A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Monisha, M.
- Enhancement of Information Hiding in Audio Signals with Efficient Lsb Based Methods
Authors
1 School of Computing, SASTRA University, Thanjavur, Tamil Nadu- 613401, IN
Source
Indian Journal of Science and Technology, Vol 7, No S5 (2014), Pagination: 80-85Abstract
In the modern era the easiness in the content alteration and copying in an available digital domain have enriched the security of academic copyrights as well as the anticipation of the illegal inference of data of multimedia have turned into a significant research and technological issue. Steganography is called as an art of secret and secured communication. The basic idea behind this paper is to find the best way to embed text data in audio file using the steganography techniques. Our proposed method uses LSB technique only in specific bit positions which are known only to sender and receiver. Our results have shown that the quality of the audio remains same after embedding the secret text and also very less difference between the original audio and steganographed audio. These results were obtained by the estimation of PSNR, MSE and audio features such as Pitch, Entropy and Flatness etc. The size of the audio signal also remains unaltered.Keywords
Information Hiding, LSB, MSE, PSNR, Stegnography- Mobile Phone Cloning and Computing
Authors
Source
Wireless Communication, Vol 8, No 5 (2016), Pagination: 180-184Abstract
Mobile communication has been eagerly available for several years, and is main business today. It provides a valuable service to its users who are willing to pay a sizable premium over a fixed line phone, to be able to march and talk freely. Because of its usefulness and the cash involved in the professional, it is subject to fraud. Unfortunately, the advance of security standards has not kept miss with the dissemination of mobile communication.
Some of the features of mobile communication make it an pleasing target for felons. It is a reasonably new invention, so not all persons are fairly aware with its chances, in good or in bad. Its newness also means intense fight among mobile phone service providers as they are drawing consumers. The major hazard to mobile phone is from cloning. Cell phone cloning is a method wherein hideaway data from one cell phone is transferred into added phone. The other cell phone becomes the exact replica of the creative cell phone like a clone. As a outcome, while calls can be made from together phones, only the unusual is billed. Though message channels are armed with security algorithms, yet cloners get away with the help of circle pigpens in systems. So when one gets colossal fliers, the chances are that the phone is being cloned.
This paper terms about the cell phone cloning with execution in GSM and CDMA knowledge phones. It gives an dream into the security mechanism in CDMA and GSM phones along with the hoop holes in the systems and discusses on the dissimilar ways of avoiding this cloning. Moreover, the upcoming risk of this fraud is being enlarged.
Keywords
CDMA, Cloning, GSM, Phone- Women Safety Device and Application-FEMME
Authors
1 Department of Information Technology, Sathyabama University, Chennai - 600119, Tamil Nadu, IN
2 Department of Electrical and Electronic Engineering, Sathyabama University, Chennai - 600119, Tamil Nadu, IN
3 Faculty of Computing, Sathyabama University, Chennai - 600119, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 10 (2016), Pagination:Abstract
Objectives: In our Country, even though it has super power and an economic development, but still there are many crimes against women. The atrocities against the women can be brought to an end with the help of our product "FEMME". This device is a security system, specially designed for women in distress. Method/Analysis: Using ARM controller for the hardware device is the most efficient and it consumes less power. We use radio frequency signal detector to detect hidden cameras. Findings: We analysed that there are no security device for our total safety. The user has to carry multiple devices. We found an ALL-IN-ONE security device which has all the features in one click. Applications/Improvements: In this paper we used ARM controller and android application in which both the device and the smart phone are synchronized using Bluetooth, hence both can be triggered independently. We can record audio for further investigation and can give an alert call and message to the pre-set contacts with the instant location every 2 minutes and can be tracked live using our application. Hidden camera detector is also a distinct feature using which we can ensure our privacy.Keywords
Application, Emergency, GPS Tracker and Bluetooth Access, Security, Sensors, Etc- Sign Language Recognition Using Thinning Algorithm
Authors
1 Department of Aerospace Engineering, Indian Institute of Science, Bangalore, Karnataka, IN
2 Department of Information Technology, National Institute of Technology Karnataka, Surathkal, IN