How data can be shared from one part of the world to the other in near real time came with
the arrival of internet. Along with this they have introduced new challenges like maintaining the
confidentiality of transmitting the data. This gave a boost to the research area related to cryptography.
Firstly, Encryption of images with the accepted encryption algorithms had significant downside as key
management was complicated and limited. Secondly, introduction to new area for encrypting images
was splitting the image at its pixel level in to multiple shares. But the major drawback of this approach
was that the recovered image had a poor quality. To overcome these mentioned drawbacks we have
proposed a new approach which does not attempt to use any type of keys for encryption.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Digital image copyright protection based on visual cryptographyinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Improving image resolution through the cra algorithm involved recycling proce...csandit
Image processing concepts are widely used in medical fields. Digital images are prone to a
variety of types of noise. Noise is the result of errors in the image acquisition process for
reconstruction that result in pixel values that reflect the true intensities of the real scenes. A lot
of researchers are working on the field analysis and processing of multi-dimensional images.
Work previously hasn’t sufficient to stop them, so they continue performance work is due by the
researcher. In this paper we contribute a novel research work for analysis and performance
improvement about to image resolution. We proposed Concede Reconstruction Algorithm (CRA)
Involved Recycling Process to reduce the remained problem in improvement part of an image
processing. The CRA algorithms have better response from researcher to use them
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Digital image copyright protection based on visual cryptographyinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Improving image resolution through the cra algorithm involved recycling proce...csandit
Image processing concepts are widely used in medical fields. Digital images are prone to a
variety of types of noise. Noise is the result of errors in the image acquisition process for
reconstruction that result in pixel values that reflect the true intensities of the real scenes. A lot
of researchers are working on the field analysis and processing of multi-dimensional images.
Work previously hasn’t sufficient to stop them, so they continue performance work is due by the
researcher. In this paper we contribute a novel research work for analysis and performance
improvement about to image resolution. We proposed Concede Reconstruction Algorithm (CRA)
Involved Recycling Process to reduce the remained problem in improvement part of an image
processing. The CRA algorithms have better response from researcher to use them
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
14 offline signature verification based on euclidean distance using support v...INFOGAIN PUBLICATION
In this project, a support vector machine is developed for identity verification of offline signature based on the matrices derived through Euclidean distance. A set of signature samples are collected from 35 different people. Each person gives his 15 different copies of signature and then these signature samples are scanned to have softcopy of them to train SVM. These scanned signature images are then subjected to a number of image enhancement operations like binarization, complementation, filtering, thinning, edge detection and rotation. On the basis of 15 original signature copies from each individual, Euclidean distance is calculated. And every tested image is compared with the range of Euclidean distance. The values from the ED are fed to the support vector machine which draws a hyper plane and classifies the signature into original or forged based on a particular feature value.
Performance evaluation of lossy image compression techniques over an awgn cha...eSAT Journals
Abstract Recent advancement in image compression research resulted in reducing the time and cost in image storage and transmission without significant reduction of the image quality. In this paper software algorithms for image compression based on psycho visual and inter pixel redundancy elimination have been developed and implemented. This paper examines the suitability of these two compression techniques over a practical AWGN communication channel and concludes with an experimental comparison on the basis of BER v/s Eb/No ratio. Key Words: Psycho visual redundancy, inter pixel redundancy, lossless and lossy compression, AWGN channel, BER, Eb/No ratio.
Dual-layer Digital Image Watermarking for Intellectual Property Right ProtectionIDES Editor
Digital watermarking is a technique which is widely
used in various application areas such as copyright protection,
copy control, broadcast monitoring etc. In this paper a novel
digital image watermarking technique is presented. To protect
the intellectual property rights, two different watermarks are
inserted in host image. The first watermark is used to monitor
the any changes made in host image while second one is used
as proof of ownership. The performance of proposed system is
good and it withstands against various attacks such as Gaussian
noise, salt and pepper, tampering etc.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...IDES Editor
The objective of this work is to develop a
hardware-based watermarking system to identify the device
using which the photograph was taken. The watermark chip
will be fit in any electronic component that acquires the
images, which are then watermarked in real time while
capturing along with separate key. Watermarking is the
process of embedding the watermark, in which a watermark
is inserted in to a host image while extracting the watermark
the watermark is pulled out of the image. The ultimate
objective of the research presented in this paper is to develop
low-power, high-performance, real-time, reliable and secure
watermarking systems, which can be achieved through
hardware implementations. In this paper the development of
a very Large Scale Integration (VLSI) architecture for a highperformance
watermarking chip that can perform invisible
colour image watermarking using genetic algorithm is
discussed. The prototyped VLSI implementation of
watermarking is analyzed in two ways.
Viz.,(i) Digital watermarking
Reversible Watermarking based on Histogram Shifting Modification:A Reviewiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
An unsupervised method for real time video shot segmentationcsandit
Segmentation of a video into its constituent shots is a fundamental task for indexing and
analysis in content based video retrieval systems. In this paper, a novel approach is presented
for accurately detecting the shot boundaries in real time video streams, without any a priori
knowledge about the content or type of the video. The edges of objects in a video frame are
detected using a spatio-temporal fuzzy hostility index. These edges are treated as features of the
frame. The correlation between the features is computed for successive incoming frames of the
video. The mean and standard deviation of the correlation values obtained are updated as new
video frames are streamed in. This is done to dynamically set the threshold value using the
three-sigma rule for detecting the shot boundary (abrupt transition). A look back mechanism
forms an important part of the proposed algorithm to detect any missed hard cuts, especially
during the start of the video. The proposed method is shown to be applicable for online video
analysis and summarization systems. In an experimental evaluation on a heterogeneous test set,
consisting of videos from sports, movie songs and music albums, the proposed method achieves
99.24% recall and 99.35% precision on the average.
