Thounaojam Rupachandra Singh | Manipur University (original) (raw)

Uploads

Papers by Thounaojam Rupachandra Singh

Research paper thumbnail of Misdirection Attack Detection in Wireless Sensor Network

International journal of recent technology and engineering, Jan 30, 2020

Wireless Sensor Network (WSN) is susceptible to various kinds of security attacks such as the mis... more Wireless Sensor Network (WSN) is susceptible to various kinds of security attacks such as the misdirection attack. Detection of misdirection attack in WSN is a difficult job. The malicious node misdirects the arriving packets to a node other than the purposive node in the path from the source to the destination. Consequently, it introduces high end-to-end delay in the network. A novel technique for detection of misdirection attack in WSN without using cluster heads is proposed in the paper. The proposed detection technique has been implemented using Omnetpp 5.4.1 on four different network scenarios (10, 20, 30, and 40 numbers of nodes) and varying number of malicious nodes. The results of simulation shows that the proposed technique delivers better detection rate with reduced end-to-end delay compared to the detection method which uses cluster heads.

Research paper thumbnail of Server Load Balancing with Round Robin Technique in SDN

2022 International Conference on Decision Aid Sciences and Applications (DASA), Mar 23, 2022

Research paper thumbnail of Smart classroom environment based on attendance management using CNN based multi-layer neural networks

AIP Conference Proceedings

Research paper thumbnail of Server Load Balancing with Round Robin Technique in SDN

2022 International Conference on Decision Aid Sciences and Applications (DASA)

Research paper thumbnail of A Survey on Image and Video Upscaling and Measuring Matices

Journal of critical reviews, 2020

Image upscaling takes a key role in the field of image processing to enhance the image and video ... more Image upscaling takes a key role in the field of image processing to enhance the image and video resolution for Super Resolution (SR) in the devices such as computer system as well as in smart phone. Nowadays many remarkable machine learning based techniques of image RS are being developed. In this paper a survey on current advanced image SR techniques which use the machine learning approaches with a systematic way is presented. It is also presented other topics regarding metrics along with publicly available benchmark datasets for evaluation of the performance. Here we give the conclusion for this survey after evaluation of the results by highlighting the merits and demerits of the techniques along with potential directions.

Research paper thumbnail of A Technique to Detect Wormhole Attack in Wireless Sensor Network Using Artificial Neural Network

Evolutionary Computing and Mobile Sustainable Networks, 2020

Wormhole attack is a harmful attack that disrupts the normal functioning of the network by manipu... more Wormhole attack is a harmful attack that disrupts the normal functioning of the network by manipulating routing protocols and exhausting network resources. The paper presents a technique that detects the presence of wormhole attack in wireless sensor network (WSN) using artificial neural network (ANN). The proposed technique uses connectivity information between any two sensor nodes as the detection feature. The proposed technique has been implemented considering the deployment of sensor nodes in the wireless sensor network area under uniform, Poisson, Gaussian, exponential, gamma & beta probability distributions. The proposed technique does not require any additional hardware resources and gives a comparatively high percentage of detection accuracy.

Research paper thumbnail of Misdirection Attack Detection in Wireless Sensor Network

International Journal of Recent Technology and Engineering (IJRTE), 2020

Wireless Sensor Network (WSN) is susceptible to various kinds of security attacks such as the mis... more Wireless Sensor Network (WSN) is susceptible to various kinds of security attacks such as the misdirection attack. Detection of misdirection attack in WSN is a difficult job. The malicious node misdirects the arriving packets to a node other than the purposive node in the path from the source to the destination. Consequently, it introduces high end- to- end delay in the network. A novel technique for detection of misdirection attack in WSN without using cluster heads is proposed in the paper. The proposed detection technique has been implemented using Omnetpp 5.4.1 on four different network scenarios (10, 20, 30, and 40 numbers of nodes) and varying number of malicious nodes. The results of simulation shows that the proposed technique delivers better detection rate with reduced end- to- end delay compared to the detection method which uses cluster heads.

Research paper thumbnail of Optimal Bandwidth Allocation and Software-Defined Network Aggregation for Heterogeneous Mobile Network

Turkish Journal of Computer and Mathematics Education (TURCOMAT), Jun 28, 2021

Research paper thumbnail of A robust image copy detection method using machine learning

In this present time, it is very easy to get a digital image through our smartphone we use everyd... more In this present time, it is very easy to get a digital image through our smartphone we use everyday. Thus easily our digital image can be processed and used by other people without our knowledge. The original image gets manipulated and processed for various reasons without the authentication of those who belong to it. Due to this reason image copy detection plays a significant role. This research paper tries to present the image copy detection model for the 2 most common image tampering method which includes copy-image forgery detection and Image Splicing. Also Feature extraction process is done through the Speeded up robust features(SURF), and Scale Invariant Feature Transform(SIFT) Descriptor method for identifying the matching point. In the case of Image Splicing Detection, it is used for extracting the image edges of Y(brightness in luma), Cb(blue minus luma), and Cr (Red minus luma) of the image components. Gray Level Co-Occurrence Matrix (GLCM) is utilized for each and every e...

