International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...idescitation
Digital communication has seen exponential growth in the past decade.
Consequently, the security of digital data has become a field of extensive research since
piracy and unauthorized use of such data is prevalent because of the ease with which data
can be replicated or tampered. Visual Cryptography (VC) is a special cryptographic
technique where decryption is done by an authorized user by simply overlaying the shares.
Thus, there is no requirement for complex computations unlike normal cryptography.
Though simple for an authorized user, it is equally difficult for an unauthorized user to
attack since the secret message can be deciphered if and only if all the shares are available
to the attacker. The probability of this is negligibly small since one of the shares usually
needs to be registered with a Certified Authority (CA). The procedure is non- intrusive and
does not alter the contents of the host image or video. For this reason, VC has been applied
to image watermarking widely. In case of video watermarking applications, robustness
against different types of attacks like frame attacks, spatial and temporal desynchronization
attacks, statistical analysis and collusion attacks need to be considered. Also creation of
shares for videos requires feature extraction techniques which are different from that of
images. Moreover, as size of video is more, a large secret payload can be used to construct a
share. In this survey paper, the research being carried out globally on VC techniques for
videos, along with their pros and cons have been highlighted. The paper also discusses
challenges in applying VC for video watermarking. Further, a performance comparison
amongst the mentioned schemes is also provided.
Spatially Selective Antenna For Very Close Proximitybtsirline
This multi-part article
provides background on
RFID antenna-transponder
interactions, and presents
an antenna technique that
achieves greater discrimination
when reading
multiple transponders
Richard Korn, Senior Manager of Localization and Packaging Development at St. Jude Medical, and Clio Schils, Account Director of Life Sciences for Lionbridge, explain the requirements of the life sciences industry in the different Latin American countries and prove that the region has a great potential for both medical device manufacturers and, consequently, translation and localization providers.
Fleet Robo Taxi Management Solution is automatic Taxi Management Systems which handle vehicle tracking and dispatch of cabs based on intelligent business rules.
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...idescitation
Digital communication has seen exponential growth in the past decade.
Consequently, the security of digital data has become a field of extensive research since
piracy and unauthorized use of such data is prevalent because of the ease with which data
can be replicated or tampered. Visual Cryptography (VC) is a special cryptographic
technique where decryption is done by an authorized user by simply overlaying the shares.
Thus, there is no requirement for complex computations unlike normal cryptography.
Though simple for an authorized user, it is equally difficult for an unauthorized user to
attack since the secret message can be deciphered if and only if all the shares are available
to the attacker. The probability of this is negligibly small since one of the shares usually
needs to be registered with a Certified Authority (CA). The procedure is non- intrusive and
does not alter the contents of the host image or video. For this reason, VC has been applied
to image watermarking widely. In case of video watermarking applications, robustness
against different types of attacks like frame attacks, spatial and temporal desynchronization
attacks, statistical analysis and collusion attacks need to be considered. Also creation of
shares for videos requires feature extraction techniques which are different from that of
images. Moreover, as size of video is more, a large secret payload can be used to construct a
share. In this survey paper, the research being carried out globally on VC techniques for
videos, along with their pros and cons have been highlighted. The paper also discusses
challenges in applying VC for video watermarking. Further, a performance comparison
amongst the mentioned schemes is also provided.
Spatially Selective Antenna For Very Close Proximitybtsirline
This multi-part article
provides background on
RFID antenna-transponder
interactions, and presents
an antenna technique that
achieves greater discrimination
when reading
multiple transponders
Richard Korn, Senior Manager of Localization and Packaging Development at St. Jude Medical, and Clio Schils, Account Director of Life Sciences for Lionbridge, explain the requirements of the life sciences industry in the different Latin American countries and prove that the region has a great potential for both medical device manufacturers and, consequently, translation and localization providers.
Fleet Robo Taxi Management Solution is automatic Taxi Management Systems which handle vehicle tracking and dispatch of cabs based on intelligent business rules.