Volume 6 Issue 5- May 2016

 

Page Title Full Text
138-143 Secret Image Sharing Technique based on Bitwise XOR
Raja Koti B K. Naveen Kumar Dr. G.V.S. Raj Kumar
Abstract

Traditional secret sharing schemes involve complex computation. A visual secret sharing (VSS) scheme decodes the secret without computation, but each shadow is m times as big as the original. Probabilistic VSS solved the computation complexity and space complexity problems at once. In this paper we propose a probabilistic (2, n) scheme for binary images and a deterministic (n, n) scheme for grayscale images. Both use simple Boolean operations and both have no pixel expansion. The (2, n) scheme provides a better contrast and significantly smaller recognized areas than other methods. The (n, n) scheme gives an exact reconstruction. Due to rapid growth of internet, the secure transmission and protection of secret information has become an important issue. Numerous methods, such as cryptography and steganography have been developed to protect secure data from malicious users on the internet. But both the methods are Single Point of Failure (SPOF) type as they use single storage mechanism and thus these two methods are not robust against loss or manipulation. Secret sharing methods which distribute a secret content among a set of participants might be one of the possible solutions. This paper focuses on the major algorithms of the secret image sharing schemes.


Full Text PDF
144-148 Assemblage of Objects from Natural Scene
Leena Mary Francis, K.C.Visalatchi, Dr. N. Sreenath
Abstract

The first phase of any image recognition process includes image pre-processing process which enhances the image and makes it clear for further detection mechanism. Picture pre-handling can fundamentally build the dependability of an optical investigation. Some channel operations which improve or diminish certain image subtle elements empower a less demanding or speedier assessment.  The AssemblagE of Objects from Natural Scene (AEON) proposes to pre-process the image and to collect the various objects from the natural scene. The image pre-processing phase includes two steps involved in it namely Image De-noising and Contrast Enhancement. Total variation approach is applied in order to remove the noise from the image and Otsu method is applied in order to enhance the clarity of the image. Then the processed image is given to the next phase in order to collect all the objects embedded in the natural scene, the Histogram of Oriented Gradients feature descriptor is used to collect the pool of objects. The dataset used for pre-processing and collection of objects is ICDAR 2015, on which performance measures such as precision, recall and f-measure are evaluated and gives good results.
Keywords – contrast enhancement, de-noising, histogram of oriented gradients, image pre-processing


Full Text PDF
149-152 Energy Efficient Data Collection in WSN with Multi-Hop Routing
Divjot Kaur, R.S Uppal, Jatinder Singh Saini
Abstract

Wireless Sensor Networks (WSNs) are usually self-organized wireless Networks which consists of a number of smart sensor nodes working together in many applications of tracking & monitoring. The main tasks of these sensor nodes are: firstly, systematic collection of data and secondly, transmits gathered data to a distant base station (BS). Hence network life- time becomes an important parameter for efficient design of data gathering schemes for sensor networks. In this paper, we use multi-hop routing to transfer the data. In our proposed energy-efficient mechanism, the most appropriates nodes (Super nodes) for data forwarding will be selected and the lifetime of the whole network will be maximized. The simulation results show that by using the proposed approach, the lifetime and number of alive -nodes of the network will be increased.

Keywords— Wireless Sensor Network, Data Collection, Energy Efficiency, Multi-hop routing,

Full Text PDF
153-160 Security from Insider Theft on Cloud Computing
Neelam Sharma, Sonia Batra
Abstract

Cloud Computing is not a new term it is basically up gradation of grid computing. It involves the concept Virtualization and service on de that can be easily access by remote computer system and cloud servers. The main importance of cloud computing is to connect people on this geographical area. Cloud Computing having lots of attractive features like scalability, service on demand, Efficiency, High Performance, Easy to Deploy, Easy to use, No need to buy resources, cheap services and Ready to use services, No maintenance by users. There are lots of services provided by cloud computing like cloud system can be public, private, hybrid or a community can handle the cloud system. It means a cloud system can be managed personally, by an organization etc.  Popular and broadly used cloud services are Software as Service (SaaS), Platform as Service (PaaS) and Infrastructure as Service (IaaS). All the services are either provided by cloud service provider on demand bases or available on rental charges. It is completely based on the subscription selected by the user. To access all these services a user only requires an internet connection on their system. With all these features cloud technology has some drawbacks which make organization to think whether they should adopt it or not. Most of the drawbacks are related to security issues. In cloud computing users or organization going to store their data on remote resources for that they needed to be hundred percent sure that their data is in right hands and will not be reveal by any people. As this is new technology all the vulnerability in system is not checked yet and may have some security holes, which is biggest issues for organization that’s stop them to adopt this technology. According to NIST [1] Cloud computing is a model for convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. In cloud computing data and applications are maintained with the use of central remote server and internet and allow consumers to use the applications without installing and also with the help of internet cloud computing allows customers to access their personal data which are stored in some other computer. Yahoo email, Gmail, or Hotmail etc. are examples of cloud computing. The email management software and the server are fully managed and controlled by the CSP Google, Yahoo etc. and are all on the cloud (Internet)
Keywords: Cloud Computing, virtualization, Software as Service, Insider Theft, Cloud Security


Full Text PDF
161-171 Performance of Ten Software Development Process Models with Principles
S.Thulasi Krishna , Dr. S .Sreekanth,
Abstract

The software development life cycle is very important in project development.  A software process model is the basic framework which gives a workflow from one stage to the next, for developing any project in efficient manner. Now days we have number of process models available but which one is best model, identification is very difficult. So in this research paper I proposed Ten software development process model histories, phases, principles and performance of software development chart. This chart explores clear architecture, behavior of process model and applicability of software development process model for various projects. This is useful for developing projects in short period.

Keywords:process model, history, phases, process model principles, performance of software development process chart.


Full Text PDF
172-175 A Review Paper on Space Time Scheme for MIMO System
Gulshan Jaiswal, Dr.G.R.Sinha
Abstract

Communication system with multiple transmitter and receiver architecture is called MIMO(Multiple input and multiple output). Capacity-wise, bit-rate wise and reliability –wise MIMO has many advantages as compared to the SISO(Single input and single output). MIMO can be classified in three different categories I.e. Spatial diversity, Spatial multiplexing and Beam Forming. Spatial multiplexing is used to get the higher data rate while spatial diversity is used to reduce the bit error rate. Here in this literature review paper authors are mainly focused on space time coding technique. In this paper various techniques channel coding, space time coding for frequency flat fading channels, MIMO, MIMO OFDM channel were discussed

Keywords— SISO(Single input single output), MIMO(Multiple input Multiple output), ML(Maximum Likelihood), STC (Space Time Coding)


Full Text PDF
176-178 Dental Clinic Management System- A New Approach
Priyanka Dhanore, Abdulla shaik, P. Ramtekkar
Abstract

Most of medical sectors today are using network services and offering Online web services in order to create more benefits for both their stakeholders and themselves, including the way of how people make booking. As a result, one system called Dental Clinic Management System with Notification using web will be develop to resolve all the current problems at clinic. The objective of this project is develop Decision Support System for Dental Clinic that provide information about the dentist profile, patient information include patient personal detail, patient treatment, patient appointment, patient billing, and dental treatment and disease. During the system development Visual Studio 10 is used in order to create interface and coding. This system is gives advantages to the all both users clinic staff and end user especially patient, where the two users can access the system.

Keywords: Dental Clinic Management System, Data Base, Dentistry and Patient Information.


Full Text PDF

 

 

 

 

 

IJCSET Menu

Downloads