Call for Comming Issue
 

Volume 2, Issue 1 January 2014

S.No. Title Page No.
01
Detection of Copy-Move Forgery using Haarlike features
Mehdi Ghorbani, Mohammad Firouzmand
Abstract : Copy-move forgery is a specific type of image tampering where a part of the image is copied and pasted on another part generally to conceal unwanted portions of the image. Hence, the goal in detection of copy-move forgeries is to detect image areas that are same or extremely similar. This paper describes a method for robust and accurate copy-move forgery detection by employing Haar-like features on the integral image. By applying Haar-like filters to n×n overlapping blocks of the integral image instead of input image, time needed for the detection process is reduced. Experimental results show that the proposed scheme accurately detects such specific image manipulations although the copied region are rotated and it’s complexity time is very small compared to approaches base on overlap blocking.
001-007
[PDF]
02
A Comparative Analysis of Different Image Fusion Techniques
Shaveta Mahajan, Arpinder Singh
Abstract: This paper presents a review on the different image fusion techniques. The main application of image fusion in multi-focus cameras to combine information from multiple images of the same scene in order to deliver only the multi focused image. The discrete cosine transforms (DCT) based methods of image fusion are more suitable and time-saving in real-time systems using DCT based standards of still image or video. In this paper an efficient approach for fusion of multi-focus images based on variance calculated in DCT domain is presented. The overall goal is to find the gaps in existing literature and suggesting a suitable method to reduce the gaps of existing techniques.
008-015
[PDF]
03
Evaluating the Performance of Integrated SVD & Visibility Restoration Digital Watermarking
Amrik Singh, Balpreet Kaur
Abstract: This paper focuses evaluating the performance of the integrated SVD and visibility restoration approach. This research work focuses on the securing the data transmission over internet by using the concept of the SVD based watermarking. Much important information is communicated over the internet every day. There are some hackers who are always available to hack this information. So securing the transmission is an important area of research. However by using the cryptography the encrypted message is converted into a meaning less form; which may alert the hackers to hack or crack the information. This research work focuses on securing the network transmission by embedding the information in the digital images. The proposed algorithm has been implemented in MATLAB using image processing toolbox. Performance evaluation has shown significant improvement the of the integrated watermarking scheme over the available techniques.
016-022
[PDF]
04
SECURE TRANSMISSION OVER REMOTE GROUP: A NEW KEY MANAGEMENT PROTOTYPE
Mrs.K.Sudha , Mr. J.Prem Ranjith, Mr. S.Ganapathy, Mr.S.Ranjith Sasidharan
Abstract:The problem of efficiently and more secure broadcasting to a remote co-operative group occurs in many newly emerging networks. The most challenging in devising such systems is to overcome the problems of the potentially limited communication from the group to the sender, the un-avail of a fully trusted key generation center, and the dynamics of the sender. The present key management paradigms can’t deal with this problem effectively. In this paper, we circumvent these obstacles and fill this gap by proposing a novel key management paradigm. The new paradigm is a hybrid of traditional broadcast encryption and group key agreement. In such a system, each member maintains a single public/secret key pair. Upon seeing the public keys of the members, a remote sender can securely broadcast to any intended subgroup chosen in an ad hoc way. Following this model, we instantiate a scheme that is proven secure in the standard model. Even if all the non-intended members collude, they can’t obtain any useful information from the transmitted messages. After the public group encryption key is extracted, both the computation overhead and the communication cost are independent of the group size. Furthermore, our scheme facilitates simple yet efficient member deletion/addition and flexible rekeying strategies. Its strong security against Collusion, its constant overhead, and its implementation friendliness without relying on a fully trusted authority render our Protocol a very promising solution to many applications.
023-028
[PDF]
05
m-Privacy For Hospital Data Management
Mr. Thirumurugan, S. Akilan, M.Raman and Mohammed Anisul Rahuman
Abstract:In this approach we provide two way data publishing for multiple data providers and we use inside attackers , in which own data record to block other providers, where we introducing three new techniques for improving privacy they are aggregate, anonymization and trusted party. The Anonymize defines the separate subsets and its stored in different database where aggregate defines the subsets are stored in a single trusted third party. Trusted third party defines the single database otherwise it also called as the collection of subsets are stored in single database.
029-032
[PDF]
06
A SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHM
Soubhik Kumar Dey, Mr. Tarak Nandy
Abstract:A set of people who use a common language to communicate between them, any message said in that language by them will be called plain text as everyone from that set can easily understand that message. But sometimes it is necessary to hide that message from some people of that set. Only the sender and authorised receiver can decrypt it. So, sender codifies the message and sends it to authorised receiver. The coded message is called cipher text. This conversion of plain text to cipher text is cryptography. By doing this we can protect information from unauthorized access. Nowadays for password of online account, ATM cards, message transfer during wars cryptography is widely used. Cryptography is done by using sometimes symmetric key algorithm or sometimes asymmetric key algorithms. This paper describes cryptography, briefly about symmetric key algorithms and then proposes a new symmetric key algorithm for both encryption and decryption technique. The advantages of this new algorithm over the others are also explained.
033-036
[PDF]
07
An efficient and decision making semantic web for Educational ERP
Rashmi Singh, Samvidha Sharma
Abstract:The increasing volume of data available on the Web as well as data's lack of structure, multidimensionality, large volume and dynamic evolution make information retrieval a tedious and difficult task. The process of assembling pieces of functionality into complex business processes also involves human interaction. The Semantic Web is an extension of the current Web that allows the meaning of information to be precisely described in terms of well-defined vocabularies that are understood by people and computers. The semantic web technology can be used in the context of an ERP to enable the lacking automation process. The semantic integration of Information Management Systems could be regarded as a first step towards the modernization of ERP applications. Ontology engineering in the Semantic Web is primarily supported by languages such as RDF and OWL. We have proposed semantic web mining for an ERP application based on educational domain. The proposed system helps to find suitable semantic data related to students, faculties and courses We implemented semantic web mining in parallel distributed environment in all tiers for decision making, and increasing speed and efficiency.
037-042
[PDF]
08
A LITERATURE SURVERY ON INFROMATION RETERIVAL IN WEB BASED DATA
D.saravanan, S.Vaithyasubramanian, K.N.Jothi Venkatesh
Abstract:On the last decades, the amount of web-based information available has increased dramatically. How to gather useful information from the web has become a challenging issue for users. Current web information gathering systems attempt to satisfy user requirements by capturing their information needs. Due to the assumption of all documents being generated from a single common template, solutions for this problem are applicable only when all documents are guaranteed to conform to a common template. However, in real applications, it is not trivial to classify massively crawled documents into homogeneous partitions in order to use these techniques. In this paper we try to present a literature survey on information retrieval in web based document.
043-050
[PDF]
09
Image Fusion using various Transforms
G.Ramesh Babu and K.Veera Swamy
Abstract:Image fusion is the method of combining significant information from two or more images into a single image. In this work, image fusion using mean and variance is explored in transform domain. Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Non Subsampled Contourlet Transform (NSCT) are used for image fusion. Feature Similarity (FSIM) index is used to test the quality of the fused image. Experimental results indicate that the proposed methods are producing better results than other methods available in the literature.
051-058
[PDF]

 

 

 

 

©  2010 All Rights Reserved to IPASJ