Vandana Choksi | Dharmsinh Desai University (original) (raw)
Related Authors
International Journal of Engineering Research and Applications (IJERA)
Uploads
Papers by Vandana Choksi
Multiplication is an operation much needed in Digital Signal Processing for various applications.... more Multiplication is an operation much needed in Digital Signal Processing for various applications. This paper puts forward a high speed Vedic multiplier which is efficient in terms of speed, making use of Urdhva Tiryagbhyam, a sutra from Vedic Math for multiplication and MAC unit for performing addition of partial products and also compares it with the characteristics of existing algorithms. It enables parallel generation of intermediate products, eliminates unwanted multiplication steps with zeros and scaled to higher bit levels using Karatsuba algorithm with the compatibility to different data types. The below algorithms aids to parallel generation of partial products and faster carry generation respectively, leading to better performance. The code is written in Verilog HDL and implemented on ModelSim.
Visual cryptography technique encipher the visual information in such a way, that decipher can be... more Visual cryptography technique encipher the visual information in such a way, that decipher can be performed by human visual system without any complex process. Visual cryptography is a secure process for transmitting visual information but, if anyone gets access to all shares, he/she can reveal out the secret easily. In this paper a visual cryptography scheme is proposed. This technique first encrypts the secret using a symmetric key given by the user. Further, the encrypted image is divided into N different shares. These N shares can be distributed but, the end user needs only K of these shares to regenerate the original image. After piling of K shares, the original image is generated but it is still in encrypted form. The key which is used to encrypt the image originally is now required again to decrypt the image, thus providing an additional level of security. This technique is proposed for binary image, Grey scale image & colour images. Here the symmetric key used for encryption and decryption is any string (like password). Such a technique thus would be lucrative for defence and security.
Multiplication is an operation much needed in Digital Signal Processing for various applications.... more Multiplication is an operation much needed in Digital Signal Processing for various applications. This paper puts forward a high speed Vedic multiplier which is efficient in terms of speed, making use of Urdhva Tiryagbhyam, a sutra from Vedic Math for multiplication and MAC unit for performing addition of partial products and also compares it with the characteristics of existing algorithms. It enables parallel generation of intermediate products, eliminates unwanted multiplication steps with zeros and scaled to higher bit levels using Karatsuba algorithm with the compatibility to different data types. The below algorithms aids to parallel generation of partial products and faster carry generation respectively, leading to better performance. The code is written in Verilog HDL and implemented on ModelSim.
Visual cryptography technique encipher the visual information in such a way, that decipher can be... more Visual cryptography technique encipher the visual information in such a way, that decipher can be performed by human visual system without any complex process. Visual cryptography is a secure process for transmitting visual information but, if anyone gets access to all shares, he/she can reveal out the secret easily. In this paper a visual cryptography scheme is proposed. This technique first encrypts the secret using a symmetric key given by the user. Further, the encrypted image is divided into N different shares. These N shares can be distributed but, the end user needs only K of these shares to regenerate the original image. After piling of K shares, the original image is generated but it is still in encrypted form. The key which is used to encrypt the image originally is now required again to decrypt the image, thus providing an additional level of security. This technique is proposed for binary image, Grey scale image & colour images. Here the symmetric key used for encryption and decryption is any string (like password). Such a technique thus would be lucrative for defence and security.