Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Efficient And Improved Video Steganography using DCT and Neural NetworkIJSRD
As per the demand of modern communication it is important to establish secret communication which is obtain by seganography .Video Steganography is the technique of hiding some covert message inside a video. The addition of this information to the video is not recognizable through the human eye as modify of a pixel color is negligible. In the proposed method Discrete Cosine Transform (DCT) and neural network is used. Input image is divided into blocks and is processed to generate quantization matrix of cover and stego images by using Discrete Cosine Transform (DCT).And using neural network performance of this method can be further improved. The neural network is trained and on the basis of training and segmentation done, neural network provide efficient positions where data can be merge. The performance and efficiency is measured by PSNR and MSE value.
A New Steganographic Method for Embedded Image In Audio FileCSCJournals
Abstract Secure transaction of information has increasing attention in the recent days, such that information concealment has become very important modern used strategies, in which the information is concealment in any other information such that the second information does not change significantly and it appears the same as original. Information hiding is the technology to embed the secret information into a cover data in a way that keeps the secret information invisible. This paper presents a new steganographic method for embedding an image in an Audio file. Emphasis will be on the proposed scheme of image hiding in audio and its comparison with simple Least Significant Bit insertion method of data hiding in audio.
Using this software any 50 sec audio message can be decrypted into image file and then original message can again be recovered from image file. This project is coded in Matlab and gui is also built in Matlab.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Efficient And Improved Video Steganography using DCT and Neural NetworkIJSRD
As per the demand of modern communication it is important to establish secret communication which is obtain by seganography .Video Steganography is the technique of hiding some covert message inside a video. The addition of this information to the video is not recognizable through the human eye as modify of a pixel color is negligible. In the proposed method Discrete Cosine Transform (DCT) and neural network is used. Input image is divided into blocks and is processed to generate quantization matrix of cover and stego images by using Discrete Cosine Transform (DCT).And using neural network performance of this method can be further improved. The neural network is trained and on the basis of training and segmentation done, neural network provide efficient positions where data can be merge. The performance and efficiency is measured by PSNR and MSE value.
A New Steganographic Method for Embedded Image In Audio FileCSCJournals
Abstract Secure transaction of information has increasing attention in the recent days, such that information concealment has become very important modern used strategies, in which the information is concealment in any other information such that the second information does not change significantly and it appears the same as original. Information hiding is the technology to embed the secret information into a cover data in a way that keeps the secret information invisible. This paper presents a new steganographic method for embedding an image in an Audio file. Emphasis will be on the proposed scheme of image hiding in audio and its comparison with simple Least Significant Bit insertion method of data hiding in audio.
Using this software any 50 sec audio message can be decrypted into image file and then original message can again be recovered from image file. This project is coded in Matlab and gui is also built in Matlab.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Research Inventy : International Journal of Engineering and Scienceresearchinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Deep learning (also known as deep structured learning or hierarchical learning) is the application of artificial neural networks (ANNs) to learning tasks that contain more than one hidden layer. Deep learning is part of a broader family of machine learning methods based on learning data representations, as opposed to task-specific algorithms. Learning can be supervised, partially supervised or unsupervised.
An improved security and message capacity using AES and Huffman coding on ima...TELKOMNIKA JOURNAL
Information security is very important and has been widely implemented. Cryptography and steganography are two common methods that can be implemented to secure and conceal the information. In this research, the proposed AES algorithm for cryptography and DWT for steganography. However, in case of implementing DWT as steganography, there is a weakness which is a lower capacity. Based on DWT’s problem, proposed Huffman Coding to reduce the total of the message’s bit and increase the capacity. In the implementation, a message will be processed by using AES and compressed by using Huffman Coding then conceal in a cover using DWT. After doing several experiments using a 128x128 pixel message image and a 512x512 pixel of the cover image, achieved the average of MSE is 1.5676 and the average of PSNR result is above 40 db which is 46.1878.
