A Secure Extended Visual Cryptography Scheme based on Steganography
In steganography, a message is hidden in such a way that no one apart from the intended recipient knows of the existence of the message. It is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message. In reversible Steganography, information is disguised within a digital image in such a way that the cover image can be taken to its original state after extracting the hidden information. Visual cryptography is a technique of secret sharing in which images are distributed as shares in such a way that, when these shares are superimposed, a message hidden secretly in the image is revealed. In this study, the concepts of steganography as well as visual cryptography are combined to have benefits of both techniques which will provide improved security for the confidential information being exchanged.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Design of bio-implantable acoustic power transmitter using comsol 3. 5
Acoustic power transmi-tter was introduced using comsol multiphysics. They can provide electronic energy to other implanted devices by receiving an external acoustic wave generated from the skin surface of the subcutaneous tissue. Piezoelectric ceramics make the internal devices of the receiver, and they are directly charged, converting pressure into an extractable electrical energy. Moreover, the less weight material such as aluminium is used to design the internal devices. Additionally, the designs of transducer which can efficiently absorb the generated charges were also designed using comsol. The actuator which can efficiently generate the required acoustic waves are analysed. The shear bender model generates the required acoustic waves, they were used here to generate the required charges .The material properties for different elements were chosen to maximize the output power .The output power developed is analysed for the different tissue properties such as fatty tissue or muscular tissue .The charge developed is maximum at the top surface of transducer which are easy to extract it to other devices.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Secure grouping data transmission scheme for multiple applications in wireless sensor network
Data aggregation system is the majority sensible technique for wireless sensor networks. It reduce a large amount of communication. To screen announcement during aggregation homomorphism encryptions have been practical in previous be taught. So the enciphered data can be aggregated algebraically without decryption. Although data aggregation could considerably reduce broadcast, it is defenseless to some attacks. However, these schemes failed to satisfy multi-application surroundings. The main drawback of these scheme is that, it become insecure in case a number of sensor nodes are compromised. Also, these scheme do not provide secure counting. Thus, it is suffer due to unauthorized aggregation attacks. An alternative move toward for this problem is to collective encrypted messages in a straight line from SN, thereby avoid the forgery of aggregate result. To end these drawbacks, we propose a new hidden data aggregation system called CDAMA, provide CDA connecting multiple groups. It is extensive from homomorphism community encryption system. There are three contributions in the proposed system. First, it is intended a multi-application surroundings. Next, it mitigates the crash of compromising attack in single request environments. Compared with conservative schemes, CDAMA mitigates the collision of compromise SN from beginning to end the construction of manifold groups. It reduces the damage from illegal aggregations.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
QR Code based Passport Smart Card using an Advanced Encryption Standard (AES) Algorithm
The implementation of QR code based smart card has been becoming an ever increasing popularity in the traceability of products. This QR code smart card contains the Passport details, Pan card details, Aadhar card details.QR code helpful to store and process the information through black and white dots on the QR scanner which transmit by the reader. The QR reader reads the data present in the passport and sends the data by using QR Scanner through wireless network. As soon as the card shown, using QR reader, the details of the person appear on the computer screen and verify it using the data present in the system and if it matches then the details of the passport holder is displayed. It reduces the burden of documentation which thereby reduces the time consumption. This makes the system centralized by increasing the security.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Survey on Intrusion Detection Techniques and Sceneraio for Intrsuion Mechanism
Security has become the greatest problem within and outside the organizations. User ID, passwords and firewalls are the common steps that organizations take to secure their computers. However, these are not so effective mediums in current context of unsecure eon. Intruders and attackers are so advanced that they access the computer and manipulate it, so they cannot be traced easily. Through this contribution objective is to find out & present existing intrusion detection system (IDS) with their pros and cons that will be helpful to select the best one and provide the secure environment so that system will be protected from instrusion and attacks.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Canceling donor interference in heart transplantation using adaptive signal processing techniques
