This paper presents a new approach for secure image transmission. It consists of three treatments including: a compression based on Discrete Fourier Transform (DFT), a use of symmetric encryption Advanced Encryption Standard (AES) and a Data Hidden Insertion technique for the transport of sensitive information.
Image compression using embedded zero tree waveletsipij
Compressing an image is significantly different than compressing raw binary data. compressing images is
used by this different compression algorithm. Wavelet transforms used in Image compression methods to
provide high compression rates while maintaining good image quality. Discrete Wavelet Transform (DWT)
is one of the most common methods used in signal and image compression .It is very powerful compared to
other transform because its ability to represent any type of signals both in time and frequency domain
simultaneously. In this paper, we will moot the use of Wavelet Based Image compression algorithm-
Embedded Zerotree Wavelet (EZW). We will obtain a bit stream with increasing accuracy from ezw
algorithm because of basing on progressive encoding to compress an image into . All the numerical results
were done by using matlab coding and the numerical analysis of this algorithm is carried out by sizing
Peak Signal to Noise Ratio (PSNR) and Compression Ratio (CR) for standard Lena Image .Experimental
results beam that the method is fast, robust and efficient enough to implement it in still and complex images
with significant image compression.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Implementation of Image Steganography Using 2-Level DWT Technique .............................................1
Aayushi Verma, Rajshree Nolkha, Aishwarya Singh and Garima Jaiswal
Efficient Neighbor Routing in Wireless Mesh Networks.......................................................................1
V. Lakshmi Praba and A. Mercy Rani
Content Based Messaging Model for Library Information System........................................................1
Surbhi Agarwal, Chandrika Chanda and Senthil Murugan B.
Building an Internal Cloud for IT Support Organisations: A Preview .....................................................1
S. M. M. M Kalyan Kumar and Dr S. C. Pradhan
Use of Intelligent Business, a Method for Complete Fulfillment of E-government ................................1
M. Nili Ahmadabadi, Masoud Najafi and Peyman Gholami
Comparison of Swarm Intelligence Techniques ...................................................................................1
Prof. S. A. Thakare
An Efficient Rough Set Approach in Querying Covering Based Relational Databases.............................1
P. Prabhavathy and Dr. B. K. Tripathy
Image compression using embedded zero tree waveletsipij
Compressing an image is significantly different than compressing raw binary data. compressing images is
used by this different compression algorithm. Wavelet transforms used in Image compression methods to
provide high compression rates while maintaining good image quality. Discrete Wavelet Transform (DWT)
is one of the most common methods used in signal and image compression .It is very powerful compared to
other transform because its ability to represent any type of signals both in time and frequency domain
simultaneously. In this paper, we will moot the use of Wavelet Based Image compression algorithm-
Embedded Zerotree Wavelet (EZW). We will obtain a bit stream with increasing accuracy from ezw
algorithm because of basing on progressive encoding to compress an image into . All the numerical results
were done by using matlab coding and the numerical analysis of this algorithm is carried out by sizing
Peak Signal to Noise Ratio (PSNR) and Compression Ratio (CR) for standard Lena Image .Experimental
results beam that the method is fast, robust and efficient enough to implement it in still and complex images
with significant image compression.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Implementation of Image Steganography Using 2-Level DWT Technique .............................................1
Aayushi Verma, Rajshree Nolkha, Aishwarya Singh and Garima Jaiswal
Efficient Neighbor Routing in Wireless Mesh Networks.......................................................................1
V. Lakshmi Praba and A. Mercy Rani
Content Based Messaging Model for Library Information System........................................................1
Surbhi Agarwal, Chandrika Chanda and Senthil Murugan B.
Building an Internal Cloud for IT Support Organisations: A Preview .....................................................1
S. M. M. M Kalyan Kumar and Dr S. C. Pradhan
Use of Intelligent Business, a Method for Complete Fulfillment of E-government ................................1
M. Nili Ahmadabadi, Masoud Najafi and Peyman Gholami
Comparison of Swarm Intelligence Techniques ...................................................................................1
Prof. S. A. Thakare
An Efficient Rough Set Approach in Querying Covering Based Relational Databases.............................1
P. Prabhavathy and Dr. B. K. Tripathy
A Secure Color Image Steganography in Transform Domain ijcisjournal
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted image is also similar to the secret image. This is proved by the high PSNR (Peak Signal to Noise Ratio), value for both stego and extracted secret image. The results are compared with the results of similar techniques and it is found that the proposed technique is simple and gives better PSNR values than others.
Novel DCT based watermarking scheme for digital imagesIDES Editor
There is an ever growing interest in copyright
protection of multimedia content, thus digital
watermarking techniques are widely practiced. Due to
the internet connectivity and digital libraries the
research interest of protecting digital content
watermarking is extensively researched. In this paper
we present a novel watermark generation scheme
based on the histogram of the image and apply it to the
original image in the transform(DCT) domain. Further
we study the performance of the watermark against
some common attacks that can take place with images.
Experimental results show that the embedded
watermark is imperceptible and image quality is not
degraded.