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
Owing to advances in communication technology, a bulk of visual digital data is being stored and transmitted over the internet now-a-days. Particularly millions and millions of images transfer through the network per day as per the statistics and a result, the security of image data is an important requirement. Image encryption algorithm is used to provide this security. In this paper, an image encryption algorithm based on confusion diffusion architecture that uses dynamic key space is proposed. An internal key generator is used to generate the initial seeds for the overall encryption scheme is proposed. With these initial seeds logistic map generates pseudo random numbers then these numbers are converted into permutation order for permutation. The diffusion bits are generated in parallel using the logistic map and manipulated with pixels confused. The image pixels are iteratively confused and diffused using permutation order and diffusion bits respectively to produce cipher image in minimum number of rounds. This paper proposes a new kind of initial seed generation that utilizes the combo of logistic and tent maps. Even all external seeds are same. The internal seeds will be totally different. This ensures the key sensitivity. The simulation results and analysis confirm that the satisfactory level of security is achieved in three rounds and overall encryption time is saved.
A novel secure combination technique of steganography and cryptographyZac Darcy
A new technique proposed with the combination of cryptography and steganography enhanced with new
secure feature for generating a new security system. Cryptography and Steganography are two popular
ways for secure data transmission in which the former distorts a message so it cannot be understood and
another hides a message so it cannot be seen. In cryptography, this system is used advanced encryption
standard (AES) algorithm to encrypt secret message and then these are separated keys; one of which is
used to hide in cover image. In steganography, a part of encrypted message as a key is used to hide in
discrete cosine transform (DCT) of an image which is highly secured. This kind of system is to be
introduced in applications such as transferring secret data that can be authentication of various fields.
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherSagun Man Singh Shrestha
This work is the software implementation of the concept of neural cryptography, which is a communication of two tree parity machines for agreement on a common key over a public channel. This key is utilized to encrypt a sensitive message to be transmitted over an insecure channel using Rijndael cipher. This is a new potential source for public key cryptography schemes which are not based on number theoretic functions, and have small time and memory complexities. This paper will give a brief introduction to artificial neural networks, cryptography and its types, which will help explain why the two communicating terminals converge to a common key in neural cryptography and will also cover the Rijndael (AES) cipher. This paper is intended to show that such neural key exchange protocol and AES encryption can be practically implemented in a high-level programming language viz. C++, which could be further extended in higher-level applications. Both CLI and GUI implementations of the software created using Visual C++ (.NET framework) are presented.
Image and text Encryption using RSA algorithm in java PiyushPatil73
About RSA
RSA is an encryption algorithm.
Developed in: 1977.
Developed by: Ron Rivest, Adi Shamir, and Leonard Adleman.
The RSA algorithm is the most commonly used public key encryption algorithm.
Two keys are used: Public Key and Private Key.
Public Key: For encryption.
Private Key: For decryption, also known as a secret key.
Public Key: Shared with the public that wants to send us data.
Private Key: Kept secret so that when someone sends us data encrypted by our
Public Key, we can decrypt the data using the Private Key.
In this project we develop an application for translation of information in any language to Cipher/Encrypted , which otherwise is done by using different software in the present scenario. Our attempt is to overcome the various shortcomings in different software available in the market and develop the best (Encryptor/Decryptor) with most useful algorithms. We explore and implement Tiny Algorith, Neural Algorithm, A hybrid blend Neural and Tiny algorithm, Rijandel Agorithm, Stegnography (for Image and Audio files), Video Encryption and Decryption, and a Chat server for secret Communication oiver the software.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Research Inventy : International Journal of Engineering and Scienceresearchinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Deep learning (also known as deep structured learning or hierarchical learning) is the application of artificial neural networks (ANNs) to learning tasks that contain more than one hidden layer. Deep learning is part of a broader family of machine learning methods based on learning data representations, as opposed to task-specific algorithms. Learning can be supervised, partially supervised or unsupervised.
