CINXE.COM
Prashant Koshta - Academia.edu
<!DOCTYPE html> <html lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" class="wf-loading"> <head prefix="og: https://ogp.me/ns# fb: https://ogp.me/ns/fb# academia: https://ogp.me/ns/fb/academia#"> <meta charset="utf-8"> <meta name=viewport content="width=device-width, initial-scale=1"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <title>Prashant Koshta - Academia.edu</title> <!-- _ _ _ | | (_) | | __ _ ___ __ _ __| | ___ _ __ ___ _ __ _ ___ __| |_ _ / _` |/ __/ _` |/ _` |/ _ \ '_ ` _ \| |/ _` | / _ \/ _` | | | | | (_| | (_| (_| | (_| | __/ | | | | | | (_| || __/ (_| | |_| | \__,_|\___\__,_|\__,_|\___|_| |_| |_|_|\__,_(_)___|\__,_|\__,_| We're hiring! See https://www.academia.edu/hiring --> <link href="//a.academia-assets.com/images/favicons/favicon-production.ico" rel="shortcut icon" type="image/vnd.microsoft.icon"> <link rel="apple-touch-icon" sizes="57x57" href="//a.academia-assets.com/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//a.academia-assets.com/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//a.academia-assets.com/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//a.academia-assets.com/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//a.academia-assets.com/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//a.academia-assets.com/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//a.academia-assets.com/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//a.academia-assets.com/images/favicons/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//a.academia-assets.com/images/favicons/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="//a.academia-assets.com/images/favicons/manifest.json"> <meta name="msapplication-TileColor" content="#2b5797"> <meta name="msapplication-TileImage" content="//a.academia-assets.com/images/favicons/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <script> window.performance && window.performance.measure && window.performance.measure("Time To First Byte", "requestStart", "responseStart"); </script> <script> (function() { if (!window.URLSearchParams || !window.history || !window.history.replaceState) { return; } var searchParams = new URLSearchParams(window.location.search); var paramsToDelete = [ 'fs', 'sm', 'swp', 'iid', 'nbs', 'rcc', // related content category 'rcpos', // related content carousel position 'rcpg', // related carousel page 'rchid', // related content hit id 'f_ri', // research interest id, for SEO tracking 'f_fri', // featured research interest, for SEO tracking (param key without value) 'f_rid', // from research interest directory for SEO tracking 'f_loswp', // from research interest pills on LOSWP sidebar for SEO tracking 'rhid', // referrring hit id ]; if (paramsToDelete.every((key) => searchParams.get(key) === null)) { return; } paramsToDelete.forEach((key) => { searchParams.delete(key); }); var cleanUrl = new URL(window.location.href); cleanUrl.search = searchParams.toString(); history.replaceState({}, document.title, cleanUrl); })(); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "profiles/works", 'action': "summary", 'controller_action': 'profiles/works#summary', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script type="text/javascript"> window.sendUserTiming = function(timingName) { if (!(window.performance && window.performance.measure)) return; var entries = window.performance.getEntriesByName(timingName, "measure"); if (entries.length !== 1) return; var timingValue = Math.round(entries[0].duration); gtag('event', 'timing_complete', { name: timingName, value: timingValue, event_category: 'User-centric', }); }; window.sendUserTiming("Time To First Byte"); </script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="6dkkOxQHUx6yLC2XSyROCRhotV5kYVOiHcPz1MrosAsFFXV0nRZ+FPft9PG3CIbafnZNfEuQuJ/cgFpXhujJkw==" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/wow-77f7b87cb1583fc59aa8f94756ebfe913345937eb932042b4077563bebb5fb4b.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/social/home-9e8218e1301001388038e3fc3427ed00d079a4760ff7745d1ec1b2d59103170a.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/heading-b2b823dd904da60a48fd1bfa1defd840610c2ff414d3f39ed3af46277ab8df3b.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/button-3cea6e0ad4715ed965c49bfb15dedfc632787b32ff6d8c3a474182b231146ab7.css" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&family=Gupter:wght@400;500;700&family=IBM+Plex+Mono:wght@300;400&family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-10fa40af19d25203774df2d4a03b9b5771b45109c2304968038e88a81d1215c5.css" /> <meta name="author" content="prashant koshta" /> <meta name="description" content="Prashant Koshta: 1 Follower, 3 Following, 3 Research papers. Research interests: Wireless Sensor Networks and Visual Sensor Networks." /> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs" /> <script> var $controller_name = 'works'; var $action_name = "summary"; var $rails_env = 'production'; var $app_rev = '836a04d38e13e94dcd4e9d2b995bb1a155f81b46'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.Aedu = { hit_data: null }; window.Aedu.SiteStats = {"premium_universities_count":15252,"monthly_visitors":"120 million","monthly_visitor_count":120260779,"monthly_visitor_count_in_millions":120,"user_count":278658558,"paper_count":55203019,"paper_count_in_millions":55,"page_count":432000000,"page_count_in_millions":432,"pdf_count":16500000,"pdf_count_in_millions":16}; window.Aedu.serverRenderTime = new Date(1734029469000); window.Aedu.timeDifference = new Date().getTime() - 1734029469000; window.Aedu.isUsingCssV1 = false; window.Aedu.enableLocalization = true; window.Aedu.activateFullstory = false; window.Aedu.serviceAvailability = { status: {"attention_db":"on","bibliography_db":"on","contacts_db":"on","email_db":"on","indexability_db":"on","mentions_db":"on","news_db":"on","notifications_db":"on","offsite_mentions_db":"on","redshift":"on","redshift_exports_db":"on","related_works_db":"on","ring_db":"on","user_tests_db":"on"}, serviceEnabled: function(service) { return this.status[service] === "on"; }, readEnabled: function(service) { return this.serviceEnabled(service) || this.status[service] === "read_only"; }, }; window.Aedu.viewApmTrace = function() { // Check if x-apm-trace-id meta tag is set, and open the trace in APM // in a new window if it is. var apmTraceId = document.head.querySelector('meta[name="x-apm-trace-id"]'); if (apmTraceId) { var traceId = apmTraceId.content; // Use trace ID to construct URL, an example URL looks like: // https://app.datadoghq.com/apm/traces?query=trace_id%31298410148923562634 var apmUrl = 'https://app.datadoghq.com/apm/traces?query=trace_id%3A' + traceId; window.open(apmUrl, '_blank'); } }; </script> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.2/html5shiv.min.js"></script> <![endif]--> <link href="https://fonts.googleapis.com/css?family=Roboto:100,100i,300,300i,400,400i,500,500i,700,700i,900,900i" rel="stylesheet"> <link href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" rel="stylesheet"> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/libraries-a9675dcb01ec4ef6aa807ba772c7a5a00c1820d3ff661c1038a20f80d06bb4e4.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/academia-0fb6fc03c471832908791ad7ddba619b6165b3ccf7ae0f65cf933f34b0b660a7.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system_legacy-056a9113b9a0f5343d013b29ee1929d5a18be35fdcdceb616600b4db8bd20054.css" /> <script src="//a.academia-assets.com/assets/webpack_bundles/runtime-bundle-005434038af4252ca37c527588411a3d6a0eabb5f727fac83f8bbe7fd88d93bb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/webpack_libraries_and_infrequently_changed.wjs-bundle-2eebbf16f94e23df09908fc0eb355e7d088296bc7bbbbe96567743814345fdd9.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/core_webpack.wjs-bundle-086d9084944b0c8a793ea96ac398b4180db6177bb674e9655034fb25e834c8b4.