SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 5 Issue 1, November-December 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD38047 | Volume – 5 | Issue – 1 | November-December 2020 Page 768
Image Encoding to Short/Text Message
Rafidison Maminiaina Alphonse, Ramafiarisona Hajasoa Malalatiana
Telecommunication-Automatic-Signal-Image-Research, Laboratory/Doctoral School in Science and
Technology of Engineering and Innovation/University of Antananarivo, Antananarivo, Madagascar
ABSTRACT
Sending an image using Short Message (SM) is the purpose of this article. An
image contains a large information and existing base character such us
American Standard Code for Information Interchange (ASCII) are not enough
for encoding, then we are obliged to create a new base. The shortmessagewill
go through mobile telecom network. The sender uploads the image, the
algorithm process on its turn to convert the input to short message and the
receiver receives a binary photo by decoding the message received. This
encoding, decoding methods are not limited for Person to Person (P2P)
service but applicable also in case of bulk message Application to Person
(A2P) and Person to Application (P2A). The only condition required is that
each user (person or application) knows the method of encoding and
decoding. It means also that image encoded is supported by the standard
protocol Short Message Peer-to-Peer Protocol (SMPP). A simple image can be
sent with one short message which is less than 160 characters however for
complex image, it may be more than one short message. The research written
on this paper can bypass the usage of Multimedia Messaging Service (MMS)
because a Short Message Service Center (SMSC) candoitsjobinconditionthat
the mobile operator has the application installed on Subscriber
Identity/Identification Mobile (SIM) card or in software provided which can
be downloaded by subscriber.
KEYWORD: Short Message, encoding, decoding, short message service center,
short message peer-to-peer protocol, multimedia messaging service
How to cite this paper: Rafidison
Maminiaina Alphonse | Ramafiarisona
Hajasoa Malalatiana "Image Encoding to
Short/Text Message"
Published in
International Journal
of Trend in Scientific
Research and
Development(ijtsrd),
ISSN: 2456-6470,
Volume-5 | Issue-1,
December 2020, pp.768-770, URL:
www.ijtsrd.com/papers/ijtsrd38047.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
I. INTRODUCTION
Short Message Service (SMS) is most popular in Madagascar
comparing with Multimedia Message Service(MMS).MMSis
never attracting more subscribers then the existing telecom
mobile network operator (MNO) didn’t invest. It is possible
to send an image with social networks but internet
connection is mandatory. So image to textmessage encoding
is a solution in the aim of using SMSC as transit platform.
MNO doesn’t know the meaning of sent SM, it meansthatthe
algorithm that we propose here can be used in encryption
domain.
To understand well the content of this paper, we start with
general overview of SMSC and MMSC. Then, we continue
with algorithm presentation and testing followed by
conclusion.
II. Short message service
SMS appeared on the wireless scene in 1991 in Europe. The
European standard for digital wireless, now known as the
Global System for Mobile Communications (GSM), included
short messaging services from the outset.
In North America, SMS was made availableinitiallyondigital
wireless networks built by early pioneers such as BellSouth
Mobility, PrimeCo, and Nextel, among others. These digital
wireless networks are based on GSM, code division multiple
access (CDMA), and time division multiple access (TDMA)
standards.
Network consolidation from mergers and acquisitions has
resulted in large wireless networks having nationwide or
international coverageandsometimessupporting morethan
one wireless technology. This new class of service provider
demands network-grade products that can easily provide a
uniform solution, enable ease of operation and
administration, and accommodate existing subscriber
capacity, message throughput, future growth, and services
reliably. Short messaging service center (SMSC) solutions
based on an intelligent network (IN) approach are well
suited to satisfy these requirements, while adding all the
benefits of IN implementations.
SMS provides a mechanism for transmitting short messages
to and from wireless devices. The service makes use of an
SMSC, which acts as a store-and-forward system for short
messages. The wireless network provides the mechanisms
required to find the destination station(s) and transports
short messages between the SMSCs and wireless stations.In
contrasttoother existingtext-messagetransmissionservices
