Image forgery detection and its accuracy are addressed in the proposed work. The image authentication process aims at finding the originality of an image. Due to the advent of many image editing software image tampering has become common. The Enhanced hashing approach is suggested for image authentication. The concept of Hashing has been used for searching images from large databases. It can also be applied to image authentication as it produces different results with respect to the change in image. But the hashing methods used for similarity searches cannot be used for image authentication since they are no sensitive for small changes. Moreover, we need a system that detects only perceptual changes. A new hashing method, namely, enhanced robust hashing is proposed for image authentication, which uses global and local properties of an image. This method is developed for detecting image forgery, including removal, insertion, and replacement of objects, and abnormal color modification, and for locating the forged area. The local models include position and texture information of object regions in the image. The hash mechanism uses secret keys for encryption and decryption. IP tracing is done to track the suspicious nodes.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Performance Evaluation of Password Authentication using Associative Neural Me...ijait
They are many ways of providing security to user resources. Password authentication is a very important system security procedure to secure user resources. In order to solve the problems with traditional password authentication several methods have been introduced to provide password authentication using Associative Memories like Back Propagation Neural Network (BPNN),Hopfield Neural
Network(HPNN),Bidirectional Associative Memories(BAM),Brain-State-in-a Box(BSB). Later Password authentication has been provided using Context-Sensitive Associative Memory Method (CSAM). Here in this paper we proposed performance analysis of password authentication schemes using Associative memories and CSAM using graphical Images. We observe that in comparison to existing layered and associative neural network techniques for graphical images as password, the CSAM method provides better accuracy and quicker response time to registration and password changes.
Pso based optimized security scheme for image authentication and tamper proofingcsandit
The hash function offers an authentication and an integrity to digital images. In this paper an
innovative optimized security scheme based on Particle swarm optimization (PSO) for image
authentication and tamper proofing is proposed. This scheme provide solutions to the issues
such as robustness, security and tamper detection with precise localization. The features are
extracted in Daubechies4 wavelet transform domain with help of PSO to generate the image
hash. This scheme is moderately robust against attacks and to detect and locate the tampered
areas in an image. The experimental results are presented to exhibit the effectiveness of the
proposed scheme.
Significant Data Hiding through Discrete Wavelet Transformation ApproachEswar Publications
The methods of communication of invisible information have become need in the today’s digital era. The network connectivity and high speed devices made easy passing massive data instantly. As boom of the huge data transmission has taken place due to easy use of the technology, the protection of the data has become prime issue. Steganography hides messages inside some other digital media. Cryptography, on the other hand obscures the content of the message. We proposed a novel integration of an incorporating text and image steganography to find a solution for improve security and protect data. The proposed methods shows a high level of efficiency and robustness by combining text and image which involves the scheme of discrete wavelet transformation combining text and image by secretly embeds encrypted secrete message text data (cipher text) or text image in the content of a digital image. A comparative study of the different techniques has been illustrated by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR).
Adaptive block-based pixel value differencing steganographyOsama Hosam
Steganography is the science of hiding secure data in digital carriers such as images and videos. Pixel value differencing
(PVD) steganography algorithms embed data into images depending on pixel neighborhood differences. We have pro-
posed PVD scheme for embedding secure data into digital images. The image is divided into non-overlapping 33 blocks.
The block’s median pixel is used as a reference for calculating pixel differences. The distance between the minimum and
maximum differences are fine tuned for spreading the secure data on a wide range of image regions with high-intensity
fluctuations. The embedding procedure embeds secure data into the content regions with edges and intensity transitions.
Texture images provide higher embedding size compared with regular images. The results showed that the proposed
algorithm is successfully able to avoid smooth regions in the embedding process. In addition, the proposed algorithm
shows better embedding quality compared with the state of the art PVD approaches especially with low-embedding rates.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Performance Evaluation of Password Authentication using Associative Neural Me...ijait
They are many ways of providing security to user resources. Password authentication is a very important system security procedure to secure user resources. In order to solve the problems with traditional password authentication several methods have been introduced to provide password authentication using Associative Memories like Back Propagation Neural Network (BPNN),Hopfield Neural
Network(HPNN),Bidirectional Associative Memories(BAM),Brain-State-in-a Box(BSB). Later Password authentication has been provided using Context-Sensitive Associative Memory Method (CSAM). Here in this paper we proposed performance analysis of password authentication schemes using Associative memories and CSAM using graphical Images. We observe that in comparison to existing layered and associative neural network techniques for graphical images as password, the CSAM method provides better accuracy and quicker response time to registration and password changes.
Pso based optimized security scheme for image authentication and tamper proofingcsandit
The hash function offers an authentication and an integrity to digital images. In this paper an
innovative optimized security scheme based on Particle swarm optimization (PSO) for image
authentication and tamper proofing is proposed. This scheme provide solutions to the issues
such as robustness, security and tamper detection with precise localization. The features are
extracted in Daubechies4 wavelet transform domain with help of PSO to generate the image
hash. This scheme is moderately robust against attacks and to detect and locate the tampered
areas in an image. The experimental results are presented to exhibit the effectiveness of the
proposed scheme.