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/sentry.wjs-bundle-5fe03fddca915c8ba0f7edbe64c194308e8ce5abaed7bffe1255ff37549c4808.js"></script> <script> jade = window.jade || {}; jade.helpers = window.$h; jade._ = window._; </script> <!-- Google Tag Manager --> <script id="tag-manager-head-root">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer_old','GTM-5G9JF7Z');</script> <!-- End Google Tag Manager --> <script> window.gptadslots = []; window.googletag = window.googletag || {}; window.googletag.cmd = window.googletag.cmd || []; </script> <script type="text/javascript"> // TODO(jacob): This should be defined, may be rare load order problem. // Checking if null is just a quick fix, will default to en if unset. // Better fix is to run this immedietely after I18n is set. if (window.I18n != null) { I18n.defaultLocale = "en"; I18n.locale = "en"; I18n.fallbacks = true; } </script> <link rel="canonical" href="https://independent.academia.edu/PrashantKoshta" /> </head> <!--[if gte IE 9 ]> <body class='ie ie9 c-profiles/works a-summary logged_out'> <![endif]--> <!--[if !(IE) ]><!--> <body class='c-profiles/works a-summary logged_out'> <!--<![endif]--> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script><script>window.fbAsyncLoad = function() { // Protection against double calling of this function if (window.FB) { return; } (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); } if (!window.defer_facebook) { // Autoload if not deferred window.fbAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.fbAsyncLoad(); }, 5000); }</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script><script>window.googleAsyncLoad = function() { // Protection against double calling of this function (function(d) { var js; var id = 'google-jssdk'; var ref = d.getElementsByTagName('script')[0]; if (d.getElementById(id)) { return; } js = d.createElement('script'); js.id = id; js.async = true; js.onload = loadGoogle; js.src = "https://accounts.google.com/gsi/client" ref.parentNode.insertBefore(js, ref); }(document)); } if (!window.defer_google) { // Autoload if not deferred window.googleAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.googleAsyncLoad(); }, 5000); }</script> <div id="tag-manager-body-root"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5G9JF7Z" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Event listeners for analytics --> <script> window.addEventListener('load', function() { if (document.querySelector('input[name="commit"]')) { document.querySelector('input[name="commit"]').addEventListener('click', function() { gtag('event', 'click', { event_category: 'button', event_label: 'Log In' }) }) } }); </script> </div> <script>var _comscore = _comscore || []; _comscore.push({ c1: "2", c2: "26766707" }); (function() { var s = document.createElement("script"), el = document.getElementsByTagName("script")[0]; s.async = true; s.src = (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js"; el.parentNode.insertBefore(s, el); })();</script><img src="https://sb.scorecardresearch.com/p?c1=2&c2=26766707&cv=2.0&cj=1" style="position: absolute; visibility: hidden" /> <div id='react-modal'></div> <div class='DesignSystem'> <a class='u-showOnFocus' href='#site'> Skip to main content </a> </div> <div id="upgrade_ie_banner" style="display: none;"><p>Academia.edu no longer supports Internet Explorer.</p><p>To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to <a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.getElementById('upgrade_ie_banner').style.display = 'block'; }</script> <div class="DesignSystem bootstrap ShrinkableNav"><div class="navbar navbar-default main-header"><div class="container-wrapper" id="main-header-container"><div class="container"><div class="navbar-header"><div class="nav-left-wrapper u-mt0x"><div class="nav-logo"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="visible-xs-inline-block" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hidden-xs" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a></div><div class="nav-search"><div class="SiteSearch-wrapper select2-no-default-pills"><form class="js-SiteSearch-form DesignSystem" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><i class="SiteSearch-icon fa fa-search u-fw700 u-positionAbsolute u-tcGrayDark"></i><input class="js-SiteSearch-form-input SiteSearch-form-input form-control" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" value="" /></form></div></div></div><div class="nav-right-wrapper pull-right"><ul class="NavLinks js-main-nav list-unstyled"><li class="NavLinks-link"><a class="js-header-login-url Button Button--inverseGray Button--sm u-mb4x" id="nav_log_in" rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="NavLinks-link u-p0x"><a class="Button Button--inverseGray Button--sm u-mb4x" rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li></ul><button class="hidden-lg hidden-md hidden-sm u-ml4x navbar-toggle collapsed" data-target=".js-mobile-header-links" data-toggle="collapse" type="button"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></button></div></div><div class="collapse navbar-collapse js-mobile-header-links"><ul class="nav navbar-nav"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li><li class="u-borderColorGrayLight u-borderBottom1 js-mobile-nav-expand-trigger"><a href="#">more <span class="caret"></span></a></li><li><ul class="js-mobile-nav-expand-section nav navbar-nav u-m0x collapse"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/about">About</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/press">Press</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/documents">Papers</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/hiring"><i class="fa fa-briefcase"></i> We're Hiring!</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://support.academia.edu/"><i class="fa fa-question-circle"></i> Help Center</a></li><li class="js-mobile-nav-collapse-trigger u-borderColorGrayLight u-borderBottom1 dropup" style="display:none"><a href="#">less <span class="caret"></span></a></li></ul></li></ul></div></div></div><script>(function(){ var $moreLink = $(".js-mobile-nav-expand-trigger"); var $lessLink = $(".js-mobile-nav-collapse-trigger"); var $section = $('.js-mobile-nav-expand-section'); $moreLink.click(function(ev){ ev.preventDefault(); $moreLink.hide(); $lessLink.show(); $section.collapse('show'); }); $lessLink.click(function(ev){ ev.preventDefault(); $moreLink.show(); $lessLink.hide(); $section.collapse('hide'); }); })() if ($a.is_logged_in() || false) { new Aedu.NavigationController({ el: '.js-main-nav', showHighlightedNotification: false }); } else { $(".js-header-login-url").attr("href", $a.loginUrlWithRedirect()); } Aedu.autocompleteSearch = new AutocompleteSearch({el: '.js-SiteSearch-form'});</script></div></div> <div id='site' class='fixed'> <div id="content" class="clearfix"> <script>document.addEventListener('DOMContentLoaded', function(){ var $dismissible = $(".dismissible_banner"); $dismissible.click(function(ev) { $dismissible.hide(); }); });</script> <script src="//a.academia-assets.com/assets/webpack_bundles/profile.wjs-bundle-7c63369d6bc1d9729936224080f1002d6f378f0ed8d4ed7c2ee00a7b16812651.js" defer="defer"></script><script>Aedu.rankings = { showPaperRankingsLink: false } $viewedUser = Aedu.User.set_viewed( {"id":20039268,"first_name":"Prashant","middle_initials":null,"last_name":"Koshta","page_name":"PrashantKoshta","domain_name":"independent","created_at":"2014-10-26T19:23:26.476-07:00","display_name":"Prashant Koshta","url":"https://independent.academia.edu/PrashantKoshta","photo":"/images/s65_no_pic.png","has_photo":false,"is_analytics_public":false,"interests":[{"id":9136,"name":"Wireless Sensor Networks","url":"https://www.academia.edu/Documents/in/Wireless_Sensor_Networks"},{"id":52661,"name":"Visual