireless personal area networks such as Bluetooth, RFID and wireless sensor networks has been provided.
In this paper, a novel efficient remote user authentication scheme using smart cards based on Ell... more In this paper, a novel efficient remote user authentication scheme using smart cards based on Elliptic Curve Discrete Logarithm Problem (ECDLP) has been proposed. A remote user authentication scheme is a two-party protocol whereby an authentication server confirms the identity of a remote individual logging on to the server over an untrusted, unsecured network. The password based authentication schemes are commonly used for authenticating remote users. Many passwords based schemes both with and without smart card have been proposed; each scheme has its merits and demerits. Our proposed scheme does not require verifier table and allows the user to choose their passwords. The proposed scheme also withstands message replying attack.
Web Usage Mining: An Implementation View
This paper describes the implementation of Web usage mining for DSpace server of NIT Rourkela. Th... more This paper describes the implementation of Web usage mining for DSpace server of NIT Rourkela. The DSpace log files have been preprocessed to convert the data stored in them into a structured format. Thereafter, the general procedures for bot-removal and session-identification from a Web log file have been applied with certain modifications pertaining to the DSpace log files. Furthermore, analysis of these log files using a subjective interpretation of recently proposed algorithm EIN-WUM has also been conducted.
Blind signature allows a requester to obtain signature from a signer on any document in such a wa... more Blind signature allows a requester to obtain signature from a signer on any document in such a way that, the authority learns nothing about the message that is being signed. Due to the blindness and untraceability properties of Blind Signature Scheme, it can be used in cryptographic applications such as web based e-voting, digital cash etc. In this paper, a novel blind signature scheme based on Elliptic Curve Discrete Logarithm Problem has been proposed. The model has been explained using a customer-and-bank example and the proof of correctness has been made.

Biometrics are expected to add a new level of security to applications, as a person attempting ac... more Biometrics are expected to add a new level of security to applications, as a person attempting access must prove who he or she really is by presenting a biometric to the system. The recent developments in the biometrics area have lead to smaller, faster and cheaper systems, which in turn has increased the number of possible application areas for biometric identity verification. The biometric data, being derived from human bodies (and especially when used to identify or verify those bodies) is considered personally identifiable information (PII). The collection, use and disclosure of biometric data — image or template, invokes rights on the part of an individual and obligations on the part of an organization. As biometric uses and databases grow, so do concerns that the personal data collected will not be used in reasonable and accountable ways. Privacy concerns arise when biometric data are used for secondary purposes, invoking function creep, data matching, aggregation, surveillance and profiling. Biometric data transmitted across networks and stored in various databases by others can also be stolen, copied, or otherwise misused in ways that can materially affect the individual involved. As Biometric systems are vulnerable to replay, database and brute-force attacks, such potential attacks must be analysed before they are massively deployed in security systems. Along with security, also the privacy of the users is an important factor as the constructions of lines in palmprints contain personal characteristics, from face images a person can be recognised, and fake signatures can be practised by carefully watching the signature images available in the database. We propose a cryptographic approach to encrypt the images of palmprints, faces, and signatures by an advanced Hill cipher technique for hiding the information in the images. It also provides security to these images from being attacked by above mentioned attacks. So, during the feature extraction, the encrypted images are first decrypted, then the features are extracted, and used for identification or verification.
In this paper, a secure and efficient protocol for vehicular ad hoc networks has been proposed th... more In this paper, a secure and efficient protocol for vehicular ad hoc networks has been proposed that ensures both message authentication and privacy preservation. As safety related message may contain life critical information, it is a necessity that the sender as well as the message are authentic. The proposed scheme is based on a secure elliptic curve digital signature algorithm approach. The proposed scheme supports conditional privacy, where the user's location can be revealed at the willingness of the user. Apart from this, the scheme is secure against attacks like DoS, Sybil and Grey/Black Hole attacks. From the comparison with previously proposed schemes, it is found that the proposed scheme as based on elliptic curve discrete logarithmic problem, outperforms existing algorithms based on integer factoring and discrete logarithmic problem.

In this paper, we propose a novel protocol for smart card based on Elliptic Curve Discrete Logari... more In this paper, we propose a novel protocol for smart card based on Elliptic Curve Discrete Logarithm Problem (ECDLP). We believe that applications of smart card technology should be benefited more from advantages of public key cryptography, specifically, in initiation and maintenance of secure channel. This paper introduces a public key cryptographic protocol for secure entity authentication, data integrity and data confidentiality. The proposed secure channel protocol uses a combination of secure public key system, secret key and a use of public encryption system to achieve the desired goal. In this paper, signature authentication along with signature encryption for smart card based on Digital Signature Authentication (DSA) using ECDLP has been proposed. Signature encryption is useful in protocols that guarantee the anonymity of the participants and its message. The proposed scheme can be easily extended to M-Commerce, Financial transactions and healthcare applications, where, the requester needs a signature on the message.
This is to certify that the work in the thesis entitled A Secure Template Gen-
Uploads
Papers by Saroj Panigrahy