Recent News

  • An IoT- based smart wallet prototype June 2, 2022

    exterior designDr Sonam Maurya, and her research team; Soha Muskaan Sayyad, Trisha Chilukuri, Samah Maaheen Sayyad, and Juhita Naga Priya Velagapudi from the Department of Computer Science and Engineering have innovated a smart wallet model based on IoT and got their patent “Smart Wallet with Enhanced Features for Preventing Misuse and Alarm System for the Same” published. This is a fitting solution to protect against the loss and theft of the wallet.

     

    smart walletA smart wallet is an excellent technology to safeguard your credit and debit cards. Wallets these days are getting smarter with the latest technologies induced to monitor its presence. The proposed IoT- based wallet model is more smart, intelligent, secure, and safe which encompasses the best use of the latest IoT technologies in our pocket. The prototype consists of fingerprinting access technology, Augmented Reality (AR) navigation, Interactive Air Display (IAD)/ Transparent Display (TD), Voice control mechanism, Emergency alerts, RFID features, and many more. The smart wallet is designed to overcome the shortcomings of the regular wallet types.

     

    3D ViewThe new technology of AR makes the tracking of the wallet easier with a graphical pathway. And the voice control functionalities help the user to make the process easier in comparison to manual opening. IAD/ TD is used to control the mechanisms like opening the card or money case. To keep the data more secure from hackers, an RFID technology-enabled card is also embedded in the wallet. The strong Graphene outer covering is used to make the materials inside more flexible and safer. Besides, there is an emergency voice control mechanism that takes the instruction from the user and makes the surroundings alert by sending an alert message to the emergency contacts. And the cash counting facility in the wallet to keep track of the cash makes it a wholesome package of digital innovation.

    The social implications of this smart wallet are:

    • Enhanced features for preventing wallet misuse

    • Alarm system to help in emergencies and threatening situations

    • Best use of IoT technology in a user-friendly way

    • Enabled with Wallet/ Card missing notifications

    • Eco-friendly charging mechanism

    With this innovation, the research team aims to bring technology to its fullest use to make significant transformations in the everyday life of society.

    Continue reading →
  • Communication revolution and data security May 28, 2022

    The structure of human society is always profoundly affected by the developments happening in the domain of communication. Data security and privacy have always been a concern in the ongoing communication revolution. The Department of Computer Science and Engineering is glad to inform you that the paper, “An Efficient Spatial Transformation-based Entropy Retained Reversible Data Hiding Scheme in Encrypted Images,” has been published by Dr V M Manikandan, Assistant Professor, and his PhD student Mr Shaiju Panchikkil in “Optik Journal” with an impact factor of 2.443.

    Abstract of the research

    A critical issue with the current communication revolution is data security and privacy, which is an inevitable part of trustworthiness in the communication system. Hence, the applicability of the Reversible Data Hiding schemes (RDH) in this scenario is encouraging and critical, like medical image communication, satellite image transmission, etc. Earlier, we explored Arnold transform in one of our previous works to hide the secret data that uses the Convolutional Neural Network (CNN) model to design a complete RDH scheme. The proposed scheme follows a statistical approach to support recovering the cover image and the embedded information. This approach proves advantageous over the previous work following its computational capability. The scheme designed can retain the entropy of the encrypted images even after embedding the additional information, complementing the security of the encryption algorithm.

    Explanation of the research

    data securityThe research focuses on hiding information in an encrypted image and transmitting it to the receiver. Earlier, the researchers used the Arnold transform-based image scrambling algorithm to facilitate the data hiding. But at the receiver end, they have used a convolutional neural network model, which acts as a binary classifier to recover the image properly after extracting the hidden information. The researchers had a few overheads over there, like training the model and then sharing the same with the receiver to recover the original image efficiently. To overcome these overheads, they analysed the correlation of neighboring pixels and introduced a statistical measure at the receiver end to recover the exact image.

    Social implications of the research

    One of the various social implications of the research is an application concerning patient treatment. In a general scenario, during the covid 19 pandemic, people make an online consultation with the doctor by uploading their medical images. If the doctor wants to take a specialist’s opinion, he should send this image and the diagnosis report via a communication medium. The research team’s approach is meaningful in this aspect. The original image is initially encrypted, which makes it unreadable. The diagnosis report information is hidden over the encrypted image. Hence the doctor needs to send only a single file to the specialist. It is also difficult for an external agent or an unauthorized party to decode the report and the image as it is encrypted. Now it is essential to regain the original quality of the recovered image, as any degradation in the quality of the recovered image can lead to a wrong diagnosis. Hence, they have designed the recovery module carefully to extract all the hidden information and recover the original image without compromising its quality.

    The researchers are in constant collaboration with Professor Yu-Dong Zhang from the University of Leicester, University Road, Leicester, LE1 7RH, UK, to introduce new strategies to elevate the embedding capacity from the current level without negotiating the quality of the recovered image.

    Continue reading →

TOP