An improved security and message capacity using AES and Huffman coding on ima...TELKOMNIKA JOURNAL
Information security is very important and has been widely implemented. Cryptography and steganography are two common methods that can be implemented to secure and conceal the information. In this research, the proposed AES algorithm for cryptography and DWT for steganography. However, in case of implementing DWT as steganography, there is a weakness which is a lower capacity. Based on DWT’s problem, proposed Huffman Coding to reduce the total of the message’s bit and increase the capacity. In the implementation, a message will be processed by using AES and compressed by using Huffman Coding then conceal in a cover using DWT. After doing several experiments using a 128x128 pixel message image and a 512x512 pixel of the cover image, achieved the average of MSE is 1.5676 and the average of PSNR result is above 40 db which is 46.1878.
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
Owing to advances in communication technology, a bulk of visual digital data is being stored and transmitted over the internet now-a-days. Particularly millions and millions of images transfer through the network per day as per the statistics and a result, the security of image data is an important requirement. Image encryption algorithm is used to provide this security. In this paper, an image encryption algorithm based on confusion diffusion architecture that uses dynamic key space is proposed. An internal key generator is used to generate the initial seeds for the overall encryption scheme is proposed. With these initial seeds logistic map generates pseudo random numbers then these numbers are converted into permutation order for permutation. The diffusion bits are generated in parallel using the logistic map and manipulated with pixels confused. The image pixels are iteratively confused and diffused using permutation order and diffusion bits respectively to produce cipher image in minimum number of rounds. This paper proposes a new kind of initial seed generation that utilizes the combo of logistic and tent maps. Even all external seeds are same. The internal seeds will be totally different. This ensures the key sensitivity. The simulation results and analysis confirm that the satisfactory level of security is achieved in three rounds and overall encryption time is saved.
A novel secure combination technique of steganography and cryptographyZac Darcy
A new technique proposed with the combination of cryptography and steganography enhanced with new
secure feature for generating a new security system. Cryptography and Steganography are two popular
ways for secure data transmission in which the former distorts a message so it cannot be understood and
another hides a message so it cannot be seen. In cryptography, this system is used advanced encryption
standard (AES) algorithm to encrypt secret message and then these are separated keys; one of which is
used to hide in cover image. In steganography, a part of encrypted message as a key is used to hide in
discrete cosine transform (DCT) of an image which is highly secured. This kind of system is to be
introduced in applications such as transferring secret data that can be authentication of various fields.
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherSagun Man Singh Shrestha
This work is the software implementation of the concept of neural cryptography, which is a communication of two tree parity machines for agreement on a common key over a public channel. This key is utilized to encrypt a sensitive message to be transmitted over an insecure channel using Rijndael cipher. This is a new potential source for public key cryptography schemes which are not based on number theoretic functions, and have small time and memory complexities. This paper will give a brief introduction to artificial neural networks, cryptography and its types, which will help explain why the two communicating terminals converge to a common key in neural cryptography and will also cover the Rijndael (AES) cipher. This paper is intended to show that such neural key exchange protocol and AES encryption can be practically implemented in a high-level programming language viz. C++, which could be further extended in higher-level applications. Both CLI and GUI implementations of the software created using Visual C++ (.NET framework) are presented.
Image and text Encryption using RSA algorithm in java PiyushPatil73
About RSA
RSA is an encryption algorithm.
Developed in: 1977.
Developed by: Ron Rivest, Adi Shamir, and Leonard Adleman.
The RSA algorithm is the most commonly used public key encryption algorithm.
Two keys are used: Public Key and Private Key.
Public Key: For encryption.
Private Key: For decryption, also known as a secret key.
Public Key: Shared with the public that wants to send us data.
Private Key: Kept secret so that when someone sends us data encrypted by our
Public Key, we can decrypt the data using the Private Key.
In this project we develop an application for translation of information in any language to Cipher/Encrypted , which otherwise is done by using different software in the present scenario. Our attempt is to overcome the various shortcomings in different software available in the market and develop the best (Encryptor/Decryptor) with most useful algorithms. We explore and implement Tiny Algorith, Neural Algorithm, A hybrid blend Neural and Tiny algorithm, Rijandel Agorithm, Stegnography (for Image and Audio files), Video Encryption and Decryption, and a Chat server for secret Communication oiver the software.
