Refine your search
Collections
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Agrawal, Vikram
- DNA-Based Audio Steganography
Abstract Views :162 |
PDF Views:2
Authors
Affiliations
1 Computer Department, B.V.M. Engineering College, Gujarat Technological University, Vallabh Vidhyanagar, Gujarat, IN
2 IT Department, B.V.M. Engineering College, Gujarat Technological University, Vallabh Vidhyanagar, Gujarat, IN
1 Computer Department, B.V.M. Engineering College, Gujarat Technological University, Vallabh Vidhyanagar, Gujarat, IN
2 IT Department, B.V.M. Engineering College, Gujarat Technological University, Vallabh Vidhyanagar, Gujarat, IN
Source
Oriental Journal of Computer Science and Technology, Vol 8, No 1 (2015), Pagination: 43-48Abstract
Security is the important criteria relevant to information in transit as well as in storage. Steganography is the technique of hiding secret message in a cover medium in such a way that only the sender and the intended recipient knows the existence of communication. DNA due to its immense storage capacity and high randomness is used now in the field of steganography. Audio steganography is concerned with hiding information in a cover (host) audio signal in an imperceptible way. In this paper, various techniques using DNA sequences and audio files for data hiding is discussed for secure data transmission and reception. It also proposes highly secure method to hide the existence of secret message to prevent unauthorized access. The proposed method has three levels. Single level of encryption and two levels of steganography are used. The main objective of this method is that no one could be able to find the existence of secret message.Keywords
Steganography, Data Hiding, Information Security, DNA Sequence, Audio Steganography.- Optimized Image Mosaicing with Moment Invariants and SIFT Features
Abstract Views :216 |
PDF Views:3
Authors
Affiliations
1 Department of Information Technology, B.V.M. Engineering College, V.V.Nagar, IN
2 Department of Computer Engineering, B.V.M. Engineering College, V.V.Nagar, IN
1 Department of Information Technology, B.V.M. Engineering College, V.V.Nagar, IN
2 Department of Computer Engineering, B.V.M. Engineering College, V.V.Nagar, IN
Source
Oriental Journal of Computer Science and Technology, Vol 10, No 1 (2017), Pagination: 66-75Abstract
In the field of Image mosaicing, much research has been done to fulfil the two major challenges, time complexity and quality improvement. Proposed method is a pre-processing step before actual image stitching carried out. The method aims to find out the overlapping regions in two images. Thus features can be extracted from these overlapping regions and not from the whole images, which result into reduction of computation time. For detecting overlapping portion, gradient based edge extraction method and invariant moments are used. In the deduced region, SIFT features are extraction to determine the matching features. The registration process carried out by RANSAC algorithm and final output mosaic will obtained by warping the images. An optimized approach to calculate the moment difference values is presented to improve time efficiency and quality.Keywords
Image Registration, Edge Detection, Moment Invariants, Feature Extraction, Image Mosaicing, SIFT, RANSAC.References
- Manjusha Deshmukh, Udhav Bhosle, “A Survey of Image Registration”, International Journal of Image Processing (IJIP), 5(3), (2011).
- Medha V. Wyawahare, Dr. Pradeep M. Patil, and Hemant K. Abhyankar, “Image Registration Techniques: An overview”, International Journal of Signal Processing, Image Processing and Pattern Recognition, 2(3), (2009).
- H Hemlata Joshi, Mr. Khomlal Sinha, “A Survey on Image Mosaicing Techniques”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 2(2), (2013).
- A.Annis Fathima, R. Karthik, V. Vaidehi, “Image Stitching with Combined Moment Invariants and SIFT Features”, Procedia Computer Science 19: 420 – 427, ( 2013 ).
- Udaykumar B Patel, Hardik N Mewada, “Review of Image Mosaic Based on Feature Technique”,International Journal of Engineering and Innovative Technology (IJEIT), 2(11), (2013).
- H Hetal M. Patel, Pinal J. Patel, Sandip G. Patel, “Comprehensive Study And Review Of Image Mosaicing Methods”, International Journal of Engineering Research & Technology (IJERT), 1(9),(2012).
- M.M. El-gayar, H. Soliman, N. meky, “A comparative study of image low level feature extraction algorithms”, Egyptian Informatics Journal 14, 175–181, (2013).
