IRJET- Image Privacy Protection as a Single ShareIRJET Journal
This document proposes a method for privacy protection of visual data using false color within the JPEG architecture. The method involves converting an input RGB image to grayscale, using the grayscale values to index a RGB color palette to replace the original pixel values, creating a protected false image. The false image and decryption metadata are stored together in a single JPEG file. Only authorized users with the decryption key can decompress, decrypt and decode the file to recover the original image losslessly. The method aims to provide privacy protection with intelligibility and security for surveillance systems and shared visual data.
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET Journal
This document proposes a hybrid approach to text and image steganography using AES encryption and LSB substitution. It begins with background on cryptography, steganography, and image steganography techniques. It then reviews related work that uses direct hiding, XOR encryption, AES encryption with LSB nibble substitution, and techniques requiring pre-agreed cover images. The proposed system first encrypts a text or image using AES before embedding it in a cover image using an improved LSB technique that can store more data while maintaining image quality. It presents the methodology, sample screenshots and concludes the technique provides improved security while being user friendly. Future work could extend it to other file types and formats.
11.biometric data security using recursive visual cryptographyAlexander Decker
This document summarizes a research paper on using recursive visual cryptography and biometric authentication to securely store biometric data. The paper proposes a scheme where secrets can be recursively embedded within image shares created by visual cryptography. Additionally, biometric authentication is used to securely access the shares. The scheme involves creating shares of secrets, embedding those shares as additional secrets within other shares, and authenticating users through iris recognition before revealing embedded secrets. This allows for multiple secrets to be hidden and revealed securely through the visual cryptography and biometric authentication methods combined.
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...IRJET Journal
This document proposes an image encryption technique that uses the Arnold transform to scramble pixel positions, generalized logistic equations to generate secret keys, and non-subsampled contourlet transforms to change pixel values. Differential evolution is used to fine-tune the key space. The technique encrypts images in RGB layers by applying the Arnold transform, generating secret keys with the logistic equation, diffusing the keys into the transformed pixel values, and decrypting in reverse order. Analysis shows the encrypted images have uniform histograms, low pixel correlation, high PSNR values, and can withstand attacks like changes to the secret keys.
This document summarizes a research paper that proposes a new method for encrypting images with high security when transmitting over a network. The method involves dividing the source image into multiple parts, encrypting each part separately with a different encryption key, and then combining the encrypted parts into a single encrypted image for transmission. This provides stronger security than encrypting the whole image with a single key. The document provides background on existing image encryption techniques and visual cryptography. It then outlines the proposed new methodology, which first divides the source image into multiple smaller images, encrypts each part separately with a different algorithm/key, and has two options for transmission - sending all the encrypted parts individually or combining them into one encrypted image.
Implementation of image steganography using lab viewIJARIIT
Steganography is the one of the technique to hide secret messages within a larger one in such way that someone can
not know the presence or contents of the hidden message. The purpose of Steganography is to maintain secret communication
between two parties. This paper presents the implementation of a highly secured data hiding technique called Steganography.
This technique is applicable for image data type. The main aim of this technique is to encode the data image within the cover
image such that the data image's existence is concealed. Here we use the data as an image for Steganography. It deals with the
encoding data image information in a given image (called cover image) without making any visible changes to it. LabVIEW
graphical programming environment is a tool for realizing the image acquisition and processing. This software has several
advantages: simple implementation, modularity, flexibility, attractive user interface and the possibility to develop very easy new
features.
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...IRJET Journal
This document discusses methods for encrypting and decrypting images using reversible data hiding and least significant bit algorithms with asymmetric cryptography. It proposes a method that reserves room in the image before encryption using histogram shift-based reversible data hiding and least significant bit algorithms with a public key cryptosystem. This allows data to be embedded in the encrypted image simply for the user. The embedded data and original image can then be extracted and recovered later without any loss of pixels or data. The method claims to embed more than ten times as much data as other techniques while maintaining image quality and restoration after encryption.
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
There are algorithms in existence for hiding data within an image. The proposed scheme treats the image as a whole. Here
Integer Cosine Transform (ICT) and Integer Wavelet Transform (IWT) is combined for converting signal to frequency. Hide Behind
Corner (HBC) algorithm is used to place a key at corners of the image. All the corner keys are encrypted by generating Pseudo
Random Numbers. The Secret keys are used for corner parts. Then the hidden image is transmitted. The receiver should be aware of
the keys that are used at the corners while encrypting the image. Reverse Data Hiding (RDH) is used to get the original image and it
proceeds once when all the corners are unlocked with proper secret keys. With these methods the performance of the stegnographic
technique is improved in terms of PSNR value.
IRJET- Image Privacy Protection as a Single ShareIRJET Journal
This document proposes a method for privacy protection of visual data using false color within the JPEG architecture. The method involves converting an input RGB image to grayscale, using the grayscale values to index a RGB color palette to replace the original pixel values, creating a protected false image. The false image and decryption metadata are stored together in a single JPEG file. Only authorized users with the decryption key can decompress, decrypt and decode the file to recover the original image losslessly. The method aims to provide privacy protection with intelligibility and security for surveillance systems and shared visual data.
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET Journal
This document proposes a hybrid approach to text and image steganography using AES encryption and LSB substitution. It begins with background on cryptography, steganography, and image steganography techniques. It then reviews related work that uses direct hiding, XOR encryption, AES encryption with LSB nibble substitution, and techniques requiring pre-agreed cover images. The proposed system first encrypts a text or image using AES before embedding it in a cover image using an improved LSB technique that can store more data while maintaining image quality. It presents the methodology, sample screenshots and concludes the technique provides improved security while being user friendly. Future work could extend it to other file types and formats.
11.biometric data security using recursive visual cryptographyAlexander Decker
This document summarizes a research paper on using recursive visual cryptography and biometric authentication to securely store biometric data. The paper proposes a scheme where secrets can be recursively embedded within image shares created by visual cryptography. Additionally, biometric authentication is used to securely access the shares. The scheme involves creating shares of secrets, embedding those shares as additional secrets within other shares, and authenticating users through iris recognition before revealing embedded secrets. This allows for multiple secrets to be hidden and revealed securely through the visual cryptography and biometric authentication methods combined.
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...IRJET Journal
This document proposes an image encryption technique that uses the Arnold transform to scramble pixel positions, generalized logistic equations to generate secret keys, and non-subsampled contourlet transforms to change pixel values. Differential evolution is used to fine-tune the key space. The technique encrypts images in RGB layers by applying the Arnold transform, generating secret keys with the logistic equation, diffusing the keys into the transformed pixel values, and decrypting in reverse order. Analysis shows the encrypted images have uniform histograms, low pixel correlation, high PSNR values, and can withstand attacks like changes to the secret keys.
