Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Venkat Narayana Rao, T.
- Reversible Watermarking Mechanisms - a New Paradigm in Image Security
Abstract Views :362 |
PDF Views:86
Authors
Affiliations
1 C.V.R College of Engg., Jawaharlal Technol. University, Hyderabad, A.P, IN
2 Dept. of Computer Science & Engg., Jawaharlal Technol. University, Hyderabad, IN
1 C.V.R College of Engg., Jawaharlal Technol. University, Hyderabad, A.P, IN
2 Dept. of Computer Science & Engg., Jawaharlal Technol. University, Hyderabad, IN
Source
Indian Journal of Science and Technology, Vol 2, No 5 (2009), Pagination: 23-28Abstract
This paper, discuss the features and concepts pertaining to the three popular visible reversible watermarking algorithms and analyze them to evaluate with metrics such as MSE and PSNR values based on implementation i.e. a) Wavelet based watermarking technique b) Tian's difference expansion technique c) LSB-prediction error expansion technique. It is recommended to adopt new reversible data-embedding technique called Least Significant Bit prediction-error expansion which exploits the correlation inherent in the neighborhood of a pixel and provides an effective method for data embedding than the difference-expansion wavelet based schemes. Reversibility aspect ensures image verification, security , lossless embedding and also extraction of images during the damage of source images itself (i.e., image recovery process).Keywords
Watermark, Data Embedding, Data SecurityReferences
- Cox M. Miller and J. Bloom (2001) Digital Watermarking. San Mateo, CA: Morgan Kaufmann.
- Diljith M. Thodi and Jeffrey J. Rodríguez (2007) Expansion Embedding Techniques for Reversible Watermarking. IEEE Trans. on Image Processing. 16, (3),721-730.
- Fridrich J, Goljan M and Du R (2002) Lossless data embedding new paradigm in digital watermarking. EURASIP J. Appl. Signal Processing, 2002 (2), 185- 196.
- Ghouti L, Bouridane A, Ibrahim MK and Boussakta (2006) Digital image watermarking using balanced multiwavelets. IEEE Trans. Signal Process. 54 (4), 4707-4719.
- Kamstra L and Heijmans H (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans. Image Proc. 14 (12) 2082– 2090.
- Keinert F (2004) Wavelets and multiwavelets. Chapman and Hall/CRC. ISBN: 1-58488-304-9.
- Lebrun J and Vetterli M (2001) High-order balanced multiwavelets: theory, factorisation and design. IEEE Trans. Signal Process. 49 (9), 1918–1930.
- Lin E, Eskicioglu A, Lagendijk R and Delp E (2005) Advances in digital content protection. Proc. IEEE. 93 (1) 171–183.
- Martin MB and Bell AE (2001) New image compression techniques multiwavelets and multiwavelet packets. IEEE Trans. Image Process. 10, (4), 500-510.
- Miller M, Cox I and Bloom J (2000) Informed embedding: exploiting image and detector information during watermark insertion. In: Proc. Int. Conf. Image Processing. Sep., Vancouver, BC, Canada.
- Petitcolas FAP, Anderson RJ and Kuhn MG (1999) Information hiding-A survey. Proc. IEEE, 87,1062-1078.
- Rafael C. Gonzalez and Richard E. Woods (2004) Digital Image Processing. Pearson Education Edition, 6th Indian reprint.
- Sha Wang, Dong Zheng and Jiying Zhao (2007) An image quality evaluation method based on digital watermarking. IEEETrans. Comm. 17 (1), 453-467.
- Strela V, Heller PN, Strang G, Topiwala P and Heil C (1999) The application of multi wavelet filter banks to image processing. IEEE Trans. Image Process., vol. 8 (4), 548-563.
- Tian J (2002) Reversible watermarking by difference expansion. In: Proc. of Workshop on Multimedia and Security: Authentication, Secrecy, and Steganalysis. Eds. Dittmann J, Fridrich J and Wohlmacher P, Dec., pp:19-22.
- Tseng YC, Chen Y-Y and Pan H-K (2002) A secure data hiding scheme of binary images. IEEE Trans. Commun. 50 (5), 320-334.
- Van der Veen M, Bruekers F, Van Leest A and S. Cavin (2003) High capacity reversible watermarking. Proc. SPIE, pp:11-20.