such as alphanumeric paging, the service elements are
designed to provide guaranteed delivery of text messages to
the destination. Additionally, SMS supports several input
mechanisms that allow interconnection with different
message sources and destinations.
A distinguishing characteristic of the service is thatanactive
mobile handset is able to receive or submit a short message
at any time, independent of whether a voice or data call is in
progress (in some implementations, this may depend on the
MSC or SMSC capabilities). SMS also guarantees delivery of
the short message by thenetwork.Temporaryfailuresdueto
IJTSRD38047
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD38047 | Volume – 5 | Issue – 1 | November-December 2020 Page 769
unavailable receiving stations are identified, and the short
message is stored in the SMSC until the destination device
becomes available.
SMS is characterized by out-of-band packet delivery and
low-bandwidth message transfer, which results in a highly
efficient means for transmitting short bursts of data. Initial
applications of SMS focused on eliminating alphanumeric
pagers by permitting two-way general-purpose messaging
and notification services, primarily for voice mail. As
technology and networks evolved, a variety of services have
been introduced, including e-mail, fax, and paging
integration,interactive banking,informationservicessuchas
stock quotes, and integration with Internet-based
applications.Wirelessdata applicationsincludedownloading
of subscriber identity module (SIM) cards for activation,
debit, profile-editing purposes, wireless points of sale
(POSs), and other field-service applications such as
automaticmeter reading,remotesensing,andlocation-based
services. Additionally, integration with the Internet spurred
the development of Web-based messaging and other
interactive applications such as instant messaging, gaming,
and chatting [1].
III. Multimedia messaging service
Multimedia Messaging Service (MMS) is an evolution of
(SMS), extending the text content with capabilities to
transmit multimedia messages to other mobile users. The
messages can be any combination of images, animations,
audio (voice, music), video and text. MMS supports most
common compression techniques, such as JPEG and GIF for
pictures, MPEG-4 for video and MP3, WAV and midi for
audio.
MMS is a store and forward messaging service. This means
that if the recipient phone is not switched on, the message
will be stored in the network and sent to the recipient as
soon as the phone is switched on. Different protocols can be
used as MMS transport mechanism, such as Wireless
Application Protocol (WAP), HTTP or Session Initiation
Protocol (SIP). The most common approach used nowadays
is WAP. The subscriber will needanMMS-enabledphone[2].
IV. Algorithm
The algorithm is divided in three parts: preparation,
encoding image to short message and the inverse.
A. Preparation phase
Step 1 : Load original image .
Step 2 : Convert to binary image .
Step 3 : Resize to obtain . This step can be ignored but
the short message length will be long.
Step 4 : Split to block of 8x8 .
Step 5 : Threshold to minimize the numberofsymbol to
be used. This step can be ignored also but the short
message length will be long too.
B. Image encoding to short message
Step 1 : Establish a base with 257 characters shown in
TABLE I to IV.
Step 2 : Concatenate first and second column of and
convert to decimal . Same case for third and
fourth .
Step 3 : Find the value of and in column “code” of
base characters and add in string array the “char”
equivalent of “code”.
Step 4 : Optimize the number of characters in message by
adding the number of repeated characters. For
example, aaaa = a4 but in case the characteris not
repeated, we don’t need to add 1.
Step 5 : Send the encoded short message via Telecom
mobile network.
C. Short message decoding to image
Step 1 : Read the short message.
Step 2 : Insert “1” between when twocharactersdon’thave
a number as separator.
Step 3 : Replace all number by repeating the character.For
example, a4 = aaaa.
Step 4 : Collect two by two the characters in latest short
message which present one bloc.
Step 5 : Read each character and convert the
corresponding “Index” to binary.Iftheconversionis
less than 8 bites, add 0 as prefix to reach 8.
Step 6 : Reshape conversion result of two characters to
matrix 8x8.
Step 7 : Form the image by combining .
Step 8 : Display image.
TABLE I BASE CHARACTERS PART 1
Index Code Char Index Code Char Index Code Char Index Code Char
0 120 x 21 923 Λ 41 41 ) 61 61 =
1 913 Α 22 955 λ 42 42 * 62 62 >
2 945 α 23 924 Μ 43 43 + 63 63 ?
3 914 Β 24 956 μ 44 44 , 64 64 @
4 946 β 25 925 Ν 45 45 - 65 65 Φ