This document summarizes a research paper that proposes a new method for encrypting images with high security when transmitting over a network. The method involves dividing the source image into multiple parts, encrypting each part separately with a different encryption key, and then combining the encrypted parts into a single encrypted image for transmission. This provides stronger security than encrypting the whole image with a single key. The document provides background on existing image encryption techniques and visual cryptography. It then outlines the proposed new methodology, which first divides the source image into multiple smaller images, encrypts each part separately with a different algorithm/key, and has two options for transmission - sending all the encrypted parts individually or combining them into one encrypted image.
Implementation of image steganography using lab viewIJARIIT
Steganography is the one of the technique to hide secret messages within a larger one in such way that someone can
not know the presence or contents of the hidden message. The purpose of Steganography is to maintain secret communication
between two parties. This paper presents the implementation of a highly secured data hiding technique called Steganography.
This technique is applicable for image data type. The main aim of this technique is to encode the data image within the cover
image such that the data image's existence is concealed. Here we use the data as an image for Steganography. It deals with the
encoding data image information in a given image (called cover image) without making any visible changes to it. LabVIEW
graphical programming environment is a tool for realizing the image acquisition and processing. This software has several
advantages: simple implementation, modularity, flexibility, attractive user interface and the possibility to develop very easy new
features.
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...IRJET Journal
This document discusses methods for encrypting and decrypting images using reversible data hiding and least significant bit algorithms with asymmetric cryptography. It proposes a method that reserves room in the image before encryption using histogram shift-based reversible data hiding and least significant bit algorithms with a public key cryptosystem. This allows data to be embedded in the encrypted image simply for the user. The embedded data and original image can then be extracted and recovered later without any loss of pixels or data. The method claims to embed more than ten times as much data as other techniques while maintaining image quality and restoration after encryption.
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
There are algorithms in existence for hiding data within an image. The proposed scheme treats the image as a whole. Here
Integer Cosine Transform (ICT) and Integer Wavelet Transform (IWT) is combined for converting signal to frequency. Hide Behind
Corner (HBC) algorithm is used to place a key at corners of the image. All the corner keys are encrypted by generating Pseudo
Random Numbers. The Secret keys are used for corner parts. Then the hidden image is transmitted. The receiver should be aware of
the keys that are used at the corners while encrypting the image. Reverse Data Hiding (RDH) is used to get the original image and it
proceeds once when all the corners are unlocked with proper secret keys. With these methods the performance of the stegnographic
technique is improved in terms of PSNR value.
A comparatively study on visual cryptographyeSAT Journals
Abstract The effective and secure protections of sensitive information are primary concerns in commercial, medical and military systems. To address the reliability problems for secret images, a visual cryptography scheme is a good alternative to remedy the vulnerabilities. Visual cryptography is a very secure and unique way to protect secrets. Visual cryptography is an encryption technique which is used to hide information which is present in an image. Unliketraditional cryptographic schemes, it uses human eyes to recover the secret without any complex decryption algorithms and the facilitate of computers. It is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed.In this paper we represent various cryptography technique and research work done in this field. Keywords: Secret image sharing, cryptography, visual quality of image, pixel expansion
Image steganography is the art of hiding a message, image, or file within another message, image, or file. Likely, an old term in Ancient Greek, Steganography is derived from steganos meaning ―”concealed” and graphein meaning ―”writing”, in other word we can say it refers to the science of “invisible” communication. Unlike cryptography, where the goal is to secure communications from an eavesdropper, steganography techniques strive to hide the very presence of the message itself froman observer. In this research paper we deal with hiding a digital message image inside a digital cover image leading us to the stego image. With the combination of Message Preparation using Spatial Domain image modification technique, discrete cosine transforms (DCT) and image scrambled using modified Arnold Transform, an algorithm based on the three technologies is proposed. The effectiveness of the proposed methods has been estimated by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR) and experimental result shows that the proposed algorithm is highly secured with good perceptual invisibility
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET Journal
This document proposes a new method for securely transmitting images over a medium using mosaic image creation in video. The method has two main phases:
1) Mosaic video creation: A video is selected and its frames are used to create a mosaic image that resembles a target secret image. Color transformations are applied to fit tiles of the secret image into blocks of frames. Relevant information for recovery is embedded into the mosaic video.
2) Secret image recovery: At the receiving end, the frames are extracted from the video. The embedded information is extracted to recover tiles of the secret image from the mosaic frames through inverse transformations. The secret image is thus reconstructed without any loss.
This document proposes a scheme to enhance the security of visual cryptographic shares by encrypting the shares using public key encryption. It discusses visual cryptography and how shares can be intercepted if transmitted over a public network. The proposed scheme generates shares using visual cryptography, then encrypts each share using RSA public key encryption. At the destination, the shares are decrypted using RSA and then overlapped using visual cryptography to reveal the secret image. Experimental results show that an adversary unable to decrypt the encrypted shares without the private key, but the secret image is revealed when decrypting and overlapping the correct shares. The scheme provides double security to secret images during transmission over public networks.
Implementation of Steganographic Model using Inverted LSB InsertionDr. Amarjeet Singh
The most important thing in this insecure world is
the secrecy of everything. In today’s world, any important
data costs more than money. Steganography is the technique
in which one can hide data as a secrete in selected image. In
case of spatial domain, LSB approach is most popular in
steganography, where all the LSBs of pixels of image are
replaced by the bits of secret data. But the problem is that
the secrete can be easily guessed by the hacker and the data is
obtained by extracting it from direct LSBs. To make the
system more robust and to improve the signal to noise ratio,
the conventional LSB insertion method is replaced by
inverted LSB technic. The decision to invert or not the LSB
depends on combination of the 2nd and 3rd LSB. As not each
and every LSB is inverted, it makes the steganalysis very
difficult.
A digital watermarking scheme based on integer wavelet transform and histogram techniques is
proposed in this paper. Lifting scheme based integer wavelet transform is used to provide ease of
transformation of compressed data and to increase the data embedding capacity. Also histogram technique
which is one of the reversible data hiding is used to embed the secret data into original image and retrieve the
original data back after extraction. The AES encryption is used to encrypt the embedded image to provide
authentication. This algorithm is developed using verilog code and implemented on FPGA Artix 7 board in
order to increase throughput, reduce area and power consumption.
This document proposes a scheme for homomorphic image encryption to protect user privacy in cloud image processing services. The key steps are: 1) Developing a secret key homomorphic encryption that supports addition and multiplication on encrypted floating point numbers, which are used in image processing; 2) Encrypting images using this encryption; 3) Processing the encrypted images directly in the cloud without decrypting them first. Common image processing functions like filtering and segmentation can then be performed on the encrypted images while maintaining privacy, as the cloud only sees encrypted data. The results after decryption are identical to processing the original images. This allows privacy-preserving usage of cloud image processing services on sensitive personal images.