Design of digital video watermarking scheme using matlab simulinkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Image Compression Using Wavelet Packet TreeIDES Editor
Methods of compressing data prior to storage and
transmission are of significant practical and commercial
interest. The necessity in image compression continuously
grows during the last decade. The image compression includes
transform of image, quantization and encoding. One of the
most powerful and perspective approaches in this area is
image compression using discrete wavelet transform. This
paper describes a new approach called as wavelet packet tree
for image compression. It constructs the best tree on the basis
of Shannon entropy. This new approach checks the entropy of
decomposed nodes (child nodes) with entropy of node, which
has been decomposed (parent node) and takes the decision of
decomposition of a node. In addition, authors have proposed
an adaptive thresholding for quantization, which is based on
type of wavelet used and nature of image. Performance of the
proposed algorithm is compared with existing wavelet
transform algorithm in terms of percentage of zeros and
percentage of energy retained and signals to noise ratio.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Self Attested Images for Secured Transactions using Superior SOMIDES Editor
Separate digital signals are usually used as the
digital watermarks. But this paper proposes rebuffed
untrained minute values of vital image as a digital watermark,
since no host image is needed to hide the vital image for its
safety. The vital images can be transformed with the self
attestation. Superior Self Organized Maps is used to derive
self signature from the vital image. This analysis work
constructs framework with Superior Self Organizing Maps
(SSOM) against Counter Propagation Network for watermark
generation and detection. The required features like
robustness, imperceptibility and security was analyzed to prove
that which neural network is appropriate for mining watermark
from the host image. SSOM network is proved as an efficient
neural trainer for the proposed watermarking technique. The
paper presents one more contribution to the watermarking
area.
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYIJCSEA Journal
The art of information hiding has been around nearly as long as the need for covert communication. Steganography, the concealing of information, arose early on as an extremely useful method for covert information transmission. Steganography is the art of hiding secret message within a larger image or message such that the hidden message or an image is undetectable; this is in contrast to cryptography, where the existence of the message itself is not disguised, but the content is obscure. The goal of a steganographic method is to minimize the visually apparent and statistical differences between the cover data and a steganogram while maximizing the size of the payload. Current digital image steganography presents the challenge of hiding message in a digital image in a way that is robust to image manipulation and attack. This paper explains about how a secret message can be hidden into an image using least significant bit insertion method along with chaos.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Secured Data Transmission Using Video Steganographic SchemeIJERA Editor
Steganography is the art of hiding information in ways that avert the revealing of hiding messages. Video Steganography is focused on spatial and transform domain. Spatial domain algorithm directly embedded information in the cover image with no visual changes. This kind of algorithms has the advantage in Steganography capacity, but the disadvantage is weak robustness. Transform domain algorithm is embedding the secret information in the transform space. This kind of algorithms has the advantage of good stability, but the disadvantage of small capacity. These kinds of algorithms are vulnerable to steganalysis. This paper proposes a new Compressed Video Steganographic scheme. The data is hidden in the horizontal and the vertical components of the motion vectors. The PSNR value is calculated so that the quality of the video after the data hiding is evaluated.
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...IDES Editor
A new watermarking algorithm which is based on
image scrambling and SVD in the wavelet domain is discussed
in this paper. In the proposed algorithm, chaotic signals are
generated using logistic mapping and are used for scrambling
the original watermark. The initial values of logistic mapping
are taken as private keys. The covert image is decomposed
into four bands using integer wavelet transform; we apply
SVD to each band and embed the
An efficient fusion based up sampling technique for restoration of spatially ...ijitjournal
The various up-sampling techniques available in the literature produce blurring artifacts in the upsampled,
high resolution images. In order to overcome this problem effectively, an image fusion based interpolation technique is proposed here to restore the high frequency information. The Discrete Cosine Transform interpolation technique preserves low frequency information whereas Discrete Sine Transform preserves high frequency information. Therefore, by fusing the DCT and DST based up-sampled images, more high frequency, relevant information of both the up-sampled images can be preserved in the restored,
fused image. The restoration of high frequency information lessens the degree of blurring in the fusedimage and hence improves its objective and subjective quality. Experimental result shows the proposed method achieves a Peak Signal to Noise Ratio (PSNR) improvement up to 0.9947dB than DCT interpolation and 2.8186dB than bicubic interpolation at 4:1 compression ratio.
Data Steganography for Optical Color Image CryptosystemsCSCJournals
In this paper, an optical color image cryptosystem with a data hiding scheme is proposed. In the proposed optical cryptosystem, a confidential color image is embedded into the host image of the same size. Then the stego-image is encrypted by using the double random phase encoding algorithm. The seeds to generate random phase data are hidden in the encrypted stego-image by a content-dependent and low distortion data embedding technique. The confidential image and secret data delivery is accomplished by hiding the image into the host image and embedding the data into the encrypted stego-image. Experimental results show that the proposed data steganographic cryptosystem provides large data hiding capacity and high reconstructed image quality.
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...ijcisjournal
dge Detection plays a crucial role in Image Processing and Segmentation where a set of algorithms aims
to identify various portions of a digital image at which a sharpened image is observed in the output or
more formally has discontinuities. The contour of Edge Detection also helps in Object Detection and
Recognition. Image edges can be detected by using two attributes such as Gradient and Laplacian. In our
Paper, we proposed a system which utilizes Canny and Sobel Operators for Edge Detection which is a
Gradient First order derivative function for edge detection by using Verilog Hardware Description
Language and in turn compared with the results of the previous paper in Matlab. The process of edge
detection in Verilog significantly reduces the processing time and filters out unneeded information, while
preserving the important structural properties of an image. This edge detection can be used to detect
vehicles in Traffic Jam, Medical imaging system for analysing MRI, x-rays by using Xilinx ISE Design
Suite 14.2.
A novel authenticated cipher for rfid systemsijcisjournal
In this paper, we present RBS (Redundant Bit Security) algorithm which is a low-complexity symmetric
encryption with a 132-bit secret key. In this algorithm redundant bits are distributed among plaintext data
bits to change the location of the plaintext bits in the transmitted data without changing their order. The
location of redundant bits inside the transmitted data represents the secret key between sender and
receiver. The algorithm provides integrity and authentication of the original data as well. The
implementation comparison of this algorithm with other algorithms confirms that it a good candidate for
resource-constraint devices such as RFID systems and wireless sensors.
