Volume 5 Issue 6- June 2015
Page | Title | Full Text |
---|---|---|
137-141 | Review: To Study Scope of Data Hiding in MP3
Files Nishant Sharma and Gaurav Deep Abstract
Steganography is a kind of secret communication method used to hide secret data in some digital media such as images, audio etc. Hiding secret data using audio files as carrier is known as “Audio Steganography”. The availability and the popularity of audio files make them eligible to carry hidden information, and thus hold significance. With the advancement in digital audio media, many audio steganography techniques have been developed and also used. After the events of September 11, 2001, there was immediate concern voiced regarding the possible use of steganography by the al Qaida network. There has been additional concern voiced regarding the television broadcast of bin Laden. There is the possibility that there could have been hidden messages in the audio portion of the broadcasts. MP3 file format has been very popular since its inception due to its ability to minimize the file size without compromising audible quality. Several techniques have been devised for steganography in mp3 files. One such padding byte stuffing techniques hides data by replacing padding byte in a MP3 frame by secret data. In this paper, we look at various audio steganography techniques and we study about MP3 files and techniques for data hiding in MP3 files. We study about concept of padding in MP3 file and how this can be used to implement steganography in MP3 file. |
Full Text PDF |
142-145 | Online Examination System using Command Line
Interface Tushar B Kute , Tushar J. Surwade Abstract
We have to appear for various types of online examination in our day-to-day life and while appearing for examination, candidates are able to switch between many different programs. One such program can be a Web Browser or an Informative Document and may lead to malpractice or copying. In order to avoid such malpractices, we must ensure that other programs are inaccessible to the appearing candidate. So, we present a system about an online test module which works on the principle of RPC (Remote Procedure Call) developed in C-language and is currently implemented to work on Linux Operating System. The reason behind choosing Linux as a platform is that it has many advantages, one of them being that it avoids Windows malwares up to 90%. In addition, Linux is an open source operating system and it provides any user to deeply explore its features. The system we are about to present executes on terminal-only mode or CLI (Command Line Interface). It is based on Client-Server architecture in which there is a server and number of clients. The system also uses multithreading to handle various clients simultaneously, where each client is allotted to an individual candidate. |
Full Text PDF |
146-148 | Performance Analysis of Advanced Modulation
Formats in Inter-Satellite Optical Wireless
Communication System Prabhjot Kaur, Bhawna Utreja Abstract
In this article, different modulation formats CSRZ, DRZ, DPSK have been investigated in inter-satellite links on optical wireless communication system. It has been observed that DPSK performs better at long range than CSRZ, DRZ techniques while CSRZ and DRZ perform better for little range. Q-Factor has been used for the assessment of the techniques to give the simulation results. The results show that DPSK which has simple design and less cost performs best at a higher transmission range at the data rate of 40Gbps. DPSK system has been simulated at different power levels and Q-factor has been observed at these power levels. The increasing aperture diameters of both transmitters and receivers have shown significant improvement in the performance of DPSK system. Keywords: - IsOWC (Inter-Satellite Optical Wireless Communication), DPSK (Differential Phase Shift Keying), Q-Factor. |
Full Text PDF |
149-151 | Artificial Intelligence Meets Internet of Things Anand M,Clarice Susan Abstract
The next biggest evolution would be iot. This concept deals with the basic principle that everything wold be connected through a /internet. Several countries are linked together to exchange data and news through internet. Here, physical objects are programmed to interact in the way computer devices do. This Isa new technology, where devices communicate with each other using sensors. Most of the companies are investing in IOT, and it is believed this is the area which would see immense growth. This paper gives an overview of IoT and its application areas. Keywords— Internet of Things (IoT), Artificial Intelligence, Machine Learning |
Full Text PDF |
152-154 | A Rational Approach for Detecting and Removing
Cracks from Digitized Paintings Deepika Pagrotra ,. Navneet Kaur Abstract
The quality of historical art work related painting around several hundreds of years, which are still available for reference today and which is preserved by museum and universities all around the world, is poor due to physical deterioration. Digital image processing techniques are necessary to improve the legibility of the paintings. Cracking is one of the most common deteriorations found in old masters paintings.Old paintings are great resource of transferring information from one generation to another. So it is very important to restore them. In this paper we present a fuse method for crack detection and virtual restoration of old deteriorated paintings. |
Full Text PDF |