5 915 Γ 26 957 ν 46 46 . 66 66 φ
6 947 γ 27 926 Ξ 47 47 / 67 67 Χ
7 916 Δ 28 958 ξ 48 960 π 68 68 χ
8 948 δ 29 927 Ο 49 929 Ρ 69 69 Ψ
9 917 Ε 30 959 ο 50 961 ρ 70 70 ψ
10 949 ε 31 928 Π 51 931 Σ 71 71 Ω
11 918 Ζ 32 32 52 962 ς 72 72 ω
12 950 ζ 33 33 ! 53 963 σ 73 73 ˀ
13 919 Η 34 34 " 54 932 Τ 74 74 ˂
14 951 η 35 35 # 55 964 τ 75 75 ˃
15 920 Θ 36 36 $ 56 933 Υ 76 76 ˅
16 952 θ 37 37 % 57 965 υ 77 77 ˇ
17 921 Ι 38 38 & 58 58 : 78 78 ˈ
18 953 ι 39 39 ' 59 59 ; 79 79 ˉ
19 922 Κ 40 40 ( 60 60 < 80 80 ˋ
TABLE II BASE CHARACTERS PART 2
Index Code Char Index Code Char Index Code Char Index Code Char
81 81 ˏ 101 101 ≠ 121 121 ° 141 713 O
82 82 ˑ 102 102 ≡ 122 122 ± 142 715 P
83 83 ˒ 103 103 ≤ 123 123 { 143 719 Q
84 84 ˚ 104 104 ≥ 124 124 | 144 721 R
85 85 ˞ 105 105 ⊂ 125 125 } 145 722 S
86 86 ͥ 106 106 ¡ 126 126 ~ 146 730 T
87 87 ͦ 107 107 ¢ 127 934 A 147 734 U
88 88 ˩ 108 108 £ 128 966 B 148 869 V
89 89 ⊕ 109 109 ¤ 129 935 C 149 870 W
90 90 ⊗ 110 110 ¥ 130 967 D 150 745 X
91 91 [ 111 111 ¦ 131 936 E 151 8853 Y
92 92  112 112 § 132 968 F 152 8855 Z
93 93 ] 113 113 ¨ 133 937 G 153 8764 b
94 94 ^ 114 114 © 134 969 H 154 8773 c
95 95 _ 115 115 ª 135 704 I 155 8776 d
96 96 ` 116 116 « 136 706 J 156 8800 e
97 255 ÿ 117 117 ¬ 137 707 K 157 8801 f
98 98 ∼ 118 118 - 138 709 L 158 8804 g
99 99 ≅ 119 119 ® 139 711 M 159 8805 h
100 100 ≈ 120 400 Ɛ 140 712 N 160 8834 i
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD38047 | Volume – 5 | Issue – 1 | November-December 2020 Page 770
TABLE III BASE CHARACTERS PART 3
Index Code Char Index Code Char Index Code Char Index Code Char
161 161 j 181 181 µ 201 201 É 221 221 Ý
162 162 k 182 182 ¶ 202 202 Ê 222 222 Þ
163 163 l 183 183 · 203 203 Ë 223 223 ß
164 164 m 184 184 ¸ 204 204 Ì 224 224 à
165 165 n 185 185 ¹ 205 205 Í 225 225 á
166 166 o 186 186 º 206 206 Î 226 226 â
167 167 p 187 187 » 207 207 Ï 227 227 ã
168 168 q 188 188 ¼ 208 208 Ð 228 228 ä
169 169 r 189 189 ½ 209 209 Ñ 229 229 å
170 170 s 190 190 ¾ 210 210 Ò 230 230 æ
171 171 t 191 191 ¿ 211 211 Ó 231 231 ç
172 172 u 192 192 À 212 212 Ô 232 232 è
173 173 v 193 193 Á 213 213 Õ 233 233 é
174 174 w 194 194 Â 214 214 Ö 234 234 ê
175 175 ˉ 195 195 Ã 215 215 × 235 235 ë
176 176 y 196 196 Ä 216 216 Ø 236 236 ì
177 177 z 197 197 Å 217 217 Ù 237 237 í
178 178 ² 198 198 Æ 218 218 Ú 238 238 î
179 179 ³ 199 199 Ç 219 219 Û 239 239 ï
180 180 ´ 200 200 È 220 220 Ü 240 240 ð
TABLE IV BASE CHARACTERS PART 4
Index Code Char
241 241 ñ
242 242 ò
243 243 ó
244 244 ô
245 245 õ
246 246 ö
247 247 ÷
248 248 ø
249 249 ù
250 250 ú
251 251 û
252 252 ü
253 253 ý
254 254 þ
255 97 a
256 256 Ā
V. Tests and results
For experience testing, we select three images: text image,
Lena photo and Baboon picture. The reason of this choice is
that they don’t have the same type.Theresultsarepresented
in table and the first row is dedicated for preprocessing,
second the conversion to short message and the last one is
the text decoding to binary image.
Fig.1. Experience with “text image”
This sample text message respects the standard length of
one short message which should belessthan160characters.
Fig.2. Experience with “Lena”
Lena image contains a lot of information and it is logic that
the encoding length result is 286 characters which present
two short messages.
Fig.3. Experience with “Baboon”
Baboon is image color that we use to test the capacity of our
algorithm. We get two short messageswhosefirstpartis 153
characters and the last part contains 37 characters.
Some SMSC equipment may have some problem to handle a
specific special character and it changes with another
character. Modifying few characters doesn’t have visual
impact on final binary image.
VI. Conclusion
Encoding image to short message is possible but message
length depends on the type of image introduced as input.We
presented here only the main method applied for binary
image to obtain message length minimum however our
algorithm can be extended with another type of image such
as gray and color. We can loss same information during
conversion processing from any image to binary but the
pertinent information stays visible. We chose this approach
because mobile network operators chargethesesubscribers
based on short message length. One short messageislimited
to 160 characters and if your message length is more, they
split yours and charge accordingly. Image encoding can be
used also to hide an information and the senderandreceiver
are only the persons who know the content. Its looks like
cryptography technical and each other fix the base
characters to be used.
ACKNOWLEDGMENT
Authors thank NitishYerkiah for his support
REFERENCES
[1] “Introduction to SMS,”
https://www.gsmfavorites.com/
[2] “MMS,” https://www.gsmfavorites.com/