Reversible Encrypytion and Information ConcealmentIJERA Editor
Recently, a lot of attention is paid to reversible data hiding (RDH) in encrypted pictures, since it maintains the wonderful property that the initial image cover will be losslessly recovered when embedded data is extracted, whereas protects the image content that is need to be kept confidential. Other techniques used antecedently are to embed data by reversibly vacating area from the pictures, that area unit been encryted, may cause some errors on information extraction or image restoration. In this paper, we propose a unique methodology by reserving room before secret writing (i.e reserving room before encryption) with a conventional RDH algorithmic rule, and thus it becomes straightforward for hider to reversibly embed data in the encrypted image. The projected methodology is able to implement real reversibility, that is, information extraction and image recovery area unit free of any error. This methodology embedds larger payloads for constant image quality than the antecedently used techniques, like for PSNR= 40db.
This document proposes a novel image cryptography method using nearest prime pixels for key generation. It begins by introducing image cryptography and its basic concepts. The proposed method first converts image pixels to digital values and finds the nearest prime pixel values. Keys are generated by taking the difference between original and nearest prime pixels. Encryption is done by XORing pixels with keys and reversing the results, which are stored column-wise in a matrix. Decryption retrieves the matrix rows and performs reverse operations to recover the original image. The method aims to improve security by using mixed row/column retrieval and complementary operations during encryption and decryption.
Visual Cryptography Industrial Training ReportMohit Kumar
A visual cryptography scheme (VCS) is a kind of secret sharing scheme which allows the encoding of a secret image into shares distributed to participants. The beauty of such a scheme is that a set of qualified participants is able to recover the secret image without any cryptographic knowledge and computation devices. An extended visual cryptography scheme (EVCS) is a kind of VCS which consists of meaningful shares (compared to the random shares of traditional VCS).
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
IRJET- GSVD Algorithm for Image EncryptionIRJET Journal
This document describes a Generalized Singular Value Decomposition (GSVD) algorithm for encrypting and decrypting RGB images. The algorithm works by:
1) Splitting the plaintext image into R, G, and B channels and applying GSVD encryption to each channel using an encryption key.
2) Combining the encrypted channels to form the ciphertext image.
3) For decryption, the ciphertext image is split into channels and GSVD is applied to each using the encryption key to recover the original plaintext image.
The algorithm aims to provide stronger security for images transmitted between parties compared to other encryption methods through the use of GSVD and an additional reference key image during the encryption process.
An LSB Method Of Image Steganographic TechniquesIJERA Editor
The art of information hiding has received much attention in the recent years as security of information has become a big concern in this internet era. As sharing of sensitive information via a common communication channel has become inevitable. Steganography means hiding a secret message (the embedded message) within a larger one (source cover) in such a way that an observer cannot detect the presence of contents of the hidden message [1]. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet [2]. This paper intends to give an overview of image Steganography, its uses and techniques. It also attempts to identify the requirements of a good Steganography algorithm and briefly reflects on which Steganography techniques are more suitable for which applications.
Using image stitching and image steganography security can be provided to any image which has to be sent over the network or transferred using any electronic mode. There is a message and a secret image that has to be sent. The secret image is divided into parts.The first phase is the Encrypting Phase, which deals with the process of converting the actual secret message into ciphertext using the AES algorithm. In the second phase which is the Embedding Phase, the cipher text is embedded into any part of the secret image that is to be sent. Third phase is the Hiding Phase, where steganography is performed on the output image of Embedding Phase and other parts of the image where the parts are camouflaged by another image using least significant bit replacement. These individual parts are sent to the concerned receiver. At the receivers end decryption of Hiding phase and Embedding Phase takes place respectively. The parts obtained are stitched together using k nearest method. Using SIFT features the quality of the image is improved.
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
This document proposes a new secure image transmission method using byte rotation algorithm that improves encryption speed and security. The key steps are:
1. The input image is divided into four blocks which are shuffled using byte rotation.
2. A cover image is used to embed the shuffled secret image blocks for transmission.
3. At the receiver, byte rotation is applied again to extract the original secret image blocks from the embedded image.
Experimental results show the proposed method recovers images with high PSNR quality scores while increasing encryption speed over other algorithms like AES. This provides a more secure and fast way to transmit encrypted images over networks.
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the substitution process of the scheme, image is divided into blocks and subsequently into color components. Each color component is modified by performing bitwise operation which depends on secret key as well as a few most significant bits of its previous and next color component. Three rounds are taken to complete substitution process. To make cipher more robust, a feedback mechanism is also applied by modifying used secret key after encrypting each block. Further, resultant image is partitioned into several key based dynamic sub-images. Each sub-image passes through the scrambling process where pixels of sub-image are reshuffled within itself by using a generated magic square matrix. Five rounds are taken for scrambling process. The propose scheme is simple, fast and sensitive to the secret key. Due to high order of substitution and permutation, common attacks like linear and differential cryptanalysis are infeasible. The experimental results show that the proposed encryption technique is efficient and has high security features.
This document proposes a variable length key-based visual cryptography scheme for encrypting color images. It involves encrypting the original image using a variable length symmetric key, generating shares of the encrypted image using random numbers, and decrypting the shares by stacking a minimum number of shares and applying the same encryption key. The proposed scheme aims to improve security over simple visual cryptography by using an encryption key and random number-based share generation, making the shares and encrypted image different from the original image. It is described as having less complex share generation than other techniques while providing security through the use of encryption and a variable length key.
Analysing secure image secret sharing schemes based on steganographyIAEME Publication
This document discusses secure image secret sharing schemes based on steganography. It provides background on secret sharing, visual cryptography, and steganography techniques like least significant bit insertion, adaptive MELSBR method, and bit plane complexity segmentation. The document analyzes how combining secret sharing and steganography can make secret sharing schemes more secure by embedding shares in cover images, making them less obvious to attackers. It reviews few existing methods that combine secret sharing and information hiding and identifies limitations like low reliability, large shadow size, and constraints on secret image size. The intent of the paper is to explain how secret sharing combined with steganography improves security and to guide selection of a scheme for different needs.
A novel cryptographic technique that emphasis visual quality and efficieny by...eSAT Journals
Abstract Visual cryptography is a cryptographic technique which allows visual information to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. The original image can be split into shares, where unauthorized person cannot get the data which we hide within that share images. By stacking the two shares, the secret data can be revealed. The highlighted issue in VC is, the size and quality of the reconstructed image should be same as the original image. In this paper, a novel k out of k extended visual cryptography scheme (EVCS) is used, to improve security and to produce meaningful shares. Halftone visual cryptography (VC) encodes a secret image into k halftone meaningful image shares through Floyd Steinberg error diffusion algorithm. The algorithm achieves dithering using error diffusion, meaning it pushes (adds) the residual quantization error of a pixel onto its neighboring pixels, to be dealt with later. This algorithm takes a substantial time for encryption and decryption in a considerably calmer manner. Comparisons with previous approaches show the superior performance of the new method.