In this project we develop an application for translation of information in any language to Cipher/Encrypted , which otherwise is done by using different software in the present scenario. Our attempt is to overcome the various shortcomings in different software available in the market and develop the best (Encryptor/Decryptor) with most useful algorithms. We explore and implement Tiny Algorith, Neural Algorithm, A hybrid blend Neural and Tiny algorithm, Rijandel Agorithm, Stegnography (for Image and Audio files), Video Encryption and Decryption, and a Chat server for secret Communication oiver the software.
Steganography is the technique of hiding any secret information like password, data andimage behind any cover file. This paper proposes a method which is an audio-video crypto steganography system which is the combination of audio steganography and video steganography using advanced chaotic algorithm as the secure encryption method. The aim is to hide secret information behind image and audio of video file. Since video is the application of many audio and video frames. We can select a particular frame for image hiding and audio for hiding our secret data.4LSB substitution can be used for image steganography and LSB substitution algorithm with location selection for audio steganography. Advanced chaotic algorithm can be used for encryption and decryption of data and images. Suitable parameter of security and authentication such as PSNR value, histograms are obtained at both the receiver side and transmitter sides which are found to be identical at both ends. Reversible data hiding methods for both video and audio are also being mentioned. Hence the security of the data and image can be enhanced. This method can be used in fields such as medical and defence which requires real time processing.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
2. OBJECTIVE
To develop a two factor authentication mechanism based on visual
Cryptographic scheme and video object Steganography via biometrics
3. INTRODUCTION
Authentication is the act of confirming identification of someone, some application…
Normally authentication includes the use of username, password, digital cards, signatures,
biometric attributes.
Where biometric attributes are unique to every individual and there by used in variety of
application where there need to claim authenticity of individual
In this system authentication is done using biometric attribute ie.,fingerprint
4. With the rapid transmission of biometric data over internet ,the security of the data is in major concern
To avoid these security threats and sharing issues the secret information like text ,audio ,video, image
used for authentications are applied using the techniques visual cryptography and steganography
In this proposed system visual cryptography and steganography are implemented individually for
different attributes
Visual cryptography is technique to generate the shares of a secret image and the secret can be achieved
by combining both shares
Steganogtaphy is used to hide the secret image within a cover image
5. SCOPE OF THE SYSTEM
In todays century security and authentication are the major concern in all type of application
like online exams,interview,banking..etc
Where communicating entities are located at different locations
To ensure the security of the systems and digital data shared , there should be a dual
authentication process
The proposed system provides the facility with both visual cryptography and steganography
The programing is developed using MATLAB software and presented in graphical user
interphase
8. VERIFIABLE VISUAL CRYPTOGRAPHY
• Visual cryptography is a cryptographic technique which allows visual information to be encrypted in
such a way that the decryption can be performed by the human visual system, without the aid of
computers.
• Visual cryptography scheme eliminates complex computation problem in decryption process, and the
secret images can be restored by stacking operation.
• This property makes visual cryptography especially useful for the low computation load requirement
9. • In this system we are using (2,2) VCS scheme which generate two shares of image. For input binary
image which is in 1 and 0 format.
• In the 2-out-of-2 scheme, every secret pixel of the image is converted into two shares and recovered by
simply stacking two shares together.
• This is equivalent to using the OR operation between the shares.
• First we take a monochrome image for the source. Pixels in the image are either white or black
• Next sub-divide each pixel into four smaller subpixels.
• shade these four subpixels to represent the source image, then subjectively divide them between the two
cypher images are to create.
10. • Distribute the shading such that, if you have just one of the cypher images, it is impossible to determine
what is on the other cypher image, and thus, impossible to decrypt the image.
• If the original pixel in the image is black, fill in all four sub pixels then distribute them.
• The pattern selection is random
• It does not matter which pair of pixels goes on which layer, when they are combined, all four pixels will
be black.
11. • Conversely, if the source image pixel is white, shade in just two pixels, make sure that
the same pixels are shaded on both layers.
• In this way, when the two cypher images are combined, only two pixels are shaded.
• The result of this process is two images which when combined result in an image with half the
contrast of the original.
