Showing 1–2 of 2 results for author: Lakshmi, D R
-
Feature Extraction Methods for Color Image Similarity
Authors:
R. Venkata Ramana Chary,
D. Rajya Lakshmi,
K. V. N. Sunitha
Abstract:
Many User interactive systems are proposed all methods are trying to implement as a user friendly and various approaches proposed but most of the systems not reached to the use specifications like user friendly systems with user interest, all proposed method implemented basic techniques some are improved methods also propose but not reaching to the user specifications. In this proposed paper we co…
▽ More
Many User interactive systems are proposed all methods are trying to implement as a user friendly and various approaches proposed but most of the systems not reached to the use specifications like user friendly systems with user interest, all proposed method implemented basic techniques some are improved methods also propose but not reaching to the user specifications. In this proposed paper we concentrated on image retrieval system with in early days many user interactive systems performed with basic concepts but such systems are not reaching to the user specifications and not attracted to the user so a lot of research interest in recent years with new specifications, recent approaches have user is interested in friendly interacted methods are expecting, many are concentrated for improvement in all methods. In this proposed system we focus on the retrieval of images within a large image collection based on color projections and different mathematical approaches are introduced and applied for retrieval of images. before Appling proposed methods images are sub grouping using threshold values, in this paper R G B color combinations considered for retrieval of images, in proposed methods are implemented and results are included, through results it is observed that we obtaining efficient results comparatively previous and existing.
△ Less
Submitted 11 April, 2012;
originally announced April 2012.
-
Cryptanalysis of a more efficient and secure dynamic id-based remote user authentication scheme
Authors:
Mohammed Aijaz Ahmed,
D. Rajya Lakshmi,
Sayed Abdul Sattar
Abstract:
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which has many advantage such as no verifier table, user freedom to choose and change password and so on. However the subsequent papers have shown that this scheme is completely insecure and vulnerable to many attacks. Since then many schemes with improvements to Das et al's scheme has been proposed but e…
▽ More
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which has many advantage such as no verifier table, user freedom to choose and change password and so on. However the subsequent papers have shown that this scheme is completely insecure and vulnerable to many attacks. Since then many schemes with improvements to Das et al's scheme has been proposed but each has its pros and cons. Recently Yan-yan Wang et al. have proposed a scheme to overcome security weaknesses of Das et al.'s scheme. However this scheme too is vulnerable to various security attacks such as password guessing attack, masquerading attack, denial of service attack.
△ Less
Submitted 5 April, 2010;
originally announced April 2010.