A Data Hiding Model for Image Steganography Using Primes: Towards Data Security
Mamatha.T
Abstract
Steganography is the art and science of communicating in such a way that the presence of a message cannot be detected. It includes the concealment of information within computer files. This paper considers an information theoretic model for steganography with a passive adversary being proposed. The adversary’s task of distinguishing between an innocent cover message C and a modified message S containing hidden information is interpreted as a testing problem. The message is the composition of some character. Every character of the message can be represented as an ASCII value which is either even or odd. Depending on this evenness, the character is encrypted differently. This paper describes how an even-odd encryption based on ASCII value is applied and how encrypted message is converted by using Gray code and embedding with picture can secure the message and thus makes cryptanalyst’s job difficult.
Download Full Text
Biometric Recognition: Personal Identification Technique
Zatin Singhal, Preeti Gupta, Kavita Garg
Abstract
The recent advances of information technology and the increasing requirement for security have led to a rapid development of intelligent personal identification systems based on biometrics. As humans, we all use our natural abilities to recognize people through their voices, faces and other characteristics. Technology advances, particularly in biometrics, are helping to close the gap between human perception and machine recognition. A priority goal of the use of biometrics is to provide identity assurance or the capability to accurately recognize individuals with greater reliability. Biometric recognition or, simply, biometrics refers to an automatic recognition of individuals based on their physiological and/or behavioral characteristics. This paper gives a brief overview of biometric, biometric recognition system, and various biometric recognition methods and their advantages, and disadvantages.
Download Full Text
Color Image Segmentation Based on Automatic Seed Pixel Selection
Yashpal G. Mul, A.V. Gokhale
Abstract
In this paper, we present color image segmentation based on automatic seed pixel selection. First, the input RGB color image is transformed into HSVcolor space. Second, the initial seeds are automatically selected based on non-edge and smoothness at pixel’s neighbor as criterion. Third, the seed pixels are merged to form seed region if they are connected. Fourth, a seeded region growing method is used to segment the image based on seed regions. Finally, region-merging is used to merge similar or small regions. This method is applied to segment many natural color images, and experimental results show the effectiveness and efficiency of the method.
Download Full Text
Comparison and Improvement of Wavelet Based Image Fusion
B. Suresh Babu, V.Chandrasekhar, P. Naresh Kumar, K.Vivekananda Swamy
Abstract
A multi-resolution fusion algorithm, which combines aspects of region and pixel-based fusion. We use multi resolution decompositions to represent the input images at different scales, and introduce multi resolution or multi modal segmentation to partition the image domain at these scales. This segmentation is then used to guide the subsequent fusion process using wavelets. A region-based multi resolution approach allows us to consider low-level as well as intermediate- level structures, and to impose data-dependent consistency constraints based on spatial, inter- and intra-scale dependencies. The wavelets used in image fusion can be classified into three categories Orthogonal, Bi-orthogonal and non-orthogonal. Although these wavelets share some common properties, each wavelet also has a unique image decompression and reconstruction characteristics that lead to different fusion results. In this project the above three classes are being compared for their fusion results. Normally, when a wavelet transformation alone is applied the results are not so good. However if a wavelet transform and a traditional transform such as IHS transform or PCA transform are integrated for better fusion results may be achieved. Hence we introduce a new novel approach to improve the fusion method by integrating with IHS or PCA transforms. The fusion results are compared graphically, visually and statistically and show that wavelet integrated methods can improve the fusion result, reduce the ringing or aliasing effects to some extent and make image smoother.
Download Full Text
Efficient Technologies for Access Control and Asset Management
Bushra Anjum, Sanjeev Sharma
Abstract
Technological advances in the field of Electronic commerce (or e-commerce) and access control have been overwhelming in the present years, conceding the freedom to consumers for accessing and using these services when and where they wish, at times and places that are convenient to them. E-commerce and access control encompasses all business conducted by means of telecommunications and computer technologies and have made computer networks an integral part of the economic infrastructure. The widespread use of standard desktop PCs, laptops, mobile phones, credit cards, ATM cards, smart cards and different identification technologies for E-commerce and access control need to offer superior privacy and security in the technological environment.
Download Full Text
Piece-Wise Linear Approach for Optimum Point Adjustment of Single Stage, Single Transistor Amplifier
Kapil Kumar, Adarsh Srivastava, Manish Kumar, Shamim Akhter
Abstract
Amplifiers have a vital role in the applications of engineering and as well as a component of amusement devices for human kinds. Gain and output voltage swing depends upon the designing parameters of that amplifier. In these parameters, selection of operating point is a challenging task. Operating point is extracted from the DC characteristics of the amplifier. Also, the dc characteristic depends upon the amplifier’s gain, transconductance and drain resistance; which are mutually interdependent and have a perplexing relationship with the gate to source biasing voltage. The key factor is how to choose the value for drain resistance and biasing voltage to get the desired gain. In this paper a piece-wise linear approach has been developed to extract an optimum biasing voltage and value of drain resistance to achieve desired gain. It is elaborated using an example of single stage CS amplifier. Mathematical expressions have been developed to obtain the optimum biasing voltage and drain resistance.