Significant Data Hiding through Discrete Wavelet Transformation ApproachEswar Publications
The methods of communication of invisible information have become need in the today’s digital era. The network connectivity and high speed devices made easy passing massive data instantly. As boom of the huge data transmission has taken place due to easy use of the technology, the protection of the data has become prime issue. Steganography hides messages inside some other digital media. Cryptography, on the other hand obscures the content of the message. We proposed a novel integration of an incorporating text and image steganography to find a solution for improve security and protect data. The proposed methods shows a high level of efficiency and robustness by combining text and image which involves the scheme of discrete wavelet transformation combining text and image by secretly embeds encrypted secrete message text data (cipher text) or text image in the content of a digital image. A comparative study of the different techniques has been illustrated by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR).
Adaptive block-based pixel value differencing steganographyOsama Hosam
Steganography is the science of hiding secure data in digital carriers such as images and videos. Pixel value differencing
(PVD) steganography algorithms embed data into images depending on pixel neighborhood differences. We have pro-
posed PVD scheme for embedding secure data into digital images. The image is divided into non-overlapping 33 blocks.
The block’s median pixel is used as a reference for calculating pixel differences. The distance between the minimum and
maximum differences are fine tuned for spreading the secure data on a wide range of image regions with high-intensity
fluctuations. The embedding procedure embeds secure data into the content regions with edges and intensity transitions.
Texture images provide higher embedding size compared with regular images. The results showed that the proposed
algorithm is successfully able to avoid smooth regions in the embedding process. In addition, the proposed algorithm
shows better embedding quality compared with the state of the art PVD approaches especially with low-embedding rates.
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
Steganography is the art and science of invisible communication, which hides the existence of the communicated message into media such as text, audio, image and video without any suspicion. Steganography is different from cryptography and watermarking in its objectives which includes undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data. Image Steganography uses digital image as its cover media. This paper analyzes and discusses various techniques available today for image steganography along with their strengths and weaknesses.
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNELijcsit
The wide use of digital images and videos in various applications warrant serious attention to the security and privacy issues today. Several encryption techniques have been proposed in recent years as feasible solutions to the protection of digital images and videos. In many applications, such as pay-per-view videos,pay-TV and video on demand, one of the required features is that the quality of the video data be degraded only partially by some encryption technique and the encrypted data must still be partially perceptible. This feature referred to as ‘Perceptual encryption’ is the encryption algorithm that degrades the quality of media content according to security or quality requirements. In this work we propose a simple yet efficient technique for realizing perceptual encryption using geometric objects as kernels based on which the pixels are permuted. Confusion aspect that is required is realized by inserting the kernel on the image and thereby performing transposition of pixels based on the kernel formed out of geometric objects. The various parameters of geometric objects, number of objects and the position of the objects/kernel in the image are used as the key for encryption and later on for decryption. Further a choice of quality of the image required i.e., different levels of degradation is provided by adjusting the above parameters of the objects/kernel.From the results obtained it is evident that the proposed method which is more apt for perceptual encryption can also be used effectively for full image encryption with acceptable level of security.
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR.
Strong Image Alignment for Meddling Recognision PurposeIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Passive Image Forensic Method to Detect Resampling Forgery in Digital Imagesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Applications of spatial features in cbir a surveycsandit
With advances in the computer technology and the World Wide Web there has been an
explosion in the amount and complexity of multimedia data that are generated, stored,
transmitted, analyzed, and accessed. In order to extract useful information from this huge
amount of data, many content based image retrieval (CBIR) systems have been developed in the
last decade. A typical CBIR system captures image features that represent image properties
such as color, texture, or shape of objects in the query image and try to retrieve images from the
database with similar features. Retrieval efficiency and accuracy are the important issues in
designing Content Based Image Retrieval System. The Shape and Spatial features are quiet easy
and simple to derive and effective. Researchers are moving towards finding spatial features and
the scope of implementing these features in to the image retrieval framework for reducing the
semantic gap. This Survey paper focuses on the detailed review of different methods and their
evaluation techniques used in the recent works based on spatial features in CBIR systems.
Finally, several recommendations for future research directions have been suggested based on
the recent technologies.
APPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEYcscpconf
With advances in the computer technology and the World Wide Web there has been an explosion in the amount and complexity of multimedia data that are generated, stored,transmitted, analyzed, and accessed. In order to extract useful information from this hugeamount of data, many content based image retrieval (CBIR) systems have been developed in the
last decade. A typical CBIR system captures image features that represent image properties such as color, texture, or shape of objects in the query image and try to retrieve images from the
database with similar features. Retrieval efficiency and accuracy are the important issues in designing Content Based Image Retrieval System. The Shape and Spatial features are quiet easy and simple to derive and effective. Researchers are moving towards finding spatial features and the scope of implementing these features in to the image retrieval framework for reducing the semantic gap. This Survey paper focuses on the detailed review of different methods and their
evaluation techniques used in the recent works based on spatial features in CBIR systems. Finally, several recommendations for future research directions have been suggested based on
the recent technologies.
