A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Ataursafi Rahaman Laskar, Md.
- Implementation of a Pyroelectric Infrared Sensor and Wireless Intrusion Detection Based Security System by Using ARM Processor
Authors
1 Aliah University, Salt Lake City, Kolkata, IN
Source
Indian Science Cruiser, Vol 29, No 1 (2015), Pagination: 17-23Abstract
Home and industrial security today needs to make use of the latest technological components. Wireless communication of various machines and devices in mobile networks is a fast growing business and application area in industry, maintenance business, customer service, security and banking areas. Home security is very popular in present days in its simplest form home controlling is the ability to control lighting, household and image recognition, appliances remotely with this device automation safety from theft, leak in of raw gas and fire is also the most important requirement of home for people by using Wireless technology. The design integrates the device to be controlled, the ARM Processor and the GSM module so that it can be used for a wide range of applications. In this paper I am going to present the design and Implementation of a Pyroelectric Infrared Sensor and Wireless Intrusion Detection Based Security System by Using ARM Processor Technology.
In this proposes a new solution is presented for remote security and device control system. This system offers a complete, low cost, Powerful and user friendly way of 24 hours of real time monitoring and remote control of a home and industrial security.
Keywords
Wireless Communication, GSM Module, Pyroelectric Infrared Sensor, ARM Processor.- Detection and Implementation of Robust Image Steganography by Using LSB Injection Technique
Authors
1 Aliah University, Kolkata, IN
2 Consistent Services, Kolkata, IN
Source
Indian Science Cruiser, Vol 28, No 6 (2014), Pagination: 29-36Abstract
The art or science of concealing the existence of data within an ordinary and inconspicuous medium or host is called Steganography and the art of detecting the hidden message embedded in digital media using Steganography is called Steganalysis. There are many different carriers for steganography but the most popular is digital images. The Least Significant Bit of a file is the last bit (technically speaking, it is the first) in an 8-bit byte, which modifies the value of the byte by only 1 if changed.
Original and output data are compared to each other and the robustness of the application against steganalysis attacks is measured using SHADE tools. This paper focuses on the techniques of Least Significant Bit (LSB), Embedding using digital images as a medium and an overview of image Steganography, its uses and techniques.
In this paper a new method is presented, implemented and analyzed.