Performance of Modified Elliptic Curve Digital
Signature Algorithm on Cloud Data
-- M Gayatri
Cloud computing plays a major role in providing different resources in the form of web services like tax calculation, e-banking, etc. One can rely on cloud computing if these web services are really secure enough to use. This paper focuses on analyzing the limitations of current cryptographic schemes used in providing security to data on cloud, highlights the usage of Elliptic Curve Cryptography (ECC) scheme used in cloud-based applications, implements elliptic curve digital signature algorithm on cloud data, and compares its performance with RSA-based scheme (Rivest et al., 1978). The performance of elliptic curve cryptosystem heavily depends on an operation called point multiplication. In this paper, a new point multiplication method using modified base representation is used. This method reduces the point addition as well as point doubling operations, thereby increasing the efficiency of computing time in performing encryption and decryption operations.
© 2014 IUP. All Rights Reserved.
Comparing the Properties of Communities Using Ontology
--Vijay Nayak and Bhaskar Biswas
Community detection is one of the major tasks in social network analysis. The behavior of a community depends on the properties on the basis of which the community was formed. In this paper, the authors propose a method to find the relationship between the different properties through ontology. The relationships among the properties help to understand the behavior of the communities and may be used for further evolution of the community.
© 2014 IUP. All Rights Reserved.
Improving Website Ranking for Multi-Term Query
Search Based on Its Trustworthiness
--Nikhil Agrawal, Vidhyadhar Jain and Bhaskar Biswas
This paper addresses the problem of ranking the websites. Various websites provide information which may be conflicting in nature, thereby confusing the end user. The traditional ranking methods of the websites are often based on the structure of the web or the structure of the webpage or the ‘hits’ by the users, which do not guarantee correct content which a user is searching for. An improvised model has been proposed for solving the said problem in ranking the websites. The proposed model identifies the key relationship between the website, its content and the searched query. The simulation result shows that the model not only successfully finds the trustworthy websites but also ranks these websites according to their relevance to the searched query.
© 2014 IUP. All Rights Reserved.
Performance Enhancement of Image Filtering
on GPU Using CUDA
--B Ramadasu
Image filtering is one of the important preprocessing steps in image processing. Advancement in the technology has brought development in both spatial and frequency domain. In Spatial filtering, the filtering operations are performed directly on the pixels of an image. Spatial filtering includes various techniques like gaussian blurring, edge detection, denoising, etc. This paper concentrates on accelerating image filtering with Graphical Processing Unit (GPU), such that the speedup and performance of the filtering process can be enhanced. GPU is an efficient way to accelerate image filtering and uses NVidia’s Compute Unified Device Architecture (CUDA) technology for parallel computing. Traditional CPU can run only a few complex threads concurrently. GPU allows a concurrent execution of hundreds or thousands of simpler threads in parallel. This paper includes two filtering techniques, namely, gaussian blur filter and sobel edge detection filter for grayscale images on GPU using CUDA programming language.
© 2014 IUP. All Rights Reserved.
Video Compression Using Improved QPSO Technique
and 3D-DWT
--Sk. Jumlesha and Ch. Satyanarayana
Video compression techniques are urbanized, but the efficiency of those techniques depends on the way they estimate and compensate the object motions in the video sequences. The proposed Quantum Particle Swarm Optimization (QPSO) technique is used to decrease the number of computations of video compression by maintaining the same or improving the quality of video. It provides perfect motion estimation with very low complexity in the context of video estimation. This algorithm should preserve high accuracy compared to the full search and diamond search.
© 2014 IUP. All Rights Reserved.
Robust Digital Image Watermarking Using 3AES
in Wavelet Domain
--Chittaranjan Pradhan, Bidyut Jyoti Saha, Arundhati Sahoo,
and Ajay Kumar Bisoi
Watermarking technique is used to provide ownership and copyright protection to the digital content. In this paper, a robust watermarking technique has been proposed using 3AES. Discrete Wavelet Transform (DWT) is chosen as the domain for the robustness. Advanced Encryption Standard (AES) is modified to triple AES (3AES) for the better security requirement. This technique is evaluated by Peak Signal to Noise Ratio (PSNR) and Normalized Cross-correlation (NC) values. The results suggest the robustness, imperceptibility and effectiveness of the proposed algorithm.
© 2014 IUP. All Rights Reserved.
|