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
Steganography is the art and science of invisible communication, which hides the existence of the communicated message into media such as text, audio, image and video without any suspicion. Steganography is different from cryptography and watermarking in its objectives which includes undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data. Image Steganography uses digital image as its cover media. This paper analyzes and discusses various techniques available today for image steganography along with their strengths and weaknesses.
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNELijcsit
The wide use of digital images and videos in various applications warrant serious attention to the security and privacy issues today. Several encryption techniques have been proposed in recent years as feasible solutions to the protection of digital images and videos. In many applications, such as pay-per-view videos,pay-TV and video on demand, one of the required features is that the quality of the video data be degraded only partially by some encryption technique and the encrypted data must still be partially perceptible. This feature referred to as ‘Perceptual encryption’ is the encryption algorithm that degrades the quality of media content according to security or quality requirements. In this work we propose a simple yet efficient technique for realizing perceptual encryption using geometric objects as kernels based on which the pixels are permuted. Confusion aspect that is required is realized by inserting the kernel on the image and thereby performing transposition of pixels based on the kernel formed out of geometric objects. The various parameters of geometric objects, number of objects and the position of the objects/kernel in the image are used as the key for encryption and later on for decryption. Further a choice of quality of the image required i.e., different levels of degradation is provided by adjusting the above parameters of the objects/kernel.From the results obtained it is evident that the proposed method which is more apt for perceptual encryption can also be used effectively for full image encryption with acceptable level of security.
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR.
Strong Image Alignment for Meddling Recognision PurposeIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Passive Image Forensic Method to Detect Resampling Forgery in Digital Imagesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Applications of spatial features in cbir a surveycsandit
With advances in the computer technology and the World Wide Web there has been an
explosion in the amount and complexity of multimedia data that are generated, stored,
transmitted, analyzed, and accessed. In order to extract useful information from this huge
amount of data, many content based image retrieval (CBIR) systems have been developed in the
last decade. A typical CBIR system captures image features that represent image properties
such as color, texture, or shape of objects in the query image and try to retrieve images from the
database with similar features. Retrieval efficiency and accuracy are the important issues in
designing Content Based Image Retrieval System. The Shape and Spatial features are quiet easy
and simple to derive and effective. Researchers are moving towards finding spatial features and
the scope of implementing these features in to the image retrieval framework for reducing the
semantic gap. This Survey paper focuses on the detailed review of different methods and their
evaluation techniques used in the recent works based on spatial features in CBIR systems.
Finally, several recommendations for future research directions have been suggested based on
the recent technologies.
APPLICATIONS OF SPATIAL FEATURES IN CBIR : A SURVEYcscpconf
With advances in the computer technology and the World Wide Web there has been an explosion in the amount and complexity of multimedia data that are generated, stored,transmitted, analyzed, and accessed. In order to extract useful information from this hugeamount of data, many content based image retrieval (CBIR) systems have been developed in the
last decade. A typical CBIR system captures image features that represent image properties such as color, texture, or shape of objects in the query image and try to retrieve images from the
database with similar features. Retrieval efficiency and accuracy are the important issues in designing Content Based Image Retrieval System. The Shape and Spatial features are quiet easy and simple to derive and effective. Researchers are moving towards finding spatial features and the scope of implementing these features in to the image retrieval framework for reducing the semantic gap. This Survey paper focuses on the detailed review of different methods and their
evaluation techniques used in the recent works based on spatial features in CBIR systems. Finally, several recommendations for future research directions have been suggested based on
the recent technologies.
A deep locality-sensitive hashing approach for achieving optimal image retri...IJECEIAES
Efficient methods that enable high and rapid image retrieval are continuously needed, especially with the large mass of images that are generated from different sectors and domains like business, communication media, and entertainment. Recently, deep neural networks are extensively proved higher-performing models compared to other traditional models. Besides, combining hashing methods with a deep learning architecture improves the image retrieval time and accuracy. In this paper, we propose a novel image retrieval method that employs locality-sensitive hashing with convolutional neural networks (CNN) to extract different types of features from different model layers. The aim of this hybrid framework is focusing on both the high-level information that provides semantic content and the low-level information that provides visual content of the images. Hash tables are constructed from the extracted features and trained to achieve fast image retrieval. To verify the effectiveness of the proposed framework, a variety of experiments and computational performance analysis are carried out on the CIFRA-10 and NUS-WIDE datasets. The experimental results show that the proposed method surpasses most existing hash-based image retrieval methods.
Similar to Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion (20)
Beaglebone Black Webcam Server For SecurityIJTET Journal
Web server security using BeagleBone Black is based on ARM Cortex-A8 processor and Linux operating system
is designed and implemented. In this project the server side consists of BeagleBone Black with angstrom OS and interfaced
with webcam. The client can access the web server by proper authentication. The web server displays the web page forms
like home, video, upload, settings and about. The home web page describes the functions of Web Pages. The video Web page
displays the saved videos in the server and client can view or download the videos. The upload web page is used by the client
to upload the files to server. The settings web page is used to change the username, password and date if needed. The about web page provides the description of the project
Biometrics Authentication Using Raspberry PiIJTET Journal
Biometric authentication is one of the most popular and accurate technology. Nowadays, it is used in many real time
applications. However, recognizing fingerprints in Linux based embedded computers (raspberry pi) is still a very complex problem.