155-157 | Document Clustering for Forensic Analysis via
Cosine Similarity Priyanka kasote , Shruti singh ,Chhaya Varade Abstract
In study of computer forensic, hundreds and thousands of files are usually inspected. Most of the data is present in amorphous form. In this framework mechanized methods of investigation are of great interest. In specific, algorithms used for clustering documents can ease the innovation of fresh and useful information from the document under study. We use a methodology that relates the document clustering algorithms to forensic analysis of computer apprehended in police investigations. We demonstrate our method by using the well-known clustering algorithms (CSPA and cosine similarity matrix). Research have been implemented with different combinations of parameters, causing in 16 different instantiations of algorithm, connected study in literature are more restricted than our study. In our study we use CSPA algorithm for clustering which will include various sub algorithms such as cosine similarity matrix and text processing algorithm. |
Full Text PDF |
158-161 | An Adaptive Approach: Text Line Extraction from
Multi-Skewed Hand Written Documents Rajath.A.N Abstract
Advancing technology has made document image processing an important feature in automation of office documentation. Digital filing system save space, paper and printing cost. The problem arises when document to be read is not placed correctly in scanner, which leads to the miss interpretation of document and increases the storage space .This paper deals with extraction of text from those skewed document and proper alignment of those texts. Keywords —Multi-Skewed, Text Line Extraction, Connected Component Labelling, RLS Algorithm, Horizontal and Vertical Projection. |
Full Text PDF |
162-165 | Integration of BPCS Steganography and Visual
Cryptography for Secure e-Pay S.Nagendrudu, V.Ramakrishna Reddy Abstract
A high-speed prosperity in E-Commerce market has been witnessed in recent time throughout the world. With ever increasing popularity of online shopping, Debit or Credit card fraud and personal information security are major concerns for customers, merchants and banks specifically in the case of CNP (Card Not Present). This paper presents a new approach for providing limited information only that is necessary for fund transfer during online shopping thereby safeguarding customer data and increasing customer confidence and preventing identity theft. The method uses combined application of steganography and visual cryptography for this purpose. Keywords: Information security, steganography, Visual Cryptography, Online shopping, Phishing |
Full Text PDF |
166-172 | Designing and Implementation of an Efficient
Fingerprint Recognition System Using Minutia
Feature and KNN Classifier Mayank Tripathy , Deepak Shrivastava Abstract
Biometric feature based person recognition system becomes very important and necessary in this age, due to higher demand of security in corporate culture. A biometric system offers automatic identification of an individual based on a unique feature or characteristic obsessed by the individual. Human fingerprints are rich in details called minutiae, which can be used as identification marks for fingerprint verification. This work deals with the development of a highly robust and efficient biometric person identification system based on fingerprint features. Particularly this work is intended to designing and implementation of an efficient fingerprint recognition system based on minutia feature and KNN classifier. To achieve good minutiae feature extraction from fingerprints, pre-processing in form of image enhancement and binarization is first applied on fingerprints before they are evaluated. Minutia-marking with false minutiae removal methods are also used to remove false minutia. The proposed work utilizes finger print minutia as a feature for finger print identification and for the efficient classification K-Nearest Neighbour (KNN) classifier is utilized. The software platform used for the implementation of the proposed work is MATLAB. A database of total 50 real fingerprint images has been developed to test the effectiveness of the proposed system. For proper evaluation of proposed system performance 25 female and 25 male fingerprint images have been used. After the complete comparative analysis recognition efficiency among proposed system and conventional minutia matching based system, it is found that the fingerprint recognition efficiency of the developed system is very high about 99.9%, while about 70% for conventional minutia matching based system. Keywords— Biometric system, fingerprint, minutia, feature extraction, feature matching, KNN Classifier. |
Full Text PDF |
173-181 | Time Efficient Algorithms for Mining Association
Rules Supriya S. Borhade, Dr. S. V. Gumaste Abstract
The difficulty of discovering association rules between items in a large database of corporate or retail organizations sales transactions. In this paper studied and presented two new algorithms for solving this problem that are basically different from the known algorithms. Experiments with mock as well as real-life data show that these algorithms do better than known algorithms by factors ranging from three for small problems to more than an order of magnitude for large problems. Also showing how the best features of the two proposed algorithms can be combined into a hybrid algorithm, called Apriori Hybrid. Scale-up experiments show linear scales that with the number of transactions using Apriori Hybrid algorithm. Apriori Hybrid also has outstanding scale-up properties with respect to the transaction size and the number of items in the database. Keywords— Apriori, Apriori-Tid, AIS, SETM, Association rule. |