Research paper thumbnail of A Technique to Detect Wormhole Attack in Wireless Sensor Network Using Artificial Neural Network

Wormhole attack is a harmful attack that disrupts the normal functioning of the network by manipu... more Wormhole attack is a harmful attack that disrupts the normal functioning of the network by manipulating routing protocols and exhausting network resources. The paper presents a technique that detects the presence of wormhole attack in wireless sensor network (WSN) using artificial neural network (ANN). The proposed technique uses connectivity information between any two sensor nodes as the detection feature. The proposed technique has been implemented considering the deployment of sensor nodes in the wireless sensor network area under uniform, Poisson, Gaussian, exponential, gamma & beta probability distributions. The proposed technique does not require any additional hardware resources and gives a comparatively high percentage of detection accuracy.

Research paper thumbnail of Certain Investigations on Traffic Load Balanced Bandwidth Aggregation Techniques in Smart Devices

Journal of Advanced Research in Dynamical and Control Systems, 2019

Research paper thumbnail of Image Enhancement by Adaptive Power-Law Transformations

Normally the quality of an image is improved by enhancing contrast and sharpness. The enhancement... more Normally the quality of an image is improved by enhancing contrast and sharpness. The enhancement of contrast and sharpening of an image with a single function is a complex task. In real-time imaging, many complex scenes require local contrast improvements that should bring details to the best possible visibility of the image. However, local enhancement methods mainly suffer from ringing artefacts and noise over-enhancement. In this paper, we present a new adaptive spatial domain contrast and sharpness enhancement method, in which modified powerlaw transformations function is applied. Our algorithm controls perceived sharpness/smoothness, ringing artefacts (contrast) and noise, resulting in a good balance between visibility of details and non-disturbance of artefacts by controlled parameters. Its advantage over the standard power-law transformations is to enhance sharpness /smoothness and contrast with a single function by appropriate choice of control parameters. Sharpness control parameter can be also used to smoothen the image by taking the negative value of sharpness parameter. This method can be applied both to grey scale and colour images like Gamma Correction (GC). In the case of colour images, it is applied to each channel R, G and B separately.

Research paper thumbnail of Image Magnification based on Directed Linear Interpolation

Research paper thumbnail of Image Watermarking Scheme based on Visual Cryptography in Discrete Wavelet Transform

International Journal of Computer Applications, 2012

Multimedia security and copyright protection have become wide interest due the explosion of data ... more Multimedia security and copyright protection have become wide interest due the explosion of data exchange in the Internet and the extensive use of digital media. We propose an image watermarking scheme based on visual cryptography in discrete wavelet transform. A complete survey of the current image watermarking technologies was done and has been noticed that majority of the existing schemes are not capable of resisting all attacks. We propose the idea to use different parts of a single watermark into different regions of the image for generation of the owner's share from the low frequency subband of the original image based on the binary watermark, and comparing the global mean value of pixels in the same subband and the local mean of the same subband, and generation of the identification share based on comparing the global mean and the local mean of the low frequency subband of the controversial image. These two shares after stacking can reveal the copyright ownership. Experiments are conducted to verify the robustness through a series of experiments.

Research paper thumbnail of Image classification and retrieval framework for Brain Tumour Detection using CNN on ROI segmented MRI images

2021 5th International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques (ICEECCOT)

Research paper thumbnail of Robust video watermarking scheme based on visual cryptography

2012 World Congress on Information and Communication Technologies, 2012

Research paper thumbnail of A Blind Video Watermarking Scheme based on Scene Change Detection

Digital watermarking method is a good technique to protect the copyright ownership of electronic ... more Digital watermarking method is a good technique to protect the copyright ownership of electronic data. In the present paper, we propose a new digital video watermarking scheme based on detection of different shots from the video for embedding identical watermark to the similar frames and dissimilar watermarks in dissimilar frames. Visual cryptography is included in the proposed scheme for encryption of the watermark and for better security. Experimental results show that the proposed method can withstand different types of video attacks, especially frame averaging, frame dropping, frame swapping and interpolation, besides different types of malicious attacks such as JPEG compression,

Research paper thumbnail of Video watermarking scheme based on visual cryptography and scene change detection

Aeu International Journal of Electronics and Communications, Aug 1, 2013

ABSTRACT

Research paper thumbnail of Video watermarking scheme based on visual cryptography and scene change detection