Sensor Networks","url":"https://www.academia.edu/Documents/in/Visual_Sensor_Networks"}]} ); if ($a.is_logged_in() && $viewedUser.is_current_user()) { $('body').addClass('profile-viewed-by-owner'); } $socialProfiles = []</script><div id="js-react-on-rails-context" style="display:none" data-rails-context="{"inMailer":false,"i18nLocale":"en","i18nDefaultLocale":"en","href":"https://independent.academia.edu/PrashantKoshta","location":"/PrashantKoshta","scheme":"https","host":"independent.academia.edu","port":null,"pathname":"/PrashantKoshta","search":null,"httpAcceptLanguage":null,"serverSide":false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="ProfileCheckPaperUpdate" data-props="{}" data-trace="false" data-dom-id="ProfileCheckPaperUpdate-react-component-a0a0d387-886e-4f94-b314-d3949fc538ed"></div> <div id="ProfileCheckPaperUpdate-react-component-a0a0d387-886e-4f94-b314-d3949fc538ed"></div> <div class="DesignSystem"><div class="onsite-ping" id="onsite-ping"></div></div><div class="profile-user-info DesignSystem"><div class="social-profile-container"><div class="left-panel-container"><div class="user-info-component-wrapper"><div class="user-summary-cta-container"><div class="user-summary-container"><div class="social-profile-avatar-container"><img class="profile-avatar u-positionAbsolute" border="0" alt="" src="//a.academia-assets.com/images/s200_no_pic.png" /></div><div class="title-container"><h1 class="ds2-5-heading-sans-serif-sm">Prashant Koshta</h1><div class="affiliations-container fake-truncate js-profile-affiliations"></div></div></div><div class="sidebar-cta-container"><button class="ds2-5-button hidden profile-cta-button grow js-profile-follow-button" data-broccoli-component="user-info.follow-button" data-click-track="profile-user-info-follow-button" data-follow-user-fname="Prashant" data-follow-user-id="20039268" data-follow-user-source="profile_button" data-has-google="false"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">add</span>Follow</button><button class="ds2-5-button hidden profile-cta-button grow js-profile-unfollow-button" data-broccoli-component="user-info.unfollow-button" data-click-track="profile-user-info-unfollow-button" data-unfollow-user-id="20039268"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">done</span>Following</button></div></div><div class="user-stats-container"><a><div class="stat-container js-profile-followers"><p class="label">Follower</p><p class="data">1</p></div></a><a><div class="stat-container js-profile-followees" data-broccoli-component="user-info.followees-count" data-click-track="profile-expand-user-info-following"><p class="label">Following</p><p class="data">3</p></div></a><span><div class="stat-container"><p class="label"><span class="js-profile-total-view-text">Public Views</span></p><p class="data"><span class="js-profile-view-count"></span></p></div></span></div><div class="ri-section"><div class="ri-section-header"><span>Interests</span></div><div class="ri-tags-container"><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="20039268" href="https://www.academia.edu/Documents/in/Wireless_Sensor_Networks"><div id="js-react-on-rails-context" style="display:none" data-rails-context="{"inMailer":false,"i18nLocale":"en","i18nDefaultLocale":"en","href":"https://independent.academia.edu/PrashantKoshta","location":"/PrashantKoshta","scheme":"https","host":"independent.academia.edu","port":null,"pathname":"/PrashantKoshta","search":null,"httpAcceptLanguage":null,"serverSide":false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Wireless Sensor Networks"]}" data-trace="false" data-dom-id="Pill-react-component-3085c605-4e8a-4f4f-bb14-34f4712692a9"></div> <div id="Pill-react-component-3085c605-4e8a-4f4f-bb14-34f4712692a9"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="20039268" href="https://www.academia.edu/Documents/in/Visual_Sensor_Networks"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Visual Sensor Networks"]}" data-trace="false" data-dom-id="Pill-react-component-4deac731-44ac-47dc-8206-bf206ea3f0da"></div> <div id="Pill-react-component-4deac731-44ac-47dc-8206-bf206ea3f0da"></div> </a></div></div></div></div><div class="right-panel-container"><div class="user-content-wrapper"><div class="uploads-container" id="social-redesign-work-container"><div class="upload-header"><h2 class="ds2-5-heading-sans-serif-xs">Uploads</h2></div><div class="documents-container backbone-social-profile-documents" style="width: 100%;"><div class="u-taCenter"></div><div class="profile--tab_content_container js-tab-pane tab-pane active" id="all"><div class="profile--tab_heading_container js-section-heading" data-section="Papers" id="Papers"><h3 class="profile--tab_heading_container">Papers by Prashant Koshta</h3></div><div class="js-work-strip profile--work_container" data-work-id="98887854"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/98887854/A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography"><img alt="Research paper thumbnail of A Novel Authenticity of an Image Using Visual Cryptography A Novel Authenticity of an Image Using Visual Cryptography A Novel Authenticity of an Image Using Visual Cryptography A Novel Authenticity of an Image Using Visual Cryptography" class="work-thumbnail" src="https://attachments.academia-assets.com/100118926/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/98887854/A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography">A Novel Authenticity of an Image Using Visual Cryptography A Novel Authenticity of an Image Using Visual Cryptography A Novel Authenticity of an Image Using Visual Cryptography A Novel Authenticity of an Image Using Visual Cryptography</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">A digital signature is an important public-key primitive that performs the function of convention...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">A digital signature is an important public-key primitive that performs the function of conventional handwritten signatures for entity authentication, data integrity, and non-repudiation, especially within the electronic commerce environment. Currently, most conventional digital signature schemes are based on mathematical hard problems. These mathematical algorithms require computers to perform the heavy and complex computations to generate and verify the keys and signatures. In 1995, Naor and Shamir proposed a visual cryptography (VC) for binary images. VC has high security and requires simple computations. The purpose of this thesis is to provide an alternative to the current digital signature technology. We introduce a new digital signature scheme based on the concept of a non-expansion visual cryptography. A visual digital signature scheme is a method to enable visual verification of the authenticity of an image in an insecure environment without the need to perform any complex computations. We proposed scheme generates visual shares and manipulates them using the simple Boolean operations OR rather than generating and computing large and long random integer values as in the conventional digital signature schemes currently in use.