This entire work is done on the Linux based embedded computer called raspberry pi , in which database creation and management
using postgresql, web page creation using PHP language, fingerprint reader access, authentication and recognition using python were
entirely done on raspberry pi This paper discusses on the standardized authentication model which is capable of extracting the
fingerprints of individual and store that in database . Then I use the final fingerprint to match with others in fingerprints present in the
database (postgresql) to show the capability of this model.
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
Number of techniques has been planned supported packet secret writing to safeguard the
communication in MANETs. STARS functioning supported stastical characteristics of captured raw traffic.
STARS discover the relationships of offer to destination communication. To forestall STAR attack associate
offer hidding technique is introduced.The pattern aims to derive the source/destination probability distribution.
that's the probability for each node to entire traffic captured with link details message source/destination and
conjointly the end-to-end link probability distribution that's the probability for each strive of nodes to be
associate end-to-end communication strive. thence construct point-to-point traffic originate and then derive the
end-to-end traffic with a set of traffic filtering rules; thus actual traffic protected against revelation attack.
Through this protective mechanism efficiency of traffic enlarged by ninety fifth from attacked traffic. For a lot of
sweetening to avoid overall attacks second shortest path is chosen.
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
The most necessary issue that has to be solved in coming up with an information transmission rule for
wireless unplanned networks is a way to save unplanned node energy whereas meeting the wants of applications
users because the unplanned nodes are battery restricted. Whereas satisfying the energy saving demand, it’s
conjointly necessary to realize the standard of service. Just in case of emergency work, it's necessary to deliver the
information on time. Achieving quality of service in is additionally necessary. So as to realize this demand, Power -
efficient Energy-Aware routing protocol for wireless unplanned networks is planned that saves the energy by
expeditiously choosing the energy economical path within the routing method. When supply finds route to
destination, it calculates α for every route. The worth α is predicated on largest minimum residual energy of the trail
and hop count of the trail. If a route has higher α, then that path is chosen for routing the information. The worth of α
are higher, if the most important of minimum residual energy of the trail is higher and also the range of hop count is
lower. Once the trail is chosen, knowledge is transferred on the trail. So as to extend the energy potency any
transmission power of the nodes is additionally adjusted supported the situation of their neighbour. If the neighbours
of a node are closely placed thereto node, then transmission vary of the node is diminished. Thus it's enough for the
node to own the transmission power to achieve the neighbour at intervals that vary. As a result transmission power
of the node is cut back that later on reduces the energy consumption of the node. Our planned work is simulated
through Network machine (NS-2). Existing AODV and Man-Min energy routing protocol conjointly simulated
through NS-2 for performance comparison. Packet Delivery quantitative relation, Energy Consumption and end-toend
delay.
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
In Manet the first demand is co-operative communication among nodes. The malicious nodes might cause security issues like grey hole and cooperative attacks. To resolve these attack issue planning Dynamic supply routing mechanism, that is referred as cooperative bait detection theme (CBDS) that integrate the advantage of each proactive and reactive defence design is used. In region attacks, a node transmits a malicious broadcast informing that it's the shortest path to the destination, with the goal of intercepting messages. During this case, a malicious node (so-called region node) will attract all packets by victimisation solid Route Reply (RREP) packet to incorrectly claim that “fake” shortest route to the destination then discard these packets while not forwarding them to the destination. In grey hole attacks, the malicious node isn't abs initio recognized in and of itself since it turns malicious solely at a later time, preventing a trust-based security resolution from detective work its presence within the network. It then by selection discards/forwards the info packets once packets undergo it. During this we have a tendency to focus is on detective work grey hole/collaborative region attacks employing a dynamic supply routing (DSR)-based routing technique.
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
Wireless detector nodes are a promising technology to play three-dimensional applications. Even it
will sight correct lead to could on top of ground and underground. In solid underground watching system makes
some challenges are there to propagating the signals. The detector node is moving entire the underground
pipeline and sending information to relay node that's placed within the on top of ground. If any relay node is
unsuccessful during this condition suggests that it'll not sending the info. In this watching system can specially
designed as a heterogeneous networks. Every high power relay nodes most covers minimum 2 low power relay
node. If any relay node is unsuccessful within the network, the constellation can modification mechanically
supported the heterogeneous network. The high power relay node is change the unsuccessful node and sending
the condition of pipeline. The benefits are thought-about to be extremely distributed, improved packet delivery
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
A low cost Internet-based attendance record embedded system for students which uses wireless technology to
transfer data between the client and server is designed. The proposed system consist of a Raspberry Pi which acts as a
client which stores the details of the students in the database by using user login system using web. When the user logs
into the database the data is sent through GPRS to the server machine which maintains the records of the employees and
the attendance is updated in the server database. The GPRS module provides a bidirectional real-time data transfer
between the client and server. This system can be implemented to any real time application so as to retrieve information
from a data source of the client system and send a file to the remote server through GPRS. The main aim is to avoid the
limitations in Ethernet connection and design a low cost and efficient attendance record system where the data is
transferred in a secure way from the client database and updated in the server database using GPRS technology
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...IJTET Journal
Data hiding can hide sensitive information into signals for covert communication. Most data hiding
techniques will distort the signal in order to insert additional messages. The distortion is often small; the irreversibility is
not admissible to some sensitive techniques. Most of the applications, lossless data hiding is desired to extract the
embedded data and the original host signal. The project proposes the enhancement of protection system for secret data
communication through encrypted data concealment in ECG signals of the patient. The proposed encryption technique
used to encrypt the confidential data into unreadable form and not only enhances the safety of secret carrier information by
making the information inaccessible to any intruder having a random method. For that we use twelve square ciphering
techniques. The technique is used make the communication between the sender and the receiver to be authenticated is hash
function. To evaluate the effectiveness of ECG wave at the proposed technique, distortion measurement techniques of two
are used, the percentage residue difference (PWD) and wavelets weighted PRD. Proposed technique provides high security protection for patient data with low distortion is proven in this proposed system.