- Efficient Segmentation and Classification of Mammogram Images with Fuzzy Filtering
Abstract Views :256 |
PDF Views:0
Authors
Affiliations
1 JNTUK and SNIST, Hyderabad - 501301, IN
2 SIT, Department of CSE, JNTUH, Hyderabad - 500085, IN
1 JNTUK and SNIST, Hyderabad - 501301, IN
2 SIT, Department of CSE, JNTUH, Hyderabad - 500085, IN
Source
Indian Journal of Science and Technology, Vol 8, No 15 (2015), Pagination:Abstract
Background: Worldwide and across India breast cancer is the most common cause of cancer deaths in women. Early or timely detection leads to decrease in the mortality rate. Hence, classification of patients based on the size of the tumor/abnormal masses and less treatment cost must be high priority. Methods/Statistical Analysis: In this paper mammogram images are being acquired from real time and standard databases for imaging the suspected patients. The main purposes of the suggested methods are to diagnose the cancer using fuzzy rules with minimum phases in implementation. Important factors were drawn from the images for subsequent investigation and analysis with the help of Fuzzy Enhanced Mammogram Segmentation scheme. The paper presents two methods and is implemented in (i.e. FEM1 and FEM2) Mat lab programming environment. Results: The images examined were marked by qualified Radiologist and extracted the images using Photoshop tool. The proposed methodologies were evaluated for real images and Mammographic Image Analysis Society (MIAS) database images consists of 320 images for 160 patients each of 1024x1024 resolutions based gray level images. Based on the results it is found that the CDR for FEM1 is 87% whereas FEM2 demonstrates only 77% and also takes 6.25 times lesser execution time. Radiologists need more precise and reduced processing time making the outcome of FEM1 method more practicable. For the evaluation of performance, statistical properties like Similarity Index (SI), Correct Detection Ratio (CDR), and Under Segmentation Error (USE) are computed. The paper presents computations of segmentation efficiency, enhancement performance and comparative analysis between the method 1 and method 2 in terms of segmentation efficiency and CPU processing time. Finally Support Vector Method is used to classify whether the mammogram under test is normal or abnormal. Conclusion: FEM1 outperforms other similar methods. The proposed work provides faster, accurate results and more useful for the diagnosis and classify the abnormal tumors or masses at a cheaper cost.Keywords
Enhancement, Fuzzy, Image Classification, Image Segmentation, Mammogram, Wavelet- Improved Lossless Embedding and Extraction - A Data Hiding Mechanism
Abstract Views :196 |
PDF Views:110
Authors
Affiliations
1 Tirumala Engineering College, Bogaram, Kesara, RR District, A.P., IN
2 Jawaharlal Nehru Technological University, Hyderabad, College of Engineering, Jagityala, A.P., IN
3 Sathyabama University, Chennai, IN
1 Tirumala Engineering College, Bogaram, Kesara, RR District, A.P., IN
2 Jawaharlal Nehru Technological University, Hyderabad, College of Engineering, Jagityala, A.P., IN
3 Sathyabama University, Chennai, IN
Source
AIRCC's International Journal of Computer Science and Information Technology, Vol 2, No 2 (2010), Pagination: 75-86Abstract
This paper proposes a reversible data hiding mechanism based on multiresolution analysis with difference expansion algorithm. Based on the multiresolution analysis of an image, gradient information of crude original image is exploited to select proper embedding areas. Adaptively embedding method based on Difference Expansion Algorithm is proposed to embed data into the host image without causing overflow/underflow and distortion problems. The original host image can be obtained upon the extraction of the embedded information. Driving application of reversible date hiding is authentic and can be used in some special applications, such as law enforcement, banks, medical and military fields, where original cover media is required for legal reason. Embedding data into cover media while keeping the media reversible opens a new door for linking some data with original media. With this proposed method we ensure that the Host information improves the compression efficiency, and thus the lossless data embedding capability is achieved. Experimental results signify that the proposed reversible data hiding method can embed a large payload with low visual distortion in the host image.Keywords
Reversible, Data Hiding, Authentication, Lossless Extraction, Multi-Resolution, Embedding, Peak Signal to Noise Ratio, Stego-Image.- Website Injection for Fraudulent Activities and Ways to Combat
Abstract Views :166 |
PDF Views:0
Authors
Affiliations
1 Computer Science and Engineering, Sreenidhi Institute of Science and Technology, IN
2 Computer Science and Engineering, Sreenidhi Institute of Science and Technology, Ghatkesar, T.S., IN
1 Computer Science and Engineering, Sreenidhi Institute of Science and Technology, IN
2 Computer Science and Engineering, Sreenidhi Institute of Science and Technology, Ghatkesar, T.S., IN
Source
Oriental Journal of Computer Science and Technology, Vol 8, No 2 (2015), Pagination: 124-130Abstract