Keywords: k out of k, extended visual cryptography, halftone visual cryptography, Floyd Steinberg error diffusion algorithm.
This document summarizes a research paper that proposes an enhanced AES algorithm for image steganography and encryption. It begins with an introduction to digital image processing, steganography and encryption. It then describes a proposed AES technique that improves on a modified AES method. The proposed technique involves 4 steps: key expansion, sub bytes modification, new shift rows, and mixing columns. Results show the proposed method takes less time with high quality encrypted images. The document concludes the technique improves security at two levels and helps reduce encryption time to some extent.
This document summarizes an article from the International Journal of Mechanical Engineering and Technology. The article discusses the need for an integrated predictive collaboration performance evaluation framework between business partners. It notes that most competitiveness improvements have focused on individual performance measurement systems rather than collaborative value. The proposed framework would forecast performance trends based on supply chain experts' experiences rather than just historical data comparisons. It would also include additional aspects like trust between partners and information sharing. The framework aims to provide a more holistic evaluation and guidance on future performance and decision making for business partnerships.
A comparatively study on visual cryptographyeSAT Journals
Abstract The effective and secure protections of sensitive information are primary concerns in commercial, medical and military systems. To address the reliability problems for secret images, a visual cryptography scheme is a good alternative to remedy the vulnerabilities. Visual cryptography is a very secure and unique way to protect secrets. Visual cryptography is an encryption technique which is used to hide information which is present in an image. Unliketraditional cryptographic schemes, it uses human eyes to recover the secret without any complex decryption algorithms and the facilitate of computers. It is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed.In this paper we represent various cryptography technique and research work done in this field. Keywords: Secret image sharing, cryptography, visual quality of image, pixel expansion
Image steganography is the art of hiding a message, image, or file within another message, image, or file. Likely, an old term in Ancient Greek, Steganography is derived from steganos meaning ―”concealed” and graphein meaning ―”writing”, in other word we can say it refers to the science of “invisible” communication. Unlike cryptography, where the goal is to secure communications from an eavesdropper, steganography techniques strive to hide the very presence of the message itself froman observer. In this research paper we deal with hiding a digital message image inside a digital cover image leading us to the stego image. With the combination of Message Preparation using Spatial Domain image modification technique, discrete cosine transforms (DCT) and image scrambled using modified Arnold Transform, an algorithm based on the three technologies is proposed. The effectiveness of the proposed methods has been estimated by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR) and experimental result shows that the proposed algorithm is highly secured with good perceptual invisibility
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET Journal
This document proposes a new method for securely transmitting images over a medium using mosaic image creation in video. The method has two main phases:
1) Mosaic video creation: A video is selected and its frames are used to create a mosaic image that resembles a target secret image. Color transformations are applied to fit tiles of the secret image into blocks of frames. Relevant information for recovery is embedded into the mosaic video.
2) Secret image recovery: At the receiving end, the frames are extracted from the video. The embedded information is extracted to recover tiles of the secret image from the mosaic frames through inverse transformations. The secret image is thus reconstructed without any loss.
This document proposes a scheme to enhance the security of visual cryptographic shares by encrypting the shares using public key encryption. It discusses visual cryptography and how shares can be intercepted if transmitted over a public network. The proposed scheme generates shares using visual cryptography, then encrypts each share using RSA public key encryption. At the destination, the shares are decrypted using RSA and then overlapped using visual cryptography to reveal the secret image. Experimental results show that an adversary unable to decrypt the encrypted shares without the private key, but the secret image is revealed when decrypting and overlapping the correct shares. The scheme provides double security to secret images during transmission over public networks.
Implementation of Steganographic Model using Inverted LSB InsertionDr. Amarjeet Singh
The most important thing in this insecure world is
the secrecy of everything. In today’s world, any important
data costs more than money. Steganography is the technique
in which one can hide data as a secrete in selected image. In
case of spatial domain, LSB approach is most popular in
steganography, where all the LSBs of pixels of image are
replaced by the bits of secret data. But the problem is that
the secrete can be easily guessed by the hacker and the data is
obtained by extracting it from direct LSBs. To make the
system more robust and to improve the signal to noise ratio,
the conventional LSB insertion method is replaced by
inverted LSB technic. The decision to invert or not the LSB
depends on combination of the 2nd and 3rd LSB. As not each
and every LSB is inverted, it makes the steganalysis very
difficult.
A digital watermarking scheme based on integer wavelet transform and histogram techniques is
proposed in this paper. Lifting scheme based integer wavelet transform is used to provide ease of
transformation of compressed data and to increase the data embedding capacity. Also histogram technique
which is one of the reversible data hiding is used to embed the secret data into original image and retrieve the
original data back after extraction. The AES encryption is used to encrypt the embedded image to provide
authentication. This algorithm is developed using verilog code and implemented on FPGA Artix 7 board in
order to increase throughput, reduce area and power consumption.
This document proposes a scheme for homomorphic image encryption to protect user privacy in cloud image processing services. The key steps are: 1) Developing a secret key homomorphic encryption that supports addition and multiplication on encrypted floating point numbers, which are used in image processing; 2) Encrypting images using this encryption; 3) Processing the encrypted images directly in the cloud without decrypting them first. Common image processing functions like filtering and segmentation can then be performed on the encrypted images while maintaining privacy, as the cloud only sees encrypted data. The results after decryption are identical to processing the original images. This allows privacy-preserving usage of cloud image processing services on sensitive personal images.
Reversible Encrypytion and Information ConcealmentIJERA Editor
Recently, a lot of attention is paid to reversible data hiding (RDH) in encrypted pictures, since it maintains the wonderful property that the initial image cover will be losslessly recovered when embedded data is extracted, whereas protects the image content that is need to be kept confidential. Other techniques used antecedently are to embed data by reversibly vacating area from the pictures, that area unit been encryted, may cause some errors on information extraction or image restoration. In this paper, we propose a unique methodology by reserving room before secret writing (i.e reserving room before encryption) with a conventional RDH algorithmic rule, and thus it becomes straightforward for hider to reversibly embed data in the encrypted image. The projected methodology is able to implement real reversibility, that is, information extraction and image recovery area unit free of any error. This methodology embedds larger payloads for constant image quality than the antecedently used techniques, like for PSNR= 40db.