More Related Content

What's hot

Implementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportImplementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportJatin Singh
 
A Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and ApplicationsA Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and Applicationstheijes
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...IRJET Journal
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
 
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKS
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKSDEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKS
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKSijwmn
 
Iot lecture notes_hyd
Iot lecture notes_hydIot lecture notes_hyd
Iot lecture notes_hydKishore5511
 
I Minds2009 Secure And Distributed Software Prof Wouter Joosen (Ibbt Distri...
I Minds2009 Secure And Distributed Software  Prof  Wouter Joosen (Ibbt Distri...I Minds2009 Secure And Distributed Software  Prof  Wouter Joosen (Ibbt Distri...
I Minds2009 Secure And Distributed Software Prof Wouter Joosen (Ibbt Distri...imec.archive
 
934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networkstechbed
 
A Study of Various Routing Techniques with Issues and Challenges in Mobile Ad...
A Study of Various Routing Techniques with Issues and Challenges in Mobile Ad...A Study of Various Routing Techniques with Issues and Challenges in Mobile Ad...
A Study of Various Routing Techniques with Issues and Challenges in Mobile Ad...ijtsrd
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkAyano Midakso
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
LNCS 5448 - A First Look at Media Conferencing Traffic in the ...
LNCS 5448 - A First Look at Media Conferencing Traffic in the ...LNCS 5448 - A First Look at Media Conferencing Traffic in the ...
LNCS 5448 - A First Look at Media Conferencing Traffic in the ...Videoguy
 

What's hot (19)

G0314043
G0314043G0314043
G0314043
 
Implementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportImplementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- report
 
D0362035
D0362035D0362035
D0362035
 
A Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and ApplicationsA Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and Applications
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
 
CCNA 1 Chapter 1 v5.0 2014
CCNA 1 Chapter 1 v5.0 2014CCNA 1 Chapter 1 v5.0 2014
CCNA 1 Chapter 1 v5.0 2014
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Module 5 2010
Module 5 2010Module 5 2010
Module 5 2010
 
170 176
170 176170 176
170 176
 
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKS
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKSDEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKS
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKS
 
Iot lecture notes_hyd
Iot lecture notes_hydIot lecture notes_hyd
Iot lecture notes_hyd
 
I Minds2009 Secure And Distributed Software Prof Wouter Joosen (Ibbt Distri...
I Minds2009 Secure And Distributed Software  Prof  Wouter Joosen (Ibbt Distri...I Minds2009 Secure And Distributed Software  Prof  Wouter Joosen (Ibbt Distri...
I Minds2009 Secure And Distributed Software Prof Wouter Joosen (Ibbt Distri...
 
934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networks
 
A Study of Various Routing Techniques with Issues and Challenges in Mobile Ad...
A Study of Various Routing Techniques with Issues and Challenges in Mobile Ad...A Study of Various Routing Techniques with Issues and Challenges in Mobile Ad...
A Study of Various Routing Techniques with Issues and Challenges in Mobile Ad...
 
A046060105
A046060105A046060105
A046060105
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
LNCS 5448 - A First Look at Media Conferencing Traffic in the ...
LNCS 5448 - A First Look at Media Conferencing Traffic in the ...LNCS 5448 - A First Look at Media Conferencing Traffic in the ...
LNCS 5448 - A First Look at Media Conferencing Traffic in the ...
 

