Browsing by Author "Duraiswamy, K"
Now showing 1 - 3 of 3
Results Per Page
Sort Options
Item Analysis and Synthesis for Pyramid Based Textures(INFLIBNET Centre, 2005-02-02) Karthikeyani, V; Duraiswamy, K; Kamalakkannan, PThis paper describes a method for synthesizing images that match the texture appearance of a given digitized sample. This synthesis is completely automatic and requires only the “target” texture as input. It allows generation of as much texture as desired so that any object can be covered. It can be used to produce solid textures for creating textured 3-d objects without the distortions inherent in texture mapping. It can also be used to synthesize texture mixtures, images that look a bit like each of several digitized samples. The approach is based on a model of human texture perception, and has potential to be a practically useful tool for graphics applications.Item Mutual Authentication Protocol For Safer Communication(INFLIBNET Centre, 2005-02-02) Shantharajah, S P; Duraiswamy, KWith a network communication requires cryptography authentication for secure transmission. This paper takes two challenge-response protocols by which entities may authenticate their identities to one another in a mutual communication way. Here the two entities, each holding a share of a decryption exponent, collaborate to compute a signature under the corresponding public key. These may be used during session initiation, and at any other time that entity authentication is necessary. The authentication of an entity depends on the verification of the claimant’s binding with its key pair and the verification of the claimant’s digital signature on the random number challenge. The network defined mutually authenticated protocols are for entity authentication based on public key cryptography, which uses digital signatures and random number challenges. Authentication based on public key cryptography has an advantage over many other authentication schemes because no secret information has to be shared by the entities involved in the exchange. This paper analyzes the protocols, which minimizes cost, very simple and suggests security for mutually signing the signature schemes and provides proofs of security for the safer communication. This paper specifies the way of mutual communication and the method of processing that conversation between entities.Item Preprocessing Algorithms for the Recognition of Tamil Handwritten Characters(INFLIBNET Centre, 2005-02-02) Shanthi, N; Duraiswamy, KHandwriting has continued to persist as a means of communication and recording information in day-to-day life even with the introduction of new technologies. Handwriting is a skill that is personal to individuals. Recognition of characters is an important area in machine learning. Widespread acceptance of digital computers seemingly challenges the future of handwriting. However, in numerous situations, a pen together with paper or a small notepad is much more convenient than a keyboard. Handwriting data is converted to digital form either by scanning the writing on paper or by writing with a special pen on an electronic surface such as a digitizer combined with a liquid crystal display. The two approaches are distinguished as offline and online handwriting respectively. It is necessary to perform several document analysis operations prior to recognizing text in scanned documents. This paper presents detailed analysis of various preprocessing operations performed prior to recognition of Tamil handwritten characters and the results are shown.