Refine your search
Collections
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Aravinda, T. V.
- An Alternative Scalable Video Coding Scheme Used for Efficient Image Representation in Multimedia Applications
Abstract Views :147 |
PDF Views:0
Authors
Affiliations
1 PRIST University, Thanjavur, Tamilnadu, IN
2 PRIST Universituy, Thanjavur, Tamilnadu, IN
3 Dept. of CS&E, AMCE, Bangalore, Karnataka, IN
1 PRIST University, Thanjavur, Tamilnadu, IN
2 PRIST Universituy, Thanjavur, Tamilnadu, IN
3 Dept. of CS&E, AMCE, Bangalore, Karnataka, IN
Source
International Journal of Advanced Networking and Applications, Vol 2, No 1 (2010), Pagination: 475-480Abstract
This paper describes a novel video coding scheme based on a three-dimensional Matching Pursuit algorithm. In addition to good compression performance at low bit rate, the proposed coder allows for flexible spatial, temporal and rate scalability thanks to its progressive coding structure. The Matching Pursuit algorithm generates a sparse composition of a video sequence in a series of spatio-temporal atoms, taken from an over complete dictionary of three-dimensional basis functions. The dictionary is generated by shifting, scaling and rotating two different mother atoms in order to cover the whole frequency cube. An embedded stream is then produced from the series of atoms. They are first distributed into sets through the set-partitioned position map algorithm (SPPM) to form the index-map, inspired from bit plane encoding. Scalar quantization is then applied to the coefficients which are finally arithmetic coded. A complete MP3D codec has been implemented, and performances are shown to favorably compare to other scalable coders like MPEG-4 FGS and SPIHT-3D. In addition, the MP3D streams offer an incomparable flexibility for multiresolution streaming or adaptive decoding.- User Authentication Using Image Processing Techniques
Abstract Views :189 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science & Engineering, S.J.M.I.T Chitradurga, Karnataka-577501, IN
2 Department of Computer Science & Engineering, S.J.M.I.T Chitradurga, IN
1 Department of Computer Science & Engineering, S.J.M.I.T Chitradurga, Karnataka-577501, IN
2 Department of Computer Science & Engineering, S.J.M.I.T Chitradurga, IN
Source
International Journal of Advanced Networking and Applications, Vol 10, No 2 (2018), Pagination: 3770-3775Abstract
Conventional password transformation plot for client authentication in order to provide access to the system is to change password into some form of hash esteems. These secret word plans are nearly straightforward as well as quick in light of the fact that those depend on content and famed cryptography. In any case, those can be presented to digital assaults using secret key by cracking device or hash-breaking on the web locales. Assailants can altogether make sense of a unique secret word from hash esteem if it is generally basic and clear. Therefore, numerous hacking mishaps are happening transcendentally in frameworks receiving these hash oriented plans. This project recommends an upgraded secret word preparing plan in view of picture utilizing visual cryptography (VC). Not the same as the customary plan in light of hash and content, the proposed system changes a client identification word of plain text type into 2 pictures encoded by Visual Cryptography. The server just saves client identification word and one of the pictures rather than secret key. At the point when the client sign in and upload the other picture, then server extracts client identification word by using OCR (Optical Character Recognition). Thus, it confirms client through contrasting extricated ID and spared one. This proposed system has bring down calculation, counteracts digital assault went for hash splitting, and underpins confirmation not to uncover individual data, for example, ID to assailants.Keywords
Visual Cryptography, User Authentication, Password Processing, Hash, OCR, Multimedia.References
- Noar M., Shamir A., Visual cryptography: Advances in Cryptography, Eurocrypt’94, Lecture Notes in Computer Science, vol. 950,Springer-Verlag. 1 – 12 1995.
- Bailey, K., and Curran, K., “An Evaluation of Image Based Steganography Methods”, Journal of Multimedia Toolsand Applications, Vol. 30, No. 1, pp. 55-88, 2006.
- Nguyen, Thi Thu Trang, and Quang Uy Nguyen, "An analysis of Persuasive Text Passwords, "Information and Computer Science (NICS), 2015 2nd National Foundation for Science and Technology Development Conference on. IEEE, 2015.
- Tam, Leona, Myron Glassman, and Mark Vandenwauver, "The psychology of password management: a tradeoff between security and convenience, "Behaviour & Information Technology 29.3 (2010): 233- 244.
- Gauravaram, Praveen, "Security Analysis of salt|| password Hashes," Advanced Computer Science Applications and Technologies (ACSAT), 2012 International Conference on. IEEE, 2012.