Similar to Image Encoding to Short Text Message

Wireless and Mobile Computing Build Secure and Maintain Wireless Solutions
Wireless and Mobile Computing Build Secure and Maintain Wireless SolutionsWireless and Mobile Computing Build Secure and Maintain Wireless Solutions
Wireless and Mobile Computing Build Secure and Maintain Wireless SolutionsYogeshIJTSRD
 
Mi0035 computer networks...
Mi0035  computer networks...Mi0035  computer networks...
Mi0035 computer networks...smumbahelp
 
Classroom Shared Whiteboard System using Multicast Protocol
Classroom Shared Whiteboard System using Multicast ProtocolClassroom Shared Whiteboard System using Multicast Protocol
Classroom Shared Whiteboard System using Multicast Protocolijtsrd
 
Study on Infrastructure Developments of Mobile Generations
Study on Infrastructure Developments of Mobile GenerationsStudy on Infrastructure Developments of Mobile Generations
Study on Infrastructure Developments of Mobile Generationsijtsrd
 
Mi0035 computer networks...
Mi0035  computer networks...Mi0035  computer networks...
Mi0035 computer networks...smumbahelp
 
Mi0035 computer networks...
Mi0035  computer networks...Mi0035  computer networks...
Mi0035 computer networks...smumbahelp
 
Research Paper on Digital Notice Board
Research Paper on Digital Notice BoardResearch Paper on Digital Notice Board
Research Paper on Digital Notice Boardijtsrd
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...IRJET Journal
 
IRJET- MQTT in Internet of Things
IRJET- MQTT in Internet of ThingsIRJET- MQTT in Internet of Things
IRJET- MQTT in Internet of ThingsIRJET Journal
 
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiTransmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiIAEME Publication
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdfRoopa slideshare
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdfBhavanislide2
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdfRoopa slideshare
 
A multi tenant platform for sms integrated services
A multi tenant platform for sms integrated servicesA multi tenant platform for sms integrated services
A multi tenant platform for sms integrated servicesIJCNCJournal
 
A Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and IntimationA Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and Intimationijtsrd
 
What's the Right Messaging Standard for the IoT?
What's the Right Messaging  Standard for the IoT?What's the Right Messaging  Standard for the IoT?
What's the Right Messaging Standard for the IoT?Angelo Corsaro
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009Journal For Research
 
Introduction IOT/M2M
Introduction IOT/M2MIntroduction IOT/M2M
Introduction IOT/M2MLeKhanhAnh
 
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...IOSR Journals
 

Similar to Image Encoding to Short Text Message (20)

Wireless and Mobile Computing Build Secure and Maintain Wireless Solutions
Wireless and Mobile Computing Build Secure and Maintain Wireless SolutionsWireless and Mobile Computing Build Secure and Maintain Wireless Solutions
Wireless and Mobile Computing Build Secure and Maintain Wireless Solutions
 
Mi0035 computer networks...
Mi0035  computer networks...Mi0035  computer networks...
Mi0035 computer networks...
 
Classroom Shared Whiteboard System using Multicast Protocol
Classroom Shared Whiteboard System using Multicast ProtocolClassroom Shared Whiteboard System using Multicast Protocol
Classroom Shared Whiteboard System using Multicast Protocol
 
Study on Infrastructure Developments of Mobile Generations
Study on Infrastructure Developments of Mobile GenerationsStudy on Infrastructure Developments of Mobile Generations
Study on Infrastructure Developments of Mobile Generations
 
Mi0035 computer networks...
Mi0035  computer networks...Mi0035  computer networks...
Mi0035 computer networks...
 
Mi0035 computer networks...
Mi0035  computer networks...Mi0035  computer networks...
Mi0035 computer networks...
 
Research Paper on Digital Notice Board
Research Paper on Digital Notice BoardResearch Paper on Digital Notice Board
Research Paper on Digital Notice Board
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
 
IRJET- MQTT in Internet of Things
IRJET- MQTT in Internet of ThingsIRJET- MQTT in Internet of Things
IRJET- MQTT in Internet of Things
 
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiTransmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
 
A multi tenant platform for sms integrated services
A multi tenant platform for sms integrated servicesA multi tenant platform for sms integrated services
A multi tenant platform for sms integrated services
 
A Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and IntimationA Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and Intimation
 
What's the Right Messaging Standard for the IoT?
What's the Right Messaging  Standard for the IoT?What's the Right Messaging  Standard for the IoT?
What's the Right Messaging Standard for the IoT?
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
 
Introduction IOT/M2M
Introduction IOT/M2MIntroduction IOT/M2M
Introduction IOT/M2M
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxakanksha16arora
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfstareducators107
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfNirmal Dwivedi
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesSHIVANANDaRV
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 

Recently uploaded (20)