A methodology for developing video processing systemeSAT Journals
Abstract The data is exploding day by day in digital technology. Now a day’s multimedia data is also handled by the database, multimedia data contains data like images, text and video. The video processing plays a tremendous role in the multimedia but all the videos are not same, it can exists number of settings and different number of formats. By This video processing system the video is processed for enhancement, analysis, dividing the channels and binarization by using different image processing techniques. In this system different color system like YCBR, HSL, and RGB color systems are considered for processing any type of video. For this system, the input video can be from a stored file or continuous stream of video sequences from the web camera (or) any type of camera by this video processing system we can improve the quality of the video and we can also apply some special effects to the video by applying various image processing techniques and filters. The enhancement techniques considered in his system are filtering with correlation and convolution, adaptive smoothing, conservative smoothing and median filtering. The analysis techniques like edge detection, histogram and statistical analysis are considered for this system. Binarization methods implemented in this system are Custom Threshold, Order Dither. The Color filters like converting RGB to Grayscale, Grayscale to RGB ,Sepia, invert, rotate, Custom Color filter, Euclidean color filter, channel filter, red, green, blue, cyan, magenta and yellow, they are so many other filters are also implemented in this system. Key Words: Enhancement, Analysis, Dividing the channels, Binarization
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A New Steganographic Method for Embedded Image In Audio FileCSCJournals
Abstract Secure transaction of information has increasing attention in the recent days, such that information concealment has become very important modern used strategies, in which the information is concealment in any other information such that the second information does not change significantly and it appears the same as original. Information hiding is the technology to embed the secret information into a cover data in a way that keeps the secret information invisible. This paper presents a new steganographic method for embedding an image in an Audio file. Emphasis will be on the proposed scheme of image hiding in audio and its comparison with simple Least Significant Bit insertion method of data hiding in audio.
This paper presents a new technique able to provide a very good compression ratio in preserving the quality of the important components of the image called main objects. It focuses on applications where the image is of large size and consists of an object or a set of objects on background such as identity photos. In these applications, the background of the objects is in general uniform and represents insignificant information for the application. The results of this new techniques show that is able to achieve an average compression ratio of 29% without any degradation of the quality of objects detected in the images. These results are better than the results obtained by the lossless techniques such as JPEG and TIF techniques.
14 offline signature verification based on euclidean distance using support v...INFOGAIN PUBLICATION
In this project, a support vector machine is developed for identity verification of offline signature based on the matrices derived through Euclidean distance. A set of signature samples are collected from 35 different people. Each person gives his 15 different copies of signature and then these signature samples are scanned to have softcopy of them to train SVM. These scanned signature images are then subjected to a number of image enhancement operations like binarization, complementation, filtering, thinning, edge detection and rotation. On the basis of 15 original signature copies from each individual, Euclidean distance is calculated. And every tested image is compared with the range of Euclidean distance. The values from the ED are fed to the support vector machine which draws a hyper plane and classifies the signature into original or forged based on a particular feature value.
Performance evaluation of lossy image compression techniques over an awgn cha...eSAT Journals
Abstract Recent advancement in image compression research resulted in reducing the time and cost in image storage and transmission without significant reduction of the image quality. In this paper software algorithms for image compression based on psycho visual and inter pixel redundancy elimination have been developed and implemented. This paper examines the suitability of these two compression techniques over a practical AWGN communication channel and concludes with an experimental comparison on the basis of BER v/s Eb/No ratio. Key Words: Psycho visual redundancy, inter pixel redundancy, lossless and lossy compression, AWGN channel, BER, Eb/No ratio.
Dual-layer Digital Image Watermarking for Intellectual Property Right ProtectionIDES Editor
Digital watermarking is a technique which is widely
used in various application areas such as copyright protection,
copy control, broadcast monitoring etc. In this paper a novel
digital image watermarking technique is presented. To protect
the intellectual property rights, two different watermarks are
inserted in host image. The first watermark is used to monitor
the any changes made in host image while second one is used
as proof of ownership. The performance of proposed system is
good and it withstands against various attacks such as Gaussian
noise, salt and pepper, tampering etc.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...IDES Editor
The objective of this work is to develop a
hardware-based watermarking system to identify the device
using which the photograph was taken. The watermark chip
will be fit in any electronic component that acquires the
images, which are then watermarked in real time while
capturing along with separate key. Watermarking is the
process of embedding the watermark, in which a watermark
is inserted in to a host image while extracting the watermark
the watermark is pulled out of the image. The ultimate
objective of the research presented in this paper is to develop
low-power, high-performance, real-time, reliable and secure
watermarking systems, which can be achieved through
hardware implementations. In this paper the development of
a very Large Scale Integration (VLSI) architecture for a highperformance
watermarking chip that can perform invisible
colour image watermarking using genetic algorithm is
discussed. The prototyped VLSI implementation of
watermarking is analyzed in two ways.
Viz.,(i) Digital watermarking
Reversible Watermarking based on Histogram Shifting Modification:A Reviewiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
An unsupervised method for real time video shot segmentationcsandit
Segmentation of a video into its constituent shots is a fundamental task for indexing and
analysis in content based video retrieval systems. In this paper, a novel approach is presented
for accurately detecting the shot boundaries in real time video streams, without any a priori
knowledge about the content or type of the video. The edges of objects in a video frame are
detected using a spatio-temporal fuzzy hostility index. These edges are treated as features of the
frame. The correlation between the features is computed for successive incoming frames of the
video. The mean and standard deviation of the correlation values obtained are updated as new
video frames are streamed in. This is done to dynamically set the threshold value using the
three-sigma rule for detecting the shot boundary (abrupt transition). A look back mechanism
forms an important part of the proposed algorithm to detect any missed hard cuts, especially
during the start of the video. The proposed method is shown to be applicable for online video
analysis and summarization systems. In an experimental evaluation on a heterogeneous test set,
consisting of videos from sports, movie songs and music albums, the proposed method achieves
99.24% recall and 99.35% precision on the average.