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="994ce32ad271e7c67121044c1bcc3e4c" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":100118926,"asset_id":98887854,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/100118926/download_file?st=MTczNDAyOTQ2OCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="98887854"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="98887854"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 98887854; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=98887854]").text(description); $(".js-view-count[data-work-id=98887854]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 98887854; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='98887854']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 98887854, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "994ce32ad271e7c67121044c1bcc3e4c" } } $('.js-work-strip[data-work-id=98887854]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":98887854,"title":"A Novel Authenticity of an Image Using Visual Cryptography A Novel Authenticity of an Image Using Visual Cryptography A Novel Authenticity of an Image Using Visual Cryptography A Novel Authenticity of an Image Using Visual Cryptography","translated_title":"","metadata":{"grobid_abstract":"A digital signature is an important public-key primitive that performs the function of conventional handwritten signatures for entity authentication, data integrity, and non-repudiation, especially within the electronic commerce environment. Currently, most conventional digital signature schemes are based on mathematical hard problems. These mathematical algorithms require computers to perform the heavy and complex computations to generate and verify the keys and signatures. In 1995, Naor and Shamir proposed a visual cryptography (VC) for binary images. VC has high security and requires simple computations. The purpose of this thesis is to provide an alternative to the current digital signature technology. We introduce a new digital signature scheme based on the concept of a non-expansion visual cryptography. A visual digital signature scheme is a method to enable visual verification of the authenticity of an image in an insecure environment without the need to perform any complex computations. We proposed scheme generates visual shares and manipulates them using the simple Boolean operations OR rather than generating and computing large and long random integer values as in the conventional digital signature schemes currently in use.","publication_date":{"day":null,"month":null,"year":2012,"errors":{}},"grobid_abstract_attachment_id":100118926},"translated_abstract":null,"internal_url":"https://www.academia.edu/98887854/A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography","translated_internal_url":"","created_at":"2023-03-21T02:57:46.430-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":20039268,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":100118926,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/100118926/thumbnails/1.jpg","file_name":"IJCSN-2012-1-2-15.pdf","download_url":"https://www.academia.edu/attachments/100118926/download_file?st=MTczNDAyOTQ2OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Novel_Authenticity_of_an_Image_Using_V.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/100118926/IJCSN-2012-1-2-15-libre.pdf?1679395303=\u0026response-content-disposition=attachment%3B+filename%3DA_Novel_Authenticity_of_an_Image_Using_V.pdf\u0026Expires=1734033068\u0026Signature=JiIB0sS8jFT4UkCpbrHwPvKjfmMtQjWDXG18btvJo~XYRFAUEhUKC-rOBvJTeJIB35eWtXWyxULsmnwaqVytXRC81unhcOSuOhcNPXWpImbQycFR~gRzxR-KT50asI80cqoPrUHm-Q2vf~6oe5j0JfHUQprzsWnyN0lj5o2drEgxYpzNR3gGevY8fEhtKeyk4grU51n6oWxt~Ka2oJn6ccTgAVvejIqqRbT6NXUv6X5z9EgqKlzw0ZSDrVGc-i-8DNmhnM1mCFH-KZ~H6A9r1BETmwVZLplXMO5xl0ecDSQ27lkSTrw6m5dPRWO-DRfqStBcWtyALt7X2sKuYi954w__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography","translated_slug":"","page_count":8,"language":"en","content_type":"Work","summary":"A digital signature is an important public-key primitive that performs the function of conventional handwritten signatures for entity authentication, data integrity, and non-repudiation, especially within the electronic commerce environment. Currently, most conventional digital signature schemes are based on mathematical hard problems. These mathematical algorithms require computers to perform the heavy and complex computations to generate and verify the keys and signatures. In 1995, Naor and Shamir proposed a visual cryptography (VC) for binary images. VC has high security and requires simple computations. The purpose of this thesis is to provide an alternative to the current digital signature technology. We introduce a new digital signature scheme based on the concept of a non-expansion visual cryptography. A visual digital signature scheme is a method to enable visual verification of the authenticity of an image in an insecure environment without the need to perform any complex computations. We proposed scheme generates visual shares and manipulates them using the simple Boolean operations OR rather than generating and computing large and long random integer values as in the conventional digital signature schemes currently in use.","owner":{"id":20039268,"first_name":"Prashant","middle_initials":null,"last_name":"Koshta","page_name":"PrashantKoshta","domain_name":"independent","created_at":"2014-10-26T19:23:26.476-07:00","display_name":"Prashant Koshta","url":"https://independent.academia.edu/PrashantKoshta"},"attachments":[{"id":100118926,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/100118926/thumbnails/1.jpg","file_name":"IJCSN-2012-1-2-15.pdf","download_url":"https://www.academia.edu/attachments/100118926/download_file?st=MTczNDAyOTQ2OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Novel_Authenticity_of_an_Image_Using_V.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/100118926/IJCSN-2012-1-2-15-libre.pdf?1679395303=\u0026response-content-disposition=attachment%3B+filename%3DA_Novel_Authenticity_of_an_Image_Using_V.pdf\u0026Expires=1734033068\u0026Signature=JiIB0sS8jFT4UkCpbrHwPvKjfmMtQjWDXG18btvJo~XYRFAUEhUKC-rOBvJTeJIB35eWtXWyxULsmnwaqVytXRC81unhcOSuOhcNPXWpImbQycFR~gRzxR-KT50asI80cqoPrUHm-Q2vf~6oe5j0JfHUQprzsWnyN0lj5o2drEgxYpzNR3gGevY8fEhtKeyk4grU51n6oWxt~Ka2oJn6ccTgAVvejIqqRbT6NXUv6X5z9EgqKlzw0ZSDrVGc-i-8DNmhnM1mCFH-KZ~H6A9r1BETmwVZLplXMO5xl0ecDSQ27lkSTrw6m5dPRWO-DRfqStBcWtyALt7X2sKuYi954w__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":4383,"name":"Digital Signature","url":"https://www.academia.edu/Documents/in/Digital_Signature"},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security"},{"id":16542,"name":"Cryptography","url":"https://www.academia.edu/Documents/in/Cryptography"},{"id":17100,"name":"Theoretical Computer Science","url":"https://www.academia.edu/Documents/in/Theoretical_Computer_Science"},{"id":21903,"name":"Encryption","url":"https://www.academia.edu/Documents/in/Encryption"},{"id":30947,"name":"The Internet","url":"https://www.academia.edu/Documents/in/The_Internet"},{"id":140823,"name":"Technical Report","url":"https://www.academia.edu/Documents/in/Technical_Report"},{"id":222999,"name":"Public key cryptography","url":"https://www.academia.edu/Documents/in/Public_key_cryptography"},{"id":331895,"name":"Visual Cryptography","url":"https://www.academia.edu/Documents/in/Visual_Cryptography"},{"id":1560969,"name":"Financial Cryptography","url":"https://www.academia.edu/Documents/in/Financial_Cryptography"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="76928369"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/76928369/%E8%95%B4%E5%90%AB_K_4_e_C_4%E5%8F%AF%E5%9B%BE%E5%BA%8F%E5%88%97%E7%9A%84%E5%88%BB%E7%94%BB"><img alt="Research paper thumbnail of 蕴含 K_4 e C_4可图序列的刻画" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/76928369/%E8%95%B4%E5%90%AB_K_4_e_C_4%E5%8F%AF%E5%9B%BE%E5%BA%8F%E5%88%97%E7%9A%84%E5%88%BB%E7%94%BB">蕴含 K_4 e C_4可图序列的刻画</a></div><div class="wp-workCard_item"><span>漳州师范学院学报:自然科学版</span><span>, 2012</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="76928369"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="76928369"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 76928369; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=76928369]").text(description); $(".js-view-count[data-work-id=76928369]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 76928369; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='76928369']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 