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesIJTET Journal
In this paper, a hybrid turbo decoding algorithm is used, in which the outer code, Cyclic Redundancy Check code is
not used for detection of errors as usual but for error correction and improvement. This algorithm effectively combines the iterative
decoding algorithm with Rate-Compatible Insertion Convolution Turbo Decoding, where the CRC code and the turbo code are
regarded as an integrated whole in the Decoding process. Altogether we propose an effective error detecting method based on
normalized Euclidean distance to compensate for the loss of error detection capability which should have been provided by CRC
code. Simulation results show that with the proposed approach, 0.5-2dB performance gain can be achieved for the code blocks
with short information length
Improved Trans-Z-source Inverter for Automobile ApplicationIJTET Journal
In this paper a new technology is proposed with a replacement of conventional voltage source/current
source inverter with Improved Trans-Z-source inverter in automobile applications. The improved Trans-Z-source
inverter has a high boost inversion capability and continues input current. Also this new inverter can suppress the
resonant current at the startup; this resonant current in the startup may lead the device to permanent damage. In
improved Trans-Z-source inverter a couple inductor is needed, instead of this coupled inductor a transformer is used.
By using a transformer with sufficient turns ratio the size can be reduced. The turn’s ratio of the transformer decides
the input voltage of the inverter. In this paper operating principle, comparison with conventional inverters, working
with automobiles simulation results, THD analysis, Hardware implementation using ATMEGA 328 P are included.
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...IJTET Journal
This paper presents an analysis of a PMSG wind power system using T-Sourcethree phase matrix converter. PMSG using T-Source three phase matrix converterhas advantages that it can provide any desired AC output voltage regardless of DC input with regulation in shoot-through time. In this control system T-Source capacitor voltage can be kept stable with variations in the shoot-through time, maximum power from the wind turbine to be delivered. Inaddition, of a new future, the converter employs a safe-commutation strategy toconduct along a continuous current flow, which results in theelimination of voltage spikes on switches without the need for a snubber circuit. With the use of matrix converter the surely need forrectifier circuit and passive components to store energy arereduced. The MATLAB/Simulinkmodel of the overall system is carried out and theoretical wind energy conversion output load voltage calculations are madeand feasibility of the new topology has been verified and that theconverter can produce an output voltage and output current. This proposed method has greater efficiency and lower cost.
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
A wireless sensor network mostly relies on multi-hop transmissions to deliver a data packet. It is of essential importance to measure the quality of multi-hop paths and such information shall be utilized in designing efficient routing strategies. Existing metrics like ETF, ETX mainly focus on quantifying the link performance in between the nodes while overlooking the forwarding capabilities inside the sensor nodes. By combining the QoF measurements within a node and over a link, we are able to comprehensively measure the intact path quality in designing efficient multihop routing protocols. We propose QoF, Quality of Forwarding, a new metric which explores the performance in the gray zone inside a node left unattended in previous studies. We implement QoF and build a modified Collection Tree Protocol.
Optimizing Data Confidentiality using Integrated Multi Query ServicesIJTET Journal
Query services have experienced terribly massive growth within past few years for that reason large usage of services need to balance outsourcing data management to Cloud service providers that provide query services to the client for data owners, therefore data owner needs data confidentiality as well as query privacy to be guaranteed attributable to disloyal behavior of cloud service provider consequently enhancing data confidentiality must not be compromise the query processed performance. It is not significant to provide slow query services as the result of security along with privacy assurance. We propose the random space perturbation data perturbation method to provide secure with kNN(k-nearest-neighbor) range query services for protecting data in the cloud and Frequency Structured R-Tree (FSR-Tree) efficient range query. Our schemes enhance data confidentiality without compromising the FSR-TREE query processing performance that also increases the user experience.
Foliage Measurement Using Image Processing TechniquesIJTET Journal
Automatic detection of fruit and leaf diseases is essential to automatically detect the symptoms of diseases as early as they appear on the growing stage. This system helps to detect the diseases on fruit during farming , right from plan and easily monitoring the diseases of grapes leaf and apple fruit. By using this system we can avoid the economical loss due to various diseases in agriculture production. K-means clustering technique is used for segmentation. The features are extracted from the segmented image and artificial neural network is used for training the image database and classified their performance to the respective disease categories. The experimental results express that what type of disease can be affected in the fruit and leaf .