Translation of sign language using generic fourier descriptor and nearest nei...ijcisjournal
Sign languages are used all over the world as a primary means of communication by deaf people. Sign
language translation is a promising application for vision-based gesture recognition methods. Therefore, it
is need such a tool that can translate sign language directly. This paper aims to create a system that can
translate static sign language into textual form automatically based on computer vision. The method
contains three phases, i.e. segmentation, feature extraction, and recognition. We used Generic Fourier
Descriptor (GFD) as feature extraction method and K-Nearest Neighbour (KNN) as classification
approach to recognize the signs. The system was applied to recognize each 120 stored images in database
and 120 images which is captured real time by webcam. We also translated 5 words in video sequences.
The experiment revealed that the system can recognized the signs with about 86 % accuracy for stored
images in database and 69 % for testing data which is captured real time by webcam.
A Secure Color Image Steganography in Transform Domain ijcisjournal
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted image is also similar to the secret image. This is proved by the high PSNR (Peak Signal to Noise Ratio), value for both stego and extracted secret image. The results are compared with the results of similar techniques and it is found that the proposed technique is simple and gives better PSNR values than others.
Novel DCT based watermarking scheme for digital imagesIDES Editor
There is an ever growing interest in copyright
protection of multimedia content, thus digital
watermarking techniques are widely practiced. Due to
the internet connectivity and digital libraries the
research interest of protecting digital content
watermarking is extensively researched. In this paper
we present a novel watermark generation scheme
based on the histogram of the image and apply it to the
original image in the transform(DCT) domain. Further
we study the performance of the watermark against
some common attacks that can take place with images.
Experimental results show that the embedded
watermark is imperceptible and image quality is not
degraded.
Design of digital video watermarking scheme using matlab simulinkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Image Compression Using Wavelet Packet TreeIDES Editor
Methods of compressing data prior to storage and
transmission are of significant practical and commercial
interest. The necessity in image compression continuously
grows during the last decade. The image compression includes
transform of image, quantization and encoding. One of the
most powerful and perspective approaches in this area is
image compression using discrete wavelet transform. This
paper describes a new approach called as wavelet packet tree
for image compression. It constructs the best tree on the basis
of Shannon entropy. This new approach checks the entropy of
decomposed nodes (child nodes) with entropy of node, which
has been decomposed (parent node) and takes the decision of
decomposition of a node. In addition, authors have proposed
an adaptive thresholding for quantization, which is based on
type of wavelet used and nature of image. Performance of the
proposed algorithm is compared with existing wavelet
transform algorithm in terms of percentage of zeros and
percentage of energy retained and signals to noise ratio.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Self Attested Images for Secured Transactions using Superior SOMIDES Editor
Separate digital signals are usually used as the
digital watermarks. But this paper proposes rebuffed
untrained minute values of vital image as a digital watermark,
since no host image is needed to hide the vital image for its
safety. The vital images can be transformed with the self
attestation. Superior Self Organized Maps is used to derive
self signature from the vital image. This analysis work
constructs framework with Superior Self Organizing Maps
(SSOM) against Counter Propagation Network for watermark
generation and detection. The required features like
robustness, imperceptibility and security was analyzed to prove
that which neural network is appropriate for mining watermark
from the host image. SSOM network is proved as an efficient
neural trainer for the proposed watermarking technique. The
paper presents one more contribution to the watermarking
area.
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYIJCSEA Journal
The art of information hiding has been around nearly as long as the need for covert communication. Steganography, the concealing of information, arose early on as an extremely useful method for covert information transmission. Steganography is the art of hiding secret message within a larger image or message such that the hidden message or an image is undetectable; this is in contrast to cryptography, where the existence of the message itself is not disguised, but the content is obscure. The goal of a steganographic method is to minimize the visually apparent and statistical differences between the cover data and a steganogram while maximizing the size of the payload. Current digital image steganography presents the challenge of hiding message in a digital image in a way that is robust to image manipulation and attack. This paper explains about how a secret message can be hidden into an image using least significant bit insertion method along with chaos.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Secured Data Transmission Using Video Steganographic SchemeIJERA Editor
Steganography is the art of hiding information in ways that avert the revealing of hiding messages. Video Steganography is focused on spatial and transform domain. Spatial domain algorithm directly embedded information in the cover image with no visual changes. This kind of algorithms has the advantage in Steganography capacity, but the disadvantage is weak robustness. Transform domain algorithm is embedding the secret information in the transform space. This kind of algorithms has the advantage of good stability, but the disadvantage of small capacity. These kinds of algorithms are vulnerable to steganalysis. This paper proposes a new Compressed Video Steganographic scheme. The data is hidden in the horizontal and the vertical components of the motion vectors. The PSNR value is calculated so that the quality of the video after the data hiding is evaluated.
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...IDES Editor
A new watermarking algorithm which is based on
image scrambling and SVD in the wavelet domain is discussed
in this paper. In the proposed algorithm, chaotic signals are
generated using logistic mapping and are used for scrambling
the original watermark. The initial values of logistic mapping
are taken as private keys. The covert image is decomposed
into four bands using integer wavelet transform; we apply
SVD to each band and embed the
An efficient fusion based up sampling technique for restoration of spatially ...ijitjournal
The various up-sampling techniques available in the literature produce blurring artifacts in the upsampled,
high resolution images. In order to overcome this problem effectively, an image fusion based interpolation technique is proposed here to restore the high frequency information. The Discrete Cosine Transform interpolation technique preserves low frequency information whereas Discrete Sine Transform preserves high frequency information. Therefore, by fusing the DCT and DST based up-sampled images, more high frequency, relevant information of both the up-sampled images can be preserved in the restored,
fused image. The restoration of high frequency information lessens the degree of blurring in the fusedimage and hence improves its objective and subjective quality. Experimental result shows the proposed method achieves a Peak Signal to Noise Ratio (PSNR) improvement up to 0.9947dB than DCT interpolation and 2.8186dB than bicubic interpolation at 4:1 compression ratio.