- Dana Yang, Inshil Doh, Kijoon Chae, “Mutual Authentication based on Visual Cryptography and OCR for Secure IoT Service,” Source of the Document 2016 6th International Workshop on Computer Science and Engineering, WCSE 2016, 2016, Pages 214-219.
- User athentication using visual cryptography. 2015 International Conference on Control, Communication & Computing India (ICCC) | 19-21 November 2015 | Trivandrum. Pages 647-652.
- Analysis and Extraction of Password Image using Visual Cryptography and Steganography International Journal of Advanced Research in Computer Science and Software Engineering. Volume 7, Issue 5, May 2017 Pages 321-325.
- Mori, Shunji, Ching Y. Suen, and Kazuhiko Yamamoto, "Historical review of OCR research and development," Proceedings of the IEEE 80.7 (1992): 1029-1058.
- Patel, Chirag, Atul Patel, and Dharmendra Patel, "Optical character recognition by open source OCR tool tesseract: A case study," International Journal of Computer Applications 55.10 (2012).
- Image Reconstruction Using Wavelet Method
Abstract Views :168 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, SJMIT Chitradurga, 577501, IN
1 Department of Computer Science and Engineering, SJMIT Chitradurga, 577501, IN
Source
International Journal of Advanced Networking and Applications, Vol 10, No 2 (2018), Pagination: 3804-3807Abstract
This5paper proposes5a joint system wherein5lifting-based, divisible, image matched5wavelets are assessed from5compressively detected pictures and are utilized for5the recreation of the5same. Matched5wavelet can be effectively composed if5full picture is5available. Additionally contrasted with5standard wavelets as5sparsifying bases, coordinated wavelet5may give better recreation brings about5compressive sensing5application. Since in5application, we have5compressively detected pictures rather than full picture. Existing strategies for outlining coordinated wavelets can't be utilized. Accordingly, we5propose a joint structure that appraisals coordinated5wavelets from compressively detected pictures and furthermore recreates full pictures. This paper has three huge commitments. To begin with, lifting-based, picture coordinated distinct wavelet is planned from compressively detected pictures and is additionally used to recreate the same. Second, a straightforward detecting network is utilized to test information at sub-Nyquist rate with the end goal that detecting and reproduction time is diminished extensively. Third, another5multi-level L-Pyramid wavelet5disintegration system is accommodated divisible wavelet usage on pictures that prompts enhanced reproduction execution. Contrasted with CS-based remaking utilizing standard5wavelets with Gaussian detecting lattice and5with existing wavelet5decomposition system, the proposed strategy gives speedier5and better picture reproduction in compressive sensing5application.Keywords
Pattern Recognition, Matched Wavelet, Multi-Level L-Pyramid Wavelet Decomposition, Nyquistrate, Gaussian Sensing Matrix, Image Reconstruction, PCIM- Partial Canonical Identity Matrix, PCI - Partial Canonical Identity.References
- E. J. Candès, J. Romberg, T. Tao, "Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information", IEEE Trans. Inf. Theory, vol. 52, no. 2, pp. 489-509, Feb. 2006.
- D. L. Donoho, "Compressed sensing", IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1289-1306, Apr. 2006.
- A. Gupta, S. D. Joshi, S. Prasad, "A new method of estimating wavelet with desired features from a givensignal", Signal Process., vol. 85, no. 1, pp. 147-161, Jan. 2005.
- A. Gupta, S. D. Joshi, S. Prasad, "A new approach for estimation of statistically matched wavelet", IEEE Trans. Signal Process., vol. 53, no. 5, pp. 1778-1793, May 2005.
- N. Ansari, A. Gupta, "Signal-matched wavelet design via lifting using optimization techniques", Proc. IEEE Int. Conf. Digit. Signal Process. (DSP), pp. 863-867, Jul. 2015.
- J. O. Chapa, R. M. Rao, "Algorithms for designing wavelets to match a specified signal", IEEE Trans. Signal Process., vol. 48, no. 12, pp. 3395-3406, Dec. 2000
- R. L. Claypoole Jr, R. G. Baraniuk, and R. D. Nowak, “Adaptive wavelet transforms via lifting,” in Acoustics, Speech and Signal Processing, 1998.
- Daubechies and W. Sweldens, “Factoring wavelet transforms into lifting steps,” Journal of Fourier analysis and applications, vol. 4, no. 3,pp. 247–269, 1998.