2021 International Conference on Computational Performance Evaluation (ComPE)
Unless a powerful algorithm protects data transmitted over a wireless network, it is public. It i... more Unless a powerful algorithm protects data transmitted over a wireless network, it is public. It is still vulnerable to attacks despite several solutions. The paper provides a robust M-encrypt technique for securing a wireless network. M-encrypt is the best option photos sending images over a wireless network. The image is partitioned into four sections in the first step of the method. Using L-Fractal, the proposed approach encrypts each of the four sections separately. The segments are then encrypted and transformed into linear arrays before being sent across the network. To test SITF, an IEEE 802.11g and 802.16 simulation was done. Kali Linux and hacking software running on the Redmi Note 7 were used to test the susceptibility to attacks. There was no evidence of vulnerability to the attacks in the packets. Four parameters were used to assess the quality of the encrypted images. The results show that the image quality transmitted is excellent. Finally, we calculated the encryption, decryption, and overall packet transmission times on Wi-Fi and Wi-Max networks.
802.11 refers to a family of specifications developed by the IEEE for wireless LAN technology. IE... more 802.11 refers to a family of specifications developed by the IEEE for wireless LAN technology. IEEE accepted the specification for 802.11 in 1997. Wireless Local Area Network (WLAN) has become popular in the home due to ease of installation, and the increasing popularity of laptop computers. WLAN is based on IEEE 802.11 standard and is also known as Wireless Fidelity (WiFi) [1]. The task groups within the 802.11 working group have produced few extensions to the original specifications. The products of these extensions are named after the task group and the original specification for example, 802.11b is an extension developed by the task group b. The most popular extensions of 802.11 specifications are 802.11b, 802.11a, 802.11g and 802.11n. This article represents the major differences between various 802.11 standards, their operation, interoperability, and deployment constraints.
2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT)
This paper is part of a research which the authors are carrying out for designing a secured trans... more This paper is part of a research which the authors are carrying out for designing a secured transmission for IoT (Internet of Things). In this scenario group key plays a major role as vehicles would be grouped according to their size. A unique group key establishment system has been proposed where High Definition images(HDRI) are taken as a group key, the images are first watermarked using DWT and then encrypted and are assigned to each group. To access a device(source) of a group the key stored for the source is transmitted to the target trying to establish a connection. The target would be having the decryption algorithm where the image would be decrypted and the watermarked image is extracted and matched with the stored image, once a match is found the connection would be established between the source and the target but to access the device of the source target would again have to establish a simple device key authentication after which a complete connectivity would be possible. The proposed system is unique as there is no decryption key and uses images for authentication. It is the future of a secured IoT and networking as a whole. To check the robustness of the system various attacks including Man in the middle have been tried and quality of the extracted watermarked images has also been checked and it has been observed that the quality remains good even after transmitting the images in a linear form over the network.
Moving object detection and tracking are main initial steps in object recognition, context analys... more Moving object detection and tracking are main initial steps in object recognition, context analysis and index processes for visual surveillance system. IT is a big challenge for researchers to make a decision on which detection & tracking algorithm is more suitable. There is a variety of object D&T algorithms (i.e. methods) and publications on their performance comparison. This paper provides a systematic review of these algorithms and performance measures.
4 Abstract— In the modern era of communication Orthogonal Frequency Division Multiplexing (OFDM) ... more 4 Abstract— In the modern era of communication Orthogonal Frequency Division Multiplexing (OFDM) technique is the most widely used in wireless technology. With some advantage come few issues such as Peak to Average Power Ratio (PAPR) that leads High Power Amplifiers (HPA) to be worked in nonlinear region which causes inter-modulation distortion and out of band radiation. To overcome with this problem, several techniques were used. Whereas, this paper uses most efficient signal scrambling technique, Partial Transmit Sequence (PTS) and Selected Mapping (SLM) to be worked with various modulators such as Orthogonal Quadrature Phase Shift Key (OQPSK) and Quadrature Amplitude Modulator (QAM) and Binary Phase Shift Key (BPSK) . Under different modulator and different parameters like Sub-Band, Modulation factor, these techniques were analyzed and compared.