Data Steganography for Optical Color Image CryptosystemsCSCJournals
In this paper, an optical color image cryptosystem with a data hiding scheme is proposed. In the proposed optical cryptosystem, a confidential color image is embedded into the host image of the same size. Then the stego-image is encrypted by using the double random phase encoding algorithm. The seeds to generate random phase data are hidden in the encrypted stego-image by a content-dependent and low distortion data embedding technique. The confidential image and secret data delivery is accomplished by hiding the image into the host image and embedding the data into the encrypted stego-image. Experimental results show that the proposed data steganographic cryptosystem provides large data hiding capacity and high reconstructed image quality.
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...ijcisjournal
dge Detection plays a crucial role in Image Processing and Segmentation where a set of algorithms aims
to identify various portions of a digital image at which a sharpened image is observed in the output or
more formally has discontinuities. The contour of Edge Detection also helps in Object Detection and
Recognition. Image edges can be detected by using two attributes such as Gradient and Laplacian. In our
Paper, we proposed a system which utilizes Canny and Sobel Operators for Edge Detection which is a
Gradient First order derivative function for edge detection by using Verilog Hardware Description
Language and in turn compared with the results of the previous paper in Matlab. The process of edge
detection in Verilog significantly reduces the processing time and filters out unneeded information, while
preserving the important structural properties of an image. This edge detection can be used to detect
vehicles in Traffic Jam, Medical imaging system for analysing MRI, x-rays by using Xilinx ISE Design
Suite 14.2.
A novel authenticated cipher for rfid systemsijcisjournal
In this paper, we present RBS (Redundant Bit Security) algorithm which is a low-complexity symmetric
encryption with a 132-bit secret key. In this algorithm redundant bits are distributed among plaintext data
bits to change the location of the plaintext bits in the transmitted data without changing their order. The
location of redundant bits inside the transmitted data represents the secret key between sender and
receiver. The algorithm provides integrity and authentication of the original data as well. The
implementation comparison of this algorithm with other algorithms confirms that it a good candidate for
resource-constraint devices such as RFID systems and wireless sensors.
Translation of sign language using generic fourier descriptor and nearest nei...ijcisjournal
Sign languages are used all over the world as a primary means of communication by deaf people. Sign
language translation is a promising application for vision-based gesture recognition methods. Therefore, it
is need such a tool that can translate sign language directly. This paper aims to create a system that can
translate static sign language into textual form automatically based on computer vision. The method
contains three phases, i.e. segmentation, feature extraction, and recognition. We used Generic Fourier
Descriptor (GFD) as feature extraction method and K-Nearest Neighbour (KNN) as classification
approach to recognize the signs. The system was applied to recognize each 120 stored images in database
and 120 images which is captured real time by webcam. We also translated 5 words in video sequences.
The experiment revealed that the system can recognized the signs with about 86 % accuracy for stored
images in database and 69 % for testing data which is captured real time by webcam.
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner ijcisjournal
With the rapid advances in integrated circuit(IC) technologies, number of functions on a chip was
increasing at a very fast rate, with which interconnect density is increasing especially in functional logic
chips. The on-chip noise affects are increasing and needs to be addressed. In this paper we have
implemented a convolution encoder using a technique that provides higher noise immunity. The encoder
circuit is simulated in Tanner 15.0 with data rate of 25Mbps and a clock frequency of 250MHz
Comparative Performance Analysis of Low Power Full Adder Design in Different ...ijcisjournal
This paper gives the comparison of performance of full adder design in terms of area, power and delay in
different logic styles. Full adder design achieves low power using the Transmission Gate logic compared to
all other topologies such as Basic CMOS, Pass Transistor and GDI techniques but it make use of more
number of transistors compared to GDI. GDI occupies less area compared to all other logic design styles.
This paper presents the simulated outcome using Tanner tools and also H-Spice tool which shows power
and speed comparison of different full adder designs. All simulations have been performed in 90nm, 45nm
and 22nm scaling parameters using Predictive Technology Models in H-Spice tool.
Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes ijcisjournal
Wireless Sensor Networks (WSN) refers to a gathering of spatially scattered and committed sensors used
for to sense the environmental and physical conditions. The WSN collects and aggregates the data from
all the sensor nodes and send it to the sink. But the delay required for Radio transmission of collected
information to the sink is very high. If the delay of the network is high then the power consumption may be
high it leads to decrease in node life time. So to avoid that problem the delay of the network must be kept
at minimum in order to increase the node lifetime. If number of computations required for data
aggregation process are low then automatically the delay of the network is also very less. At present a
carry look ahead adder with parallel prefix algorithm for data aggregation is used but with this approach
is having the disadvantages like high latency and memory. To avoid all those disadvantages a novel tree
approach is proposed. The expected results are reduced in latency that is it increase the speed of data
aggregation process in Wireless sensor nodes along with less memory requirement for that Tree structure.
Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...ijcisjournal
Multi-Speaker activity (MSA) detection helps in detecting the presence of whether the speech signals has a
single speaker or multiple speaker speeches in the speech signal. It is easy to calculate the slope at ZCs
(zero crossings) of the speech signal and makes a comparison with a suitable threshold (Th). Multi-speaker
is declared as and when the zero crossing value exceeds the threshold. The impact of the proposed
technique is compared to the existing technique by calculating the sample-by-sample ZCR (Zero crossing
rate) value is demonstrated. Experimental results prove that the proposed ZCR technique achieves accurate
results than the traditional techniques for MSA detection that uses the cepstrum resynthesis residual
magnitude (CRRM) in the literature.