• The black of the source remains black in the combined cypher, but the white in the source is changed
to a randomly mottled half-tone gray
• this is still sufficiently high enough contrast for the secret message to be easily read
.
12. BLOWFISH ENCRYPTION
• Image encryption is necessary for future multimedia Internet applications.
• By encrypting these images, a degree of security can be achieved.
• Blowfish is a symmetric block cipher that can be effectively used for encryption and safeguarding of
data
• It takes a variable-length key, from 32 bits to 448 bits, making it ideal for securing data.
• Blowfish Algorithm is a Feistel Network, iterating a simple encryption function 16 times
• Blowfish contains 16 rounds. Each round consists of XOR operation and a function. Each round
consists of key expansion and data encryption.
13. Algorithm: Blowfish Encryption
Divide x into two 32-bit halves: xL, xR
For i = 1to 16:
xL = XL XOR Pi
xR = F(XL) XOR xR
Swap XL and xR
Swap XL and xR (Undo the last swap.)
xR = xR XOR P17
xL = xL XOR P18
Recombine xL and xR
14. Blowfish symmetric block cipher algorithm encrypts block data of 64-bits at a time.it will follows the
feistel network and this algorithm is divided into two parts.
• 1. Key-expansion
• 2. Data Encryption
Key-expansion:
• It will converts a key of at most 448 bits into several subkey arrays totaling 4168 bytes. Blowfish uses
large number of subkeys. These keys are generate earlier to any data encryption or decryption.
• The p-array consists of 18, 32-bit subkeys: P1,P2,………….,P1
Data Encryption:
• It is having a function to iterate 16 times of network. Each round consists of key-dependent permutation
and a key and data-dependent substitution.
• All operations are XORs and additions on 32-bit words. The only additional operations are four indexed
array data lookup tables for each round.
15. STEGANOGRAPHIC VIDEO OBJECT AUTHENTICATION
The proposed scheme involves
• Extraction of the host video object from a video and detection of the QSWTs to embed the encrypted signal,
• Embedding of the encrypted signal to the host video object using steganography
• Compression of the final content
Video to frame conversion
• The video is taken from the user as input.
• Usually, the video Consists of multiple frames. The frames are extracted by explicit values specified by the
user.
• After the conversion of video to frames, the user has to input their biometric image i.e. retinal pattern or
finger print.
16. DATA HIDING
• The goal of this system is send sensitive information that are invisible to human eyes but also robust under
different attacks.
• Qualified Significant Wavelet Trees provide such robustness in the steganography.
• The hiding module hide the encrypted the information into the largest-value QSWTs of energy-efficient
pairs of sub bands
• The image obtained is stego-object image.
• It is compressed and transmitted and receiver after receiving decompress and decryption is done to get
original information and it is accessed as a secret code.
17. • The Discrete Wavelet Transform is used to hide information like text, audio, video, images etc., into
cover image.
• The steganography technique is implemented in the discrete wavelet transform.
• In this technique the cover image is divided into four equal parts with respect to the resolution of the
image
• The four parts is represented as low, middle and high frequencies that is represented as LL, HL, LH
and HH.
18. • By applying the DWT once to an area of arbitrary shape, four parts of low, middle, and high frequencies, i.e.,
LL1, HL1, LH1, HH1, are produced.
• Band LL1 (HH1) includes low (high) frequency components both in horizontal and vertical direction, while
the HL1 (LH1), includes high (low) frequencies in horizontal direction and low (high) frequencies in vertical
direction.
• Subband LL1 can be further decomposed in a similar way into four different subbands, denoted as LL2, HL2,
LH2, HH2 respectively.
• The coefficient at the highest level is called the parent and all coefficients corresponding to the same spatial
location at the lower levels of similar orientation are called children..