A methodology for developing video processing systemeSAT Journals
Abstract The data is exploding day by day in digital technology. Now a day’s multimedia data is also handled by the database, multimedia data contains data like images, text and video. The video processing plays a tremendous role in the multimedia but all the videos are not same, it can exists number of settings and different number of formats. By This video processing system the video is processed for enhancement, analysis, dividing the channels and binarization by using different image processing techniques. In this system different color system like YCBR, HSL, and RGB color systems are considered for processing any type of video. For this system, the input video can be from a stored file or continuous stream of video sequences from the web camera (or) any type of camera by this video processing system we can improve the quality of the video and we can also apply some special effects to the video by applying various image processing techniques and filters. The enhancement techniques considered in his system are filtering with correlation and convolution, adaptive smoothing, conservative smoothing and median filtering. The analysis techniques like edge detection, histogram and statistical analysis are considered for this system. Binarization methods implemented in this system are Custom Threshold, Order Dither. The Color filters like converting RGB to Grayscale, Grayscale to RGB ,Sepia, invert, rotate, Custom Color filter, Euclidean color filter, channel filter, red, green, blue, cyan, magenta and yellow, they are so many other filters are also implemented in this system. Key Words: Enhancement, Analysis, Dividing the channels, Binarization
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A New Steganographic Method for Embedded Image In Audio FileCSCJournals
Abstract Secure transaction of information has increasing attention in the recent days, such that information concealment has become very important modern used strategies, in which the information is concealment in any other information such that the second information does not change significantly and it appears the same as original. Information hiding is the technology to embed the secret information into a cover data in a way that keeps the secret information invisible. This paper presents a new steganographic method for embedding an image in an Audio file. Emphasis will be on the proposed scheme of image hiding in audio and its comparison with simple Least Significant Bit insertion method of data hiding in audio.
This paper presents a new technique able to provide a very good compression ratio in preserving the quality of the important components of the image called main objects. It focuses on applications where the image is of large size and consists of an object or a set of objects on background such as identity photos. In these applications, the background of the objects is in general uniform and represents insignificant information for the application. The results of this new techniques show that is able to achieve an average compression ratio of 29% without any degradation of the quality of objects detected in the images. These results are better than the results obtained by the lossless techniques such as JPEG and TIF techniques.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
The Present demands of scientific and social life forced image processing based applications to have a tremendous growth. This growth at the same time has given numbers of challenges to researcher to meet the desired objectives of either users or from solution perspectives. Among the various challenges, the most dominating areas are: reduction in required memory spaces for storage or taken transmission time from one location to other, protection of image contents to maintain the privacy and to facilitate the mechanism to identify the malicious modification if there is any either in storage or in transmission channel. Even though there are number of methods proposed by various researchers and are existed as solutions, questions are remain open in terms of quality, cost and complexity. In this paper we have proposed the concept based on neural network to achieve the quality of compression, protection and authentication all together using the ability of universal approximation by learning, one way property and one to one mapping characteristics correspondingly. With the proposed methods not only we can authenticate the image but also positions of malicious activity given in the image can be located with high precision. Proposed methods are very efficient in performance as well as carry the features of simplicity and cost effectiveness.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A comparatively study on visual cryptographyeSAT Journals
Abstract The effective and secure protections of sensitive information are primary concerns in commercial, medical and military systems. To address the reliability problems for secret images, a visual cryptography scheme is a good alternative to remedy the vulnerabilities. Visual cryptography is a very secure and unique way to protect secrets. Visual cryptography is an encryption technique which is used to hide information which is present in an image. Unliketraditional cryptographic schemes, it uses human eyes to recover the secret without any complex decryption algorithms and the facilitate of computers. It is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed.In this paper we represent various cryptography technique and research work done in this field. Keywords: Secret image sharing, cryptography, visual quality of image, pixel expansion
Reversible Data Hiding in Encrypted Image: A ReviewEditor IJMTER
Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted
images, since it maintains the excellent property that the original cover can be losslessly recovered
after embedded data is extracted while protecting the image content’s confidentiality. All previous
methods embed data by reversibly vacating room from the encrypted images, which may be subject
to some errors on data extraction and/or image restoration. In this survey paper, we discuss about
various methods and algorithms which were used for reversible data hiding (RDH) in encrypted
image to make data hiding process effortless. We also use visual cryptographic approach for
encryption which helps to protect the image during transmission. The scheme is suitable for
authentication based application where collective acceptance and decision making plays an important
role. The main goal is to retrieve the original image with lossless process and minimum computation
during image encryption /decryption by using keyless approach.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Visual Cryptography is a special encryption technique that encrypts the secret image into n
number of shares to hide information in images in such a way that it can be decrypted by the
human visual system. It is imperceptible to reveal the secret information unless a certain
number of shares (k) or more are superimposed. Simple visual cryptography is very insecure.
Variable length key based visual cryptography for color image uses a variable length Symmetric
Key based Visual Cryptographic Scheme for color images where a secret key is used to encrypt
the image and division of the encrypted image is done using Random Number. Unless the secret
key, the original image will not be decrypted. Here secret key ensures the security of image.
This paper describes the overall process of above scheme. Encryption process encrypts the
Original Image using variable length Symmetric Key, gives encrypted image. Share generation
process divides the encrypted image into n number of shares using random number. Decryption process stacks k number of shares out of n to reconstruct encrypted image and uses the same key for decryption.
Image Encryption Using Differential Evolution Approach in Frequency Domainsipij
This paper presents a new effective method for image encryption which employs magnitude and phase manipulation using Differential Evolution (DE) approach. The novelty of this work lies in deploying the concept of keyed discrete Fourier transform (DFT) followed by DE operations for encryption purpose. To this end, a secret key is shared between both encryption and decryption sides. Firstly two dimensional (2-D) keyed discrete Fourier transform is carried out on the original image to be encrypted. Secondly crossover is performed between two components of the encrypted image, which are selected based on Linear Feedback Shift Register (LFSR) index generator. Similarly, keyed mutation is performed on the real parts of a certain components selected based on LFSR index generator. The LFSR index generator initializes it seed with the shared secret key to ensure the security of the resulting indices. The process shuffles the positions of image pixels. A new image encryption scheme based on the DE approach is developed which is composed with a simple diffusion mechanism. The deciphering process is an invertible process using the same key. The resulting encrypted image is found to be fully distorted, resulting in increasing the robustness of the proposed work. The simulation results validate the proposed image encryption scheme.
Implementation of image steganography using lab viewIJARIIT
Steganography is the one of the technique to hide secret messages within a larger one in such way that someone can
not know the presence or contents of the hidden message. The purpose of Steganography is to maintain secret communication
between two parties. This paper presents the implementation of a highly secured data hiding technique called Steganography.
This technique is applicable for image data type. The main aim of this technique is to encode the data image within the cover
image such that the data image's existence is concealed. Here we use the data as an image for Steganography. It deals with the
encoding data image information in a given image (called cover image) without making any visible changes to it. LabVIEW
graphical programming environment is a tool for realizing the image acquisition and processing. This software has several
advantages: simple implementation, modularity, flexibility, attractive user interface and the possibility to develop very easy new
features.