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

Image Encoding to Short Text Message

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 5 Issue 1, November-December 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD38047 | Volume – 5 | Issue – 1 | November-December 2020 Page 768 Image Encoding to Short/Text Message Rafidison Maminiaina Alphonse, Ramafiarisona Hajasoa Malalatiana Telecommunication-Automatic-Signal-Image-Research, Laboratory/Doctoral School in Science and Technology of Engineering and Innovation/University of Antananarivo, Antananarivo, Madagascar ABSTRACT Sending an image using Short Message (SM) is the purpose of this article. An image contains a large information and existing base character such us American Standard Code for Information Interchange (ASCII) are not enough for encoding, then we are obliged to create a new base. The shortmessagewill go through mobile telecom network. The sender uploads the image, the algorithm process on its turn to convert the input to short message and the receiver receives a binary photo by decoding the message received. This encoding, decoding methods are not limited for Person to Person (P2P) service but applicable also in case of bulk message Application to Person (A2P) and Person to Application (P2A). The only condition required is that each user (person or application) knows the method of encoding and decoding. It means also that image encoded is supported by the standard protocol Short Message Peer-to-Peer Protocol (SMPP). A simple image can be sent with one short message which is less than 160 characters however for complex image, it may be more than one short message. The research written on this paper can bypass the usage of Multimedia Messaging Service (MMS) because a Short Message Service Center (SMSC) candoitsjobinconditionthat the mobile operator has the application installed on Subscriber Identity/Identification Mobile (SIM) card or in software provided which can be downloaded by subscriber. KEYWORD: Short Message, encoding, decoding, short message service center, short message peer-to-peer protocol, multimedia messaging service How to cite this paper: Rafidison Maminiaina Alphonse | Ramafiarisona Hajasoa Malalatiana "Image Encoding to Short/Text Message" Published in International Journal of Trend in Scientific Research and Development(ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1, December 2020, pp.768-770, URL: www.ijtsrd.com/papers/ijtsrd38047.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) I. INTRODUCTION Short Message Service (SMS) is most popular in Madagascar comparing with Multimedia Message Service(MMS).MMSis never attracting more subscribers then the existing telecom mobile network operator (MNO) didn’t invest. It is possible to send an image with social networks but internet connection is mandatory. So image to textmessage encoding is a solution in the aim of using SMSC as transit platform. MNO doesn’t know the meaning of sent SM, it meansthatthe algorithm that we propose here can be used in encryption domain. To understand well the content of this paper, we start with general overview of SMSC and MMSC. Then, we continue with algorithm presentation and testing followed by conclusion. II. Short message service SMS appeared on the wireless scene in 1991 in Europe. The European standard for digital wireless, now known as the Global System for Mobile Communications (GSM), included short messaging services from the outset. In North America, SMS was made availableinitiallyondigital wireless networks built by early pioneers such as BellSouth Mobility, PrimeCo, and Nextel, among others. These digital wireless networks are based on GSM, code division multiple access (CDMA), and time division multiple access (TDMA) standards. Network consolidation from mergers and acquisitions has resulted in large wireless networks having nationwide or international coverageandsometimessupporting morethan one wireless technology. This new class of service provider demands network-grade products that can easily provide a uniform solution, enable ease of operation and administration, and accommodate existing subscriber capacity, message throughput, future growth, and services reliably. Short messaging service center (SMSC) solutions based on an intelligent network (IN) approach are well suited to satisfy these requirements, while adding all the benefits of IN implementations. SMS provides a mechanism for transmitting short messages to and from wireless devices. The service makes use of an SMSC, which acts as a store-and-forward system for short messages. The wireless network provides the mechanisms required to find the destination station(s) and transports short messages between the SMSCs and wireless stations.In contrasttoother existingtext-messagetransmissionservices such as alphanumeric paging, the service elements are designed to provide guaranteed delivery of text messages to the destination. Additionally, SMS supports several input mechanisms that allow interconnection with different message sources and destinations. A distinguishing characteristic of the service is thatanactive mobile handset is able to receive or submit a short message at any time, independent of whether a voice or data call is in progress (in some implementations, this may depend on the MSC or SMSC capabilities). SMS also guarantees delivery of the short message by thenetwork.Temporaryfailuresdueto IJTSRD38047