19. • Select the pair of subbands that contains the highest energy content (among the three pairs),
• Pi : EPi = max(EP1 ;EP2 ;EP3 )The generalized formula
• x2(i,j)={HL2,LH2,HH2},x1(p,q)={HL1,LH1,HH1}and M,N is the size of the subbands at level two
• After selecting the pair of subbands containing the highest energy content, QSWTs are found for this pair
• If a wavelet coefficient xn(i,j) ∈ D at the is a parent of xn-1(p,q), where D is a subband
• labeled HLn, HLn, HHn, satisfy |xn(i,j)|>T1, |xn- 1(p,q)|>T2 for given thresholds T1 and T2, then xn(i,j)
and its children are called a QSWT
• The encrypted biometric signal is embedded by modifying the values of the detected QSWTs
• After the encrypted biometric image is hidden into the segmented the input image Inverse Discrete
wavelet transform is applied to combine the segmented image and produce a stego -object.
20. MINIATUIA BASED FINGERPRINT MATCHING
• Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a
match between two human fingerprints
• Fingerprints are one of many forms of biometrics used to identify individuals and verify
their identity
• A fingerprint is the pattern of ridges and valleys on the finger tip.
• A fingerprint is thus defined by the uniqueness of the local ridge characteristics and their
relationships.
• Minutiae points are these local ridge characteristics that occur either at a ridge ending or a ridge
bifurcation.
• A ridge ending is defined as the point where the ridge ends abruptly and the ridge bifurcation is the
point where the ridge splits into two or more branches.
23. The PSNR is measured to ensure whether the encrypted image is intelligible to unauthorized person or not.
When comparing, PSNR is an approximation to human perception of reconstruction quality. Although a
higher PSNR generally indicates that the reconstruction is of higher quality.
Thethreshold value for PSNR is 61.971 dB
Whenever we are hiding image behind cover image though PSNR ratio increased so quality is not
degrading as PSNR value increasing the quality of image is also increasing.
That is there is not no effect on original image which is hidden twice in a cover image. PSNR value
increasing image quality also increase.
PSNR
24. SSIM
• The structural similarity index is a method for measuring the similarity between two images.
• Measuring of image quality based on an initial uncompressed or distortion-free image as reference
• SSIM is designed to improve on traditional methods like peak signal-to-noise ratio (PSNR) and mean squared
error (MSE), which have proven to be inconsistent with human eye perception.
MSE
• Mean squared error (MSE) or mean squared deviation (MSD) of an estimator measures the average of the
squares of the errors or deviations
• Ie, the difference between the estimator and what is estimated.
• MSE is a risk function, corresponding to the expected value of the squared error loss or quadratic loss.
• The difference occurs because of randomness
• it is always non-negative, and values closer to zero are better.
25. FUTURESCOPE
• This proposed system can be further enhanced and made more secure by capturing the retinal image
of a person and performing the above mentioned encryption procedure to encrypt them and send over
a network.
• Also by combining more than one biometric attribute the security can be enhanced
26. CONCLUSION
• In our daily lives biometrics signal plays a vital role and the development and integration of biometric
authentication techniques used into practical applications increases nowadays.
• In this system , propose a biometrics-based authentication scheme using visual cryptography and
steganography Security .
• If the steganography scheme is alone applied it does not ensure secrecy when it was combined with a
blowfish encryption system and visual cryptographic technique it provides additional security.
• In this method the visual cryptographic share generation at the user registration phase and embedding
biometric signal to the video object at the login phase provide a secure authentication scheme .
27. REFERENCES
1. A. Shejul and U. L. Kulkarni, “A secure skin tone based steganography using wavelet transform,”
International Journal of Computer Theory and Engineering, vol. 3(1), pp. 16–22, 2011.
2. Bailey, K. “An evaluation of image based steganography methods”, Journal of Multimedia Tools and
Applications, Vol. 30, No. 1, pp. 55-88,IEEE,2006.
3. BANOCI V, BUGAR G, LEVICKY Dusan, 2011, A Novel Method of Image Steganography in DWT
Domain‟ IEEE 2011.
4. Behera, S.K. “Colour Guided Colour Image Steganography”, Universal Journal of Computer Science and
Engineering Technology, Vol. 1, No. 1, pp. 16-23, IEEE, 2010.
5. C.C. Wu, L.H. Chen, “A Study On Visual Cryptography”, Master Thesis, Institute of Computer and
Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998.