This document proposes a novel image cryptography method using nearest prime pixels for key generation. It begins by introducing image cryptography and its basic concepts. The proposed method first converts image pixels to digital values and finds the nearest prime pixel values. Keys are generated by taking the difference between original and nearest prime pixels. Encryption is done by XORing pixels with keys and reversing the results, which are stored column-wise in a matrix. Decryption retrieves the matrix rows and performs reverse operations to recover the original image. The method aims to improve security by using mixed row/column retrieval and complementary operations during encryption and decryption.
Visual Cryptography Industrial Training ReportMohit Kumar
A visual cryptography scheme (VCS) is a kind of secret sharing scheme which allows the encoding of a secret image into shares distributed to participants. The beauty of such a scheme is that a set of qualified participants is able to recover the secret image without any cryptographic knowledge and computation devices. An extended visual cryptography scheme (EVCS) is a kind of VCS which consists of meaningful shares (compared to the random shares of traditional VCS).
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
IRJET- GSVD Algorithm for Image EncryptionIRJET Journal
This document describes a Generalized Singular Value Decomposition (GSVD) algorithm for encrypting and decrypting RGB images. The algorithm works by:
1) Splitting the plaintext image into R, G, and B channels and applying GSVD encryption to each channel using an encryption key.
2) Combining the encrypted channels to form the ciphertext image.
3) For decryption, the ciphertext image is split into channels and GSVD is applied to each using the encryption key to recover the original plaintext image.
The algorithm aims to provide stronger security for images transmitted between parties compared to other encryption methods through the use of GSVD and an additional reference key image during the encryption process.
An LSB Method Of Image Steganographic TechniquesIJERA Editor
The art of information hiding has received much attention in the recent years as security of information has become a big concern in this internet era. As sharing of sensitive information via a common communication channel has become inevitable. Steganography means hiding a secret message (the embedded message) within a larger one (source cover) in such a way that an observer cannot detect the presence of contents of the hidden message [1]. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet [2]. This paper intends to give an overview of image Steganography, its uses and techniques. It also attempts to identify the requirements of a good Steganography algorithm and briefly reflects on which Steganography techniques are more suitable for which applications.
Using image stitching and image steganography security can be provided to any image which has to be sent over the network or transferred using any electronic mode. There is a message and a secret image that has to be sent. The secret image is divided into parts.The first phase is the Encrypting Phase, which deals with the process of converting the actual secret message into ciphertext using the AES algorithm. In the second phase which is the Embedding Phase, the cipher text is embedded into any part of the secret image that is to be sent. Third phase is the Hiding Phase, where steganography is performed on the output image of Embedding Phase and other parts of the image where the parts are camouflaged by another image using least significant bit replacement. These individual parts are sent to the concerned receiver. At the receivers end decryption of Hiding phase and Embedding Phase takes place respectively. The parts obtained are stitched together using k nearest method. Using SIFT features the quality of the image is improved.
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
This document proposes a new secure image transmission method using byte rotation algorithm that improves encryption speed and security. The key steps are:
1. The input image is divided into four blocks which are shuffled using byte rotation.
2. A cover image is used to embed the shuffled secret image blocks for transmission.
3. At the receiver, byte rotation is applied again to extract the original secret image blocks from the embedded image.
Experimental results show the proposed method recovers images with high PSNR quality scores while increasing encryption speed over other algorithms like AES. This provides a more secure and fast way to transmit encrypted images over networks.
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the substitution process of the scheme, image is divided into blocks and subsequently into color components. Each color component is modified by performing bitwise operation which depends on secret key as well as a few most significant bits of its previous and next color component. Three rounds are taken to complete substitution process. To make cipher more robust, a feedback mechanism is also applied by modifying used secret key after encrypting each block. Further, resultant image is partitioned into several key based dynamic sub-images. Each sub-image passes through the scrambling process where pixels of sub-image are reshuffled within itself by using a generated magic square matrix. Five rounds are taken for scrambling process. The propose scheme is simple, fast and sensitive to the secret key. Due to high order of substitution and permutation, common attacks like linear and differential cryptanalysis are infeasible. The experimental results show that the proposed encryption technique is efficient and has high security features.
This document proposes a variable length key-based visual cryptography scheme for encrypting color images. It involves encrypting the original image using a variable length symmetric key, generating shares of the encrypted image using random numbers, and decrypting the shares by stacking a minimum number of shares and applying the same encryption key. The proposed scheme aims to improve security over simple visual cryptography by using an encryption key and random number-based share generation, making the shares and encrypted image different from the original image. It is described as having less complex share generation than other techniques while providing security through the use of encryption and a variable length key.
Analysing secure image secret sharing schemes based on steganographyIAEME Publication
This document discusses secure image secret sharing schemes based on steganography. It provides background on secret sharing, visual cryptography, and steganography techniques like least significant bit insertion, adaptive MELSBR method, and bit plane complexity segmentation. The document analyzes how combining secret sharing and steganography can make secret sharing schemes more secure by embedding shares in cover images, making them less obvious to attackers. It reviews few existing methods that combine secret sharing and information hiding and identifies limitations like low reliability, large shadow size, and constraints on secret image size. The intent of the paper is to explain how secret sharing combined with steganography improves security and to guide selection of a scheme for different needs.
A novel cryptographic technique that emphasis visual quality and efficieny by...eSAT Journals
Abstract Visual cryptography is a cryptographic technique which allows visual information to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. The original image can be split into shares, where unauthorized person cannot get the data which we hide within that share images. By stacking the two shares, the secret data can be revealed. The highlighted issue in VC is, the size and quality of the reconstructed image should be same as the original image. In this paper, a novel k out of k extended visual cryptography scheme (EVCS) is used, to improve security and to produce meaningful shares. Halftone visual cryptography (VC) encodes a secret image into k halftone meaningful image shares through Floyd Steinberg error diffusion algorithm. The algorithm achieves dithering using error diffusion, meaning it pushes (adds) the residual quantization error of a pixel onto its neighboring pixels, to be dealt with later. This algorithm takes a substantial time for encryption and decryption in a considerably calmer manner. Comparisons with previous approaches show the superior performance of the new method.
Keywords: k out of k, extended visual cryptography, halftone visual cryptography, Floyd Steinberg error diffusion algorithm.
This document summarizes a research paper that proposes an enhanced AES algorithm for image steganography and encryption. It begins with an introduction to digital image processing, steganography and encryption. It then describes a proposed AES technique that improves on a modified AES method. The proposed technique involves 4 steps: key expansion, sub bytes modification, new shift rows, and mixing columns. Results show the proposed method takes less time with high quality encrypted images. The document concludes the technique improves security at two levels and helps reduce encryption time to some extent.