Heart Attack and other cardiac diseases have shooted up the death rate in the world in recent years. So they have to be given more importance. Though the Heart transplantation techniques has originated in 1960’s it gained popularity only in 1980’s, after the invention of Anti Rejection Medicine. Now the advancement is such that, the patient’s old heart ECG can alone be monitored by suppressing the interference arising from the new heart, which ease the job of the surgeon, which can be achieved using Adaptive Noise Cancellation Technique. The algorithms such as LMS and RLS were implemented using MATLAB 6.5 and simulated and synthesized using Modelsim and Leonardo spectrum VLSI tools. In future the design will be fused into a chip and dedicated to mankind.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Secure Data Sharing Model for Cloud Systems
Secure Data Sharing Model for Cloud Computing (SSCC) is a new cryptosystem model that aims to store user's data files in a secure manner to keep it away from the unauthorized access. We have developed a new cryptosystem model that based on the Original Hill cipher algorithm using matrices manipulation and symmetric key cryptography. It gave a good impression by comparing it with previous ways where the comparing results between SSCC and Hill Cipher 6.86% improvement in the encryption time. While when we compare SSCC and Advance Encryption Standard (AES) the difference was 3.94% for AES which means that the proposed model has a chance to compete with AES model. Another comparison is done to cover the two cases: SSCC1 and SSCC2, the SSCC1 with and without compression decreasing the encryption time in a percentage of 96.287%.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
In this paper, we propose a novel joint data-hiding and compression scheme for digital images using side match vector quantization (SMVQ) and image inpainting. The two functions of data hiding and image compression can be integrated into one single module seamlessly. On the sender side, except for the blocks in the leftmost and topmost of the image, each of the other residual blocks in raster-scanning order can be embedded with secret data and compressed simultaneously by SMVQ or image inpainting adaptively according to the current embedding bit. Vector quantization is also utilized for some complex blocks to control the visual distortion and error diffusion caused by the progressive compression. After segmenting the image compressed codes into a series of sections by the indicator bits, the receiver can achieve the extraction of secret bits and image decompression successfully according to the index values in the segmented sections. Experimental results demonstrate the effectiveness of the proposed scheme.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
State-based dynamic slicing technique for UML integrating activity model
Unified Modeling Language has been widely used in software development for modeling the problem domain to solution domain. The major problems lie in comprehension and testing which can be found in whole process. Program slicing is an important approach to analyze, understand, test and maintain the program. It is a technique for analyzing program by focusing on statements which have dependence relation with slicing criterion. Program slicing is of two types (i) Static slicing (ii) Dynamic slicing. Dynamic slicing refers to a collection of program execution and may significantly reduce the size of the program slice because runtime information, collected during execution, is used to compute the program slice. In this paper we introduce an approach for constructing dynamic slice of unified modeling language (UML) using sequence diagram, state chart diagram, class diagram along with the activity diagram. First we construct an intermediate representation known as model dependency graph. MDG combines information extracted from various sequence diagrams along with those from class, state-machine, sequence diagram and activity diagrams. Then dynamic slice is computed by integrating the activity models into the MDG. Finally for a given slicing criterion test cases has been generated.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
The improvement of the efficiency of automatic annotation of medical images using Majority Voting
Automatic annotation is actually a classification of medical images, using global and local features of images, IRMA standard code are extracted for them which consists of four data axes techniques of image providing (modality), direction, anatomy, and biological system. Recent researches show despite the fact that classification with high accuracy has been achieved good results but cannot always be optimal for all features of images. Therefore, in this paper, in order to improve the efficiency of automatic annotation system of medical images in terms of classification accuracy, the combined classifiers votes’ technique (Majority Voting) and Gabor filter feature in HSV color space for images has been used. The results are promising and improved performance show the improvement of the quality of the proposed system. In fact, in addition to high speed compared with previous methods, it has been achieved good accuracy as much as 75.1 percent
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]