Covid-19 a small virus has created a havoc in the world. The pandemic has already taken over 4 la... more Covid-19 a small virus has created a havoc in the world. The pandemic has already taken over 4 lakh lives. The tests to detect a Covid-19 positive takes time and is costly. Moreover, the ability of the virus to mutate surprises the doctors every day. Present paper proposes a saliency-based model called Deep_Saliency. The model works on chest x-rays of healthy, unhealthy, and covid-19 patients. An x-ray repository of Covid-19, available in public domain, is taken for the study. Deep_Saliency uses visual, disparity, and motion saliency to create a feature dataset of the x-rays. The collected features are tested and trained using Long Short-Term Memory (LSTM) network. A predictive analysis is performed using the x-ray of a new patient to confirm a Covid-19 positive case. The first objective of the paper is to detect Covid-19 positive cases from x-rays. The other objective is to provide a benchmark dataset of biomarkers. The proposed work achieved an accuracy of 96.66%.
Cognitive radio is a new concept of reusing licensed spectrum in an unlicensed manner. The spectr... more Cognitive radio is a new concept of reusing licensed spectrum in an unlicensed manner. The spectrum must be sensed to detect primary user signals, in order to allow cognitive radios in a primary system. Spectrum sensing is to be done over a wide range of the electro-magnetic spectrum. While many of the signals of interest are similar in terms of the modulation techniques used, the characteristics of the transmission channel experienced by these signals can vary considerably depending upon the frequency range of operation. In the recent scenario 802.16 (commercially known as WIMAX) uses scalable OFDMA as physical layer transmission technique. This paper explores the issues in coexistence between cognitive systems and WiMax. Performance evaluation is done for time domain and frequency domain spectrum sensing techniques using time varying channel conditions.
2021 International Conference on Computational Performance Evaluation (ComPE)
Unless a powerful algorithm protects data transmitted over a wireless network, it is public. It i... more Unless a powerful algorithm protects data transmitted over a wireless network, it is public. It is still vulnerable to attacks despite several solutions. The paper provides a robust M-encrypt technique for securing a wireless network. M-encrypt is the best option photos sending images over a wireless network. The image is partitioned into four sections in the first step of the method. Using L-Fractal, the proposed approach encrypts each of the four sections separately. The segments are then encrypted and transformed into linear arrays before being sent across the network. To test SITF, an IEEE 802.11g and 802.16 simulation was done. Kali Linux and hacking software running on the Redmi Note 7 were used to test the susceptibility to attacks. There was no evidence of vulnerability to the attacks in the packets. Four parameters were used to assess the quality of the encrypted images. The results show that the image quality transmitted is excellent. Finally, we calculated the encryption, decryption, and overall packet transmission times on Wi-Fi and Wi-Max networks.
802.11 refers to a family of specifications developed by the IEEE for wireless LAN technology. IE... more 802.11 refers to a family of specifications developed by the IEEE for wireless LAN technology. IEEE accepted the specification for 802.11 in 1997. Wireless Local Area Network (WLAN) has become popular in the home due to ease of installation, and the increasing popularity of laptop computers. WLAN is based on IEEE 802.11 standard and is also known as Wireless Fidelity (WiFi) [1]. The task groups within the 802.11 working group have produced few extensions to the original specifications. The products of these extensions are named after the task group and the original specification for example, 802.11b is an extension developed by the task group b. The most popular extensions of 802.11 specifications are 802.11b, 802.11a, 802.11g and 802.11n. This article represents the major differences between various 802.11 standards, their operation, interoperability, and deployment constraints.