6. C.-T. Li and M.-S. Hwang, “An efficient biometrics based remote user authentication scheme using smart
cards,” Journal of Network and Computer Applications, vol. 33, no. 1, pp. 1–5, Jan. 2010.
7. Chen, C-H. Ling, and M.-S. Hwang,(2014) “Weaknesses of the yoonkim-yoo remote user authentication
scheme using smart cards,” in Proceedings of the 2014 IEEE Workshop on Electronics, Computer and
Applications. IEEE, pp. 771–774.
8. D. He and D. Wang, “Robust biometrics-based authentication schemefor multi-server environment,” IEEE
Systems Journal, pp. 1–8, 2014.
28. 9. D. He, Q. Sun, and Q. Tian, “A secure and robust object-based video authentication system,” EURASIP
Journal of Applied Signal Processing, vol. 2004, pp. 2185–2200, 2004.
10. D. Kundur, Y. Zhao, and P. Campisi, “A steganographic framework for dual authentication and compression
of high resolution imagery,” in Proceedings of the IEEE International Symposium on Circuits and Systems, vol. 2.
IEEE, 2004, pp. 1–4.
11. Doulamis .N.D, A. D. Doulamis, K. S. Ntalianis, and S. D. Kollias,(2003) “An efficient fully-unsupervised video
object segmentation scheme using an adaptive neural network classifier architecture,” IEEE Transactions on
Neural Networks, vol. 14(3), pp. 616–630.
12. Fard .M, M. R. Akbarzadeh-T, and F. Varasteh-A,(2006) “A new genetic algorithm approach for secure jpeg
steganography,” in Proc. of IEEE Int’l Conference on Engineering of Intelligent Systems.
13. Gopi Krishnan S and Loganathan D,”Color Image Cryptography Scheme Based on Visual Cryptography
“,Proceedings of 2011 International Conference on Signal Processing, Communication, Computing and Networking
Technologies (ICSCCN 2011)
14. Gutub, A. “Pixel Indicator High Capacity Technique for RGB Image Based Steganography”, WoSPA 2008 –
5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, U.A.E., pp. 154-
159,IEEE,2008.
15. Gutub, A. “Pixel Indicator Technique for RGB Image Steganography”, Journal of Emerging Technologies in
Web Intelligence, Vol. 2, No.1, pp. 193-198,IEEE,2010.
16. Han Yanyan, Cheng Xiaoni, Yao Dong, He Wencai,” VVCS: Verifiable Visual Cryptography Scheme”, 2011
Seventh International Conference on Computational Intelligence and Security
29. 17. Kashyap N, Sinha G.R, 2012,‟Image Watermarking using 3-level Discrete WaveletTransform (DWT)‟
IJMECS.
18. Kaur B, Kaur A, Singh J, 2011,‟Steganographic approach for hiding image in dct domain‟,IJAET, Vol 1, Issue 3.
19. Kelash H.M, Abdel wahab O.F, Elshakankiry ,Etsayed H.S, 2013, „Hiding Data in videoSequences Using
Steganography Algorithms‟ IEEE.2013
20. Klimis Ntalianis and Nicolas Tsapatsoulis (2015), “Remote Authentication Via Biometrics: A Robust Video-
Object Steganographic Mechanism Over Wireless Networks” in IEEE Transactions on Emerging topics on
computing.
21. Kumar S, Latha M, 2014, “DCT Based Secret Image Hiding in video sequence” IJERA,2014
22. Li .S, X. Zheng, X. Mou, and Y. Cai, (2002,) “Chaotic encryption scheme for real-time digital video,” in
Proceedings of Real-Time Imaging VI, vol. 4666. SPIE, pp. 149–160.
23. Majumder J, Mangal S, 2012, „An Overview of image steganography using LSB Technique‟,IJCA.
24. Marwaha, P. “Visual cryptographic steganography in images”, Second International conference on Computing,
Communication and Networking Technologies, pp. 34-39, IEEE, 2010.
25. Moon S.K, Raut R.d, 2013,‟Analysis of Secured Video Steganography Using Computer Forensics Technique for
Enhance Data Security‟, IEEE.