Content Based Image Retrieval Using Gray Level Co-Occurance Matrix with SVD a...ijcisjournal
In this paper, gray level co-occurrence matrix, gray level co-occurrence matrix with singular value
decomposition and local binary pattern are presented for content based image retrieval. Based upon the
feature vector parameters of energy, contrast, entropy and distance metrics such as Euclidean distance,
Canberra distance, Manhattan distance the retrieval efficiency, precision, and recall of the images are
calculated. The retrieval results of the proposed method are tested on Corel-1k database. The results after
being investigated shows a significant improvement in terms of average retrieval rate, average retrieval
precision and recall of different algorithms such as GLCM, GLCM & SVD, LBP with radius one and LBP
with radius two based on different distance metrics.
An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...ijcisjournal
A novel approach for optimizing the transistor dimensions of two stage CMOS op-amp using MultiObjective
Genetic Algorithm (MOGA) is presented. The proposed approach is used to find the optimal
dimensions of each transistor to improve op-amp performances for analog and mixed signal integrated
circuit design. The aim is to automatically determine the device sizes to meet the given performance
specifications while minimizing the cost function such as power dissipation and a weighted sum of the
active area. This strongly suggests that the approach is capable of determining the globally optimal
solutions to the problem. Exactness of performance prediction in the device sizing program (implemented
in MATLAB) maintained. Here Six parameters are considered i.e., open loop gain, Phase Margin (PM),
Area (A), Bandwidth of unity Gain (UGB), Power Consumption (P) and Slew Rate (SR). The circuit is
simulated in cadence(Virtuoso Spectre) 0.18um CMOS technology.
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...ijcisjournal
Integral distinguisher is the main factor of integral attack. Conventionally, higher order integral distinguisher is obtained as an extension of first order integral (conventional algorithm). The algorithm was applied to many subblock-based block ciphers, however, the conventional algorithm has some problems. We find other integral distinguisher of two sub block-based block ciphers, TWINE and LBlock, which are different from the conventional evaluations. As a solution, we propose a new algorithm to search for higher order integral distinguisher. The point of a proposal algorithm is exploitation of bijective and injective components of cipher functions. Applying the proposal algorithm to TWINE and LBlock, we confirm the results of the proposal algorithm are consistent with the results which are calculated from computer experiment. The results are the optimal distinguisher and the most advantageous one for the attackers. Our proposal algorithm contributes to development of stronger block ciphers by obtaining such integral distinguisher.
128-Bit Area Efficient Reconfigurable Carry Select Adder ijcisjournal
Adders are one of the most critical arithmetic circuits in a system and their throughput affects the overall
performance of the system. Carry Select Adder (CSLA) is one of the fastest adders used in many dataprocessing
processors to perform fast arithmetic functions. From the structure of the CSLA, it is clear that
there is scope for reducing the area and power consumption in the CSLA. In this paper, we proposed an
area-efficient carry select adder by sharing the common Boolean logic term. After logic optimization and
sharing partial circuit, we only need one XOR gate and one inverter gate for sum generation. Through the
multiplexer, we can select the final-sum only and for carry selection we need only one AND gate and one
OR gate. Based on this modification 16-, 32-, 64-, and 128-bit CSLA architecture have been developed and
compared with the conventional CSLA architecture. The proposed design greatly reduces the area
compared to other CSLAs. From this improvement, the gate count of a 128-bit carry select adder can be
reduced from 3320 to 1664. The proposed structure is implemented in Artix-7 FPGA. Compared with the
proposed design, the conventional CSLA has 65.80% less area.
Target Detection Using Multi Resolution Analysis for Camouflaged Images ijcisjournal
Target detection is a challenging problem having many applications in defense and civil. Most of the
targets in defense are camouflaged. It is difficult for a system to detect camouflaged targets in an image. A
novel and constructive approach is proposing to detect object in camouflage images. This method uses
various methodologies such as 2-D DWT, gray level co-occurrence matrix (GLCM), wavelet coefficient
features, region growing algorithm and canny edge detection. Target detection is achieved by calculating
wavelet coefficient features from GLCM of transformed sub blocks of the image. Seed block is obtained by
evaluating wavelet coefficient features. Finally the camouflage object is highlighted using image
processing schemes. The proposed target detection system is implemented in Matlab 7.7.0 and tested on
different kinds of images.
A survey on privacy preserving data publishingijcisjournal
Data mining is a computational process of analysing and extracting the data from large useful datasets. In
recent years, exchanging and publishing data has been common for their wealth of opportunities. Security,
Privacy and data integrity are considered as challenging problems in data
mining.Privacy is necessary to protect people’s interest in competitive situations. Privacy is an abilityto
create and maintain different sort of social relationships with people. Privacy Preservation is one of the
most important factor for an individual since he should not embarrassed by an adversary. The Privacy
Preservation is an important aspect of data mining to ensure the privacy by various methods. Privacy
Preservation is necessary to protect sensitive information associated with individual. This paper provides a
survey of key to success and an approach where individual’s privacy would to be non-distracted.
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...ijcisjournal
In the present work, a low-complexity Digit-Serial/parallel Multiplier over Finite Field is proposed. It is
employed in applications like cryptography for data encryption and decryptionto deal with discrete
mathematical andarithmetic structures. The proposedmultiplier utilizes a redundant representation because
of their free squaring and modular reduction. The proposed 10-bit multiplier is simulated and synthesized
using Xilinx VerilogHDL. It is evident from the simulation results that the multiplier has significantly low
area and power when compared to the previous structures using the same representation.
Impedance Cardiography Filtering Using Non-Negative Least-Mean-Square Algorithmijcisjournal
In general using several signal acquisition methods are applied to get cardio-impedance signal to analyse
the cardiac output. The analysis completely based on frequency information obtained after applying
frequency selection filters and frequency shaping filters. Here proposing a constructive approach involves
a developed Non-Negative LMS (NNLMS) followed by filtering techniques to measure and overcome the
limitations of commonly used approaches. The proposed technique performance is analysed by considering
different types of noise environments like fundamental one white noise and also sum of sinusoidal noise.