76928369, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=76928369]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":76928369,"title":"蕴含 K_4 e C_4可图序列的刻画","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2012,"errors":{}},"publication_name":"漳州师范学院学报:自然科学版"},"translated_abstract":null,"internal_url":"https://www.academia.edu/76928369/%E8%95%B4%E5%90%AB_K_4_e_C_4%E5%8F%AF%E5%9B%BE%E5%BA%8F%E5%88%97%E7%9A%84%E5%88%BB%E7%94%BB","translated_internal_url":"","created_at":"2022-04-19T02:31:20.155-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":20039268,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"蕴含_K_4_e_C_4可图序列的刻画","translated_slug":"","page_count":null,"language":"zh","content_type":"Work","summary":null,"owner":{"id":20039268,"first_name":"Prashant","middle_initials":null,"last_name":"Koshta","page_name":"PrashantKoshta","domain_name":"independent","created_at":"2014-10-26T19:23:26.476-07:00","display_name":"Prashant Koshta","url":"https://independent.academia.edu/PrashantKoshta"},"attachments":[],"research_interests":[],"urls":[{"id":19660142,"url":"http://www.scielo.org.co/scielo.php?script=sci_arttext\u0026pid=S0122-97612014000100005\u0026lng=pt"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="76928358"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/76928358/A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography"><img alt="Research paper thumbnail of A Novel Authenticity of an Image Using Visual Cryptography" class="work-thumbnail" src="https://attachments.academia-assets.com/84455561/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/76928358/A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography">A Novel Authenticity of an Image Using Visual Cryptography</a></div><div class="wp-workCard_item"><span>International Journal of Computer Science and Network</span><span>, Apr 1, 2012</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="04a1a93d367ca75979e939687a0df5b6" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":84455561,"asset_id":76928358,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/84455561/download_file?st=MTczNDAyOTQ2OSw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="76928358"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="76928358"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 76928358; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=76928358]").text(description); $(".js-view-count[data-work-id=76928358]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 76928358; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='76928358']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 76928358, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "04a1a93d367ca75979e939687a0df5b6" } } $('.js-work-strip[data-work-id=76928358]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":76928358,"title":"A Novel Authenticity of an Image Using Visual Cryptography","translated_title":"","metadata":{"publication_date":{"day":1,"month":4,"year":2012,"errors":{}},"publication_name":"International Journal of Computer Science and Network"},"translated_abstract":null,"internal_url":"https://www.academia.edu/76928358/A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography","translated_internal_url":"","created_at":"2022-04-19T02:31:06.055-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":20039268,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":84455561,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/84455561/thumbnails/1.jpg","file_name":"IJCSN-2012-1-2-15.pdf","download_url":"https://www.academia.edu/attachments/84455561/download_file?st=MTczNDAyOTQ2OSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Novel_Authenticity_of_an_Image_Using_V.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/84455561/IJCSN-2012-1-2-15-libre.pdf?1650362481=\u0026response-content-disposition=attachment%3B+filename%3DA_Novel_Authenticity_of_an_Image_Using_V.pdf\u0026Expires=1734033069\u0026Signature=JiAh9QoP2CCZ6PHVbFYsdDaWFcW9UTBLq8Gud5IUsrMlXME-ZGr~0SEtKJCasr~TE3de14NCH5ncRmY6GKAismiz6WFwUpU~qZyd1re0Hm8zTrfr1C0p6ybouhkwtCtpLZWyJhzqNKVHCbRmJsMq3dndatjuxU0gsh4xv~k8NUr3WDx5LJoON6EGp~H1gKd8eMAAWGJt32W8HuNCcBreem3Ws2VEkjEszAZT~Rvp9LnPTmlgzTscphmPab4Rzjxn2e7G4Rkst7K1~Ko-36dR2IK~BP4w1W8JdXSf7X2evY~WxOfQF05ldho693K1FeB-jRnsfYcK95vSlABUXNeOAQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography","translated_slug":"","page_count":8,"language":"en","content_type":"Work","summary":null,"owner":{"id":20039268,"first_name":"Prashant","middle_initials":null,"last_name":"Koshta","page_name":"PrashantKoshta","domain_name":"independent","created_at":"2014-10-26T19:23:26.476-07:00","display_name":"Prashant Koshta","url":"https://independent.academia.edu/PrashantKoshta"},"attachments":[{"id":84455561,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/84455561/thumbnails/1.jpg","file_name":"IJCSN-2012-1-2-15.pdf","download_url":"https://www.academia.edu/attachments/84455561/download_file?st=MTczNDAyOTQ2OSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Novel_Authenticity_of_an_Image_Using_V.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/84455561/IJCSN-2012-1-2-15-libre.pdf?1650362481=\u0026response-content-disposition=attachment%3B+filename%3DA_Novel_Authenticity_of_an_Image_Using_V.pdf\u0026Expires=1734033069\u0026Signature=JiAh9QoP2CCZ6PHVbFYsdDaWFcW9UTBLq8Gud5IUsrMlXME-ZGr~0SEtKJCasr~TE3de14NCH5ncRmY6GKAismiz6WFwUpU~qZyd1re0Hm8zTrfr1C0p6ybouhkwtCtpLZWyJhzqNKVHCbRmJsMq3dndatjuxU0gsh4xv~k8NUr3WDx5LJoON6EGp~H1gKd8eMAAWGJt32W8HuNCcBreem3Ws2VEkjEszAZT~Rvp9LnPTmlgzTscphmPab4Rzjxn2e7G4Rkst7K1~Ko-36dR2IK~BP4w1W8JdXSf7X2evY~WxOfQF05ldho693K1FeB-jRnsfYcK95vSlABUXNeOAQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":84455560,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/84455560/thumbnails/1.jpg","file_name":"IJCSN-2012-1-2-15.pdf","download_url":"https://www.academia.edu/attachments/84455560/download_file","bulk_download_file_name":"A_Novel_Authenticity_of_an_Image_Using_V.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/84455560/IJCSN-2012-1-2-15-libre.pdf?1650362477=\u0026response-content-disposition=attachment%3B+filename%3DA_Novel_Authenticity_of_an_Image_Using_V.pdf\u0026Expires=1734033069\u0026Signature=exfRkgGKpyrXEPNCumA-MC6zgQHE0QxAFrOcyqu-rbGJLYVX9gKc6fNN3~swZjXRflHN2emgCfppHrxcseYZCXj0r~YZ2HnEMbbpiqYG5JzxMGegbmLTAqyLD6udBlR62cMPGZMnkoHZYU8iRQCcZqz5nat7qVN~x8OsUBaXNxj2QedOhx7BDQWk0KIXwJwcVPjaGB5hHm9i1~EHQcUjVf4PCJruDYqiDifsFpRycSl4SW8959TtqaDn2Jl6jvJgaiyo9lH5BnMnaSHEkMV7nHgikzAUIwq6f8~qwspd0nUyUP6ARHwlRa6oWspRUBp7DDqnI1TBbcezlIApPi-haw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence"},{"id":854,"name":"Computer Vision","url":"https://www.academia.edu/Documents/in/Computer_Vision"},{"id":30193,"name":"Image Analysis (Mathematics)","url":"https://www.academia.edu/Documents/in/Image_Analysis_Mathematics_"},{"id":140823,"name":"Technical Report","url":"https://www.academia.edu/Documents/in/Technical_Report"},{"id":331895,"name":"Visual Cryptography","url":"https://www.academia.edu/Documents/in/Visual_Cryptography"}],"urls":[{"id":19660136,"url":"http://arizona.openrepository.com/arizona/bitstream/10150/219514/1/IJCSN-2012-1-2-15.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="14662569" id="papers"><div class="js-work-strip profile--work_container" data-work-id="98887854"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/98887854/A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography"><img alt="Research paper thumbnail of A Novel Authenticity of an Image Using Visual Cryptography A Novel Authenticity of an Image Using Visual Cryptography A Novel Authenticity of an Image Using Visual Cryptography A Novel Authenticity of an Image Using Visual Cryptography" class="work-thumbnail" src="https://attachments.academia-assets.com/100118926/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/98887854/A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography">A Novel Authenticity of an Image Using Visual Cryptography A Novel Authenticity of an Image Using Visual Cryptography A Novel Authenticity of an Image Using Visual Cryptography A Novel Authenticity of an Image Using Visual Cryptography</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">A digital signature is an important public-key primitive that performs the function of convention...