Download Full Text
A Review of Secure Ad-hoc Routing
Tannu Arora, Deepika Arora
Abstract
An ad-hoc network is a spontaneous network that can be established with no fixed infrastructure. This means that all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes in the network. The emergence of the Mobile Ad Hoc Networking (MANET) technology advocates self-organized wireless interconnection of communication devices that would either extend or operate in concert with the wired networking infrastructure or, possibly, evolve to autonomous networks. Mobile Ad hoc Networks are assortment of mobile terminals or nodes, allowing no stationary infrastructure and centralized administration. In this paper, we present a survey of existing and secure ad hoc routing protocols for wireless networks and then compare them in the trusted environment. We briefly present the most popular protocols for ad-hoc networks. A performance evaluation of routing protocol is very cumbersome due to various metrics involving dynamic topologies, mobility, routing limited resources, security etc. In this paper, various existing routing protocols are reviewed. The goal of this paper is to show the limitations of existing unsecure ad-hoc protocols which are more vulnerable to various kind of attacks.
Download Full Text
Risk Analysis in Web Project Management
Mahesh Pavaskar, Savita Chavan, Kiran Jagtap and B. B. Meshram
Abstract
The web has become the main platform for deploying business and social application and organizational information systems. Web Project management is relatively new field of knowledge, which has been dynamically developing. Goal of project management is providing solutions to existing problems, ranging from simple problems of preparing a wedding to setting up a factory or building a space ship. While providing a solution it deals with management of resources, people, time and communication. Additionally it addresses problems of managing risk and informing stakeholders of a project. These problems have lead to invention of tools like: Work Breakdown Structure, Gantt chart, PERT diagram and Critical Path Method. Another important aspect of project management is that it involves teamwork and collaboration of team members. The aim is to bring an easy to use and complete application for project managers and team members that will provide the most needed tools and enforce communication between team members. Risk assessment is an important part of the project. It is often carried out individually by the various disciplines involved in a construction project [1]. As the industry moves towards more collaborative working practices, it is vital that tools are available which enable risk assessment to be collaboratively undertaken. The paper addresses what are the new ways to reduce risk in web project management.
Download Full Text
Spring Framework: A Companion to JavaEE
Ankur Bawiskar, Prashant Sawant, Vinayak Kankate, B.B. Meshram
Abstract
This paper present the ideas of the Spring framework which is widely used in making enterprise applications .Considering the present situation where applications are developed using the traditional EJB model, Spring framework insists that ordinary java beans can be used with slight modifications. This framework can be used with J2EE to make it easier to develop application. This paper presents the architecture overview of spring along with the features of the framework that have made the framework useful. The integration of various frameworks for an E-commerce system has also been discussed in this paper. The Spring MVC framework is also discussed. This paper also proposes architecture for a website based on Spring, Hibernate and struts framework.
Download Full Text
Vision Based Simultaneous Localization and Mapping
Shweta Gupta, Javed Ashraf
Abstract
This paper gives an introduction to the Simultaneous Localization and Mapping (SLAM) methods and recent advances in computational methods of SLAM problem for large scale & complex environment. SLAM addresses the problem of a robot navigating through an unknown environment. It is a process by which a mobile robot can build a map of its near-by environment and at the same time use this map to compute its own location. There are number of approaches to the SLAM problem. Different algorithms have been used to perform SLAM including Extended Kalman Filtering, Particle Filtering, Local Bundle Adjustment etc. There are still many practical issues to overcome, especially in more complex outdoor environments. This present paper elucidates variants of the SLAM problem and proposes a taxonomy for the same.
Download Full Text
Comparative Advertising and its Status in India
Rajiv Kaushik
Abstract
After liberalization of Indian Economy competition among different has increase many folds. Now every brand wants to be in the evoked set of consumer’s brand. Comparative advertising is one way by which they can grab the attention of the consumer. Comparative advertising helps the consumer in taking decision if it is fair. But many comparative advertising is unfair. To stop such practices many laws are enacted in Indian constitution from time to time. Initially MRTP (Monopolies and Restrictive Trade Practices) Act came into existence then it was amended to Director General of Investigation and Registration (DGIR) and now Consumer Protection Act is enacted. Under the existing law, a manufacturer whose goods are disparaged has no locus standi to seek a remedy. Even if a firm succeeded in getting an advertisement stopped through this route, it would not get any compensation for loss of profit. Due to complication and complexities in accessing the exact loss due to comparative advertising, courts are not awarding any penalties but just stop that advertisement.
Download Full Text
Social Media : On the wheels of FAME
Shreyta Raj and Ashutosh Dangwal
Abstract
It must first to admit that early innovative changes should not a strongly acceptable. The time when Facebook became famous sometime in late 2004, there was no linking that it will become the leader for social media revolution—or that there would even be a social media revolution. Now days it becomes very popular that all the kids used this student site to “check each other out.” This paper will focus on how the social media plays a vital role in different fields of our day today life such as enterprises, social diagnosis, crisis management, advertisement for a particular product or organization etc. This paper also shows the disadvantages of social media in organizations.
Download Full Text
FDI in Retail and its Implication in India
Rajiv Kaushik
Abstract
Liberalization has created a conducive environment for investment in India. One of the objective of liberalization was to attract foreign direct investment (FDI) in India. FDI in manufacturing is altogether different from FDI in retail. Foreign Direct Investment in retail in India has become a matter of intensive debate for last 10 years. CII and FICCI are strongly in favour of opening of FDI in retail. These bodies support their argument by saying that it will increase employment and minimize the losses. Farmer bodies like Bharat KrishakSamaj and Consortium of Indian Farmers Association (CIFA) etc. are supporting for FDI in retail by saying that it will eliminate the middle men’s margin. Farmers will get better price for their produce and consumer get the product at reasonable price. Some state governments like Andhra Pardesh are taking the help of big retailers like Wal-Mart and Carrefour etc. to establish retail chain in their states. Myth that organised retailers earn only profit doesn’t carry much weight. Both small and big retailers can coexist. We should not lose the sight for the sake of criticism and political compulsion.
Download Full Text