Thounaojam Rupachandra Singh | Manipur University (original) (raw)
Uploads
Papers by Thounaojam Rupachandra Singh
International journal of recent technology and engineering, Jan 30, 2020
Wireless Sensor Network (WSN) is susceptible to various kinds of security attacks such as the mis... more Wireless Sensor Network (WSN) is susceptible to various kinds of security attacks such as the misdirection attack. Detection of misdirection attack in WSN is a difficult job. The malicious node misdirects the arriving packets to a node other than the purposive node in the path from the source to the destination. Consequently, it introduces high end-to-end delay in the network. A novel technique for detection of misdirection attack in WSN without using cluster heads is proposed in the paper. The proposed detection technique has been implemented using Omnetpp 5.4.1 on four different network scenarios (10, 20, 30, and 40 numbers of nodes) and varying number of malicious nodes. The results of simulation shows that the proposed technique delivers better detection rate with reduced end-to-end delay compared to the detection method which uses cluster heads.
2022 International Conference on Decision Aid Sciences and Applications (DASA), Mar 23, 2022
AIP Conference Proceedings
2022 International Conference on Decision Aid Sciences and Applications (DASA)
Journal of critical reviews, 2020
Image upscaling takes a key role in the field of image processing to enhance the image and video ... more Image upscaling takes a key role in the field of image processing to enhance the image and video resolution for Super Resolution (SR) in the devices such as computer system as well as in smart phone. Nowadays many remarkable machine learning based techniques of image RS are being developed. In this paper a survey on current advanced image SR techniques which use the machine learning approaches with a systematic way is presented. It is also presented other topics regarding metrics along with publicly available benchmark datasets for evaluation of the performance. Here we give the conclusion for this survey after evaluation of the results by highlighting the merits and demerits of the techniques along with potential directions.
Evolutionary Computing and Mobile Sustainable Networks, 2020
Wormhole attack is a harmful attack that disrupts the normal functioning of the network by manipu... more Wormhole attack is a harmful attack that disrupts the normal functioning of the network by manipulating routing protocols and exhausting network resources. The paper presents a technique that detects the presence of wormhole attack in wireless sensor network (WSN) using artificial neural network (ANN). The proposed technique uses connectivity information between any two sensor nodes as the detection feature. The proposed technique has been implemented considering the deployment of sensor nodes in the wireless sensor network area under uniform, Poisson, Gaussian, exponential, gamma & beta probability distributions. The proposed technique does not require any additional hardware resources and gives a comparatively high percentage of detection accuracy.
International Journal of Recent Technology and Engineering (IJRTE), 2020
Wireless Sensor Network (WSN) is susceptible to various kinds of security attacks such as the mis... more Wireless Sensor Network (WSN) is susceptible to various kinds of security attacks such as the misdirection attack. Detection of misdirection attack in WSN is a difficult job. The malicious node misdirects the arriving packets to a node other than the purposive node in the path from the source to the destination. Consequently, it introduces high end- to- end delay in the network. A novel technique for detection of misdirection attack in WSN without using cluster heads is proposed in the paper. The proposed detection technique has been implemented using Omnetpp 5.4.1 on four different network scenarios (10, 20, 30, and 40 numbers of nodes) and varying number of malicious nodes. The results of simulation shows that the proposed technique delivers better detection rate with reduced end- to- end delay compared to the detection method which uses cluster heads.
Turkish Journal of Computer and Mathematics Education (TURCOMAT), Jun 28, 2021
In this present time, it is very easy to get a digital image through our smartphone we use everyd... more In this present time, it is very easy to get a digital image through our smartphone we use everyday. Thus easily our digital image can be processed and used by other people without our knowledge. The original image gets manipulated and processed for various reasons without the authentication of those who belong to it. Due to this reason image copy detection plays a significant role. This research paper tries to present the image copy detection model for the 2 most common image tampering method which includes copy-image forgery detection and Image Splicing. Also Feature extraction process is done through the Speeded up robust features(SURF), and Scale Invariant Feature Transform(SIFT) Descriptor method for identifying the matching point. In the case of Image Splicing Detection, it is used for extracting the image edges of Y(brightness in luma), Cb(blue minus luma), and Cr (Red minus luma) of the image components. Gray Level Co-Occurrence Matrix (GLCM) is utilized for each and every e...
Wormhole attack is a harmful attack that disrupts the normal functioning of the network by manipu... more Wormhole attack is a harmful attack that disrupts the normal functioning of the network by manipulating routing protocols and exhausting network resources. The paper presents a technique that detects the presence of wormhole attack in wireless sensor network (WSN) using artificial neural network (ANN). The proposed technique uses connectivity information between any two sensor nodes as the detection feature. The proposed technique has been implemented considering the deployment of sensor nodes in the wireless sensor network area under uniform, Poisson, Gaussian, exponential, gamma & beta probability distributions. The proposed technique does not require any additional hardware resources and gives a comparatively high percentage of detection accuracy.