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">A digital signature is an important public-key primitive that performs the function of conventional handwritten signatures for entity authentication, data integrity, and non-repudiation, especially within the electronic commerce environment. Currently, most conventional digital signature schemes are based on mathematical hard problems. These mathematical algorithms require computers to perform the heavy and complex computations to generate and verify the keys and signatures. In 1995, Naor and Shamir proposed a visual cryptography (VC) for binary images. VC has high security and requires simple computations. The purpose of this thesis is to provide an alternative to the current digital signature technology. We introduce a new digital signature scheme based on the concept of a non-expansion visual cryptography. A visual digital signature scheme is a method to enable visual verification of the authenticity of an image in an insecure environment without the need to perform any complex computations. We proposed scheme generates visual shares and manipulates them using the simple Boolean operations OR rather than generating and computing large and long random integer values as in the conventional digital signature schemes currently in use.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="994ce32ad271e7c67121044c1bcc3e4c" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":100118926,"asset_id":98887854,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/100118926/download_file?st=MTczNDAyOTQ2OSw4LjIyMi4yMDguMTQ2&st=MTczNDAyOTQ2OCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="98887854"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="98887854"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 98887854; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=98887854]").text(description); $(".js-view-count[data-work-id=98887854]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 98887854; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='98887854']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 98887854, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "994ce32ad271e7c67121044c1bcc3e4c" } } $('.js-work-strip[data-work-id=98887854]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":98887854,"title":"A Novel Authenticity of an Image Using Visual Cryptography A Novel Authenticity of an Image Using Visual Cryptography A Novel Authenticity of an Image Using Visual Cryptography A Novel Authenticity of an Image Using Visual Cryptography","translated_title":"","metadata":{"grobid_abstract":"A digital signature is an important public-key primitive that performs the function of conventional handwritten signatures for entity authentication, data integrity, and non-repudiation, especially within the electronic commerce environment. Currently, most conventional digital signature schemes are based on mathematical hard problems. These mathematical algorithms require computers to perform the heavy and complex computations to generate and verify the keys and signatures. In 1995, Naor and Shamir proposed a visual cryptography (VC) for binary images. VC has high security and requires simple computations. The purpose of this thesis is to provide an alternative to the current digital signature technology. We introduce a new digital signature scheme based on the concept of a non-expansion visual cryptography. A visual digital signature scheme is a method to enable visual verification of the authenticity of an image in an insecure environment without the need to perform any complex computations. We proposed scheme generates visual shares and manipulates them using the simple Boolean operations OR rather than generating and computing large and long random integer values as in the conventional digital signature schemes currently in use.","publication_date":{"day":null,"month":null,"year":2012,"errors":{}},"grobid_abstract_attachment_id":100118926},"translated_abstract":null,"internal_url":"https://www.academia.edu/98887854/A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography","translated_internal_url":"","created_at":"2023-03-21T02:57:46.430-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":20039268,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":100118926,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/100118926/thumbnails/1.jpg","file_name":"IJCSN-2012-1-2-15.pdf","download_url":"https://www.academia.edu/attachments/100118926/download_file?st=MTczNDAyOTQ2OSw4LjIyMi4yMDguMTQ2&st=MTczNDAyOTQ2OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Novel_Authenticity_of_an_Image_Using_V.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/100118926/IJCSN-2012-1-2-15-libre.pdf?1679395303=\u0026response-content-disposition=attachment%3B+filename%3DA_Novel_Authenticity_of_an_Image_Using_V.pdf\u0026Expires=1734033068\u0026Signature=JiIB0sS8jFT4UkCpbrHwPvKjfmMtQjWDXG18btvJo~XYRFAUEhUKC-rOBvJTeJIB35eWtXWyxULsmnwaqVytXRC81unhcOSuOhcNPXWpImbQycFR~gRzxR-KT50asI80cqoPrUHm-Q2vf~6oe5j0JfHUQprzsWnyN0lj5o2drEgxYpzNR3gGevY8fEhtKeyk4grU51n6oWxt~Ka2oJn6ccTgAVvejIqqRbT6NXUv6X5z9EgqKlzw0ZSDrVGc-i-8DNmhnM1mCFH-KZ~H6A9r1BETmwVZLplXMO5xl0ecDSQ27lkSTrw6m5dPRWO-DRfqStBcWtyALt7X2sKuYi954w__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography_A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography","translated_slug":"","page_count":8,"language":"en","content_type":"Work","summary":"A digital signature is an important public-key primitive that performs the function of conventional handwritten signatures for entity authentication, data integrity, and non-repudiation, especially within the electronic commerce environment. Currently, most conventional digital signature schemes are based on mathematical hard problems. These mathematical algorithms require computers to perform the heavy and complex computations to generate and verify the keys and signatures. In 1995, Naor and Shamir proposed a visual cryptography (VC) for binary images. VC has high security and requires simple computations. The purpose of this thesis is to provide an alternative to the current digital signature technology. We introduce a new digital signature scheme based on the concept of a non-expansion visual cryptography. A visual digital signature scheme is a method to enable visual verification of the authenticity of an image in an insecure environment without the need to perform any complex computations. We proposed scheme generates visual shares and manipulates them using the simple Boolean operations OR rather than generating and computing large and long random integer values as in the conventional digital signature schemes currently in use.","owner":{"id":20039268,"first_name":"Prashant","middle_initials":null,"last_name":"Koshta","page_name":"PrashantKoshta","domain_name":"independent","created_at":"2014-10-26T19:23:26.476-07:00","display_name":"Prashant Koshta","url":"https://independent.academia.edu/PrashantKoshta"},"attachments":[{"id":100118926,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/100118926/thumbnails/1.jpg","file_name":"IJCSN-2012-1-2-15.pdf","download_url":"https://www.academia.edu/attachments/100118926/download_file?st=MTczNDAyOTQ2OSw4LjIyMi4yMDguMTQ2&st=MTczNDAyOTQ2OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Novel_Authenticity_of_an_Image_Using_V.