Now showing items 1-7 of 7

    • An Image Forensic Technique Based on SIFT Descriptors and FLANN Based Matching 

      Gupta, Megha (2021)
      Doctored images are prevalent everywhere since the easy availability of photoediting tools. The research in image forensics focuses mainly on developing techniques that can help discriminate between doctored and legitimate ...
    • MBE: Client Side Secure Data Deduplication Based on Merkel Tree 

      Joshi, Kriti (2021)
      Several secure data deduplication protocols are recently proposed to maintain unique data copies at the cloud service providers (CSP’s) and utilize the storage space efficiently. Though many Message Locked Encryption (MLE) ...
    • On the Robustness of Federated Learning towards Various Attacks 

      Yagnik, Shrey Devenkumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2023)
      A study based on Federated Learning (FL), i.e., a kind of decentralized learningthat consists of local training among the clients, and the central server returnsthe federated average. Deep learning models have been used ...
    • Privacy-Preserving Iris Based Authentication System 

      Agrawal, Radha (Dhirubhai Ambani Institute of Information and Communication Technology, 2023)
      Biometric authentication systems have gained immense popularity due to theirability to provide secure and convenient authentication. However, the leakageof sensitive biometric data can compromise an individual�s privacy ...
    • Privacy-Preserving Proximity Detection through Haversine Distance and Geo-Hash 

      Rathi, Jash (Dhirubhai Ambani Institute of Information and Communication Technology, 2022)
      Proximity implies computing suitable distance between nearby people and places. Proximity detection is very crucial to many multimedia applications. For instance, fatal incidents occur near forests if animals like elephants ...
    • S-DIHE: Secure Deduplication of images based on Homomorphic Encryption 

      Patel, Nimmi (Dhirubhai Ambani Institute of Information and Communication Technology, 2022)
      The cloud space is occupied with multiple versions of the same data, including images, text files, et. Cetera. Though cloud service providers (CSPs) are provid- ing very cost effective storage space but combating the ...
    • SHELBRS: Location-Based Recommendation Services using Switchable Homomorphic Encryption 

      Jain, Mishel (2021)
      Location-Based Recommendation Services (LBRS) has seen an unprecedented rise in its usage in recent years. LBRS facilitates a user by recommending services based on his location and past preferences. However, leveraging ...