Gautham SK

Work place: Department of CSE, BMS Institute of Technology and Management Bangalore

E-mail: 1by19scs02@bmsit.in

Website:

Research Interests: Computational Learning Theory, Computer Architecture and Organization, Data Structures and Algorithms

Biography

Gautham SK received the BTech degree from Kerala Technical University (KTU), in 2019. He is currently a MTech scholar in BMSIT&M, Bengaluru, India. His research interest includes authentication,physical layer security, machine learning and deep learning.

Author Articles
CNN-based Security Authentication for Wireless Multimedia Devices

By Gautham SK Anjan K Koundinya

DOI: https://doi.org/10.5815/ijwmt.2021.04.01, Pub. Date: 8 Aug. 2021

Security is a major concern for wireless multimedia networks because of their role in providing various services. Traditional security techniques have inadequacies in identifying emerging security threats and also lacks in computing efficiency. Furthermore, conventional upper-layer authentication doesn’t provide any protection for physical layer, thus leading to leakage of privacy data. Keep these issues in mind, the paper has envisioned an artificial intelligence-based security authentication system that is lightweight, adaptive and doesn’t require any explicit programming. The neural network is built on convolutional filters which explore the data and learns the features or characteristic of the data. With this learned feature, the model will be able to recognize whether a wireless multimedia device present in a network is legitimate or not. Experimental analysis and validation have been performed on the trained model and ensure that the authentication of wireless multimedia devices can be achieved and also ensuring lightweight authentication system, which ensures less computation needs. The different neural model is also trained using gaussian noise of different standard deviation so that it can be used in a practical scenario like smart industry etc.  

[...] Read more.
Two-Layer Encryption based on Paillier and ElGamal Cryptosystem for Privacy Violation

By Anjan K Koundinya Gautham SK

DOI: https://doi.org/10.5815/ijwmt.2021.03.02, Pub. Date: 8 Jun. 2021

Our life nowadays relies much on technologies and online services net banking, e-voting and so on. So, there is a necessity to secure the data that is transmitted through the internet. However, while performing decryption, it sometimes led to privacy violation so there is need to operate on users encrypted data without knowing the original plaintext.
This paper represents the implementation of two-layer cryptosystem using paillier and elgamal algorithm both following asymmetric encryption. It is mainly focusing the challenges of privacy protection and secure utilization of information, where homomorphy encryption is gaining attention. Additive homomorphism is used in paillier cryptosystem which is used in fields like secure biometrics and electronic voting. Elgamal ensures that paillier encrypted data is secured that ensures two-layer encryption.

[...] Read more.
Other Articles