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
System-on-chip (soc) based system has so many disadvantages in power-dissipation as
well as clock rate while the data transfer from one system to another system in on-chip. At the same
time, a higher operated system does not support the lower operated bus network for data transfer.
However an alternative scheme is proposed for high speed data transfer. But this scheme is limited to
SOCs. Unlike soc, network-on-chip (NOC) has so many advantages for data transfer. It has a special
feature to transfer the data in on-chip named as transitional encoder. Its operation is based on input
transitions. At the same time it supports systems which are higher operated frequencies. In this
project, a low-power encoding scheme is proposed. The proposed system yields lower dynamic
power dissipation due to the reduction of switching activity and coupling switching activity when
compared to existing system. Even-though many factors which is based on power dissipation, the
dynamic power dissipation is only considerable for reasonable advantage. The proposed system is
synthesized using quartus II 9.1 software. Besides, the proposed system will be extended up to
interlink PE communication with help of routers and PE’s which are performed by various
operations. To implement this system in real NOC’s contains the proposed encoders and decoders for
data transfer with regular traffic scenarios should be considered.
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
Coins are important part of our life. We use coins in a places like stores, banks, buses, trains
etc. So it becomes a basic need that coins can be sorted, counted automatically. For this, there is
necessary that the coins can be recognized automatically. Automated Coin Recognition System for the
Indian Coins of Rs. 1, 2, 5 and 10 with the rotation invariance. We have taken images from the both
sides of coin. So this system is capable to recognizing coins from both sides. Features are taken from the
images using techniques as a Hough Transformation, Pattern Averaging etc.
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
Worldwide Interoperability for Microwave Access (WiMAX) is currently one of the
hottest technologies in wireless communication. It is a standard based on the IEEE 802.16 wireless
technology that provides a very high throughput broadband connections over long distances. In
parallel, Voice Over Internet Protocol (VoIP) is a new technology which provides access to voice
communication over internet protocol and hence it is becomes an alternative to public switched
telephone networks (PSTN) due to its capability of transmission of voice as packets over IP
networks. A lot of research has been done in analyzing the performances of VoIP traffic over
WiMAX network. In this paper we review the analysis carried out by several authors for the most
common VoIP codec’s which are G.711, G.723.1 and G.729 over a WiMAX network using various
service classes. The objective is to compare the results for different types of service classes with
respect to the QoS parameters such as throughput, average delay and average jitter.
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
The cloud backup is used for the personal storage of the people in terms of reducing the
mainlining process and managing the structure and storage space managing process. The challenging
process is the deduplication process in both the local and global backup de-duplications. In the prior
work they only provide the local storage de-duplication or vice versa global storage de-duplication in
terms of improving the storage capacity and the processing time. In this paper, the proposed system
is called as the ALG- Dedupe. It means the Application aware Local-Global Source De-duplication
proposed system to provide the efficient de-duplication process. It can provide the efficient deduplication process with the low system load, shortened backup window, and increased power
efficiency in the user’s personal storage. In the proposed system the large data is partitioned into
smaller part which is called as chunks of data. Here the data may contain the redundancy it will be
avoided before storing into the storage area.
Aging protocols that could incapacitate the InternetEditor IJMTER
The biggest threat to the Internet is the fact that it was never really designed. For e.g., the
BGP protocol is used by Internet routers to exchange information about changes to the Internet's
network topologies. However, it also is among the most fundamentally broken; as Internet routing
information can be poisoned with bogus routing information. Instead, it evolved in fits and start,
thanks to various protocols that have been cobbled together to fulfill the needs of the moment. Few
of protocols from them were designed with security in mind. or if they were sported no more than
was needed to keep out a nosy neighbor, not a malicious attacker. The result is a welter of aging
protocols susceptible to exploit on an Internet scale. Here are six Internet protocols that could stand
to be replaced sooner rather than later or are (mercifully) on the way out.
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...Editor IJMTER
The emergence of exactitude agriculture has been promoted by the numerous developments within
the field of wireless sensing element actor networks (WSAN). These WSANs offer important data
for gathering, work management, development of crops, and limitation of crop diseases. Goals of
this paper to introducing cloud computing as a brand new way (technique) to be utilized in addition
to WSANs to any enhance their application and benefits to the area of agriculture.
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESEditor IJMTER
Carpooling (also car-sharing, ride-sharing, lift-sharing), is the sharing of car journeys so
that more than one person travels in a car. It helps to resolve a variety of problems that continue to
plague urban areas, ranging from energy demands and traffic congestion to environmental pollution.
Most of the existing method used stochastic disturbances arising from variations in vehicle travel
times for carpooling. However it doesn’t deal with the unmet demand with uncertain demand of the
vehicle for car pooling. To deal with this the proposed system uses Chance constrained
formulation/Programming (CCP) approach of the problem with stochastic demand and travel time
parameters, under mild assumptions on the distribution of stochastic parameters; and relates it with a
robust optimization approach. Since real problem sizes can be large, it could be difficult to find
optimal solutions within a reasonable period of time. Therefore solution algorithm using tabu
heuristic solution approach is developed to solve the model. Therefore, we constructed a stochastic
carpooling model that considers the in- fluence of stochastic travel times. The model is formulated as
an integer multiple commodity network flow problem. Since real problem sizes can be large, it could
be difficult to find optimal solutions within a reasonable period of time.
Sustainable Construction With Foam Concrete As A Green Green Building MaterialEditor IJMTER
A green building is an environmentally sustainable building, designed, constructed and
operated to minimise the total environmental impacts. Carbon dioxide (CO2) is the primary
greenhouse gas emitted through human activities. It is claimed that 5% of the world’s carbon dioxide
emission is attributed to cement industry, which is the vital constituent of concrete. Due to the
significant contribution to the environmental pollution, there is a need for finding an optimal solution
along with satisfying the civil construction needs. Apart from normal concrete bricks, a clay brick,
Foam concrete is a new innovative technology for sustainable building and civil construction which
fulfills the criteria of being a Green Material. This paper concludes that Foam Concrete can be an
effective sustainable material for construction and also focuses on the cost effectiveness in using
Foam Concrete as a building material in replacement with Clay Brick or other bricks.
