Home » Workshop » 3 Days Hands On Workshop On “Emerging Cryptographic Challenges in Multimedia” in Dept of ECE, SSIT, Tumkur, From 5-7 November 2014

3 Days Hands On Workshop On “Emerging Cryptographic Challenges in Multimedia” in Dept of ECE, SSIT, Tumkur, From 5-7 November 2014

Recently I conducted hands on session for last one and half days in a Workshop titled “Emerging Cryptographic Challenges in Multimedia” organized by Department of ECE in SSIT Tumkur. The workshop was for Staff and M.Tech students of first year.

This was organized under TEQUIP 2.0.

bro 1 bro 2

Dr.SATHYA NARAYANA.S.V from Jawaharlal lal Nehru National College of Engineering, Shimoga was resource person for the Opening day and also key resource person. He presented several critical applications of Cryptography which also included a special focus on Elliptical Curve Cryptography. Dr. Nalini  handled last session where she presented facts about few more applications of cryptography, especially on Wireless Sensor networks.

The very Next Day, Dr. Jagadisha presented  Firewalls where he covered Basic Approaches and Limitations Additional Important Features ,Trends, Threatening Firewalls – and Counter Trends. Prof Jalesh Kumar presented Revolutionary techniques.

From the Second session onward it was time for hands on session. From my personal experience, students always love such hands on sessions. On the first day, I focused on Matlab and Covered Matlab Basics. My sessions were organized in ECE lab with projectors. Students of group three had occupied systems. So I would explain a concept and they would immediately code it in their terminal.

This is more or less the setup that we stick for all my sessions.


The next was a challenge as it was the last day of the Workshop and I had to cover quite a bit. My role was to show the encryption techniques and theier effect on wireless network. My focus was mainly to help participants design communication systems like spread spectrum techniques and then use simple encryption and decryption. Then we used SNR vs MSE/BER analysis.

We understood data, then we covered Audio followed by image.

Session 1 ( Data Encryption in Communication System)
 a) Simple Message Communication using BPSK
 b) Data Encryption in BPSK System
 c) Effect of Channel Conditions ( SNR) on Crypto System
 d) Spread Spectrum as Natural Encryption System
 f) Combining Cryptography with Spread Spectrum technique.
h) Discussion about Symmetric Key Cryptography and Public Key Cryptography on Communication System.
 Session 2: Encryption of Non Binary Stream Data( Audio)
a) Audio Capture and Transmission.
b) Audio Encryption and Decryption
c) Effect of Channel in Audio Encryption Performance
3. Session 3: Image Encryption and Transmission
a) Image Encryption using a Carrier Image and Scanned Pattern
b) Transmitting and Receiving Encrypted Image over BPSK/QPSK channel
c0 Effect of Noise on Image Encryption Technique.
Even after explaining the code concepts, students would have doubts and program errors. So I moved around, went to each group in turn and solved their doubts and queries. As sessions moved ahead, participants started to become more involved in coding. It really needed some energy to cover such a large hall, about more than 40 participants and clarifying every group’s doubt.



Our concept was based on Following Spread Spectrum Architecture



We also did BPSK modulation with spread spectrum.



Finally the session ended with me covering Image transmission over QPSK and Image Encryption using Scanned Pattern.


The workshop was concluded with a Valedictory function which was chaired by Dr. Kurien, HOD, Dept of ECE.  I also got the opportunity to share few thoughts with the Students.

You can download the PPT and Associated Matlab Codes.

Download PPT714.2 KB330

Download Code806.2 KB327


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>