This document summarizes an article from the International Journal of Mechanical Engineering and Technology. The article discusses the need for an integrated predictive collaboration performance evaluation framework between business partners. It notes that most competitiveness improvements have focused on individual performance measurement systems rather than collaborative value. The proposed framework would forecast performance trends based on supply chain experts' experiences rather than just historical data comparisons. It would also include additional aspects like trust between partners and information sharing. The framework aims to provide a more holistic evaluation and guidance on future performance and decision making for business partnerships.
This document summarizes an article from the International Journal of Industrial Engineering and Development titled "Development and Application of SFMEA Model to Software Testing Environment". It discusses using Failure Mode and Effects Analysis (FMEA) to improve software quality assurance. Specifically, it proposes developing a Software FMEA (SFMEA) model to identify potential failures, their causes and effects, for three banking software projects. The document reviews literature on SFMEA and discusses implementing the model to analyze failures and recommend corrective actions. It describes calculating a Risk Priority Number to prioritize failures and validate that the SFMEA model reduces this number and improves software quality.
This document summarizes a research paper on the potential for solar power in India. It finds that:
1) India has high solar potential and is becoming a leader in solar development through initiatives like Jawaharlal Nehru National Solar Mission.
2) The costs of solar power are declining rapidly due to economies of scale, while coal costs are rising.
3) The analysis projects that solar power could reach grid parity with coal in India by 2016-2018 and capture a significant share of India's energy mix by 2022, helping to address India's major power issues.
The document summarizes an experimental study that measured laminar burning velocities and Markstein numbers for mixtures of natural gas enriched with varying amounts of hydrogen. The study used a constant-volume combustion chamber equipped with thermocouples to measure flame propagation speeds. It found that adding hydrogen nonlinearly increased burning velocities at lean mixtures and decreased Markstein lengths, indicating greater flame instability. The results were compared to other studies and showed good agreement.
This document summarizes a research paper that proposes modifying the DYMO routing protocol for mobile ad hoc networks (MANETs) using an artificial immune system (AIS) approach called clonal selection to make it more secure and resilient against network layer attacks. Specifically, the paper discusses issues with securing routing in MANETs, describes the existing DYMO protocol, outlines common network layer attacks against MANETs, provides an overview of AIS and clonal selection algorithms, and proposes developing an AIS-based version of DYMO called AIS-DYMO to better handle network layer attacks.
The document compares the efficiency of electrocoagulation (EC) and chemical coagulation processes for treating paint wastewater in terms of chemical oxygen demand (COD) removal. EC using aluminum electrodes achieved a maximum 73% COD removal efficiency, outperforming chemical coagulation using alum which achieved 66% removal. Operational parameters like electrolyte concentration, pH, current density, and initial contaminant concentration influence the performance of EC for paint wastewater treatment.
This document discusses the sustainability of concrete in construction. It notes that while concrete is durable, the production of Portland cement, its key ingredient, releases significant amounts of CO2 and greenhouse gases. To improve sustainability, the document advocates using less Portland cement and more supplementary cementitious materials like fly ash. It also recommends producing concrete through engineered and mechanized processes to reduce waste. Overall sustainability requires considering a material's entire lifecycle from extraction to disposal or recycling.
This document discusses the development of an advanced functional maintenance management system for mining excavators. It proposes a systemic approach to functional maintenance that considers maintenance as an integrated function of mining processes and conditions. The approach aims to minimize maintenance costs and efficiently monitor technical constraints. It involves developing maintenance plans, condition monitoring systems, and an expert system using data mining and simulation modeling. The system also includes an economic analysis component to monitor maintenance expenditures and identify high-cost interventions. The goal is to establish strong correlations between mining production technologies and maintenance technologies for improved efficiency.
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET Journal
This document proposes a new encryption technique that combines visual cryptography and steganography for added security layers. A secret text message is first hidden in a cover image using steganography. The stego image is then sliced into shares using visual cryptography and transmitted over an open system. At the receiver end, the shares are stacked to reconstruct the cover image containing the hidden message, which can then be extracted using steganography. The technique aims to address issues like pixel expansion and memory requirements of previous methods by using unexpanded shares. It provides a less complex encryption/decryption system compared to other approaches.
Review On Encrypting and Decrypting Message Via Image SlicingIRJET Journal
This document reviews techniques for encrypting and decrypting messages via image slicing. It begins with an introduction on the importance of securing data transmitted over unsecured channels. It then summarizes several existing studies on steganography and cryptography techniques. The document proposes a hybrid approach using AES cryptography, LSB steganography, and image slicing/stitching for encrypting messages and ensuring their authentic transmission. It presents block diagrams of the sender and receiver sides and compares the proposed approach to existing systems. Limitations and opportunities for future work are also discussed.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
At Softroniics we provide job oriented training for freshers in IT sector. We are Pioneers in all leading technologies like Android, Java, .NET, PHP, Python, Embedded Systems, Matlab, NS2, VLSI etc. We are specializiling in technologies like Big Data, Cloud Computing, Internet Of Things (iOT), Data Mining, Networking, Information Security, Image Processing, Mechanical, Automobile automation and many other. We are providing long term and short term internship also.
We are providing short term in industrial training, internship and inplant training for Btech/Bsc/MCA/MTech students. Attached is the list of Topics for Mechanical, Automobile and Mechatronics areas.
MD MANIKANDAN-9037291113,04954021113
softroniics@gmail.com
www.softroniics.com
Implementation of Steganographic Techniques and its Detection.IRJET Journal
This document presents a literature review and proposed system for implementing steganographic techniques to conceal and retrieve secret information hidden in digital files like images. The proposed system would allow users to hide messages in images, videos and documents using an interface. It would also include a classifier trained to detect common steganography techniques to identify if hidden information is present in images. The system aims to provide a secure communication method and could be used for applications like digital watermarking, covert communication and detecting media piracy. It would use techniques like LSB substitution and AES encryption to hide data in bit planes of images selected by the user. An activity log and user profiles with private keys are also proposed to manage operations and provide additional security.
IRJET- A Review Paper on Chaotic Map Image Encryption TechniquesIRJET Journal
This document reviews various techniques for encrypting images using chaotic maps. It begins with an abstract summarizing that image encryption has become important with digital communication growth. Chaotic encryption is an alternative due to chaotic maps' sensitivity to initial conditions and unpredictability. The document then reviews concepts of image encryption, cryptography, and chaotic systems. It surveys several existing image encryption schemes based on chaotic maps and their approaches, such as using the Henon map or selective encryption of image components. The typical architecture of chaos-based image cryptosystems is also described.