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemIJTET Journal
This project suggest a sine-wave modulation technique is to achieve a low total harmonic distortion of Buck-Boost converter connected to a changing polarity inverter in a system. The suggested technique improves the harmonic content of the output. In addition, a proportional-resonant Integral controller is used along with harmonic compensation techniques for eliminating the DC component in the system. Also, the performance of the Proposed controller is analyzed when it connecting to the converter. The design of Buck-Boost converter is fed by modulated sine wave Pulse width modulation technique are proposed to mitigate the low order harmonics and to control the output current. So, that the output complies within the standard limit without use of low pass filter.
Comparative Study on NDCT with Different Shell Supporting StructuresIJTET Journal
Natural draft cooling towers are very essential in modern days in thermal and nuclear power stations. These are the hyperbolic shells of revolution in form and are supported on inclined columns. Several types of shell supporting structures such as A,V,X,Y are being used for construction of NDCT’s. Wind loading on NDCT governs critical cases and requires attention. In this paper a comparative study on reinforcement details has been done on NDCT’s with X and Y shell supporting structures. For this purpose 166m cooling tower with X and Y supporting structures being analyzed and design for wind (BS & IS code methods), seismic loads using SAP2000.
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...IJTET Journal
The modeling of pressure distribution of fresh concrete poured in vertical formwork are rather dynamic than complex. Many researchers had worked on the pressure distribution modeling of concrete and formulated empirical relationship factors like formwork height, rate of pour, consistency classes of concrete. However, in the current scenario, most of high rise construction uses self compacting concrete(SCC) which is a special concrete which utilizes not only mineral and chemical admixtures but also varied aggregate proportions and hence modeling pressure distribution of SCC over other concrete in vertical formwork systems is necessitated. This research seeks to bridge the gap between the theoretical formulation of pressure distribution with the actual modeled (scaled) vertical formwork systems. The pressure distribution of SCC in the laboratory will be determined using pressure sensors, modeled and analyzed.
A Five – Level Integrated AC – DC ConverterIJTET Journal
This paper presents the implementation of a new five – level integrated AC – DC converter with high input power factor and reduced input current harmonics complied with IEC1000-3-2 harmonic standards for electrical equipments. The proposed topology is a combination of boost input power factor pre – regulator and five – level DC – DC converter. The single – stage PFC (SSPFC) approach used in this topology is an alternative solution to low – power and cost – effective applications.
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
Sclera and finger print vein fusion is a new biometric approach for uniquely identifying humans. First, Sclera vein is identified and refined using image enhancement techniques. Then Y shape feature extraction algorithm is used to obtain Y shape pattern which are then fused with finger vein pattern. Second, Finger vein pattern is obtained using CCD camera by passing infrared light through the finger. The obtained image is then enhanced. A line shape feature extraction algorithm is used to get line patterns from enhanced finger vein image. Finally Sclera vein image pattern and Finger vein image pattern were combined to get the final fused image. The image thus obtained can be used to uniquely identify a person. The proposed multimodal system will produce accurate results as it combines two main traits of an individual. Therefore, it can be used in human identification and authentication systems.
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationIJTET Journal
Outrigger braced structures has efficient structural form consist of a central core, comprising braced frames with
horizontal cantilever ”outrigger” trusses or girders connecting the core to the outer column. When the structure is loaded
horizontally, vertical plane rotation of the core is restrained by the outriggers through tension in windward column and
compression in leeward column. The effective structural depth of the building is greatly increased, thus augmenting the lateral
stiffness of the building and reducing the lateral deflections and moments in core. In effect, the outriggers join the columns to the
core to make the structure behave as a partly composite cantilever. By providing eccentrically braced system in outrigger frame by
varying the size of links and analyzing it. Push over analysis is carried out by varying the link size using computer programs, Sap
2007 to understand their seismic performance. The ductile behavior of eccentrically braced frame is highly desirable for structures
subjected to strong ground motion. Maximum stiffness, strength, ductility and energy dissipation capacity are provided by
eccentrically braced frame. Studies were conducted on the use of outrigger frame for the high steel building subjected to
earthquake load. Braces are designed not to buckle, regardless of the severity of lateral loading on the frame. Thus eccentrically
braced frame ensures safety against collapse.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
192
Enhanced Hashing Approach For
Image Forgery Detection With
Feature Level Fusion
G. Mathumitha
PG Scholar, Department of CSE,
Paavai College of Engineering,
Namakkal, India.
R. Murugesan
Assistant Professor, Department of CSE,
Paavai College of Engineering,
Namakkal, India.
Abstract—Image forgery detection and its accuracy are addressed in the proposed work. The image authentication process aims
at finding the originality of an image. Due to the advent of many image editing software image tampering has become common.