Now a days , web injection exhibits in different modes, but basically occurs when malicious and unwanted actors tamper directly with browser sessions for their business profits. Malware's are injected through ad networks into websites. How an individual play different roles in this kind of tampering browsers is being discussed. The consequences of malware attacks are explored, as these are new trends in website attacks and describe types of malware you need to watch out on your site. Finally, this paper discusses solutions for reducing malware threats and also includes some best practices for protecting website and business.Keywords
Malware, Spyware, Cybercriminals, Spammers, Ransomware.- AIDE-Aid For Heads Up Display Navigation
Abstract Views :193 |
PDF Views:3
Authors
Affiliations
1 Hyderabad Institute of Technology and Management, R.R Dist, Hyderabad, T.S., IN
2 Department of CSE, SNIST, R.R Dist, Hyderabad , T.S., IN
1 Hyderabad Institute of Technology and Management, R.R Dist, Hyderabad, T.S., IN
2 Department of CSE, SNIST, R.R Dist, Hyderabad , T.S., IN
Source
Oriental Journal of Computer Science and Technology, Vol 8, No 1 (2015), Pagination: 65-71Abstract
AIDE is an idea in advance that only ensures safe navigation, but also lets you link up to the universe. AIDE projects a transparent image into the driver's field of view which appears to roam out of doors of the windscreen. The icon is centered in the space and then the track remains in focus while the driver looks at the information presented by AIDE. This, combined with touchless gesture control, means that the driver is able to use AIDE without ever holding their eyes off the road. When you synchronize the device with your Android handset or iPhone and by placing the AIDE onto your car's dashboard. With this we can start communicating with the vehicle and other people without ever removing your eyes off the road. It is designed to give relevant information at a glance and the power to respond to that information with voice and theme song-less gesture controls i.e. embedded with IR camera and internal microphone. It grows better as it possess an accelerometer, an e-compass and an ambient brightness sensing element. The device, which is to be designed to run on Android 5.0 has transparent HUD display of 5.1-inch and has Wi-Fi and Bluetooth for connectivity. For the touch less controls, in terms of navigating it employs an IR camera , it also includes a GLOAN-ASS, digital compass, accelerometer and ambient brightness sensor. It can also warn us when car needs to be served next and when oil needs replacement. This paper present a novel and useful interface for the future automated vehicles and disabled people.Keywords
IR Camera, Transparent Hud Display, Accelerometer, Digital Compass, GLOAN-ASS and Ambient Light Sensing Element.- Video Indexing and Retrieval – Applications and Challenges
Abstract Views :155 |
PDF Views:1
Authors
Affiliations
1 Computer Science and Engineering, Geethanjali College of Engineering & Technology, Cheeryal, R.R.Dist, IN
2 Computer Science and Engineering, JNTUCEH, Jagityal, Karimnagar, IN
3 Hyderabad Institute of Technology & Management (HITAM), R.R.District, IN
1 Computer Science and Engineering, Geethanjali College of Engineering & Technology, Cheeryal, R.R.Dist, IN
2 Computer Science and Engineering, JNTUCEH, Jagityal, Karimnagar, IN
3 Hyderabad Institute of Technology & Management (HITAM), R.R.District, IN
Source
Oriental Journal of Computer Science and Technology, Vol 3, No 1 (2010), Pagination: 125-137Abstract
Video data indexing and retrieval which applies tags to large video databases, is useful as a complementary means for applications which are having multi media content and need faster search responses. Well-ordered and effective management of video documents depends on the availability of indexes. Manual indexing is not viable for large video collections in this modern era of information super highway. There is a want for a techniques and frameworks that can store, handle, search and retrieve the data from the huge media archive. This paper discusses about application areas, emerging challenges of video indexing & retrieval, and some future directions for video indexing, video retrieval management system.Keywords
Video Indexing, Information Retrieval, Annotations, Semantic Gap, VDBMS.- Predictive Analytics-The Cognitive Analysis
Abstract Views :150 |
PDF Views:6
Authors
Affiliations
1 Department of Computer Science and Engineering, Sreenidhi Institute of Science and Technology, Yamnampet, Ghatkesar, Rangareddy, IN
1 Department of Computer Science and Engineering, Sreenidhi Institute of Science and Technology, Yamnampet, Ghatkesar, Rangareddy, IN
Source
Oriental Journal of Computer Science and Technology, Vol 10, No 1 (2017), Pagination: 187-193Abstract
Predictive analytics plays an important role in the decision-making process and intuitive business decisions, by overthrowing the traditional instinct process. Predictive analytics utilizes data-mining techniques in order to predict the future outcomes with a high level of certainty. This advanced branch of data engineering is composed of various analytical and statistical methods which are used to develop models that predict the future occurrences. This paper examines the concepts of predictive analytics and various mining methods to achieve the prior. In conclusion, paper discusses process and issues involved in the knowledge discovery process.Keywords
BigData, Predictive Analytics, Predictive Modelling, Data Mining, Prediction.References
- C. Nyce, “Predictive Analytics,” AICPCU-IIA, Pennsylvania, 2007.