This document summarizes a research paper that proposes an improved color visual cryptography scheme using Floyd error diffusion. Visual cryptography allows images to be encrypted into shares such that the secret image is only revealed when a sufficient number of shares are stacked together, without requiring any computational decryption. Existing color visual cryptography schemes produced low quality random shares. The proposed scheme uses the concepts of visual information pixels and error diffusion to generate high quality color shares that contain meaningful visual information. It introduces a new encryption method using visual cryptography matrices and cyclic redundancy checks to identify errors and verify authentication of shares. Experimental results show the new scheme produces better quality shares than previous methods and increases security.
Chaos Based Image Encryption Techniques: A ReviewIRJET Journal
This document reviews various techniques for encrypting digital images using chaotic systems. It begins by introducing chaos theory and its application to cryptography. It then reviews 25 research papers published between 2014-2020 that proposed different chaotic map-based techniques for image encryption. These techniques are evaluated and compared based on security metrics like key space, differential analysis, and histogram analysis. While the reviewed techniques demonstrated good encryption performance, the document also identifies potential weaknesses like vulnerability to chosen-plaintext attacks in some methods. It concludes that combining multiple chaotic maps and dynamic algorithms can help develop more robust encryption systems.
This document summarizes a research paper that proposes a technique for secure authentication of bank customers using image processing, improved steganography, and visual cryptography. The technique encodes a customer's password using steganography to hide it in an image. The image is then divided into shares, with one share stored by the bank and one by the customer. During transactions, the customer presents their share which is combined with the bank's share to reconstruct the original image and extract the hidden password for authentication. The proposed method aims to improve imperceptibility compared to previous steganography methods by utilizing more surrounding pixels when hiding information to reduce image distortion.
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...IRJET Journal
This document proposes a new approach called anti-phishing image captcha validation using visual cryptography to detect and prevent phishing. It uses the concept of image processing and visual cryptography to encrypt an image captcha into two shares stored on separate servers. When both shares are available simultaneously, the original image captcha is revealed for the user as a password. This scheme aims to preserve the privacy of the image captcha. The document provides background on phishing, visual cryptography, and related works before describing the proposed system which uses a (2,2) visual cryptography threshold scheme to encrypt the image captcha into two shares.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Retrieving Of Color Images Using SDS TechniqueEditor IJMTER
How data can be shared from one part of the world to the other in near real time came with
the arrival of internet. Along with this they have introduced new challenges like maintaining the
confidentiality of transmitting the data. This gave a boost to the research area related to cryptography.
Firstly, Encryption of images with the accepted encryption algorithms had significant downside as key
management was complicated and limited. Secondly, introduction to new area for encrypting images
was splitting the image at its pixel level in to multiple shares. But the major drawback of this approach
was that the recovered image had a poor quality. To overcome these mentioned drawbacks we have
proposed a new approach which does not attempt to use any type of keys for encryption.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes a research paper that proposes a new image encryption method using magnitude and phase manipulation with crossover and mutation approaches. The proposed method encrypts images in the frequency domain. It performs crossover operations to swap real and complex parts of frequency components. It also applies a mutation operation using NOT logic. This makes the encrypted image sensitive to key changes and difficult to decrypt without the key. The method is evaluated on different types of images and is shown to encrypt images with 84-98% efficiency depending on the image content. The authors conclude the method provides an efficient encryption scheme and future work could further improve encryption of images containing easily recognizable objects.
Data Hiding and Retrieval using Visual CryptographyAM Publications
Nath et al. developed several methods for hiding data in a cover file using different steganography
methods. In some methods Nath et al. first applied encryption method before hiding into the cover file. For security
reasons the secret message is encrypted first before inserting into the cover file. To make the system more complex the
authors used some random insertion of bits so that even if the intruders can extract the bits from cover file but they
cannot reconstruct the original secret message. In the present work the authors applied different data hiding
algorithm based on visual cryptography. Visual Cryptography is now a days a very popular method for hiding any
secret message inside multiple shares. Initially people were trying to hide some secret message which is simply B/W in
two shares. But slowly the researchers started to hide any color image (may be text or image or any object) in two or
more shares. In the present work the authors tried to hide any color message/image in two or more shares. The
interesting part of the present method is that from one share it impossible to create the second share or to extract the
hidden secret message from one share without having the other share(s). The present method may be used for
reconstructing password or any kind of important message or image. The present method may be applied in forensic
department or in defense for sending some confidential message
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
This document summarizes a research paper that proposes a novel image encryption approach for addressing security issues. The approach has two stages: 1) data encryption where biometric data like face and knuckle images are converted to binary then run length encoded for encryption. 2) Matching encrypted data where encrypted samples are stored and matched for authentication. Experiments on face and knuckle datasets showed the approach performed well, encrypting biometric data with precision and recall over 80% for matching. The simple encryption method effectively provided security for biometric identification systems.
Encrypting and Decrypting Message via Image SlicingIRJET Journal
This document discusses a proposed method for encrypting and decrypting messages via image slicing. The proposed method uses several techniques including AES encryption, LSB steganography, image slicing, and image stitching. At the sender side, the message is first encrypted using AES encryption with a shared key. It is then embedded into an image file using LSB steganography. The image is then sliced into pieces without changing its dimensions. These image slices are sent to the receiver. At the receiver side, the image slices are stitched back together. LSB decoding and AES decryption are then applied to extract the original encrypted message and decrypt it using the shared key. The proposed method aims to securely transmit messages over untrusted networks by
Digital image copyright protection based on visual cryptographyinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
1) The document discusses copy-move forgery detection using the Discrete Wavelet Transform (DWT) method. Copy-move forgery involves copying and pasting a part of an image within the same image to conceal information.
2) Previous work has used the PCA algorithm to detect incompatible pixels, but this study proposes using the DWT and GLCM algorithms instead. The proposed algorithm is tested in MATLAB and evaluated based on PSNR and MSE values.
3) The study finds that the proposed DWT and GLCM algorithm performs better than the previous PCA-only approach, providing more accurate forgery detection while maintaining good performance metrics.
Similar to A novel technique of visual cryptography for maintaining the security of visual information transaction (20)
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
2. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
called plain text or clear text into a form that appears to be random and unreadable which is called
Cipher text. Plain text is either in the form that can be understood by a person (document) or by a
computer (executable code).
195
Once it is transformed into Cipher text, neither human nor machine can properly process it
until it is decrypted. This enables the transmission of confidential information over insecure channels
without unauthorized disclosure. When data is stored on a computer it is protected by logical and
physical access controls. When this same sensitive information is sent over a network, the
information is in much more vulnerable state. Naor and Shamir introduced the new concept of Visual
Cryptography in 1994[1], requiring no computation except human Visual System to decrypt. They
proposed a basic (2, 2) Visual Cryptography scheme where a secret image is divided into 2 shares
[3], revealing the secret image through Share Stacking.