- John J. Oram, James C. McWilliams, Keith D. Stolzenbach, “Gradient-based edge detection and feature classification of sea-surface images of the Southern California Bight”, Remote Sensing of Environment 112, 2397–2415, (2008).
- Konstantinos G. Derpanis, “Overview of the RANSAC Algorithm”, kosta@cs.yorku.ca, Version 1.2, May 13, 2010.
- David G. Lowe, “Distinctive Image Features from Scale-Invariant Keypoints”, Computer Science Department, University of British Columbia, Vancouver, B.C., Canada. (Accepted for publication in the International Journal of Computer Vision, 2004).
- Security with Respect to MANET (Mobile Ad-hoc Network) and IoT (Internet of Things)
Abstract Views :208 |
PDF Views:2
Authors
Affiliations
1 IT Dept, BVM Engineering College, G.T.U. Gujarat, IN
1 IT Dept, BVM Engineering College, G.T.U. Gujarat, IN
Source
Oriental Journal of Computer Science and Technology, Vol 10, No 1 (2017), Pagination: 82-85Abstract
MANET is self organizing, decentralized and dynamic network. In which participating nodes can move anywhere. The nodes can be host or router anytime [1]. Mobile ad hoc network is decentralized network so if one node is participating as router for particular time but if that node leave network then it is very difficult to transfer data packets. The main feature of MANET network of self organizing capability of node has advantage and disadvantage as well. By this it is easy to maintain network and convert topology but at same time we need to tolerate data transfer. The MANET is also used for big network and internet but there is no smart objects like IoT which can share information machine to machine. Now rapidly increase internet users worldwide to access global information and technology [2]. IoT is basically used to converge applications and services to open global business opportunities which can use I-GVC (Information-driven Global Value Chain) for efficient productivity.Keywords
IoT, MANET, Global, Security.References
- Agrawal, Vikaram M., and HiralChauhan. “An Overview of security issues in Mobile Ad hoc Networks.” International Journal of Computer Engineering and Sciences 1(1): 9-17, (2015).
- Daniele Miorandi, Sabrina Sicari, Francesco DePellegrini, ImrichChlamtac, “Internet of things: Vision, applications and research challenges “,Ad Hoc Networks ,10,1497– 1516,(2012).
- Vikram M. Agrawal, Samip A. Patel, “A STUDY ON SECURITY LEVEL OF ADHOC ROUTING PROTOCOL TO FIND OTHER APPROACH WITH DSDV”, in IJCET (IAEME) 4(6), 240-246, (2013). ISSN 0976 – 6367(Pr int ) , ISSN 0976 – 6375(Online).
- F. Stajano and R. Anderson, “The Resurrecting Duckling: Security Issues for Ad Hoc Wireless Networks,” Security Protocols, 7th International Workshop, LNCS, SpringerVerlag, 2009.
- Kuldeep Sharma, NehaKhandelwal and Prabhakar.M, “An Overview Of security Problems in MANET,” http://psrcentre.org/ images/extraimages/155.pdf
- A technology roadmap of the Internet of Things, 4 April 2008, Appendix F of Disruptive Technologies Global Trends 2025 page 1 Figure 15 (Background: The Internet of Things), SRI Consulting Business Intelligence/National Intelligence Council
- Zhang Hua,GaoFei ,WenQiaoyan” A Password-Based Secure Communication Scheme in Battlefields for Internet of Things”, China Communications, 8(1),72-78,(2011).
- Zhijing Qin, Denker, G., Giannelli C., Bellavista P. Venkatasubramanian, N., “A software Defined Networking architecture for the Internet - of-Things,” in Network Operations and Management Symposium (NOMS), Pages 1-9, 5-9 May 2014.
- Improve Fingerprint Recognition Using Both Minutiae Based and Pattern Based Method
Abstract Views :163 |
PDF Views:0
Authors
Affiliations
1 B.V.M. Engineering College, GTU, V.V. Nagar-388120, IN
2 IT dept, B.V.M. Engineering College, GTU, V.V. Nagar-388120, IN
1 B.V.M. Engineering College, GTU, V.V. Nagar-388120, IN
2 IT dept, B.V.M. Engineering College, GTU, V.V. Nagar-388120, IN