Refine your search
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Devapriya, M.
- Digital Image Watermarking Scheme Using DWT-SVD Domain
Abstract Views :127 |
PDF Views:2
Authors
M. Devapriya
1,
K. Ramar
2
Affiliations
1 Dept. of Computer Science, Government Arts College, Udumalpet, IN
2 Dept of CSE, National Engineering College, Kovilpatti-628502, IN
1 Dept. of Computer Science, Government Arts College, Udumalpet, IN
2 Dept of CSE, National Engineering College, Kovilpatti-628502, IN
Source
Digital Image Processing, Vol 2, No 2 (2010), Pagination: 68-73Abstract
Information transfer by hiding the data into a host image is a remarkable technique known by the name Digital watermarking. Digital watermarking can be functional to an assortment of fields like text, image, audio, video and software. Bundle of tools has been recognized in order to duplicate and transform the multimedia data. Consequently security is mainly an important argument that requires some mechanism to save from harm the digital multimedia data. In order to look after those multimedia data on the Internet numerous techniques are accessible including a variety of encryption techniques, steganography techniques, watermarking techniques and information hiding techniques. Digital watermarking is a technique in which one can hide the data or information in another object (cover data) and transfers it over the network. The data hiding is able to take place moreover in spatial domain or in frequency domain. This paper proposes a non-blind watermarking scheme in which the original image is decomposed into four frequency bands. The DWT coefficients in these frequency bands are then personalized in order to hide the watermark data. SVD is competent of resourcefully representing the intrinsic algebraic properties of an image, where singular values keep up a correspondence to the brightness of the image and singular vectors reflect geometry characteristics of the image. Therefore in this approach the robustness can be achieved by DWT, stability of watermark image is increased by SVD, and imperceptibility is ensured by the use of enhanced DWT domain human visual model. The performance comparison of the algorithms among the first three levels of frequency band decomposition is taken into account on order to investigate the efficiency of the proposed approach.Keywords
Discrete Wavelet Transformation (DWT), Digital Image Watermarking, Human Visual Model, Imperceptibility, Singular Value Decomposition (SVD).- Applications and Techniques of Outlier Detection
Abstract Views :182 |
PDF Views:2
Authors
P. Divya
1,
M. Devapriya
1
Affiliations
1 Government Arts College, Coimbatore, IN
1 Government Arts College, Coimbatore, IN
Source
Data Mining and Knowledge Engineering, Vol 4, No 5 (2012), Pagination: 265-269Abstract
Outlier detection plays a vital role in many data-mining applications. Noisy data is a significant problem which is being researched in diverse fields of research and application domains. Many outlier detection techniques have been developed specific to certain application domains, while some techniques are more generic. A research on crime and terrorist activities are some of the application domains are being researched with strict confidentiality. The techniques and results of such techniques are not readily forthcoming. In this paper, various outlier detection techniques are discussed in a structured and generic description. With this exercise, the researchers have attain a better understanding of the different directions of research on outlier analysis. Then, the applications of outlier detection are also screened out in a better and precise way. This paper will be useful for beginners in this research field.Keywords
Outliers, Outlier Detection, Outlier Applications.- A Novel Secure Routing Protocol based on Retina Biometric Authentication
Abstract Views :160 |
PDF Views:5
Authors
R. Sudha
1,
M. Devapriya
2
Affiliations
1 Department of Computer Science, PSG College of Arts and Science, Coimbatore, Tamil Nadu, IN
2 Department of Computer Science, Government Arts College, Coimbatore, Tamil Nadu, IN
1 Department of Computer Science, PSG College of Arts and Science, Coimbatore, Tamil Nadu, IN
2 Department of Computer Science, Government Arts College, Coimbatore, Tamil Nadu, IN
Source
Biometrics and Bioinformatics, Vol 9, No 7 (2017), Pagination: 129-133Abstract
The development of the internet in the recent years leads to the security and authentication of users data. It is still a challenging problem in the Wireless Body Sensor Network (WBSN). It is important to protect the personal medical and health information collected by the biosensors. To protect the physiological data biometric authentication is implemented on physical features to provide privacy. Biometric field recently works on reduce in process delay and enhances the level of accuracy. WBSN authenticates systems works based on retina intrinsically of physiological and behavioral characteristics of persons. It provides solutions to network security problems by replacing the authentication component of the traditional systems. The experimental results shows that by implementing BFTASR protocol on retina authentication performance proves that more secure than existing approach.Keywords
Biometric, Image Acquisition, Image Pre-Processing and Wireless Body Sensor Network (WBSN).References
- Pathania, S. and Bilandi, N., 2014. Security issues in Wireless Body area network. Int J ComputSci Mobile Comput, 3(4), pp.1171-1178.
- Brussee, P.W.G. and Pouwelse, J.A., 2015. Survey of robust and resilient social media tools on Android. arXiv preprint arXiv:1512.00071.
- Saraswathi, K., Jayaram, B. and Balasubramanian, R., 2011. Retinal biometrics based authentication and key exchange system. International Journal of Computer Application, 19(1).
- Borah, T.R., Sarma, K.K. And Talukdar, P.H., Retina Based Biometric Identification System In 2012.
- Uludag U, Pankanti S, Prabhakar S, Jain AK. Biometric cryptosystems: issues and challenges. Proceedings of the IEEE. 2004 Jun; 92(6):948-60.
- Panchal, P., Bhojani, R. and Panchal, T., 2016. An Algorithm for Retinal Feature Extraction Using Hybrid Approach. Procedia Computer Science, 79, pp.61-68.
- Choraś, R.S., 2012, August. Retina recognition for biometrics. In Digital Information Management (ICDIM), 2012 Seventh International Conference on (pp. 177-180). IEEE.
- Kirbas, C. and Quek, F., 2004. A review of vessel extraction techniques and algorithms. ACM Computing Surveys (CSUR), 36(2), pp.81-121.
- Xu, L. and Luo, S., 2010. A novel method for blood vessel detection from retinal images. Biomedical engineering online, 9(1), p.14.
- Farzin, H., Abrishami-Moghaddam, H. and Moin, M.S., 2008. A novel retinal identification system. EURASIP Journal on Advances in Signal Processing, 2008(1), p.280635.
- Tajuddin, M. and Nandini, C., 2013. Cryptographic Key Generation using Retina Biometric Parameter. International Journal of Engineering and Innovative Technology (IJEIT) Volume, 3.
- Borah, T.R., Sarma, K.K. and Talukdar, P.H., 2013. Retina and fingerprint based biometric identification system. International Journal of Computer Applications (IJCA), 74.
- Barkhoda, W., Tab, F.A. and Amiri, M.D., 2009, October. Rotation invariant retina identification based on the sketch of vessels using angular partitioning. In Computer Science and Information Technology, 2009. IMCSIT'09. International Multiconference on (pp. 3-6). IEEE.