Arindam Sarkar
Ramakrishna Mission Vidyamandira

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Privileged authenticity in reconstruction of digital encrypted shares Joydeep Dey; Anirban Bhowmik; Arindam Sarkar; Sunil Karforma
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 8, No 2: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (478.726 KB) | DOI: 10.11591/ijai.v8.i2.pp175-180

Abstract

Efficient message reconstruction mechanism depends on the entire partial shares received in random manner. This paper proposed a technique to ensure the authenticated accumulation of shares based on the privileged share. Threshold number of received shares inclusive of the privileged share, were being accumulated together to validate the original message. Although attaining threshold number of shares or more excluding the privileged share, it would not be possible to reconstruct the original message. Encryptional procedure has been put into the desired partial shares to confuse the evaesdroppers. Decisive parameter termed as hash tag has been extracted from the cumulative shares and bitwise checking procedure has been carried out. In appearance of first mismatch, rests of the checking bits were ignored, as test case put under failure transaction. Different statistical tests namely floating frequency, entropy value have proved the robustness of the proposed technique. Thus, extensive experiments were conducted to evaluate the security and efficiency with better productivity.
Computational intelligence based lossless regeneration (CILR) of blocked gingivitis intraoral image transportation Anirban Bhowmik; Joydeep Dey; Arindam Sarkar; Sunil Karforma
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 8, No 3: September 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (783.751 KB) | DOI: 10.11591/ijai.v8.i3.pp197-204

Abstract

This paper presented that an intraoral image has been wrapped during wireless transportation with an encryption tool with an added essence of lossless regeneration property. Threshold based cryptographic transportation has provided the construction of reliable and robust medical data communication system. The accumulation of threshold shares only would result to the formation of the intraoral gingivitis image at the receivers’ end. The proposed technique dealt with the generation of n number of partial shares by creating a unique frame structure by the dentist / physician. Additional feature has been proposed on the computational lossless transportation.The existing techniques cause a high computational complexity. The proposed technique ensured the lossless regeneration property while blocked gingivitis image sharing. Filling of bits have been incorporated to ensure the static sized homogeneous blocks of intraoral gingivitis image. A graphical masking method had been deployed, followed by successive decryption procedure on minimum threshold shares that ensure lossless data regeneration. This can guide the dental treatment with enhanced accuracy. Different types of statistical testing like entropy analysis and histogram analysis confirms the exhibition of authenticity, confidentiality, and integrity of our proposed technique.
Multilayer neural network synchronized secured session key based encryption in wireless communication Arindam Sarkar
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1174.09 KB) | DOI: 10.11591/ijai.v8.i1.pp44-53

Abstract

In this paper, multilayer neural network synchronized session key based encryption has been proposed for wireless communication of data/information. Multilayer perceptron transmitting systems at both ends accept an identical input vector, generate an output bit and the network are trained based on the output bit which is used to form a protected variable length secret-key. For each session, different hidden layer of multilayer neural network is selected randomly and weights or hidden units of this selected hidden layer help to form a secret session key. The plain text is encrypted through chaining, cascaded xoring of multilayer perceptron generated session key. If size of the final block of plain text is less than the size of the key then this block is kept unaltered. Receiver will use identical multilayer perceptron generated session key for performing deciphering process for getting the plain text. Parametric tests have been done and results are compared in terms of Chi-Square test, response time in transmission with some existing classical techniques, which shows comparable results for the proposed technique.