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/100118926/IJCSN-2012-1-2-15-libre.pdf?1679395303=\u0026response-content-disposition=attachment%3B+filename%3DA_Novel_Authenticity_of_an_Image_Using_V.pdf\u0026Expires=1734033068\u0026Signature=JiIB0sS8jFT4UkCpbrHwPvKjfmMtQjWDXG18btvJo~XYRFAUEhUKC-rOBvJTeJIB35eWtXWyxULsmnwaqVytXRC81unhcOSuOhcNPXWpImbQycFR~gRzxR-KT50asI80cqoPrUHm-Q2vf~6oe5j0JfHUQprzsWnyN0lj5o2drEgxYpzNR3gGevY8fEhtKeyk4grU51n6oWxt~Ka2oJn6ccTgAVvejIqqRbT6NXUv6X5z9EgqKlzw0ZSDrVGc-i-8DNmhnM1mCFH-KZ~H6A9r1BETmwVZLplXMO5xl0ecDSQ27lkSTrw6m5dPRWO-DRfqStBcWtyALt7X2sKuYi954w__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":4383,"name":"Digital Signature","url":"https://www.academia.edu/Documents/in/Digital_Signature"},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security"},{"id":16542,"name":"Cryptography","url":"https://www.academia.edu/Documents/in/Cryptography"},{"id":17100,"name":"Theoretical Computer Science","url":"https://www.academia.edu/Documents/in/Theoretical_Computer_Science"},{"id":21903,"name":"Encryption","url":"https://www.academia.edu/Documents/in/Encryption"},{"id":30947,"name":"The Internet","url":"https://www.academia.edu/Documents/in/The_Internet"},{"id":140823,"name":"Technical Report","url":"https://www.academia.edu/Documents/in/Technical_Report"},{"id":222999,"name":"Public key cryptography","url":"https://www.academia.edu/Documents/in/Public_key_cryptography"},{"id":331895,"name":"Visual Cryptography","url":"https://www.academia.edu/Documents/in/Visual_Cryptography"},{"id":1560969,"name":"Financial Cryptography","url":"https://www.academia.edu/Documents/in/Financial_Cryptography"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="76928369"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/76928369/%E8%95%B4%E5%90%AB_K_4_e_C_4%E5%8F%AF%E5%9B%BE%E5%BA%8F%E5%88%97%E7%9A%84%E5%88%BB%E7%94%BB"><img alt="Research paper thumbnail of 蕴含 K_4 e C_4可图序列的刻画" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/76928369/%E8%95%B4%E5%90%AB_K_4_e_C_4%E5%8F%AF%E5%9B%BE%E5%BA%8F%E5%88%97%E7%9A%84%E5%88%BB%E7%94%BB">蕴含 K_4 e C_4可图序列的刻画</a></div><div class="wp-workCard_item"><span>漳州师范学院学报:自然科学版</span><span>, 2012</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="76928369"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="76928369"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 76928369; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=76928369]").text(description); $(".js-view-count[data-work-id=76928369]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 76928369; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='76928369']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 76928369, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=76928369]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":76928369,"title":"蕴含 K_4 e C_4可图序列的刻画","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2012,"errors":{}},"publication_name":"漳州师范学院学报:自然科学版"},"translated_abstract":null,"internal_url":"https://www.academia.edu/76928369/%E8%95%B4%E5%90%AB_K_4_e_C_4%E5%8F%AF%E5%9B%BE%E5%BA%8F%E5%88%97%E7%9A%84%E5%88%BB%E7%94%BB","translated_internal_url":"","created_at":"2022-04-19T02:31:20.155-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":20039268,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"蕴含_K_4_e_C_4可图序列的刻画","translated_slug":"","page_count":null,"language":"zh","content_type":"Work","summary":null,"owner":{"id":20039268,"first_name":"Prashant","middle_initials":null,"last_name":"Koshta","page_name":"PrashantKoshta","domain_name":"independent","created_at":"2014-10-26T19:23:26.476-07:00","display_name":"Prashant Koshta","url":"https://independent.academia.edu/PrashantKoshta"},"attachments":[],"research_interests":[],"urls":[{"id":19660142,"url":"http://www.scielo.org.co/scielo.php?script=sci_arttext\u0026pid=S0122-97612014000100005\u0026lng=pt"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="76928358"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/76928358/A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography"><img alt="Research paper thumbnail of A Novel Authenticity of an Image Using Visual Cryptography" class="work-thumbnail" src="https://attachments.academia-assets.com/84455561/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/76928358/A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography">A Novel Authenticity of an Image Using Visual Cryptography</a></div><div class="wp-workCard_item"><span>International Journal of Computer Science and Network</span><span>, Apr 1, 2012</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="04a1a93d367ca75979e939687a0df5b6" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":84455561,"asset_id":76928358,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/84455561/download_file?st=MTczNDAyOTQ2OSw4LjIyMi4yMDguMTQ2&st=MTczNDAyOTQ2OSw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="76928358"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="76928358"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 76928358; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=76928358]").text(description); $(".js-view-count[data-work-id=76928358]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 76928358; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='76928358']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 76928358, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "04a1a93d367ca75979e939687a0df5b6" } } $('.js-work-strip[data-work-id=76928358]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":76928358,"title":"A Novel Authenticity of an Image Using Visual Cryptography","translated_title":"","metadata":{"publication_date":{"day":1,"month":4,"year":2012,"errors":{}},"publication_name":"International Journal of Computer Science and Network"},"translated_abstract":null,"internal_url":"https://www.academia.edu/76928358/A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography","translated_internal_url":"","created_at":"2022-04-19T02:31:06.055-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":20039268,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":84455561,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/84455561/thumbnails/1.jpg","file_name":"IJCSN-2012-1-2-15.pdf","download_url":"https://www.academia.edu/attachments/84455561/download_file?st=MTczNDAyOTQ2OSw4LjIyMi4yMDguMTQ2&st=MTczNDAyOTQ2OSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Novel_Authenticity_of_an_Image_Using_V.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/84455561/IJCSN-2012-1-2-15-libre.pdf?1650362481=\u0026response-content-disposition=attachment%3B+filename%3DA_Novel_Authenticity_of_an_Image_Using_V.pdf\u0026Expires=1734033069\u0026Signature=JiAh9QoP2CCZ6PHVbFYsdDaWFcW9UTBLq8Gud5IUsrMlXME-ZGr~0SEtKJCasr~TE3de14NCH5ncRmY6GKAismiz6WFwUpU~qZyd1re0Hm8zTrfr1C0p6ybouhkwtCtpLZWyJhzqNKVHCbRmJsMq3dndatjuxU0gsh4xv~k8NUr3WDx5LJoON6EGp~H1gKd8eMAAWGJt32W8HuNCcBreem3Ws2VEkjEszAZT~Rvp9LnPTmlgzTscphmPab4Rzjxn2e7G4Rkst7K1~Ko-36dR2IK~BP4w1W8JdXSf7X2evY~WxOfQF05ldho693K1FeB-jRnsfYcK95vSlABUXNeOAQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"A_Novel_Authenticity_of_an_Image_Using_Visual_Cryptography","translated_slug":"","page_count":8,"language":"en","content_type":"Work","summary":null,"owner":{"id":20039268,"first_name":"Prashant","middle_initials":null,"last_name":"Koshta","page_name":"PrashantKoshta","domain_name":"independent","created_at":"2014-10-26T19:23:26.476-07:00","display_name":"Prashant Koshta","url":"https://independent.academia.edu/PrashantKoshta"},"attachments":[{"id":84455561,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/84455561/thumbnails/1.jpg","file_name":"IJCSN-2012-1-2-15.pdf","download_url":"https://www.academia.edu/attachments/84455561/download_file?st=MTczNDAyOTQ2OSw4LjIyMi4yMDguMTQ2&st=MTczNDAyOTQ2OSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Novel_Authenticity_of_an_Image_Using_V.