The simulation results are useful to measure the performance and accuracy under different noise
environments also a comparative analysis is done with the proposed work with existing methods under
different performance metrics by the help of quantitative analysis of algorithms. Simulation results are
found to be satisfactory in the analysis of cardiac output.
Design of Tripl-Band CPW FED Circular Fractal Antenna ijcisjournal
A novel miniaturized circular fractal antenna is designed by inscribing circular slot on rectangular ground
plane and successively forming circular rings connected by semi-circles for circular-fractal patch. Novel
modified Coplanar Waveguide (CPW) is used as feed for fractal circular patch. The analysis of parametric
variations is performed by consecutive fractal iterations, varying the radius of inscribed circle of ground
plane, slots and different ground plane configurations. To further enhance gain and radiation pattern a
dual inverted L slots is included in ground plane. From the results it is evident that, the proposed fractal
antenna possesses triple bands at 1.8GHz, 3.5GHz and 5.5GHz. These bands are used in Digital
Communication Systems (DCS) (1.8GHz), IEEE 802.16d fixed WiMAX (3.5GHz) and IEEE 802.11a WLAN
(5.5GHz) applications.
International Journal on Cryptography and Information Security ( IJCIS)ijcisjournal
International Journal on Cryptography and Information Security ( IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.
The paper proposes a new image encryption scheme based on chaotic encryption. It provides a fast
encryption algorithm based on coupled chaotic map. The image is encrypted using a pseudorandom key
stream generator. The image is partially encrypted by selecting most important components of image. To
obtain most important components of an image, discrete wavelet transform is applied.
A digital watermarking scheme based on integer wavelet transform and histogram techniques is
proposed in this paper. Lifting scheme based integer wavelet transform is used to provide ease of
transformation of compressed data and to increase the data embedding capacity. Also histogram technique
which is one of the reversible data hiding is used to embed the secret data into original image and retrieve the
original data back after extraction. The AES encryption is used to encrypt the embedded image to provide
authentication. This algorithm is developed using verilog code and implemented on FPGA Artix 7 board in
order to increase throughput, reduce area and power consumption.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
Due to enormous increase in the usage of computers and mobiles, today’s world is currently flooded with huge volumes of data. This paper is primarily focused on multimedia data and how it can be protected from unwanted attacks. Sharing of multimedia data is easy and very efficient, it has been a customary practice to share multimedia data but there is no proper encryption technique to encrypt multimedia data. Sharing of multimedia data over unprotected networks using DCT algorithm and then applying selective encryption-based algorithm has never been adequately studied. This paper introduces a new selective encryption-based security system which will transfer data with protection even in unauthenticated network. Selective encryption-based security system will also minimize time during encryption process which there by achieves efficiency. The data in the image is transmitted over a network is discriminated using DCT transform and then it will be selectively encrypted using Number Puzzle technique, and thus provides security from unauthorized access. This paper discusses about numeric puzzle-based encryption technique
and how it can achieve security and integrity for multimedia data over traditional encryption technique.
A Hybrid Approach for Ensuring Security in Data Communication cscpconf
For a very long time, various forms of steganographic and cryptographic techniques have been used to ensure security in data communication. Whereas steganography is the art of hiding the fact that any communication is taking place, cryptography on the other hand ensures data security by changing the very form of the data being communicated by using a symmetric or an asymmetric key. But, both the methods are susceptible to being weakened by a challenger. In
steganography, there is always a possibility of detection of the presence of a message by the opponent and most of the cryptographic techniques are vulnerable to disclosure of the key. This paper proposes a hybrid approach where in image steganography and cryptography are combined to protect the sensitive data thereby ensuring improved security in data
communication. To find the impact of the same, a simulator was designed in MATLAB and corresponding time complexities were recorded. The simulation results depict that this hybrid
technique although increases the time complexity but ensures an enhanced security in data communication.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Digital image compression is a modern technology which comprises of wide range of use in different fields as in machine learning, medicine, research and many others. Many techniques exist in image processing. This paper aims at the analysis of compression using Discrete Cosine Transform (DCT) by using special methods of coding to produce enhanced results. DCT is a technique or method used to transform pixels of an image into elementary frequency component. It converts each pixel value of an image into its corresponding frequency value. There has to be a formula that has to be used during compression and it should be reversible without losing quality of the image. These formulae are for lossy and lossless compression techniques which are used in this project. The research test Magnetic Resonance Images (MRI) using a set of brain images. During program execution, original image will be inserted and then some algorithms will be performed on the image to compress it and a decompressing algorithm will execute on the compressed file to produce an enhanced lossless image.
Today among various medium of data transmission or storage our sensitive data
are not secured with a third-party, that we used to take help of. Cryptography plays an
important role in securing our data from malicious attack. This paper present a partial
image encryption based on bit-planes permutation using Peter De Jong chaotic map for
secure image transmission and storage. The proposed partial image encryption is a raw data
encryption method where bits of some bit-planes are shuffled among other bit-planes based
on chaotic maps proposed by Peter De Jong. By using the chaotic behavior of the Peter De
Jong map the position of all the bit-planes are permuted. The result of the several
experimental, correlation analysis and sensitivity test shows that the proposed image
encryption scheme provides an efficient and secure way for real-time image encryption and
decryption.