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTEditor IJMTER
A good education system is required for overall prosperity of a nation. A tremendous
growth in the education sector had made the administration of education institutions complex. Any
researches reveal that the integration of ICT helps to reduce the complexity and enhance the overall
administration of education. This study has been undertaken to identify the various functional areas
to which ICT is deployed for information administration in education institutions and to find the
current extent of usage of ICT in all these functional areas pertaining to information administration.
The various factors that contribute to these functional areas were identified. A theoretical model was
derived and validated.
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
Data partitioning methods are used to partition the data values with similarity. Similarity
measures are used to estimate transaction relationships. Hierarchical clustering model produces tree
structured results. Partitioned clustering produces results in grid format. Text documents are
unstructured data values with high dimensional attributes. Document clustering group ups unlabeled text
documents into meaningful clusters. Traditional clustering methods require cluster count (K) for the
document grouping process. Clustering accuracy degrades drastically with reference to the unsuitable
cluster count.
Textual data elements are divided into two types’ discriminative words and nondiscriminative
words. Only discriminative words are useful for grouping documents. The involvement of
nondiscriminative words confuses the clustering process and leads to poor clustering solution in return.
A variation inference algorithm is used to infer the document collection structure and partition of
document words at the same time. Dirichlet Process Mixture (DPM) model is used to partition
documents. DPM clustering model uses both the data likelihood and the clustering property of the
Dirichlet Process (DP). Dirichlet Process Mixture Model for Feature Partition (DPMFP) is used to
discover the latent cluster structure based on the DPM model. DPMFP clustering is performed without
requiring the number of clusters as input.
Document labels are used to estimate the discriminative word identification process. Concept
relationships are analyzed with Ontology support. Semantic weight model is used for the document
similarity analysis. The system improves the scalability with the support of labels and concept relations
for dimensionality reduction process.
Testing of Matrices Multiplication Methods on Different ProcessorsEditor IJMTER
There are many algorithms we found for matrices multiplication. Until now it has been
found that complexity of matrix multiplication is O(n3). Though Further research found that this
complexity can be decreased. This paper focus on the algorithm and its complexity of matrices
multiplication methods.
Malware is a worldwide pandemic. It is designed to damage computer systems without
the knowledge of the owner using the system. Software‟s from reputable vendors also contain
malicious code that affects the system or leaks information‟s to remote servers. Malware‟s includes
computer viruses, spyware, dishonest ad-ware, rootkits, Trojans, dialers etc. Malware detectors are
the primary tools in defense against malware. The quality of such a detector is determined by the
techniques it uses. It is therefore imperative that we study malware detection techniques and
understand their strengths and limitations. This survey examines different types of Malware and
malware detection methods.
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
Practical requirements for securely demonstrating identities between two handheld
devices are an important concern. The adversary can inject a Man-In- The-Middle (MITM) attack to
intrude the protocol. Protocols that employ secret keys require the devices to share private
information in advance, in which it is not feasible in the above scenario. Apart from insecurely
typing passwords into handheld devices or comparing long hexadecimal keys displayed on the
devices’ screen, many other human-verifiable protocols have been proposed in the literature to solve
the problem. Unfortunately, most of these schemes are unsalable to more users. Even when there are
only three entities attempt to agree a session key, these protocols need to be rerun for three times.
So, in the existing method a bipartite and a tripartite authentication protocol is presented using a
temporary confidential channel. Besides, further extend the system into a transitive authentication
protocol that allows multiple handheld devices to establish a conference key securely and efficiently.
But this method detects only the outsider attacks. Method does not consider the insider attacks. So,
in the proposed method trust score based method is introduced which computes the trust values for
the nodes and provide the security. The trust score is computed has a positive influence on the
confidence with which an entity conducts transactions with that node. Network the behavior of the
node will be monitored periodically and its trust value is also updated .So depending on the behavior
of the node in the network trust relation will be established between two nodes.
GLAUCOMA is a chronic eye disease that can damage optic nerve. According to WHO It
is the second leading cause of blindness, and is predicted to affect around 80 million people by 2020.
Development of the disease leads to loss of vision, which occurs increasingly over a long period of
time. As the symptoms only occur when the disease is quite advanced so that glaucoma is called the
silent thief of sight. Glaucoma cannot be cured, but its development can be slowed down by
treatment. Therefore, detecting glaucoma in time is critical. However, many glaucoma patients are
unaware of the disease until it has reached its advanced stage. In this paper, some manual and
automatic methods are discussed to detect glaucoma. Manual analysis of the eye is time consuming
and the accuracy of the parameter measurements also varies with different clinicians. To overcome
these problems with manual analysis, the objective of this survey is to introduce a method to
automatically analyze the ultrasound images of the eye. Automatic analysis of this disease is much
more effective than manual analysis.
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
Reliability is playing very vital role in some application of Wireless Sensor Networks
and multipath routing is one of the ways to increase the probability of reliability. More over energy
consumption is constraint. In this paper, we provide a survey of the state-of-the-art of proposed
multipath routing algorithm for Wireless Sensor Networks. We study the design, analyze the tradeoff
of each design, and overview several presenting algorithms.
Step up DC-DC Impedance source network based PMDC Motor DriveEditor IJMTER
This paper is devoted to the Quasi Z source network based DC Drive. The cascaded
(two-stage) Quasi Z Source network could be derived by the adding of one diode, one inductor,
and two capacitors to the traditional quasi-Z-source inverter The proposed cascaded qZSI inherits all
the advantages of the traditional solution (voltage boost and buck functions in a single stage,
continuous input current, and improved reliability). Moreover, as compared to the conventional qZSI,
the proposed solution reduces the shoot-through duty cycle by over 30% at the same voltage boost
factor. Theoretical analysis of the two-stage qZSI in the shoot-through and non-shoot-through
operating modes is described. The proposed and traditional qZSI-networks are compared. A
prototype of a Quasi Z Source network based DC Drive was built to verify the theoretical
assumptions. The experimental results are presented and analyzed.
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONEditor IJMTER
The paper reflects the spiritual philosophy of Aurobindo Ghosh which is helpful in today’s
education. In 19th century he wrote about spirituality, in accordance with that it is a core and vital part
of today’s education. It is very much essential for today’s kid. Here I propose the overview of that
philosophy.At the utmost regeneration of those values in today’s generation is the great deal with
education system. To develop the values and spiritual education in the youngers is the great moto of
mine. It is the materialistic world and without value redefinition among them is the harder task but not
difficult.
