Professional Documents
Culture Documents
From the security. Use of biometric devices and interfaces like finger print,
IRIS and even face has become ubiquitous. This demands that
Chairman's Desk the data base is not tampered with.
Steganography has been an area of research for quite some
Dear Fellow Fraternity, time. The possibility that steganography can be used to deliver
I am happy to inform you that All India banned and objectionable content over the internet to children
Seminar on “Cyber Security and Image and others is very real. This necessitates the development of IP
Processing” will be organized by the techniques which will sanitize this hidden content without
Telangana State Centre on 10th and 11th significantly affecting the base image. Several new results have
August, 2019. This seminar is meant to explore the connection become available in this area. A related area is the prevention
between these two seemingly unrelated areas. There are several of Video piracy. This again is a potential area of research. It is
areas of concordance between these two. Protection of images proposed to discuss in the two-day All India Seminar on ”Cyber
and video sent over the internet from tampering and their Security and Image Processing” with the following Sub-Themes
authentication using cyber security/cryptographic tools has related to the above topics such as: (i) Image and Video
become an active area of research. Parallel use of image Transmission (ii) Steganography (iii) Visual Cryptography (iv)
processing techniques like Visual Cryptography to enable secure Cyber Security and more.
transmission of different types of information has opened up As you are kindly aware, Telangana State Centre has been actively
new possibilities. conducting such innovative programmes for the benefit of not
Visual cryptography involves the segmentation of information only the budding engineers but also for all interested participants
into mutually exclusive and individually random looking with a view to learn, unlearn and relearn on different emerging
components and sending them over different paths. Here the subjects of today’s importance hope you will all attend and make
advantage is that even if one of the transmissions is intercepted it a success.
it cannot reveal any information. This makes it immune against With regards,
even computationally brute force attacks. This is especially
important because it is feared that with the advent of Quantum Dr G Rameshwar Rao, FIE
Computing, Computational Complexity alone cannot provide Chairman
Published by Er T Anjaiah, FIE, Honorary Secretary, The Institution of Engineers (India), Telangana State Centre, Khairatabad, Hyderabad. Printed by Er T Anjaiah,
FIE Honorary Secretary, The Institution of Engineers (India), Telangana State Centre, Khairatabad, Hyderabad on behalf of The Institution of Engineers (India),
Telangana State Centre. Printed at M/s Atlas Stationery and Printing Industries, Ashok Nagar, Hyderabad. Published fromThe Institution of Engineers (India),
Telangana State Centre, # 6-2-910, Visvesvaraya Bhavan, Khairatabad, Hyderabad - 500 004, Telangana. Editor Er T Anjaiah, FIE, Honorary Secretary, The Institution
of Engineers (India), Telangana State Centre, Khairatabad, Hyderabad - 500 004. Telangana.
Date of Publication :
25th July, 2019
Date of Posting
28th July, 2019
A Bulletin of IEI, Telangana State Centre