Browsing by Advisor "Veni Madhavan, C E"
Now showing items 112 of 12

Analysis And Design Of Image And Video Encryption Algorithms
(20090319)The rapid growth in multimedia based Internet systems and applications like video telephony, video on demand, network based DVD recorders and IP television has created a substantial need for ... 
Analysis Of A Sieving Heuristic For The Number Field Sieve And Design Of LowCorrelation CDMA Sequences
(20110125)In this thesis, we investigate in detail, certain important problems in cryptography and coding theory. In the first part of this thesis, we discuss the number field sieve and compare the two ways in which the sieving ... 
Bayes Optimal Feature Selection for Supervised Learning
(20180218)The problem of feature selection is critical in several areas of machine learning and data analysis such as, for example, cancer classification using gene expression data, text categorization, etc. In this work, we consider ... 
Cluster Identification : Topic Models, Matrix Factorization And Concept Association Networks
(20130917)The problem of identifying clusters arising in the context of topic models and related approaches is important in the area of machine learning. The problem concerning traversals on Concept Association Networks is of great ... 
Graph Models For Query Focused Text Summarization And Assessment Of Machine Translation Using Stopwords
(20140409)Text summarization is the task of generating a shortened version of the original text where core ideas of the original text are retained. In this work, we focus on query focused summarization. The task is to generate the ... 
Image Structures For Steganalysis And Encryption
(20131021)In this work we study two aspects of image security: improper usage and illegal access of images. In the first part we present our results on steganalysis – protection against improper usage of images. In the second part ... 
Large Scale Implementation Of The Block Lanczos Algorithm
(20100816)Large sparse matrices arise in many applications, especially in the major problems of Cryptography of factoring integers and computing discrete logarithms. We focus attention on such matrices called sieve matrices generated ... 
Network Centrality Measures And Their Applications
(20140303)Study of complex networks by researchers from many disciplines has provided penetrating insights on various complex systems. A study of the world wide web from a network theoretic perspective has led to the design of new ... 
New Approaches And Experimental Studies On  Alegebraic Attacks On Stream Ciphers
(20150205)Algebraic attacks constitute an effective class of cryptanalytic attacks which have come up recently. In algebraic attacks, the relations between the input, output and the key are expressed as a system of equations and ... 
Number Theoretic, Computational and Cryptographic Aspects of a Certain Sequence of Arithmetic Progressions
(20180621)This thesis introduces a new mathematical object: collection of arithmetic progressions with elements satisfying the inverse property, \jth terms of ith and (i+1)th progressions are multiplicative inverses of each other ... 
On A Cubic Sieve Congruence Related To The Discrete Logarithm Problem
(20130521)There has been a rapid increase interest in computational number theory ever since the invention of publickey cryptography. Various attempts to solve the underlying hard problems behind publickey cryptosystems has led ...