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD38047 | Volume – 5 | Issue – 1 | November-December 2020 Page 769 unavailable receiving stations are identified, and the short message is stored in the SMSC until the destination device becomes available. SMS is characterized by out-of-band packet delivery and low-bandwidth message transfer, which results in a highly efficient means for transmitting short bursts of data. Initial applications of SMS focused on eliminating alphanumeric pagers by permitting two-way general-purpose messaging and notification services, primarily for voice mail. As technology and networks evolved, a variety of services have been introduced, including e-mail, fax, and paging integration,interactive banking,informationservicessuchas stock quotes, and integration with Internet-based applications.Wirelessdata applicationsincludedownloading of subscriber identity module (SIM) cards for activation, debit, profile-editing purposes, wireless points of sale (POSs), and other field-service applications such as automaticmeter reading,remotesensing,andlocation-based services. Additionally, integration with the Internet spurred the development of Web-based messaging and other interactive applications such as instant messaging, gaming, and chatting [1]. III. Multimedia messaging service Multimedia Messaging Service (MMS) is an evolution of (SMS), extending the text content with capabilities to transmit multimedia messages to other mobile users. The messages can be any combination of images, animations, audio (voice, music), video and text. MMS supports most common compression techniques, such as JPEG and GIF for pictures, MPEG-4 for video and MP3, WAV and midi for audio. MMS is a store and forward messaging service. This means that if the recipient phone is not switched on, the message will be stored in the network and sent to the recipient as soon as the phone is switched on. Different protocols can be used as MMS transport mechanism, such as Wireless Application Protocol (WAP), HTTP or Session Initiation Protocol (SIP). The most common approach used nowadays is WAP. The subscriber will needanMMS-enabledphone[2]. IV. Algorithm The algorithm is divided in three parts: preparation, encoding image to short message and the inverse. A. Preparation phase Step 1 : Load original image . Step 2 : Convert to binary image . Step 3 : Resize to obtain . This step can be ignored but the short message length will be long. Step 4 : Split to block of 8x8 . Step 5 : Threshold to minimize the numberofsymbol to be used. This step can be ignored also but the short message length will be long too. B. Image encoding to short message Step 1 : Establish a base with 257 characters shown in TABLE I to IV. Step 2 : Concatenate first and second column of and convert to decimal . Same case for third and fourth . Step 3 : Find the value of and in column “code” of base characters and add in string array the “char” equivalent of “code”. Step 4 : Optimize the number of characters in message by adding the number of repeated characters. For example, aaaa = a4 but in case the characteris not repeated, we don’t need to add 1. Step 5 : Send the encoded short message via Telecom mobile network. C. Short message decoding to image Step 1 : Read the short message. Step 2 : Insert “1” between when twocharactersdon’thave a number as separator. Step 3 : Replace all number by repeating the character.For example, a4 = aaaa. Step 4 : Collect two by two the characters in latest short message which present one bloc. Step 5 : Read each character and convert the corresponding “Index” to binary.Iftheconversionis less than 8 bites, add 0 as prefix to reach 8. Step 6 : Reshape conversion result of two characters to matrix 8x8. Step 7 : Form the image by combining . Step 8 : Display image. TABLE I BASE CHARACTERS PART 1 Index Code Char Index Code Char Index Code Char Index Code Char 0 120 x 21 923 Λ 41 41 ) 61 61 = 1 913 Α 22 955 λ 42 42 * 62 62 > 2 945 α 23 924 Μ 43 43 + 63 63 ? 