The Enhanced hashing approach is suggested for image authentication. The concept of Hashing has been used for searching
images from large databases. It can also be applied to image authentication as it produces different results with respect to the
change in image. But the hashing methods used for similarity searches cannot be used for image authentication since they are no
sensitive for small changes. Moreover, we need a system that detects only perceptual changes. A new hashing method, namely,
enhanced robust hashing is proposed for image authentication, which uses global and local properties of an image. This method is
developed for detecting image forgery, including removal, insertion, and replacement of objects, and abnormal color
modification, and for locating the forged area. The local models include position and texture information of object regions in the
image. The hash mechanism uses secret keys for encryption and decryption. IP tracing is done to track the suspicious nodes.
Index Terms—Image forgery, image hashing, global and local properties, perceptual hashing, image authentication
—————————— ——————————
1 INTRODUCTION
Digital images are increasingly transmitted over non-secure
channels such as the Internet. Therefore, military, medical and
quality control images must be protected against security attacks.
Hence, image authentication has become a mandatory process in
image sharing. An image hash function maps an image to a short
binary string based on the image's appearance to the human eye.
With advancement in technology, there are many multimedia data
available over the internet. As storage becomes less costly, all the
data are stored in database as blob objects.
One primitive way for dealing with massive multimedia
databases is the similarity search problem. It aims to retrieve
similar objects to the query object from the database. Particularly,
similarity search is at the heart of many multimedia applications,
such as image retrieval, video recommendation, event detection,
and face recognition. To improve the performance of similarity
search, a long stream of research efforts has been made in the
database community.
Because of the difference in dimensionality it is difficult to
find the exact image using similarity search. To address this issue
approximate similarity search has been implemented in recent
years, which brings related images as a result instead of exact
images for the given query. With the advent of many image
editing software and its widespread use, image authentication
becomes important to avoid image forgery. Hashing can be
efficiently used to authenticate an image since a small change in
the image will produce a different hash code when the same hash
function is used.
In general, a hash should be short, robust against simple
image modifications and sensitive against major modifications.
Therefore the objective is to provide a reasonably short hash code
for an image with good performance. Global moments of the
luminance and chrominance components are used to reflect the
image’s global characteristics, and extract local texture features
from salient regions in the image to represent the contents in the
corresponding areas.
2 PROPOSED IMAGE AUTHENTICATION PROTOCOL
Many previous schemes are either based on global or local
features. Global features are generally short but insensitive to
changes of small areas in the image, while local features can
reflect regional modifications but usually produce longer hashes.
Therefore, a method that generates reasonably short hash code
and better reflects the properties of an image is required. The
proposed work focuses on efficient and automatic techniques to
2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
193
identify and verify the contents of digital images. The services
provided by the proposed image authentication system are
mentioned below.
1. Identify the received image as a similar image, or a
tampered image, or a different image.
2. Evaluate similarity of two images by calculating the
distance between them.
3. Identify and locate three types of tampered area: Added
area, Removed area, Changed area.
4. Estimate the percentage of tampered area.
Fig. 1. Process steps for image authentication.
When an image is sent to the user, a possible solution to prove
authenticity is to generate a hash value and send it securely to the
user. The hash value is a compact string. It can be called as an
abstract of the content. A user can regenerate hash value from the
received image, and compare it with the original hash value. If
they match, the content is considered as authentic. In order to
allow incidental distortion, the hash value must possess some
robustness.
In [1], the authors generated image hash using Zernike
Moments and local features. But the Salient region is detected as
rectangular boxes which include some background details and
does not clearly show the salient region. In order identify the
salient region edge detection mechanism is used in the proposed
work. And also IP tracing is enabled in the proposed system to
find the malicious node where the image got tampered. Fig.3
explains the process steps of the proposed image authentication
protocol.
The image is first rescaled to a fixed size and converted from
RGB to grayscale. These steps are covered under the
preprocessing step. The aim of rescaling is to ensure that the
generated image hash has a fixed length and the same
computation complexity. Next global and local features are
extracted. Then the Global and local features are concatenated to
construct a final hash value.
2.1 Edge Detection Mechanisms
Our proposed work includes research on the embedding
algorithm robust to geometric distortions and improving the
precision in locating the altered areas by implementing via any
digital multimedia networking application for verifying the
content of image transmission over RGB features.
So this kind of implementation is desired to find features that
best represent the image contents so as to enhance the hash’s
sensitivity to small area tampering while maintaining short hash
length, good robustness against normal image processing like
edge detection mechanisms and include tracer routing to detect
the content modified hacker system which is use full to reduce the
hacking possibilities. So without knowledge of this method,
hacker information may be acknowledged to the sender once the
hacker receives the packet for content or object modifications.
Fig. 2. Salient feature identification using Edge detection.
Here, in the final image salient features are highlighted.
Instead of rectangular boxes only the edges were traced thus
giving only the salient feature. Hash can be constructed for the
detected regions and transmitted along with the original image to
the receiver.
2.2 Hashing Generation and Encryption
The global and object local vectors are concatenated to form
an intermediate hash, which is then pseudo-randomly scrambled
based on a secret key to produce the final hash sequence.
Advanced encryption algorithms are used to encrypt the hash
sequence with respect to secret keys.
Received
Image
Preprocessing
Edge detection
Hash
construction
Fake image Original Image
IP tracing
End Process
Malicious Node Identified
Hash
Function
Match with
original
hash
YesNo
3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
194
The user regenerates the hash value from the received image
after successfully decrypting it and compares it with the original
hash value. If they match, the content is considered as authentic.