Journal of Advanced Research in Dynamical and Control Systems, 2019
Normally the quality of an image is improved by enhancing contrast and sharpness. The enhancement... more Normally the quality of an image is improved by enhancing contrast and sharpness. The enhancement of contrast and sharpening of an image with a single function is a complex task. In real-time imaging, many complex scenes require local contrast improvements that should bring details to the best possible visibility of the image. However, local enhancement methods mainly suffer from ringing artefacts and noise over-enhancement. In this paper, we present a new adaptive spatial domain contrast and sharpness enhancement method, in which modified powerlaw transformations function is applied. Our algorithm controls perceived sharpness/smoothness, ringing artefacts (contrast) and noise, resulting in a good balance between visibility of details and non-disturbance of artefacts by controlled parameters. Its advantage over the standard power-law transformations is to enhance sharpness /smoothness and contrast with a single function by appropriate choice of control parameters. Sharpness control parameter can be also used to smoothen the image by taking the negative value of sharpness parameter. This method can be applied both to grey scale and colour images like Gamma Correction (GC). In the case of colour images, it is applied to each channel R, G and B separately.
International Journal of Computer Applications, 2012
Multimedia security and copyright protection have become wide interest due the explosion of data ... more Multimedia security and copyright protection have become wide interest due the explosion of data exchange in the Internet and the extensive use of digital media. We propose an image watermarking scheme based on visual cryptography in discrete wavelet transform. A complete survey of the current image watermarking technologies was done and has been noticed that majority of the existing schemes are not capable of resisting all attacks. We propose the idea to use different parts of a single watermark into different regions of the image for generation of the owner's share from the low frequency subband of the original image based on the binary watermark, and comparing the global mean value of pixels in the same subband and the local mean of the same subband, and generation of the identification share based on comparing the global mean and the local mean of the low frequency subband of the controversial image. These two shares after stacking can reveal the copyright ownership. Experiments are conducted to verify the robustness through a series of experiments.
2021 5th International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques (ICEECCOT)
2012 World Congress on Information and Communication Technologies, 2012
Digital watermarking method is a good technique to protect the copyright ownership of electronic ... more Digital watermarking method is a good technique to protect the copyright ownership of electronic data. In the present paper, we propose a new digital video watermarking scheme based on detection of different shots from the video for embedding identical watermark to the similar frames and dissimilar watermarks in dissimilar frames. Visual cryptography is included in the proposed scheme for encryption of the watermark and for better security. Experimental results show that the proposed method can withstand different types of video attacks, especially frame averaging, frame dropping, frame swapping and interpolation, besides different types of malicious attacks such as JPEG compression,
Aeu International Journal of Electronics and Communications, Aug 1, 2013
ABSTRACT
Aeu International Journal of Electronics and Communications, Aug 1, 2013
ABSTRACT
International journal of recent technology and engineering, Jan 30, 2020
Wireless Sensor Network (WSN) is susceptible to various kinds of security attacks such as the mis... more Wireless Sensor Network (WSN) is susceptible to various kinds of security attacks such as the misdirection attack. Detection of misdirection attack in WSN is a difficult job. The malicious node misdirects the arriving packets to a node other than the purposive node in the path from the source to the destination. Consequently, it introduces high end-to-end delay in the network. A novel technique for detection of misdirection attack in WSN without using cluster heads is proposed in the paper. The proposed detection technique has been implemented using Omnetpp 5.4.1 on four different network scenarios (10, 20, 30, and 40 numbers of nodes) and varying number of malicious nodes. The results of simulation shows that the proposed technique delivers better detection rate with reduced end-to-end delay compared to the detection method which uses cluster heads.
2022 International Conference on Decision Aid Sciences and Applications (DASA), Mar 23, 2022
AIP Conference Proceedings
2022 International Conference on Decision Aid Sciences and Applications (DASA)
Journal of critical reviews, 2020
Image upscaling takes a key role in the field of image processing to enhance the image and video ... more Image upscaling takes a key role in the field of image processing to enhance the image and video resolution for Super Resolution (SR) in the devices such as computer system as well as in smart phone. Nowadays many remarkable machine learning based techniques of image RS are being developed. In this paper a survey on current advanced image SR techniques which use the machine learning approaches with a systematic way is presented. It is also presented other topics regarding metrics along with publicly available benchmark datasets for evaluation of the performance. Here we give the conclusion for this survey after evaluation of the results by highlighting the merits and demerits of the techniques along with potential directions.
Evolutionary Computing and Mobile Sustainable Networks, 2020
Wormhole attack is a harmful attack that disrupts the normal functioning of the network by manipu... more Wormhole attack is a harmful attack that disrupts the normal functioning of the network by manipulating routing protocols and exhausting network resources. The paper presents a technique that detects the presence of wormhole attack in wireless sensor network (WSN) using artificial neural network (ANN). The proposed technique uses connectivity information between any two sensor nodes as the detection feature. The proposed technique has been implemented considering the deployment of sensor nodes in the wireless sensor network area under uniform, Poisson, Gaussian, exponential, gamma & beta probability distributions. The proposed technique does not require any additional hardware resources and gives a comparatively high percentage of detection accuracy.