2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT)
This paper is part of a research which the authors are carrying out for designing a secured trans... more This paper is part of a research which the authors are carrying out for designing a secured transmission for IoT (Internet of Things). In this scenario group key plays a major role as vehicles would be grouped according to their size. A unique group key establishment system has been proposed where High Definition images(HDRI) are taken as a group key, the images are first watermarked using DWT and then encrypted and are assigned to each group. To access a device(source) of a group the key stored for the source is transmitted to the target trying to establish a connection. The target would be having the decryption algorithm where the image would be decrypted and the watermarked image is extracted and matched with the stored image, once a match is found the connection would be established between the source and the target but to access the device of the source target would again have to establish a simple device key authentication after which a complete connectivity would be possible. The proposed system is unique as there is no decryption key and uses images for authentication. It is the future of a secured IoT and networking as a whole. To check the robustness of the system various attacks including Man in the middle have been tried and quality of the extracted watermarked images has also been checked and it has been observed that the quality remains good even after transmitting the images in a linear form over the network.
Moving object detection and tracking are main initial steps in object recognition, context analys... more Moving object detection and tracking are main initial steps in object recognition, context analysis and index processes for visual surveillance system. IT is a big challenge for researchers to make a decision on which detection & tracking algorithm is more suitable. There is a variety of object D&T algorithms (i.e. methods) and publications on their performance comparison. This paper provides a systematic review of these algorithms and performance measures.
4 Abstract— In the modern era of communication Orthogonal Frequency Division Multiplexing (OFDM) ... more 4 Abstract— In the modern era of communication Orthogonal Frequency Division Multiplexing (OFDM) technique is the most widely used in wireless technology. With some advantage come few issues such as Peak to Average Power Ratio (PAPR) that leads High Power Amplifiers (HPA) to be worked in nonlinear region which causes inter-modulation distortion and out of band radiation. To overcome with this problem, several techniques were used. Whereas, this paper uses most efficient signal scrambling technique, Partial Transmit Sequence (PTS) and Selected Mapping (SLM) to be worked with various modulators such as Orthogonal Quadrature Phase Shift Key (OQPSK) and Quadrature Amplitude Modulator (QAM) and Binary Phase Shift Key (BPSK) . Under different modulator and different parameters like Sub-Band, Modulation factor, these techniques were analyzed and compared.
Covid-19 a small virus has created a havoc in the world. The pandemic has already taken over 4 la... more Covid-19 a small virus has created a havoc in the world. The pandemic has already taken over 4 lakh lives. The tests to detect a Covid-19 positive takes time and is costly. Moreover, the ability of the virus to mutate surprises the doctors every day. Present paper proposes a saliency-based model called Deep_Saliency. The model works on chest x-rays of healthy, unhealthy, and covid-19 patients. An x-ray repository of Covid-19, available in public domain, is taken for the study. Deep_Saliency uses visual, disparity, and motion saliency to create a feature dataset of the x-rays. The collected features are tested and trained using Long Short-Term Memory (LSTM) network. A predictive analysis is performed using the x-ray of a new patient to confirm a Covid-19 positive case. The first objective of the paper is to detect Covid-19 positive cases from x-rays. The other objective is to provide a benchmark dataset of biomarkers. The proposed work achieved an accuracy of 96.66%.
Cognitive radio is a new concept of reusing licensed spectrum in an unlicensed manner. The spectr... more Cognitive radio is a new concept of reusing licensed spectrum in an unlicensed manner. The spectrum must be sensed to detect primary user signals, in order to allow cognitive radios in a primary system. Spectrum sensing is to be done over a wide range of the electro-magnetic spectrum. While many of the signals of interest are similar in terms of the modulation techniques used, the characteristics of the transmission channel experienced by these signals can vary considerably depending upon the frequency range of operation. In the recent scenario 802.16 (commercially known as WIMAX) uses scalable OFDMA as physical layer transmission technique. This paper explores the issues in coexistence between cognitive systems and WiMax. Performance evaluation is done for time domain and frequency domain spectrum sensing techniques using time varying channel conditions.
Uploads
Papers by Anuj Saxena