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
The software test coverage is used measure the safety measures. The safety critical analysis is
carried out for the source code designed in Java language. Testing provides a primary means for
assuring software in safety-critical systems. To demonstrate, particularly to a certification authority, that
sufficient testing has been performed, it is necessary to achieve the test coverage levels recommended or
mandated by safety standards and industry guidelines. Mutation testing provides an alternative or
complementary method of measuring test sufficiency, but has not been widely adopted in the safetycritical industry. The system provides an empirical evaluation of the application of mutation testing to
airborne software systems which have already satisfied the coverage requirements for certification.
The system mutation testing to safety-critical software developed using high-integrity subsets of
C and Ada, identify the most effective mutant types and analyze the root causes of failures in test cases.
Mutation testing could be effective where traditional structural coverage analysis and manual peer
review have failed. They also show that several testing issues have origins beyond the test activity and
this suggests improvements to the requirements definition and coding process. The system also
examines the relationship between program characteristics and mutation survival and considers how
program size can provide a means for targeting test areas most likely to have dormant faults. Industry
feedback is also provided, particularly on how mutation testing can be integrated into a typical
verification life cycle of airborne software. The system also covers the safety and criticality levels of
Java source code.
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
The software defect factors are used to measure the quality of the software. The software
effort estimation is used to measure the effort required for the software development process. The defect
factor makes an impact on the software development effort. Software development and cost factors are
also decided with reference to the defect and effort factors. The software defects are predicted with
reference to the module information. Module link information are used in the effort estimation process.
Data mining techniques are used in the software analysis process. Clustering techniques are used
in the property grouping process. Rule mining methods are used to learn rules from clustered data
values. The “WHERE” clustering scheme and “WHICH” rule mining scheme are used in the defect
prediction and effort estimation process. The system uses the module information for the defect
prediction and effort estimation process.
The proposed system is designed to improve the defect prediction and effort estimation process.
The Single Objective Genetic Algorithm (SOGA) is used in the clustering process. The rule learning
operations are carried out sing the Apriori algorithm. The system improves the cluster accuracy levels.
The defect prediction and effort estimation accuracy is also improved by the system. The system is
developed using the Java language and Oracle relation database environment.
Software Cost Estimation Using Clustering and Ranking SchemeEditor IJMTER
Software cost estimation is an important task in the software design and development process.
Planning and budgeting tasks are carried out with reference to the software cost values. A variety of
software properties are used in the cost estimation process. Hardware, products, technology and
methodology factors are used in the cost estimation process. The software cost estimation quality is
measured with reference to the accuracy levels.
Software cost estimation is carried out using three types of techniques. They are regression based
model, anology based model and machine learning model. Each model has a set of technique for the
software cost estimation process. 11 cost estimation techniques fewer than 3 different categories are
used in the system. The Attribute Relational File Format (ARFF) is used maintain the software product
property values. The ARFF file is used as the main input for the system.
The proposed system is designed to perform the clustering and ranking of software cost
estimation methods. Non overlapped clustering technique is enhanced with optimal centroid estimation
mechanism. The system improves the clustering and ranking process accuracy. The system produces
efficient ranking results on software cost estimation methods.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Online aptitude test management system project report.pdfKamal Acharya
The purpose of on-line aptitude test system is to take online test in an efficient manner and no time wasting for checking the paper. The main objective of on-line aptitude test system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their convenience and time and there is no need of using extra thing like paper, pen etc. This can be used in educational institutions as well as in corporate world. Can be used anywhere any time as it is a web based application (user Location doesn’t matter). No restriction that examiner has to be present when the candidate takes the test.
Every time when lecturers/professors need to conduct examinations they have to sit down think about the questions and then create a whole new set of questions for each and every exam. In some cases the professor may want to give an open book online exam that is the student can take the exam any time anywhere, but the student might have to answer the questions in a limited time period. The professor may want to change the sequence of questions for every student. The problem that a student has is whenever a date for the exam is declared the student has to take it and there is no way he can take it at some other time. This project will create an interface for the examiner to create and store questions in a repository. It will also create an interface for the student to take examinations at his convenience and the questions and/or exams may be timed. Thereby creating an application which can be used by examiners and examinee’s simultaneously.
Examination System is very useful for Teachers/Professors. As in the teaching profession, you are responsible for writing question papers. In the conventional method, you write the question paper on paper, keep question papers separate from answers and all this information you have to keep in a locker to avoid unauthorized access. Using the Examination System you can create a question paper and everything will be written to a single exam file in encrypted format. You can set the General and Administrator password to avoid unauthorized access to your question paper. Every time you start the examination, the program shuffles all the questions and selects them randomly from the database, which reduces the chances of memorizing the questions.
Online aptitude test management system project report.pdf
Retrieving Of Color Images Using SDS Technique
1. Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 146
e-ISSN: 2349-9745
p-ISSN: 2393-8161
Retrieving Of Color Images Using SDS Technique
Vishal Arunrao Damedhar1
, Prof. V.S. Nandedkar2
1
Department of Computer, PVPIT Bavdhan, Pune
2
Department of Computer, PVPIT Bavdhan Pune
Abstract – How data can be shared from one part of the world to the other in near real time came with
the arrival of internet. Along with this they have introduced new challenges like maintaining the
confidentiality of transmitting the data. This gave a boost to the research area related to cryptography.
Firstly, Encryption of images with the accepted encryption algorithms had significant downside as key
management was complicated and limited. Secondly, introduction to new area for encrypting images
was splitting the image at its pixel level in to multiple shares. But the major drawback of this approach
was that the recovered image had a poor quality. To overcome these mentioned drawbacks we have
proposed a new approach which does not attempt to use any type of keys for encryption.
Index Terms – Combining, Division, Image Encryption, Image Decryption, Random shares, Sieving,
Shuffling.
I. INTRODUCTION
Maintaining the secrecy and confidentiality of an image is a listless area of study. Two different
methods are being followed. Firstly, encrypting the images by using any encryption algorithm with the
help of keys and secondly, dividing the image into possible random shares in order to maintain the
image secrecy. Further the nature of the recovered image can be classified as lossy or lossless image
encryption. Thus this gave rise to two different approaches for maintaining the secrecy of an image.