Otherwise the received image is identified as a fake one.
2.3 Hamming Distance Matching
Distance between hashes of an image pair is used as a metric
for finding similarity or dissimilarity of the two images. The hash
sequence of a received image needs to be tested with the
decrypted hash sequence under similarity ratio. If the difference is
above the threshold then it has been maliciously tampered else it
is considered as legitimate image.
2.4 IP Tracing
Tracer routing is used to find out the unauthorized router or
the system that purposefully modified the content of the image
and forwarded it to the destination in a routing process. This can
be done by getting acknowledgment from every router in the
routing process by a source. Then source compares the
acknowledgement with the predefined routing table for any
routing delay or IP mismatch. Thus the attacker node can be
identified and reported.
3 DISCUSSION AND CONCLUSION
The proposed image hashing approach is developed using
both global and local features. Image hashes produced with the
proposed method are robust against common image processing
operations like brightness adjustment, rescaling and addition of
noise. The IP tracing mechanism helps to find the malicious node
thus providing a full fledged authentication mechanism.
REFERENCES
[1] Robust Hashing for Image Authentication Using Zernike
Moments and Local Features Yan Zhao, Shuozhong Wang,
Xinpeng Zhang, and Heng Yao, Member, IEEE.
[2] S. Xiang, H. J. Kim, and J. Huang, ―Histogram-based image
hashing scheme robust against geometric deformations,‖ in
Proc. ACM Multimedia and Security Workshop, New York,
2007, pp. 121–128.
[3] V. Monga, A. Banerjee, and B. L. Evans, ―A clustering
based approach to perceptual image hashing,‖ IEEE Trans.
Inf. Forensics Security, vol. 1, no. 1, pp. 68–79, Mar. 2006.
[4] Robust Hashing with Local Models for Approximate
Similarity Search Jingkuan Song, Yi Yang, Xuelong Li,
Fellow, IEEE, Zi Huang, and Yang Yang
[5] Bohm C., Berchtold S., and Keim D. A.(2001), ―Searching in
high-dimensional spaces: Index structures for improving the
performance of multimedia databases,‖ ACM Comput.
Survey, vol. 33, no. 3, pp. 322–373.
[6] Cappelli R. (2011), ―Fast and accurate fingerprint indexing
based on ridge orientation and frequency,‖ TSMCB, vol. 41,
no. 6, pp. 1511–1521.
[7] Datar M. and Indyk P. (2004), ―Locality-sensitive hashing
scheme based on p-stable distributions,‖ in Proc. SCG, pp.
253–262.
[8] Datta R., Joshi D., Li J., and Wang J. Z. (2008), ―Image
retrieval: Ideas, influences, and trends of the new age,‖ ACM
Comput. Survey, vol. 40.
[9] Gionis A., Indyk P., and Motwani R. (1999), ―Similarity
search in high dimensions via hashing,‖ in Proc. VLDB, pp.
518–529.
[10] Jagadish H. V., Ooi B. C., Tan K. L., Yu C., and Zhang R.
(2005), ―iDistance: An adaptive B+-tree based indexing
method for nearest neighbor search,‖ ACM TODS, vol. 30,
no. 2, pp. 364–397.
[11] Jingkuan Song, Yi Yang, Xuelong Li, Fellow, IEEE, Zi
Huang, and Yang Yang (2014) "Robust Hashing With Local
Models for Approximate Similarity search" IEEE
transactions on cybernetics, vol. 44, no. 7
[12] Lv Q., Josephson W., Wang Z., Charikar M. and Li
K.(2007), ―Multi-probe LSH: Efficient indexing for high-
dimensional similarity search,‖ in Proc. VLDB, pp. 950–961.
[13] Salakhutdinov R. and Hinton G. E. (2009), ―Semantic
hashing,‖ Int. J. Approx. Reasoning, vol. 50, no. 7, pp. 969–
978.
[14] Shen H. T., Ooi B. C. and Zhou X. (2005), ―Towards
effective indexing for very large video sequence database,‖
in Proc. SIGMOD, pp. 730–741.
[15] Tao Y., Yi K., Sheng C., and Kalnis P. (2010), ―Efficient and
accurate nearest neighbor and closest pair search in high-
dimensional space,‖ ACM TODS, vol. 35, no. 3.
[16] Weiss Y., Torralba A., and Fergus R. (2008), ―Spectral
hashing,‖ in Proc. NIPS, pp. 1753–1760.
[17] Yang Y., Xu D., Nie F., Luo J. and Zhuang Y. (2009),
―Ranking with local regression and global alignment for
cross media retrieval,‖ in Proc. ACM Multimedia, pp. 175–
184.
[18] Zhang D., Wang J., Cai D. and Lu J. (2010), ―Self-taught
hashing for fast similarity search,‖ in SIGIR, pp. 18–25.
[19] Zhang L., Wang L., and Lin W. (2012), ―Generalized biased
discriminant analysis for content-based image retrieval,‖
TSMCB, vol. 42, no. 1, pp. 282–290.