Castle Hills, Road No. 1, Masab Tank, Hyderabad 500 057, India.
Ph: +91 40 2329 4000; Fax: +91 40 2353 5157
Visit us: www.idrbt.ac.in; e-mail: ipts2015@idrbt.ac.in
Page 1 of 9
Banks are issuing bank guarantee to their customers and these are sent through SFMS.
The bank guarantees have specific requirement of, to be valid for a particular period and
the time at which the bank guarantee is issued can be of great business value depending
on the circumstances
On receipt of message containing bank guarantee, SFMS hub will send request for time
stamping of the same to the time stamping authority which is part of IDRBT CA. The
time stamping token will be generated and issued to the SFMS hub which can be
included as part of the message and stored / archived by the SFMS application.
Page 3 of 9
media files. The protection of the digital images can be enforced through encryption and
decryption, steganographic or digital watermarking.
Watermarking is a technique to insert copy right information within digital contents. A robust
watermarking method provides information that cannot be removed from the watermarked
content. Fractal image encoding theory is developed based on the concept of Iterated function
systems. The image is separated into complex and smooth regions based on fractal dimension
and then watermark is embedded. It is infeasible to identify watermark bits in cover image
through these techniques. The proposed work is to use fractal techniques and contourlet
transformation techniques for watermarking.
In verification, the user claim his identity along with the biometric data. Then, the
system verifies the persons identity by comparing the captured biometric with his own
biometric template pre-stored in the system. It conducts one-to-one comparison to
determine whether the identity claimed by the individual is true or not
In identification, the user does not claim any identity along with his biometric data.
Hence, the system in this mode recognizes an individual by sequentially searching the
entire template database for a match.
Note that, this sequential search process in an identification system works well for small
databases. But in reality the fingerprint databases contains large number of records (ex. India
AADHAR) and this process is expensive and unreliable. Therefore efficient indexing systems are
required that can search large databases in less time and without compromising system
performance. Unlike structured information such as text or numeric data that can be sorted,
fingerprint data does not have any natural sorting order. As the fingerprint data is unstructured,
Page 4 of 9
this type of database cannot be indexed into alphabetical or numerical order. Therefore
indexing these fingerprint databases represents a challenging problem.
that is passed on the subnets to the library of known attacks. Once the attack is identified, or
abnormal behavior is sensed, the alert can be sent to the administrator. Example of the NIDS
would be installing it on the subnet where firewalls are located in order to see if someone is
trying to break into the firewall. Ideally one would scan all inbound and outbound traffic,
however doing so might create a bottleneck that would impair the overall speed of the
network.
Recent research work on Hidden Markov Model (HMM) analysis has shown that HMM is more
effective than other techniques like machine learning in detecting of computer viruses and
their classification. In this research, we propose to develop a Profile Hidden Markov Models
(PHMM) for developing Intrusion detection systems for Computer networks.
Page 6 of 9
With the growing popularity of cloud computing, the data owners are motivated to outsource
their data files from local sites to the commercial public cloud for great flexibility and economic
savings. Although public cloud offers many advantages, privacy of the outsourced data is a big
concern. To protect privacy, sensitive data have to be encrypted before outsourced to the
commercial public cloud, which makes effective data utilization service at very challenging task.
The aim of this project is develop an efficient privacy-preserving protocol for outsourced data in
cloud computing.
Development of basic web based application for logging in using options of password
and finger print based biometric
Integration of various finger print biometric devices available in the market in the
application
Page 7 of 9
integration with applications such as windows based log in, screen saver log, additional
security for password based log in, file / data encryption, internet banking etc.
requirements is difficult and seen as multi objective optimization problem. In this project, we
propose a novel web service composition methodology using meta-heuristic techniques.
Page 9 of 9