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/84455561/IJCSN-2012-1-2-15-libre.pdf?1650362481=\u0026response-content-disposition=attachment%3B+filename%3DA_Novel_Authenticity_of_an_Image_Using_V.pdf\u0026Expires=1734033069\u0026Signature=JiAh9QoP2CCZ6PHVbFYsdDaWFcW9UTBLq8Gud5IUsrMlXME-ZGr~0SEtKJCasr~TE3de14NCH5ncRmY6GKAismiz6WFwUpU~qZyd1re0Hm8zTrfr1C0p6ybouhkwtCtpLZWyJhzqNKVHCbRmJsMq3dndatjuxU0gsh4xv~k8NUr3WDx5LJoON6EGp~H1gKd8eMAAWGJt32W8HuNCcBreem3Ws2VEkjEszAZT~Rvp9LnPTmlgzTscphmPab4Rzjxn2e7G4Rkst7K1~Ko-36dR2IK~BP4w1W8JdXSf7X2evY~WxOfQF05ldho693K1FeB-jRnsfYcK95vSlABUXNeOAQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":84455560,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/84455560/thumbnails/1.jpg","file_name":"IJCSN-2012-1-2-15.pdf","download_url":"https://www.academia.edu/attachments/84455560/download_file","bulk_download_file_name":"A_Novel_Authenticity_of_an_Image_Using_V.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/84455560/IJCSN-2012-1-2-15-libre.pdf?1650362477=\u0026response-content-disposition=attachment%3B+filename%3DA_Novel_Authenticity_of_an_Image_Using_V.pdf\u0026Expires=1734033069\u0026Signature=exfRkgGKpyrXEPNCumA-MC6zgQHE0QxAFrOcyqu-rbGJLYVX9gKc6fNN3~swZjXRflHN2emgCfppHrxcseYZCXj0r~YZ2HnEMbbpiqYG5JzxMGegbmLTAqyLD6udBlR62cMPGZMnkoHZYU8iRQCcZqz5nat7qVN~x8OsUBaXNxj2QedOhx7BDQWk0KIXwJwcVPjaGB5hHm9i1~EHQcUjVf4PCJruDYqiDifsFpRycSl4SW8959TtqaDn2Jl6jvJgaiyo9lH5BnMnaSHEkMV7nHgikzAUIwq6f8~qwspd0nUyUP6ARHwlRa6oWspRUBp7DDqnI1TBbcezlIApPi-haw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence"},{"id":854,"name":"Computer Vision","url":"https://www.academia.edu/Documents/in/Computer_Vision"},{"id":30193,"name":"Image Analysis (Mathematics)","url":"https://www.academia.edu/Documents/in/Image_Analysis_Mathematics_"},{"id":140823,"name":"Technical Report","url":"https://www.academia.edu/Documents/in/Technical_Report"},{"id":331895,"name":"Visual Cryptography","url":"https://www.academia.edu/Documents/in/Visual_Cryptography"}],"urls":[{"id":19660136,"url":"http://arizona.openrepository.com/arizona/bitstream/10150/219514/1/IJCSN-2012-1-2-15.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/google_contacts-0dfb882d836b94dbcb4a2d123d6933fc9533eda5be911641f20b4eb428429600.js"], function() { // from javascript_helper.rb $('.js-google-connect-button').click(function(e) { e.preventDefault(); GoogleContacts.authorize_and_show_contacts(); Aedu.Dismissibles.recordClickthrough("WowProfileImportContactsPrompt"); }); $('.js-update-biography-button').click(function(e) { e.preventDefault(); Aedu.Dismissibles.recordClickthrough("UpdateUserBiographyPrompt"); $.ajax({ url: $r.api_v0_profiles_update_about_path({ subdomain_param: 'api', about: "", }), type: 'PUT', success: function(response) { location.reload(); } }); }); $('.js-work-creator-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_document_path({ source: encodeURIComponent(""), }); }); $('.js-video-upload-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_video_path({ source: encodeURIComponent(""), }); }); $('.js-do-this-later-button').click(function() { $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("WowProfileImportContactsPrompt"); }); $('.js-update-biography-do-this-later-button').click(function(){ $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("UpdateUserBiographyPrompt"); }); $('.wow-profile-mentions-upsell--close').click(function(){ $('.wow-profile-mentions-upsell--panel').hide(); Aedu.Dismissibles.recordDismissal("WowProfileMentionsUpsell"); }); $('.wow-profile-mentions-upsell--button').click(function(){ Aedu.Dismissibles.recordClickthrough("WowProfileMentionsUpsell"); }); new WowProfile.SocialRedesignUserWorks({ initialWorksOffset: 20, allWorksOffset: 20, maxSections: 1 }) }); </script> </div></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile_edit-5ea339ee107c863779f560dd7275595239fed73f1a13d279d2b599a28c0ecd33.js","https://a.academia-assets.com/assets/add_coauthor-22174b608f9cb871d03443cafa7feac496fb50d7df2d66a53f5ee3c04ba67f53.js","https://a.academia-assets.com/assets/tab-dcac0130902f0cc2d8cb403714dd47454f11fc6fb0e99ae6a0827b06613abc20.js","https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js"], function() { // from javascript_helper.rb window.ae = window.ae || {}; window.ae.WowProfile = window.ae.WowProfile || {}; if(Aedu.User.current && Aedu.User.current.id === $viewedUser.id) { window.ae.WowProfile.current_user_edit = {}; new WowProfileEdit.EditUploadView({ el: '.js-edit-upload-button-wrapper', model: window.$current_user, }); new AddCoauthor.AddCoauthorsController(); } var userInfoView = new WowProfile.SocialRedesignUserInfo({ recaptcha_key: "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB" }); WowProfile.router = new WowProfile.Router({ userInfoView: userInfoView }); Backbone.history.start({ pushState: true, root: "/" + $viewedUser.page_name }); new WowProfile.UserWorksNav() }); </script> </div> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">×</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span ="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "1723420af501c2081290584be627d14326340da95dc308393d31f8bf41c2ecdb", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="viIIWAfRcO+v/slqcMtgTKuKBNgoFRq5jJdcZtUPGsxS7lkXjsBd5eo/EAyM56ifzZT8+gfk8YRN1PXlmQ9jVA==" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://independent.academia.edu/PrashantKoshta" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="Oo/kKO5oJnlOZOZquWsH5f88eHrRtnGSJsmrP1mTA+rWQ7VnZ3kLcwulPwxFR882mSKAWP5Hmq/nigK8FZN6cg==" autocomplete="off" /><p>Enter the email address you signed up with and we'll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><script src="https://recaptcha.net/recaptcha/api.js" async defer></script> <script> var invisibleRecaptchaSubmit = function () { var closestForm = function (ele) { var curEle = ele.parentNode; while (curEle.nodeName !== 'FORM' && curEle.nodeName !== 'BODY'){ curEle = curEle.parentNode; } return curEle.nodeName === 'FORM' ? curEle : null }; var eles = document.getElementsByClassName('g-recaptcha'); if (eles.length > 0) { var form = closestForm(eles[0]); if (form) { form.submit(); } } }; </script> <input type="submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" data-callback="invisibleRecaptchaSubmit" class="g-recaptcha btn btn-primary btn-block" value="Email me a link" value=""/> </form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account? <a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div class="bootstrap" id="footer"><div class="footer-content clearfix text-center padding-top-7x" style="width:100%;"><ul class="footer-links-secondary footer-links-wide list-inline margin-bottom-1x"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/journals">Academia.edu Journals</a></li><li><a rel="nofollow" href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg> <strong>We're Hiring!</strong></a></li><li><a rel="nofollow" href="https://support.academia.edu/"><svg style="width: 12px; height: 12px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg> <strong>Help Center</strong></a></li></ul><ul class="footer-links-tertiary list-inline margin-bottom-1x"><li class="small">Find new research papers in:</li><li class="small"><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul></div></div><div class="DesignSystem" id="credit" style="width:100%;"><ul class="u-pl0x footer-links-legal list-inline"><li><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia ©2024</li></ul></div><script> //<![CDATA[ window.detect_gmtoffset = true; window.Academia && window.Academia.set_gmtoffset && Academia.set_gmtoffset('/gmtoffset'); //]]> </script> <div id='overlay_background'></div> <div id='bootstrap-modal-container' class='bootstrap'></div> <div id='ds-modal-container' class='bootstrap DesignSystem'></div> <div id='full-screen-modal'></div> </div> </body> </html>