Aeu International Journal of Electronics and Communications, Aug 1, 2013

ABSTRACT

Research paper thumbnail of Misdirection Attack Detection in Wireless Sensor Network

International journal of recent technology and engineering, Jan 30, 2020

Wireless Sensor Network (WSN) is susceptible to various kinds of security attacks such as the mis... more Wireless Sensor Network (WSN) is susceptible to various kinds of security attacks such as the misdirection attack. Detection of misdirection attack in WSN is a difficult job. The malicious node misdirects the arriving packets to a node other than the purposive node in the path from the source to the destination. Consequently, it introduces high end-to-end delay in the network. A novel technique for detection of misdirection attack in WSN without using cluster heads is proposed in the paper. The proposed detection technique has been implemented using Omnetpp 5.4.1 on four different network scenarios (10, 20, 30, and 40 numbers of nodes) and varying number of malicious nodes. The results of simulation shows that the proposed technique delivers better detection rate with reduced end-to-end delay compared to the detection method which uses cluster heads.

Research paper thumbnail of Server Load Balancing with Round Robin Technique in SDN

2022 International Conference on Decision Aid Sciences and Applications (DASA), Mar 23, 2022

Research paper thumbnail of Smart classroom environment based on attendance management using CNN based multi-layer neural networks

AIP Conference Proceedings

Research paper thumbnail of Server Load Balancing with Round Robin Technique in SDN

2022 International Conference on Decision Aid Sciences and Applications (DASA)

Research paper thumbnail of A Survey on Image and Video Upscaling and Measuring Matices

Journal of critical reviews, 2020

Image upscaling takes a key role in the field of image processing to enhance the image and video ... more Image upscaling takes a key role in the field of image processing to enhance the image and video resolution for Super Resolution (SR) in the devices such as computer system as well as in smart phone. Nowadays many remarkable machine learning based techniques of image RS are being developed. In this paper a survey on current advanced image SR techniques which use the machine learning approaches with a systematic way is presented. It is also presented other topics regarding metrics along with publicly available benchmark datasets for evaluation of the performance. Here we give the conclusion for this survey after evaluation of the results by highlighting the merits and demerits of the techniques along with potential directions.

Research paper thumbnail of A Technique to Detect Wormhole Attack in Wireless Sensor Network Using Artificial Neural Network

Evolutionary Computing and Mobile Sustainable Networks, 2020

Wormhole attack is a harmful attack that disrupts the normal functioning of the network by manipu... more Wormhole attack is a harmful attack that disrupts the normal functioning of the network by manipulating routing protocols and exhausting network resources. The paper presents a technique that detects the presence of wormhole attack in wireless sensor network (WSN) using artificial neural network (ANN). The proposed technique uses connectivity information between any two sensor nodes as the detection feature. The proposed technique has been implemented considering the deployment of sensor nodes in the wireless sensor network area under uniform, Poisson, Gaussian, exponential, gamma & beta probability distributions. The proposed technique does not require any additional hardware resources and gives a comparatively high percentage of detection accuracy.

Research paper thumbnail of Misdirection Attack Detection in Wireless Sensor Network

International Journal of Recent Technology and Engineering (IJRTE), 2020

Wireless Sensor Network (WSN) is susceptible to various kinds of security attacks such as the mis... more Wireless Sensor Network (WSN) is susceptible to various kinds of security attacks such as the misdirection attack. Detection of misdirection attack in WSN is a difficult job. The malicious node misdirects the arriving packets to a node other than the purposive node in the path from the source to the destination. Consequently, it introduces high end- to- end delay in the network. A novel technique for detection of misdirection attack in WSN without using cluster heads is proposed in the paper. The proposed detection technique has been implemented using Omnetpp 5.4.1 on four different network scenarios (10, 20, 30, and 40 numbers of nodes) and varying number of malicious nodes. The results of simulation shows that the proposed technique delivers better detection rate with reduced end- to- end delay compared to the detection method which uses cluster heads.

Research paper thumbnail of Optimal Bandwidth Allocation and Software-Defined Network Aggregation for Heterogeneous Mobile Network

Turkish Journal of Computer and Mathematics Education (TURCOMAT), Jun 28, 2021

Research paper thumbnail of A robust image copy detection method using machine learning

In this present time, it is very easy to get a digital image through our smartphone we use everyd... more In this present time, it is very easy to get a digital image through our smartphone we use everyday. Thus easily our digital image can be processed and used by other people without our knowledge. The original image gets manipulated and processed for various reasons without the authentication of those who belong to it. Due to this reason image copy detection plays a significant role. This research paper tries to present the image copy detection model for the 2 most common image tampering method which includes copy-image forgery detection and Image Splicing. Also Feature extraction process is done through the Speeded up robust features(SURF), and Scale Invariant Feature Transform(SIFT) Descriptor method for identifying the matching point. In the case of Image Splicing Detection, it is used for extracting the image edges of Y(brightness in luma), Cb(blue minus luma), and Cr (Red minus luma) of the image components. Gray Level Co-Occurrence Matrix (GLCM) is utilized for each and every e...