International Journal of Recent Technology and Engineering (IJRTE), 2020
Wireless Sensor Network (WSN) is susceptible to various kinds of security attacks such as the mis... more Wireless Sensor Network (WSN) is susceptible to various kinds of security attacks such as the misdirection attack. Detection of misdirection attack in WSN is a difficult job. The malicious node misdirects the arriving packets to a node other than the purposive node in the path from the source to the destination. Consequently, it introduces high end- to- end delay in the network. A novel technique for detection of misdirection attack in WSN without using cluster heads is proposed in the paper. The proposed detection technique has been implemented using Omnetpp 5.4.1 on four different network scenarios (10, 20, 30, and 40 numbers of nodes) and varying number of malicious nodes. The results of simulation shows that the proposed technique delivers better detection rate with reduced end- to- end delay compared to the detection method which uses cluster heads.
Turkish Journal of Computer and Mathematics Education (TURCOMAT), Jun 28, 2021
In this present time, it is very easy to get a digital image through our smartphone we use everyd... more In this present time, it is very easy to get a digital image through our smartphone we use everyday. Thus easily our digital image can be processed and used by other people without our knowledge. The original image gets manipulated and processed for various reasons without the authentication of those who belong to it. Due to this reason image copy detection plays a significant role. This research paper tries to present the image copy detection model for the 2 most common image tampering method which includes copy-image forgery detection and Image Splicing. Also Feature extraction process is done through the Speeded up robust features(SURF), and Scale Invariant Feature Transform(SIFT) Descriptor method for identifying the matching point. In the case of Image Splicing Detection, it is used for extracting the image edges of Y(brightness in luma), Cb(blue minus luma), and Cr (Red minus luma) of the image components. Gray Level Co-Occurrence Matrix (GLCM) is utilized for each and every e...
Wormhole attack is a harmful attack that disrupts the normal functioning of the network by manipu... more Wormhole attack is a harmful attack that disrupts the normal functioning of the network by manipulating routing protocols and exhausting network resources. The paper presents a technique that detects the presence of wormhole attack in wireless sensor network (WSN) using artificial neural network (ANN). The proposed technique uses connectivity information between any two sensor nodes as the detection feature. The proposed technique has been implemented considering the deployment of sensor nodes in the wireless sensor network area under uniform, Poisson, Gaussian, exponential, gamma & beta probability distributions. The proposed technique does not require any additional hardware resources and gives a comparatively high percentage of detection accuracy.
Journal of Advanced Research in Dynamical and Control Systems, 2019
Normally the quality of an image is improved by enhancing contrast and sharpness. The enhancement... more Normally the quality of an image is improved by enhancing contrast and sharpness. The enhancement of contrast and sharpening of an image with a single function is a complex task. In real-time imaging, many complex scenes require local contrast improvements that should bring details to the best possible visibility of the image. However, local enhancement methods mainly suffer from ringing artefacts and noise over-enhancement. In this paper, we present a new adaptive spatial domain contrast and sharpness enhancement method, in which modified powerlaw transformations function is applied. Our algorithm controls perceived sharpness/smoothness, ringing artefacts (contrast) and noise, resulting in a good balance between visibility of details and non-disturbance of artefacts by controlled parameters. Its advantage over the standard power-law transformations is to enhance sharpness /smoothness and contrast with a single function by appropriate choice of control parameters. Sharpness control parameter can be also used to smoothen the image by taking the negative value of sharpness parameter. This method can be applied both to grey scale and colour images like Gamma Correction (GC). In the case of colour images, it is applied to each channel R, G and B separately.
International Journal of Computer Applications, 2012
Multimedia security and copyright protection have become wide interest due the explosion of data ... more Multimedia security and copyright protection have become wide interest due the explosion of data exchange in the Internet and the extensive use of digital media. We propose an image watermarking scheme based on visual cryptography in discrete wavelet transform. A complete survey of the current image watermarking technologies was done and has been noticed that majority of the existing schemes are not capable of resisting all attacks. We propose the idea to use different parts of a single watermark into different regions of the image for generation of the owner's share from the low frequency subband of the original image based on the binary watermark, and comparing the global mean value of pixels in the same subband and the local mean of the same subband, and generation of the identification share based on comparing the global mean and the local mean of the low frequency subband of the controversial image. These two shares after stacking can reveal the copyright ownership. Experiments are conducted to verify the robustness through a series of experiments.
2021 5th International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques (ICEECCOT)
2012 World Congress on Information and Communication Technologies, 2012
Digital watermarking method is a good technique to protect the copyright ownership of electronic ... more Digital watermarking method is a good technique to protect the copyright ownership of electronic data. In the present paper, we propose a new digital video watermarking scheme based on detection of different shots from the video for embedding identical watermark to the similar frames and dissimilar watermarks in dissimilar frames. Visual cryptography is included in the proposed scheme for encryption of the watermark and for better security. Experimental results show that the proposed method can withstand different types of video attacks, especially frame averaging, frame dropping, frame swapping and interpolation, besides different types of malicious attacks such as JPEG compression,
Aeu International Journal of Electronics and Communications, Aug 1, 2013
ABSTRACT
Aeu International Journal of Electronics and Communications, Aug 1, 2013
ABSTRACT