Full Text PDF |
182-184 | Defining Privacy for Data Mining- An Overview Supriya S. Borhade, Dr. S. V. Gumaste Abstract
PPDM (Privacy preserving data mining) in receipt of valid data mining results without learning the original or essential data values. It has been receiving attention in the research scoiety and beyond. That time it was unclear what privacy preserving means. This paper provides a study framework and metrics for discussing the meaning of privacy preserving data mining, as groundwork for extra research in this field. |
Full Text PDF |
185-189 | Analysis of Website using Click Analytics Kawaljit Kaur, Hardeep Singh Abstract
Click Analytics is sub-domain of web analytics with a primary focus on what and where the website users are clicking on a web page. This helps analysts to study most clicked or avoided areas on a web page and the behavior of users inside the web page. Nowadays Web analytics is utilized to analyze different types of websites, but the use of Click Analytics has not been explored much especially in the educational domain of websites. In this paper, we used a Click Analytics tool called Crazy Egg in order to analyze and improve the website (www.gndu.ac.in). We collected the data of users coming on the web page for a month and then performed the analysis of collected data. We discuss the various observations and factors that play an important role towards the success or failure of a website among its users. The interpretation of results helped to know various problems existing on the web page |
Full Text PDF |
190-199 | Design and Implementation of Autopilot System
for Quadcopter Firas Abdullah Thweny Al-Saedi, Rawad A. Sabar Abstract
In this paper, a full approach of modeling and control of a four rotor unmanned air vehicle (UAV) known as quadcopter aircraft is presented. The main features of the quadcopter’s structure are across-shaped aerial vehicle, cross intersection columns leading to composition of two diagonals of a square. Four motors have been attached to the end of the cross intersection. The body angular rate ( ) of all motors is the key to the control of the quadcopter. The dynamics system modeling is examined to understand the force growth in play. The control algorithm is represented by the smart Fuzzy controller address the stability and robustness. The genetic algorithm (GA) is involved in constructing the flight controller due to its effectiveness and efficiency in optimization of the control systems. The control strategies represented by the smart Fuzzy controller was linked with the GA to obtain further improvements in the system response in both the transient and steady states. The GA is used as an optimization technique because it is becoming a very common tool for resolving optimization problems and it is employed to effectively secure optimal solutions. The Matlab Simulink is a great tool which was used to test the efficiency and the accuracy of the developed system. Keywords - Quadrotor, Fuzzy Controller, Unmanned Aerial Vehicle |
Full Text PDF |
200-205 | Remote Vehicle Tracking System through Voice
Recognition App Using Smart Phone FUsha Rani J,Dr T H Sreenivas Abstract
The car accidents/thefts in recent times have been increasing rapidly though there are a number of safety measures being installed in them. The new standard technologies designed for the cars can be easily cracked with adequate knowledge about the technology in use. A prototype of what can be implemented in real time applications has been developed in order to overcome the drawbacks in the existing system with an additional option for customization of user needs. Key Words— GPS (Global Positioning System), GSM (Global System for Mobile communication), HCI (Human-Computer Interaction), SMS (Short Message Service) |
Full Text PDF |
206-213 | Data Hiding Using Video Steganography
-A Survey Swetha V,Prajith V,Kshema V Abstract
Digital data communication has become an integral part of infrastructure nowadays. In this tech era, with the increasing importance of internet and the fast communication techniques, the security and the confidentiality of the sensitive data has become of prime concern. This has resulted in an unpredictable growth in the field of information hiding. Cryptography and steganography are the two popular methods available to provide security. One hides the existence of the message and the other distorts the message itself. Steganography is a technique to hide secret information in some other media without leaving any apparent evidence of data alteration. It comes under the assumption that if the feature is visible, the point of attack is evident, thus the objective of steganography is always to conceal the very existence of the secret data. This paper provides a state-of-the-art review and analysis of the different existing methods of video steganography and also covers classification and applications. Keywords- Cover Media, Cryptography, Data Hiding, LSB, Security, Steganography |
Full Text PDF |
- Home
- Author Instruction
- Editorial Board
- Call for Paper
- Current volume
- Archives
- Indexing
- FAQ
- Publication Fees
- Contact
- Citation Index 0.47
Email: ijcsetonline@gmail.com / editor@ijcset.net