A. Encryption of image with the use of keys:
The conventional method and this method use an algorithm and a key for encrypting images. Some
of the techniques which are being used are Digital Signatures Chaos Theory etc. There are some innate
disadvantages with the said techniques; the key management is limited as they rivet the use of secret
key and the computation cost is also high. Conversely the greatest advantage is that in most of the
designs the original image is recovered entirely.
B. Image Splitting
This approach in primitive form includes splitting an image in to multiple shares may be two or more
at its pixel level. The shares of the split images express no information about the original image, but
eligible set of shares when combined will produce the original image.
The main disadvantage of this approach was that the image recovered was very poor in quality. To
trounce the limitations of these approaches we put forward a new scheme, in which the quality of the
recovered image is same as it that of the original image. Many research papers have been published
using this approach, starting from a binary image [9] moving to grey scale image and finally employing
it to color images. Also in our proposed scheme we do not use any kind of key for encryption which
eventually reduces the bandwidth requirement and computational cost.
C. Mixed Approach
Splitting of an image into random shares with the help of using some kind of encryption key comes
under his approach. Incze et al. suggested the concept of sieves for the purpose of encrypting images.
2. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 147
In general sieve is a type of binary key. In order to form the shares the original image is placed over
the sieve, pixels from the original image goes through and form one share and the pixels that do not
cross will form the other share. From the study of cryptographic approaches which involves low
computation cost and keyless management guided us to take fresh approach.
D. Visual Cryptography
It is a technique in which encrypts visual information like picture, text in such a way that decryption
can be done by human visual systems without the support of computers. Simple algorithms are used;
there is no need of cryptography data or complex computations. When concerning security issues it
makes certain that hackers do not obtain any clues about the secret image from original image. Visual
information like pictures and text which are secret are taken as image and a simple algorithm is used
to encrypt to produce n copies of shares. The simplest method is creating a two bytwo structure scheme
in which the secret image is divided in to two shares. Both the shares are required for decryption. The
generated shares are dots in random which do not reveal any information about the secret image.
Visual Cryptography is a way of sharing secret images together with a group of members, where
definite group combine to get back the original image. The decryption process is fast and easy as the
shares are put on transparencies to get back the shared image. The computation cost is also very low
E. Scope and Objectives
The foremost objective of this approach is to encrypt an image without using any type of key. In this
scheme the secret image is split into multiple random images and then combined back to form the
original image. This results in low computation cost. Here the Sieving, division and shuffling process
is used to generate random shares.
II. PROPOSED TECHNIQUE
Our proposed techniques implicate dividing an image into one or more shares. The shares so produced
expose no information about the original secret image and to get back the original secret image all the
created shares are needed. This technique is executed with the help of sds algorithm which contains
three steps.
1. The first step is the sieving process in which the primary colors of the secret images are split
into Red, Green and Blue.
2. The second step is the Division process in which the split images of the secret images are
randomly divided.
3. The third step is the shuffling process in which the shares of the divided secret image are
shuffled among themselves.
Fig.1.1 Steps for generating random shares
3. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 148
When we represent colors in their additive and subtractive form they are the most chosen models. Red,
Green and Blue which are the three primary colors are mixed to get the desired colors. The example
of additive models is when colors are shown on computer monitor. Likewise the subtractive model
when using Cyan, Magenta and yellow the degree of light is reflected by the colored matter. The
desired ranges of colors are produced by the Cyan, Magenta and Yellow pigments. This model is used
in printers. The additive color model is used because of computation during encryption and decryption
in our proposed system. It is worth mentioning that in the techniques based on [6], [7] since the shares
were printed on transparencies, hence subtractive model was the natural choice for such applications
the constitutions of colors are described by the additive and the subtractive models.
III. DESIGN AND IMPLEMENTATION
This system consists of two types of user module one is the admin module and the other is the member
user module. Encryption of image is done bySieving, Division and Shuffling process. The secret image
is divided in to random shares and later on combined back to get back the original image. Decryption
of image is just the reverse process of Image encryption.
A. Admin Session and Member user Session
The Admin session include the Login, Profile, Member user creation and the member user details
whereas the Member user session comprises of Login, Image Encryption, email module, Image
decryption and changing of password.
Fig.2.1 Image encryption – DFD
Fig.3.1 Image Decryption – DFD
4. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 149
IV. MODULES DESCRIPTION
A. Registration of user
This module consists of registering the user details and provides the information which they want.
Once the user is registered a sieving and shuffling image is created. These images can be downloaded
and saved. When the user tries to login to his account he has to upload both the sieving and shuffling
image.
B. Encryption of Image
Filtering the combined Red, Green and Blue components into its individual Red, Green and Blue
components is the sieving process. The levels of the sieve actually depend upon values taken by the
Red, Green and Blue components independently. The XOR operator used reduces the computation
cost. After filtering the Red, Green and Blue components it is divided in to z parts per share.
R_ (RA, RB, RC, RD…………..RZ)
G_ (GA, GB, GC, GD…………..GZ)
B_ (BA, BB, BC, BD…………..Bc)
On dividing it is made certain that each element in RA to RZ, GA to GZ and BA to BZ are assigned random
values in such a way that the values are available for random selection. If he case is that when the
value of x=8 the values from range 0-255 are randomly assigned. The generated shares should be in
such a ways that it should generate Red, Green and Blue. Results have shown that by division the
random shares have no similarity with the original image. To randomize the shuffling operation is
performed which involves shuffling of elements individually. The value of one share depends on the
shuffling of the elements with the individual shares. Combining the generated shares yields the original
image.
C. Sending email
In this process we attach any one of the share which is to be sent to the authorized user containing
some message. Out of the two shares generated one share is sent as an attachment to the authorized
user and the other share is kept with the unit.
D. Decryption of Image
To get back the original image all the generated shared are required. The reverse process of encryption
is followed to retrieve the image. The two encrypted shares are uncombined and the uncombined shares
are un-shuffled among it to restore the original image.
