Sunil Karforma
The University of Burdwan

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Privileged authenticity in reconstruction of digital encrypted shares Joydeep Dey; Anirban Bhowmik; Arindam Sarkar; Sunil Karforma
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 8, No 2: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (478.726 KB) | DOI: 10.11591/ijai.v8.i2.pp175-180

Abstract

Efficient message reconstruction mechanism depends on the entire partial shares received in random manner. This paper proposed a technique to ensure the authenticated accumulation of shares based on the privileged share. Threshold number of received shares inclusive of the privileged share, were being accumulated together to validate the original message. Although attaining threshold number of shares or more excluding the privileged share, it would not be possible to reconstruct the original message. Encryptional procedure has been put into the desired partial shares to confuse the evaesdroppers. Decisive parameter termed as hash tag has been extracted from the cumulative shares and bitwise checking procedure has been carried out. In appearance of first mismatch, rests of the checking bits were ignored, as test case put under failure transaction. Different statistical tests namely floating frequency, entropy value have proved the robustness of the proposed technique. Thus, extensive experiments were conducted to evaluate the security and efficiency with better productivity.
Computational intelligence based lossless regeneration (CILR) of blocked gingivitis intraoral image transportation Anirban Bhowmik; Joydeep Dey; Arindam Sarkar; Sunil Karforma
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 8, No 3: September 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (783.751 KB) | DOI: 10.11591/ijai.v8.i3.pp197-204

Abstract

This paper presented that an intraoral image has been wrapped during wireless transportation with an encryption tool with an added essence of lossless regeneration property. Threshold based cryptographic transportation has provided the construction of reliable and robust medical data communication system. The accumulation of threshold shares only would result to the formation of the intraoral gingivitis image at the receivers’ end. The proposed technique dealt with the generation of n number of partial shares by creating a unique frame structure by the dentist / physician. Additional feature has been proposed on the computational lossless transportation.The existing techniques cause a high computational complexity. The proposed technique ensured the lossless regeneration property while blocked gingivitis image sharing. Filling of bits have been incorporated to ensure the static sized homogeneous blocks of intraoral gingivitis image. A graphical masking method had been deployed, followed by successive decryption procedure on minimum threshold shares that ensure lossless data regeneration. This can guide the dental treatment with enhanced accuracy. Different types of statistical testing like entropy analysis and histogram analysis confirms the exhibition of authenticity, confidentiality, and integrity of our proposed technique.
Recurrence relation and DNA sequence: A state-of-art technique for secret sharing Anirban Bhowmik; Sunil Karforma; Joydeep Dey
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 10, No 1: March 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v10.i1.pp65-76

Abstract

During the transmission over the Internet, protection of data and information is an important issue. Efficient cryptographic techniques are used for protection but everything depends on the encryption key and robustness of encryption algorithm. Threshold cryptography provides the development of reliable and strong encryption and key management machine which can reconstruct the message even in the case of destruction of some particular numbers of shares and at the opposite the data cannot be reconstructed unless an allowable set of shares are been gathered. The earlier techniques available in literature result in high computational complexity in the course of both sharing and reconstructing of message. Our method employs a brand new easy protecting technique based totally on unit matrix. The simple AND operation is used for percentage generation and reconstruction can be finished by way of easy ORing the stocks with threshold cost. We are proposing a sharing approach in conjunction with conventional cryptography technique for key control to make the key greater sturdy and for encryption we have used a session key the use of the idea of recurrence relation and DNA series Different types of experimental results confirm authenticity, confidentiality, integrity and acceptance of our technique.