Highly secure scalable compression of encrypted imageseSAT Journals
Abstract A highly secure scalable compression method for stream cipher encrypted images is described in this journal. The input image first undergoes encryption and then shuffling. This shuffling in the image pixels enhances the security. For shuffling, Henon map is used. There are two layers for the scalable compression namely base layer and enhancement layer. Base layer bits are produced by coding a series of non-overlapping patches of uniformly down sampled version of encrypted image. In the enhancement layer pixels are selected by random permutation and then coded. From all the available pixel samples an iterative multi scale technique is used to reconstruct the image and finally performs decryption. The proposed method has high security. Key Words: Encryption, Decryption, Shuffling, Scalable compression
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
Owing to advances in communication technology, a bulk of visual digital data is being stored and transmitted over the internet now-a-days. Particularly millions and millions of images transfer through the network per day as per the statistics and a result, the security of image data is an important requirement. Image encryption algorithm is used to provide this security. In this paper, an image encryption algorithm based on confusion diffusion architecture that uses dynamic key space is proposed. An internal key generator is used to generate the initial seeds for the overall encryption scheme is proposed. With these initial seeds logistic map generates pseudo random numbers then these numbers are converted into permutation order for permutation. The diffusion bits are generated in parallel using the logistic map and manipulated with pixels confused. The image pixels are iteratively confused and diffused using permutation order and diffusion bits respectively to produce cipher image in minimum number of rounds. This paper proposes a new kind of initial seed generation that utilizes the combo of logistic and tent maps. Even all external seeds are same. The internal seeds will be totally different. This ensures the key sensitivity. The simulation results and analysis confirm that the satisfactory level of security is achieved in three rounds and overall encryption time is saved.
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithmijsrd.com
Digital watermarking is one of the proposed solutions for copyright protection of multimedia data. A watermark is a form of image or text that is impressed onto paper, which provides evidence of its authenticity. A digital watermark is digital data embedded in some host document so as to later prove the ownership of the document. Digital image watermarking refers to digital data embedding in images. Robust image watermarking systems are required so that watermarked images can resist geometric attacks in addition to common image processing tasks, such as JPEG compression. Least Significant Bit (LSB) watermarking, is one of the most traditional method of watermarking which changes the LSB of individual pixels in correlation with the watermark. However, pure LSB scheme provides a fragile watermarking technique which is not acceptable in practical applications. Also, robustness against geometric attacks, such as rotation, scaling and translation, still remains one of the most challenging research topics in pixel based image watermarking. In this paper, a new pixel-based watermarking system is proposed, in which a binary logo is embedded, a bit per pixel, in the pixel domain of an image. The LSB based watermarking is then quantized using QIM, augmented with genetic algorithm to produce a watermarking scheme which is highly robust against geometrical attacks.
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
There are algorithms in existence for hiding data within an image. The proposed scheme treats the image as a whole. Here
Integer Cosine Transform (ICT) and Integer Wavelet Transform (IWT) is combined for converting signal to frequency. Hide Behind
Corner (HBC) algorithm is used to place a key at corners of the image. All the corner keys are encrypted by generating Pseudo
Random Numbers. The Secret keys are used for corner parts. Then the hidden image is transmitted. The receiver should be aware of
the keys that are used at the corners while encrypting the image. Reverse Data Hiding (RDH) is used to get the original image and it
proceeds once when all the corners are unlocked with proper secret keys. With these methods the performance of the stegnographic
technique is improved in terms of PSNR value.
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
Nowadays, digital watermarking has many
applications such as broadcast monitoring, owner identification,
proof of ownership, transaction tracking. Embedding a hidden
stream of bits in a file is called Digital Watermarking. This paper
introduces a LSB information hiding algorithm which can lift the
wavelet transform image. LSB based Steganography embeds the
hiding text message in least significant bit of the pixels. The
proposed method has good invisibility, robustness for a lot of
hidden attacks. As we think about the capacity lead us to think
about improved approach which can be achieved through
hardware implementation system by using Field Programmable
Gate Array (FPGA). In this paper hardware implementation of
digital watermarking system is proposed. MATLAB is used to
convert images into pixel-format files and to observe simulation
results. To implement this paper XPS & VB are needed. In XPS,
first select hardware & software components then by adding
source and header files & converting into bit streams and
download into FPGA, to obtain Stego image.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Secure Image Transfer in The Domain Transform DFT
1. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013
SECURE IMAGE TRANSFER IN THE DOMAIN
TRANSFORM DFT
Rakotondraina Tahina Ezéchiel1 and Rakotomalala Mamy Alain2
Department of Telecommunication, High School Polytechnic of Antananarivo,
University of Antananarivo, Madagascar
1
tahina.ezechiel@gmail.com
Department of Telecommunication, High School Polytechnic of Antananarivo,
University of Antananarivo, Madagascar
2
rakotomamialain@yahoo.fr
ABSTRACT
This paper presents a new approach for secure image transmission. It consists of three treatments
including: a compression based on Discrete Fourier Transform (DFT), a use of symmetric encryption
Advanced Encryption Standard (AES) and a Data Hidden Insertion technique for the transport of sensitive
information.
KEYWORDS
DFT, Cryptography, Watermarking, LSFR, Secure Image Transmission
1. INTRODUCTION
Our research is based on the combination of three methods of information processing.
Firstly, the information to be transferred, an image, undergoes a source coding which is a
compression of the signal used for the purpose of eliminating all redundancy and optimize the
computing power. For this we used the Discrete Fourier Transform on digital information. The
use of this mode is that, firstly, the DFT coefficients represent the image as a complex form,
which increases the choice of the use of these coefficients and, secondly, it simplifies the matrix
representation of the image and reduces the number of calculations and manipulations to do [1].
Secondly, we developed an algorithm for generating random key that is able to provide session
keys used to encrypt the information. The encryption algorithm used is AES, this symmetric
encryption algorithm is known, used and implemented in various computer systems because of its
speed and robustness against various types of known attacks, according to [2]. The encryption
system operates only on a part of the information, we use a selective encryption. We therefore
chose a part of the representation of the image obtained after the use of the Fourier transform,
which represents the coefficients representative of the information, that is to say, the real part of
the transform.