Fig. 1: Example of Visual Cryptography
In figure 1 a secret image that has to be sent is divided into shares. When these two shares are
stacked together and put into a Human Visual System the resultant image is revealed. In the visual
secret sharing model [1], a secret picture must be shared among n participants. The picture is divided
into n shares so that if m transparencies (shares) are placed together the picture is visible. When there
are fewer m transparencies it is invisible. This ensures that the secret picture is viewed as a set of
black and white pixels with each pixel being handled separately.
II. RELATED WORK
2.1 Basic (2, 2) Scheme
The (2, 2) VC scheme divides the secret image into two shares so that reconstruction of an
image from a share is impossible. Each share is printed in transparency. A share is a random noise.
Encryption is performed for each pixel. Fig.2 shows the 2 different shares for black and white pixels.
The figure shows how a pixel in a image in divided into two sub pixels depending on whether the
pixel is black or white. By doing so the width of the share increases. This is termed as Pixel
Expansion.
3. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
196
Fig. 2: A (2,2) Visual Cryptography Scheme
2.2 Pseudo Randomized Visual Cryptography Scheme
Figure 3 shows how the shares are generated by pixel reversal [7] and using pseudo random
technique [10]. Each pixel is being handled separately. The input is a secret image and the output is
the shares. Here there is no pixel expansion. The decoded image and the original secret image are of
the same sizes. But the secret image which is decoded had a darker resolution than the original
image. Preprocessing technique was used to overcome this problem [6].
Fig. 3: Pseudo Random Scheme
III. PROPOSED WORK
In this paper, the problem of pixel expansion is eliminated and also a method is proposed for
color image usage and thus the degradation of the resultant image is reduced. Chaotic random
number generation technique is used to provide much more security. Pixel index reversal is applied
where the index of each pixel is reversed and applied to a Zigzag scan pattern technique to increase
the scrambling and thus there will be increase in the security. The secret image can be revealed by a
decryption algorithm. A secret image is first split into R G B component and then the security
techniques are applied for each pixel of R G B. A secret image is taken and is split into RGB
components. Each component is handled separately. Each pixel is decomposed using Bit Plane
4. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
Decomposition technique. ATMF and De – noising is done to eliminate the presence of noise. This
result is then encrypted using Chaotic Random Number Generator and the bit planes are re – ordered
and Re – combined. Pixel Index Reversal is done to reverse the index of the pixel to improve the
Security. At this stage Zigzag Scan Pattern is applied to increase the scrambling, thus increasing the
Security. The output after the Scan is then applied to Pseudo Random Scheme as shown in Figure 4.
197
Fig. 4: Block Diagram of the Cryptographic Technique
3.1 Simulations and Results
The algorithm is implemented in MATLAB. Figure 5 shows the experiment results for the
gray image.
Fig. 5: Results for gray image as input
5. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
198
Fig. 6: Results for Color Image as input
Fig. 7: Results for Color Image after applying the Security Methods
Fig. 8: Complete Encrypted Result
3.2 Comparison of the Algorithms
Table. 1: Comparison of Algorithms
Algorithm Pixel Security Quality
Naor,
Double Increase Poor
Shamir
(k, n)
scheme
Double Increase Poor
Existing
Method
No
Expansion
Increase Increase
Proposed
Work
No
Expansion
Increase Color
Image
In the early technique of Visual Cryptography given by Naor and Shamir [2] the pixel was
expanded in width wise and so there was a problem of pixel expansion. The quality of the resultant
image was also poor. The (k, n) Visual Cryptography scheme was also suggested to improve the
concept of Visual Cryptography by Naor and Shamir. In the existing method given by Ch. Ratna
Babu and team the problem of pixel expansion was eliminated and pixel reversal method was
suggested [10]. The security also increased because of Chaotic Randomization. In the proposed
technique pixel reversal and pixel index reversal is suggested to eliminate pixel expansion. The
security increases due to Scan Pattern method and Chaotic Randomization. This technique is also
applicable for color images and so the quality increases.
6. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
199
IV. CONCLUSION AND FUTURE WORK
The security increases as the scrambling is more. The time consumption is also in terms of
Nano seconds and hence this method can be applicable in most of the fields. The problem of pixel
expansion is also eliminated. Future work can include the application of this technique for bit map
images. Some techniques can be made to improve the quality of resultant image and also to reduce
the power consumption.
V. REFERENCES
1. Adi Shamir, “How to Share a Secret”, published in ACM, Laboratory for Computer science,
Massachusetts Institute of Technology, 1979.
2. Naor M. and Shamir A, “Visual cryptography” , In Proc. Eurocrypt 94, Perugia, Italy, May
9–12, LNCS 950, Springer Verlag, 1994, 1–12.
3. “What are Visual Secret Sharing Schemes”, General concept.
4. Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, and Douglas R. Stinson, “Visual
Cryptography for general access structure”, ICALP'96, Italy, 1996.
5. Frank Stajano, “Visual Cryptography Kit”, Computer Laboratory, University of Cambridge,
1998, http://www.cl.cam.ac.uk/~fms27/vck/.
6. Zhi Zhou, Gonzalo R. Arce and Giovanni Di Crescenzo, “Half tone Visual Cryptography”,
IEEE Transaction on image processing, vol.15, no.8, 2006.
7. Stelvio Cimato, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci, “Ideal contrast
visual cryptography schemes with reversing”, Information Processing Letters, Elsevier.
8. Jim Cai, “A Short Survey On Visual Cryptography Schemes”, 2004.
9. M.Naor and A.Shamir. “Visual cryptography II: Improving the contrast via the cover base”.
Theory of Cryptography Library, (96-07), 1996.
10. Ch. Ratna Babu, M.Shridhar, Dr. B. Raveendra Babu “Information Hiding in a Gray
Scale Image using Pseudo – Randomised Visual Cryptography Algorithm for Visual
Information Security”, IEEE, 2013.
BIOGRAPHY
Akshatha M M
Completed her BE under Visvesvaraiah Technological University, Belgaum in
Electronics and Communication Engineering. She completed her M. Tech degree,
under the same university in VLSI and Embedded Systems. At present she is
working as an Asst. Professor in Sai Vidya Institute of Technology, Bengaluru.
Lokesh B
Is the Associate Professor and HOD in the department of Electronics and Electricals in SIT,
Mangalore. He is also a research scholar under Visveswaraiah Technological University, Belgaum.
Nuthan A C
Completed his BE in Electronics and Communication Engineering and M. Tech in Digital
Electronics under Visvesvaraiah Technological University. At present he is working as Assistant
Professor in the department of Electronics and Communication in GMIT, Mandya. He is also a
research scholar under Jain University, Bangalore.