Volume-12 ~ Issue-2
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Antimicrobial Activity of Ferns |
| Country | : | India |
| Authors | : | Samir Kumar Pal |
| : | 10.9790/0661-1220103 ![]() |
Abstract: The present aim is the study of ferns having antimicrobial activity and commonly found around the area of district Darjeeling of West Bengal, India. Common ferns from several areas of Darjeeling district are collected and tested against Gram +ve and Gram –ve bacteria for their antimicrobial activity. Collected plant materials are dried and the soluble extracts are made using different solvents like distilled water, methanol, ethanol and acetone Antimicrobial activities are measured using agar cup diffusion method. Greater the area of inhibition zone indicates the presence of good potentiality of antimicrobial activity. A large number of common ferns are collected and among them some species are found having antimicrobial activity. Five species show antimicrobial activity against both gram +ve and gram -ve bacteria.
Key Words: antimicrobial, extract, gram positive and gram negative, inhibition zone, solvent .
[1] R.D Banerjee , S.P Sen ,Antibiotic activity of Pteridophytes. Ecol. Bot1980., 34(3): 284-298. [2] S.P Sen , P Nandi :Antibiotics from the pteridophytes. Sci. Cult 1951., 16: 328-329. [3] J.C Maruzzella :Antimicrobial substances from ferns. Nature2005,1961.,191: 518-519. [4] A.W Bauer , M.M Kirby , J.C Sherris , M Truck Antibiotic susceptibility testing by a standardized single disk method. Am J Clin Pathol 1966; 45: 493-6. [5] O.H Lowry,., N.J. Rosebrough, A.L. Farr, and R.J. Randall (1951) Protein Measurement with the Folin Phenol Reagent. J. Biol. Chem. 193:265-275
[6] V.S Manickam ,A Benniamin ,V Irudayaraj Antibacterial activity of leaf glands of Christells parasitica (L.) Lev, Indian Fern J2002., 22: 87-88
[7] L.E Alcaraz , S.E Blanco ,O.N Puig , F Tomas ,F.H Ferretti : Antibacterial activity of flavonoids against methicillin-resistant Staphylococcus aureus strains. J Theor Biol 2000., 205:231-240.
[8] T.P.T Cushnie ,A.J Lamb : Antimicrobial activity of flavonoids. Int J Antimicrob Agents 2005., 26:343-356.
[9] U.K Yusuf : Flavonoid Glycosides in the Fern Blechnum orientale Linn. AmF J 1994., 84:69-70. [10] D Natarajan ,G Perumal ,C Mohanasundari ,K Moorthy , Studies of antimicrobial activities of certain medicinal ferns against selected dermatophytes, Indian Fern J2005., 22: 191-195.
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | The Comparative Study on Visual Cryptography and Random Grid Cryptography |
| Country | : | India |
| Authors | : | G. Deepa |
| : | 10.9790/0661-1220414 ![]() |
Abstract: Visual cryptography scheme is a cryptographic technique which allows visual information to be encrypted into several shares in such a way that the decryption can be performed by the human visual system, without the aid of computers. Random grid is a methodology to construct visual secret sharing (vss) scheme without pixel expansion in which an RG scheme takes an input image and transforms it into multiple cipher-grids that provide no information on the original image and the resulting decrypted image retains the size of the original image. Intent of this paper is on comparative study of visual cryptography and Random grid cryptography on the basis of analysis and correctness of simple VC schemes and RG schemes, improving contrast of the reconstructed image using various algorithms and multiple-image encryption using rotating angles.
Keywords - ideal contrast, random grid scheme, ring shadow technology, rotating random grids, visual cryptography scheme.
[1]. Moni Naor and Adi Shamir, "Visual Cryptography", advances in cryptology– Eurocrypt, pp 1-12,1995.
[2]. C.C. Wu, L.H. Chen, "A Study On Visual Cryptography", Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998.
[3]. H.-C. Hsu, T.-S. Chen, Y.-H. Lin, "The Ring Shadow Image Technology Of Visual Cryptography By Applying Diverse Rotating Angles To Hide The Secret Sharing", in Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control, Taipei, Taiwan, pp. 996–1001, March 2004.