E. Sequence Diagram
Fig. 4.1 Sequence Diagram
5. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 150
V. PROPOSED SDS TECHNIQUE
Input (Secret Image)
Sieve (Secret Image)
Output (R, G, B components)
n = total number of pixels (0 to n-1)
Ri / Gi / Bi are unit values z are random shares x are no. of bits representing each primary color max value is 2x
Repeat 2 for Red, Green, Blue component
for i = 0 to (n-2)
{ for share k = A to (Z-1)
Rki = Random (0, maximum _value)
aggregate _ Sum i = _ Rki } Rzi=(max_val + Ri – (Aggregate_Sumi % max_val)) % max_val
RA to RZ, GA to GZ and BA to BZ (generated shares) for k = A to Z
{ Rk-shuffle = RK
PtrFirstVac = 1
PtrLastVac = n-1
for i = 1 to (n-1)
{ If (R(k+1)(i-1) is even)
{ R(k-shuffle) PtrFirstVac = RKi
PtrFirstVac ++, i++ }
Else
{ R(A-shuffle) PtrFirstVac = RAi
i++, PtrLastVac --
} } }
Combine
For k = A to Z
RSK= (RK-shuffle XOR Gk-shuffle XOR BK-shuffle)
Thus we have Random shares (RSA, RSB------------------- RSK).
VI. ANALYSIS
Image encryption can be categorized as lossy / lossless image encryption. Visual Cryptography System
schemes all produce a tainted image quality of the recovered image. Modifications to VCS frequently
submitted to as Variants. We compare this scheme with other VCS. Digital cameras support 24 bit
true color schemes therefore most of the secret sharing schemes should support 24 bit color schemes..
Our scheme along with Also as the size of the share increases with number of shares and colors. When
considering the bandwidth factor the size of the share should be small so that they can be transmitted
with ease. If the size is apparently large it is very costly. The random share size is not a function of the
color images or the shares; in our system the size is constant thus providing better bandwidth and
storage methods. In this system the computational cost is reduced as logical XOR, OR operators are
used.
In our system there is no key management as there are no keys used. The only thing that is required is
to send one share through secured channel and the other through unsecured channel. In other schemes
the recovered original image is not the same as the original image but in our system the quality of the
recovered image is as same as the original image since there is no data loss during the sieving division
and shuffling method.
The results can be confirmed using Normalized Correlation. For measuring the NC, the given formula
is used.
NC =∑ ∑
(ௌ ⊕ ோ)
௪
ୀଵ
௪
ୀଵ
6. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 151
Where S is the secret image and R is the recovered image, w and h represent width and height of the
image.
Table 6.1 Comparison of techniques
VII. RESULTS
To authenticate the algorithm, a photograph of a user was divided in to two shares. Two shares which
have been generated; one will be kept with the authenticating group and other will be kept by the user
who is to be authenticated. The implementation is being carried out in .Net platform using C#. The
scheme will be tested with all categories of images. The process of getting back the original image
without the loss of any quality involves sieving of random shares and retrieving the shuffled shares.
The retrieved image has no loss of quality. A jpg image named leena.jpg will be been used to
demonstrate the final results. We consider a 300 x 192 pixel image which has an image depth of 24
bits. The parameters in the algorithm take the following values.
n= (300*192) = 57600 (n varies from 0 to 57599)
z=total random shares = 2 (Share A, B)
max_val = 2x = 28 = 256, x=8
PtrLastVac = (n-1) = 57599
VIII. CONCLUSION
In this paper a new encryption scheme has been brought up using VCS which is a mixed version of
image encryption schemes and traditional VCS. An image is split in to random images and the
combination of them retrieves the original image with low computation cost. The advantages of his
scheme are that the original and the retrieved images are the same. There is no pixel expansion and
thus the requirement for storage is same as that of the original image. No secret keys are involved
hence there is no key management. This scheme is vigorous to any attacks. This scheme is suitable for
authentication based application or where trust cannot be responded in any one participant for decision
making and a collective acceptance is required to proceed. A typical scenario for this could be thought
of as a secret code which has to be fed into commence of a nuclear strike, the said code could be
converted into and image and split into random shares. To retrieve the secret code all participants must
provide the random shares.
REFERENCES
[1] Thomas Verbraken, Wouter Verbeke, and Bart Baesens developes ,“A Novel Profit Maximizing Metric for
Measuring Classification Performance of Customer Churn Prediction Models” IEEE TRANSACTIONS ON
KNOWLEDGE AND DATA ENGINEERING, VOL. 25, NO. 5, MAY 2013
[2] Qingbo Li, Wei Wang,Xiaofeng Ling, and Jin Guang Wu , “Detection of Gastric Cancer with Fourier Transform
Infrared Spectroscopy and Support Vector Machine Classification” , BioMed research international, 2013 -
hindawi.com
[3] Zhen-Yu Chen, Zhi-Ping Fan, “A Hierarchical Multiple Kernel Support Vector Machine for Customer Churn
Prediction Using Longitudinal Behavioural Data” European Journal of Operational Research, 2012 – Elsevier
7. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 152
[4] Anshuman Sharma explains,” Handwritten digit Recognition using Support Vector Machine”, arXiv preprint
arXiv: 1203.3847, 2012 - arxiv.org
[5] Dragan Matic´, Filip Kulic´, Manuel Pineda-Sanchez , Ilija Kamenko ,“Support vector machine classifier for
diagnosis in electrical machines: Application to broken bar” Expert Systems with Applications 39 (2012) 8681–
8689.
[6] Ashis Pradhan “SUPPORT VECTOR MACHINE-A Survey”, (ISSN 2250-2459, Volume 2, Issue 8, August
2012)
[7] Hsu, Chih-Wei, Chih-Chung Chang, and Chih-Jen Lin. "A practical guide to support vector classification ",
http://www. csie. ntu. edu. tw/∼ jlin/papers/guide/guide. pdf (2009).
[8] Theodore B. Trafalis, Huseyin Ince , “SUPPORT VECTOR MACHINE FOR REGRESSION AND
APPLICATIONS TO FINANCIAL FORECASTING” IJCNN '00 Proceedings of the IEEE-INNS-ENNS
International Joint Conference on Neural Networks (IJCNN'00)-Volume 6.
[9] M. Naor and A. Shamir, “Visual cryptography,” in Proc. EUROCRYPT’ 94, Berlin, Germany, 1995, vol. 50, pp.
1–12, Springer-Verlag, LNCS.
[10] Kyung-Shik Shin, Taik Soo Lee, Hyun-jung KimAn “application of support vector machines in bankruptcy
prediction model” Expert Systems with Applications 28.1 (2005): 127-135.
[11] Huang, Zan, et al. "Credit rating analysis with support vector machines and neural networks: a market comparative
study." Decision support systems 37.4 (2004): 543-558.