Research paper thumbnail of A Technique to Detect Wormhole Attack in Wireless Sensor Network Using Artificial Neural Network

Wormhole attack is a harmful attack that disrupts the normal functioning of the network by manipu... more Wormhole attack is a harmful attack that disrupts the normal functioning of the network by manipulating routing protocols and exhausting network resources. The paper presents a technique that detects the presence of wormhole attack in wireless sensor network (WSN) using artificial neural network (ANN). The proposed technique uses connectivity information between any two sensor nodes as the detection feature. The proposed technique has been implemented considering the deployment of sensor nodes in the wireless sensor network area under uniform, Poisson, Gaussian, exponential, gamma & beta probability distributions. The proposed technique does not require any additional hardware resources and gives a comparatively high percentage of detection accuracy.

Research paper thumbnail of Certain Investigations on Traffic Load Balanced Bandwidth Aggregation Techniques in Smart Devices

Journal of Advanced Research in Dynamical and Control Systems, 2019

Research paper thumbnail of Image Enhancement by Adaptive Power-Law Transformations

Normally the quality of an image is improved by enhancing contrast and sharpness. The enhancement... more Normally the quality of an image is improved by enhancing contrast and sharpness. The enhancement of contrast and sharpening of an image with a single function is a complex task. In real-time imaging, many complex scenes require local contrast improvements that should bring details to the best possible visibility of the image. However, local enhancement methods mainly suffer from ringing artefacts and noise over-enhancement. In this paper, we present a new adaptive spatial domain contrast and sharpness enhancement method, in which modified powerlaw transformations function is applied. Our algorithm controls perceived sharpness/smoothness, ringing artefacts (contrast) and noise, resulting in a good balance between visibility of details and non-disturbance of artefacts by controlled parameters. Its advantage over the standard power-law transformations is to enhance sharpness /smoothness and contrast with a single function by appropriate choice of control parameters. Sharpness control parameter can be also used to smoothen the image by taking the negative value of sharpness parameter. This method can be applied both to grey scale and colour images like Gamma Correction (GC). In the case of colour images, it is applied to each channel R, G and B separately.

Research paper thumbnail of Image Magnification based on Directed Linear Interpolation

Research paper thumbnail of Image Watermarking Scheme based on Visual Cryptography in Discrete Wavelet Transform

International Journal of Computer Applications, 2012

Multimedia security and copyright protection have become wide interest due the explosion of data ... more Multimedia security and copyright protection have become wide interest due the explosion of data exchange in the Internet and the extensive use of digital media. We propose an image watermarking scheme based on visual cryptography in discrete wavelet transform. A complete survey of the current image watermarking technologies was done and has been noticed that majority of the existing schemes are not capable of resisting all attacks. We propose the idea to use different parts of a single watermark into different regions of the image for generation of the owner's share from the low frequency subband of the original image based on the binary watermark, and comparing the global mean value of pixels in the same subband and the local mean of the same subband, and generation of the identification share based on comparing the global mean and the local mean of the low frequency subband of the controversial image. These two shares after stacking can reveal the copyright ownership. Experiments are conducted to verify the robustness through a series of experiments.

Research paper thumbnail of Image classification and retrieval framework for Brain Tumour Detection using CNN on ROI segmented MRI images

2021 5th International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques (ICEECCOT)

Research paper thumbnail of Robust video watermarking scheme based on visual cryptography

2012 World Congress on Information and Communication Technologies, 2012

Research paper thumbnail of A Blind Video Watermarking Scheme based on Scene Change Detection

Digital watermarking method is a good technique to protect the copyright ownership of electronic ... more Digital watermarking method is a good technique to protect the copyright ownership of electronic data. In the present paper, we propose a new digital video watermarking scheme based on detection of different shots from the video for embedding identical watermark to the similar frames and dissimilar watermarks in dissimilar frames. Visual cryptography is included in the proposed scheme for encryption of the watermark and for better security. Experimental results show that the proposed method can withstand different types of video attacks, especially frame averaging, frame dropping, frame swapping and interpolation, besides different types of malicious attacks such as JPEG compression,

Research paper thumbnail of Video watermarking scheme based on visual cryptography and scene change detection

Aeu International Journal of Electronics and Communications, Aug 1, 2013

ABSTRACT

Research paper thumbnail of Video watermarking scheme based on visual cryptography and scene change detection

Aeu International Journal of Electronics and Communications, Aug 1, 2013

ABSTRACT