3 914 Β 24 956 μ 44 44 , 64 64 @ 4 946 β 25 925 Ν 45 45 - 65 65 Φ 5 915 Γ 26 957 ν 46 46 . 66 66 φ 6 947 γ 27 926 Ξ 47 47 / 67 67 Χ 7 916 Δ 28 958 ξ 48 960 π 68 68 χ 8 948 δ 29 927 Ο 49 929 Ρ 69 69 Ψ 9 917 Ε 30 959 ο 50 961 ρ 70 70 ψ 10 949 ε 31 928 Π 51 931 Σ 71 71 Ω 11 918 Ζ 32 32 52 962 ς 72 72 ω 12 950 ζ 33 33 ! 53 963 σ 73 73 ˀ 13 919 Η 34 34 " 54 932 Τ 74 74 ˂ 14 951 η 35 35 # 55 964 τ 75 75 ˃ 15 920 Θ 36 36 $ 56 933 Υ 76 76 ˅ 16 952 θ 37 37 % 57 965 υ 77 77 ˇ 17 921 Ι 38 38 & 58 58 : 78 78 ˈ 18 953 ι 39 39 ' 59 59 ; 79 79 ˉ 19 922 Κ 40 40 ( 60 60 < 80 80 ˋ TABLE II BASE CHARACTERS PART 2 Index Code Char Index Code Char Index Code Char Index Code Char 81 81 ˏ 101 101 ≠ 121 121 ° 141 713 O 82 82 ˑ 102 102 ≡ 122 122 ± 142 715 P 83 83 ˒ 103 103 ≤ 123 123 { 143 719 Q 84 84 ˚ 104 104 ≥ 124 124 | 144 721 R 85 85 ˞ 105 105 ⊂ 125 125 } 145 722 S 86 86 ͥ 106 106 ¡ 126 126 ~ 146 730 T 87 87 ͦ 107 107 ¢ 127 934 A 147 734 U 88 88 ˩ 108 108 £ 128 966 B 148 869 V 89 89 ⊕ 109 109 ¤ 129 935 C 149 870 W 90 90 ⊗ 110 110 ¥ 130 967 D 150 745 X 91 91 [ 111 111 ¦ 131 936 E 151 8853 Y 92 92 112 112 § 132 968 F 152 8855 Z 93 93 ] 113 113 ¨ 133 937 G 153 8764 b 94 94 ^ 114 114 © 134 969 H 154 8773 c 95 95 _ 115 115 ª 135 704 I 155 8776 d 96 96 ` 116 116 « 136 706 J 156 8800 e 97 255 ÿ 117 117 ¬ 137 707 K 157 8801 f 98 98 ∼ 118 118 - 138 709 L 158 8804 g 99 99 ≅ 119 119 ® 139 711 M 159 8805 h 100 100 ≈ 120 400 Ɛ 140 712 N 160 8834 i
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD38047 | Volume – 5 | Issue – 1 | November-December 2020 Page 770 TABLE III BASE CHARACTERS PART 3 Index Code Char Index Code Char Index Code Char Index Code Char 161 161 j 181 181 µ 201 201 É 221 221 Ý 162 162 k 182 182 ¶ 202 202 Ê 222 222 Þ 163 163 l 183 183 · 203 203 Ë 223 223 ß 164 164 m 184 184 ¸ 204 204 Ì 224 224 à 165 165 n 185 185 ¹ 205 205 Í 225 225 á 166 166 o 186 186 º 206 206 Î 226 226 â 167 167 p 187 187 » 207 207 Ï 227 227 ã 168 168 q 188 188 ¼ 208 208 Ð 228 228 ä 169 169 r 189 189 ½ 209 209 Ñ 229 229 å 170 170 s 190 190 ¾ 210 210 Ò 230 230 æ 171 171 t 191 191 ¿ 211 211 Ó 231 231 ç 172 172 u 192 192 À 212 212 Ô 232 232 è 173 173 v 193 193 Á 213 213 Õ 233 233 é 174 174 w 194 194 Â 214 214 Ö 234 234 ê 175 175 ˉ 195 195 Ã 215 215 × 235 235 ë 176 176 y 196 196 Ä 216 216 Ø 236 236 ì 177 177 z 197 197 Å 217 217 Ù 237 237 í 178 178 ² 198 198 Æ 218 218 Ú 238 238 î 179 179 ³ 199 199 Ç 219 219 Û 239 239 ï 180 180 ´ 200 200 È 220 220 Ü 240 240 ð TABLE IV BASE CHARACTERS PART 4 Index Code Char 241 241 ñ 242 242 ò 243 243 ó 244 244 ô 245 245 õ 246 246 ö 247 247 ÷ 248 248 ø 249 249 ù 250 250 ú 251 251 û 252 252 ü 253 253 ý 254 254 þ 255 97 a 256 256 Ā V. Tests and results For experience testing, we select three images: text image, Lena photo and Baboon picture. The reason of this choice is that they don’t have the same type.Theresultsarepresented in table and the first row is dedicated for preprocessing, second the conversion to short message and the last one is the text decoding to binary image. Fig.1. Experience with “text image” This sample text message respects the standard length of one short message which should belessthan160characters. Fig.2. Experience with “Lena” Lena image contains a lot of information and it is logic that the encoding length result is 286 characters which present two short messages. Fig.3. Experience with “Baboon” Baboon is image color that we use to test the capacity of our algorithm. We get two short messageswhosefirstpartis 153 characters and the last part contains 37 characters. Some SMSC equipment may have some problem to handle a specific special character and it changes with another character. Modifying few characters doesn’t have visual impact on final binary image. VI. Conclusion Encoding image to short message is possible but message length depends on the type of image introduced as input.We presented here only the main method applied for binary image to obtain message length minimum however our algorithm can be extended with another type of image such as gray and color. We can loss same information during conversion processing from any image to binary but the pertinent information stays visible. We chose this approach because mobile network operators chargethesesubscribers based on short message length. One short messageislimited to 160 characters and if your message length is more, they split yours and charge accordingly. Image encoding can be used also to hide an information and the senderandreceiver are only the persons who know the content. Its looks like cryptography technical and each other fix the base characters to be used. ACKNOWLEDGMENT Authors thank NitishYerkiah for his support REFERENCES [1] “Introduction to SMS,” https://www.gsmfavorites.com/ [2] “MMS,” https://www.gsmfavorites.com/