[4]. O. Kafri and E. Keren. Encryption of pictures and shapes by random grids. Optics Letters, 12:377-379, 1987.
[5]. Tzung-Her Chen and Kai-Hsiang Tsao, "Visual secret sharing by random grids revisited". Pattern Recognition, 42(9):2203 - 2217, 2009. ISSN 0031-3203.
[6]. C.Blundo, A.De Santis and D. R. Stinson, "On the contrast in visual cryptography schemes", Journal Cryptology, vol.12, 1999, pp. 261- 289.
[7]. J.L.Massey, "Some applications of coding theory in cryptography", in Cryptography and Coding IV, Oxford University Press, 1995, pp.33-47.
[8]. T. H. Chen, and C. S. Wu, "Efficient Multi-secret Image Sharing based on Boolean Operations", Signal Processing, Vol. 91, No. 1, (2011), pp. 90-97.
[9]. Tzung-Her Chen, Kai-Hsiang Tsao, Kuo-Chen Wei, ""Multiple-image encryption by rotating random grids,‟‟ in: Proceedings of the 8th International Conference on Intelligent System Design and Applica- tions (ISDA 2008), Kaohsiung, Taiwan, Nov. 26–28, 2008.
[10]. R.Z. Wang, Y.K. Lee, S.Y. Huang, T.L. Chia, ""Multilevel visual secret sharing,‟‟ in: Proceedings of the Second International Conference on Innovative Computing, Information and Control, Kumamoto, Japan, 2007.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Cloud computing is generally recognized as a technology which will have a significant impact on Information Technology in the future. The cloud computing data security has certain drawbacks in its implementation making it insecure. To avoid this problem in this research we propose enhanced security architecture for cloud computing using encryption and decryption system with double key cryptography based on Artificial Neural Network. The objective of the proposed scheme is to protect the information even if the hackers break the cipher text they can't convert cipher text to original text. In our proposed algorithms we have (training algorithm) adopted high data security authorized person can retrieve the data, including key generation, encryption and decryption that are provided in cloud computing system.
Keywords: Artificial Neural Network (ANN), cloud data storage Cloud data retrieval, decryption, encryption.
[1] Abhishek Mohta, Ravi Kant Sahu and Lalit Kumar Aswasthi, "Robust Data Security for Cloud while using Third party Auditor", IGARCSSE, Vol 2, Issue 2 , February 2012.
[2] Annamaneni Samatha,Nimmala Jeevan Reddy and Pradeep Kumar "Data Storage Collateral In Cloud Computing",IJERA(International Journal of Engineering Research and Applications),Vol 2,Issue 5, pp1050-1055 Sep-Oct 2012.
[4] Arti Sharmaand Pawanesh Abrol, "Cloud Computing Environment Problems Implementation",International Journal of Computers and Distributed System,Vol 1,Issues 3,pp 64-68,October 2012.
[5] Chittarajan Hota ,Sunil Sanka,Muttukrishnan Rajarajan and Srijith K Nair, "Capability based cryptography data access in cloud computing", International Journal Advance Networking and Applications, Vol 3, Issues 3, pp 1152 – 1161,November 2011.
[6] Christian Henrich,"Brief Announcement:Towards secure cloud computing" Springer,LNCS 5873,pp 785-786,2009.
[7] Dinesh C Verma,A.K Mohapatra and Kaleem Usmani, "Light Weight Encryption Technique for Group Communication in Cloud Computing Environment",IJCA,Vol 49,No 8,pp 35-41,July 2012.
[8] Eva Volna , Martin Kotyrba,Vaclav Kocian and Michal Janosek,"Cryptography Based on neural Network", Proc 26th European on modelling and simulation ,ISBN:978-0-9564944-4-3, 2012.
[9] Khaled Alallayah,Mahamed Amin,Waiel AhdElwahed and Alaa Alhamami, "Applying Neural Network for simplified Data Encryption Standard (SDES) Cipher System cryptanalysis", The International Arab Journal of Information Technology , Vol 9, No 2, PP 163-169, March 2012.
[10] L.M Kaufman, "Data Security in the world of Cloud computing, Security & Privacy", IEEE ,vol 7, pp 61-64, 2009.