- F. Buytendijk and L. Trepanier, “Predictive Analytics: Bringing The Tools To The Data,” Oracle Corporation, Redwood Shores, CA 94065, 2010.
- D. Mishra, A. K. Das, Mausumi and S. Mishra, “Predictive Data Mining: Promising Future and Applications,” International Journal of Computer and Communication Technology, 2(1), pp. 20-28, 2010.
- T. Bharatheesh and S. Iyengar, “Predictive Data Mining for Delinquency Modeling,” ESA/ VLSI, pp. 99-105, 2004.
- R. Bellazzi, F. Ferrazzi and L. Sacchi, “Predictive data mining in clinical medicine: a focus on selected methods and applications,” WIREs Data Mining Knowledge and Discovery, 1(5), pp. 416-430, 11(2011).
- P. B. Jensen, L. J. Jensen and S. Brunak, “Mining electronic health records: towards better research applications and clinical care,” Nature Reviews Genetics, 13(6), pp. 395-405, June 2012.
- M. Kinikar, H. Chawria, P. Chauhan and A. Nashte, “Data Mining in Clinical Practices Guidelines,” Global Journal of Computer Science and Technology (GJCST-C), 12(12)-C, pp. 4-8, 2012.
- http://www.articlesbase.com/strategicplanning-articles/predictiveanalytics-1704860.html.
- http://en.wikipedia.org/wiki/Predictive_ analytics
- Ogunleye, J. (2013b) ‘Before everyone goes predictive analytics ballistic’, available: http:// jamesogunleye.blogspot.co.uk/2013/05/ before-everyone-goes-predictive.html.
- James ogunleye ‘The concepts of predictive analytics’, International journal of knowledge, innovation and entrepreneurship, 2(2) pp. 8290, 2014.
- Abbott, (2014) Applied Predictive Analytics: Principles and Techniques for the Professional Data Analyst, New Jersey: John Wiley & Sons.
- Purvashi mahajan, Abhisekh sharma, “Predictive Analysis of diseases : An overview” , International journal for research in applied science & engineering technology (IJRASET), 4(VI), 2016.
- http://www.quora.com/Predictive-Analytics/ What-are-the-mostsignificant-challengesandopportunities-in-predictive-analytics.
- Huijbers, C. (2012) What is BigData? [Online] http://clinthuijbers.wordpress.com/2012/08/ 24/ what-is-big-data/; accessed: 26, 2014.
- McCue, C. (2007) Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis, Butterworth-Heinemann: Oxford, UK.
- Han, J., Kamber, M., and Pei, J. (2011) Data Mining Concepts and Techniques (Third ed). ElsevierInc.: p.6 and 8.
- Nischol Mishra, Dr. Sanjay silakar i, “Predictive Analytics : A Survey, Trends, Applications, Opportunities & Challenges”, International Journal of Computer Science and Information Technologies (IJCSIT), 3(3), pp. 4434-4438, 2012.
- Statistical Analysis for Performance Evaluation of Image Segmentation Quality Using Edge Detection Algorithms
Abstract Views :115 |
PDF Views:0
Authors
Affiliations
1 Computer Science and Engineering, Hyderabad Institute of Technology and Management, Hyderabad, A P, IN
2 College of Engineering, Jawaharlal Nehru Technological University, Nachupally, Karimnagar, A P, IN
3 Sathyabama University, Chennai, IN
1 Computer Science and Engineering, Hyderabad Institute of Technology and Management, Hyderabad, A P, IN
2 College of Engineering, Jawaharlal Nehru Technological University, Nachupally, Karimnagar, A P, IN
3 Sathyabama University, Chennai, IN