Thirdly, for the transport of the session keys, which will be used for decryption, we insert them in
the other part of the coefficients, which is the imaginary part. For this, we used an additive
watermarking technique because of his resistance to the types of geometric attacks [3]. We
present two techniques that differ from each other by their robustness against attacks.
DOI:10.5121/ijcis.2013.3101 1
2. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013
2. PROPOSED APPROACH
At the emission, we have the diagram (Figure 1). At the reception, the restitution of the
information is done through a series of reverse operation to that proposed.
Original Image
DFT
Imaginary Part Real Part
Pseudo-random
number generator
(LSFR)
Symmetric
watermarking key encryption
Imaginary Part Real Part
watermaked crypted
Crypted-
watermarked Image
Figure 1. Emission Datagram
3. RESULTS AND INTERPRETATION
As the encryption method used is a symmetric encryption, the same key will still be used for
decryption at the receiver. To enable secure sharing of the session key we insert and hide it in
another part of the information to be sent. For this, we used a technique for watermarking
information. The type of data insertion is based on watermarking robust to compression and
geometric transformation such as rotation and translation, explicitly as in [4] and [5]. For this, we
chose to use the additive watermarking method.
It should be noted that in the program, we added different techniques of diffusion and confusion
to make the algorithm difficult to understand by a cryptanalyst, but rapid at the same time. Series
of test are carried out on a personal Computer running with Intel Pentium Dual Core 2.2 GHz
with 3072 MB of RAM.
We can see at the Figure 2 that the operation generates a loss of information equivalent to the
“peak signal to noise ratio” PSNR = 31.3674 dB, a “mean square error” MSE = 47.4619 and a
“maximum of deviation quadratic” maxerr = 38.9445. The method used in this section has been
applied in the LSB of each pixel, which is why this method is more robust as we come again to
extract the session key after an attack by median filtering and after adding noise type "salt and
pepper". This approach does not stand face to geometrical attacks.
2
3. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013
Original Image Crypted-watermarked Reconstitute
Image Image
Histogram of Histogram of
Histogram of Original Crypted- Reconstitute Image
Image watermarked Image
Figure 2. Column 1: original image and his histogram, column 2 : crypted-watermarked image and his
histogram, column 3 : reconstitute image and his histogram
The correlation between the original image and the reconstructed image is corr = 0.9933, which
corresponds to an acceptable result according to its importance [3]. Table 1 shows the
effectiveness of the program both on transmission and reception. The implementation of this
program is optimized when using on a platform with limited resources such as embedded systems
or cameras.
Table 1: Implementation time of the algorithm
Implementation
CPU Time
time
Transmission 0.4315 s 0.4212 s
Reception 0.0829 s 0.0936 s
In a second approach, shown in Figure 3, the operation is done not on the least significant bits,
but rather on the set of bits. Therefore, we are faced with much loss of information at reception
because we use the low coefficients of the image obtained after the Fourier transform.
3
4. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013
Original Image crypted-watermaked Image Reconstitute Image
Histogram of Original Histogram crypted- Histogram of
Image watermaked Image Reconstitute Image
Figure 3. Column 1: original image and his histogram, column 2: crypted-watermarked image and his
histogram, column 3: reconstitute image and his histogram
We have the following results:
Table 2 : Results obtain
PSNR (dB) MSE Maxerr Corr
7.1407 1.256 e+4 1.364e+3 -0.0028
It should be noted that this second method is not resistant against attacks by scrambeling, filters
and geometric transformation. After each attack, we do not found the watermark.
Table 3: Implementation time of the algorithm
Implementation time CPU Time
transmission 0.6518 s 0.5772 s
Réception 0.1000 s 0.0936 s
The second case differs from the first on the right way to represent the coefficients of the real part
of the image compared with the encryption key, that is to say, by choosing to operate on the least
significant bits.
4
5. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013
4. CONCLUSIONS
Our approach is based on the use of the representation of the image coefficients in complex form
as a result of processing by DFT. We have seen that it is advantageous to use a selective treatment
of the image especially for the manipulation and representation of the matrix. This approach
optimizes the speed in processing time and enables parallelization of the encryption operation and
watermarking. This approach is well suited to environments with low material resources and
memory space. For robustness, the combination of AES encryption and additive watermarking is
more advantageous. AES is often recommended for symmetric encryption and additive
watermarking widely used, both are known for their resistance against the types of attacks known
and very common.
REFERENCES
[1] Jerry Gibson (2000) Handbook of Image and Video processing, Academic Press Series in
Communications, Networking and Multimedia, Al Bovik.
[2] Biggs Norman (2008) Codes: An Introduction to Information Communication and Cryptography,
Springer.
[3] Cox, Miller & Bloom (2002) Digital watermarking, Morgan Kaufmann Publishers Inc.
[4] Chang, Hwang, & Chen, (2001) “A new encryption algorithm for image cryptosystems”, The Journal
of Systems and Software, No.58, pp 83–91.
[5] T. Li, (2004) “Digital fragile watermarking scheme for authentication of JPEG images”, IEEE
Proceedings Vision, Image and Signal Processing, pp.460-466.
Authors
Tahina E. Rakotondraina was born in Antsirabe, Madagascar on 1984. He received his
M.S. in 2010 at University of Antananarivo (Madagascar). He works as a Teacher
assistant and a Ph.D. student at High School Polytechnic of Antananarivo. His currents
research interests include Cryptography, multimedia, Information Hiding, VOIP. He is a
author of one paper published in international journal.
Mamy A. Rakotomalala was born in Antananarivo, Madagascar, on 1970. He received
his Ph.D. in Computer Science and Information Engineering in 2011. He served since
2010 as a professor at High School Polytechnic of Antananarivo. His current research
interests include Images compression, multimedia, computer vision, information Hiding.
5