A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Soni, Neetika
- A Review on Underwater Wireless Sensor Networks
Authors
1 Department of ECE, Guru Nanak Dev University, RC Jalandhar, Punjab, IN
Source
Wireless Communication, Vol 8, No 4 (2016), Pagination: 119-123Abstract
In this paper, have studied and reviewed the emerging technology of Underwater Wireless Sensor Networks. The challenges that are there in developing them and the applications. We have concluded with a future prospect of our present work. Underwater wireless sensor networks has emerged as one of the most hot topics of research in wireless technologies because of its usefulness in the challenging circumstances in which earlier the data collection was very difficult. Wireless sensors have made several fiels of underwater research and monitoring possible. In this paper we have discussed various applications of the same where the use of underwater wireless sensors have been a marvelous step towards achieving the required results. With many application discussed we have also given importance to the other advantages. Several disadvantages or challenges faced have also been analysed. Our future work and conclusion is discusses the possibilities of further research in the field of underwater wireless sensor networks.
Keywords
WSNs, Underwater WSNs, Review, Versatile, Unmanned, Submerged, Tetherless, Water Quality.- A Review on Video Source Identification
Authors
1 Guru Nanak Dev University, Regional Campus, Jalandhar, Punjab, IN
Source
Digital Image Processing, Vol 8, No 4 (2016), Pagination: 121-123Abstract
In the advancing world of technology, there is need to explore the video source identification which are wirelessly transferred from a camera and from a one network to another. Wireless cameras come with new concept of video blocking, blurring and security threats like spoofing attacks. Reviewing the existing methods has enlightens the path for an improved algorithm based on sensor pattern matching with wireless signature.
Keywords
Lossy Wireless Network, PRNU, Sensor Pattern Noise Extraction, Source Identification, Spoofing Attack, Video Forensics.- An Edge Base Detection Image Steganography
Authors
Source
Digital Image Processing, Vol 8, No 6 (2016), Pagination: 193-198Abstract
Steganography is an important technique used for data hiding. It is being used by military, govt. agencies and other major agencies for concealing their information during transit and storage. The basic need of any steganography technique is data hiding capacity and undetectability. In this paper we have implemented an XOR based coding technique and the IWT based XOR coding technique for image steganography for Images. The experiment is conducted to test the effectiveness of our algorithm. Result proves the new proposed and implemented technique to be more successful than the previous ones.
Keywords
Edge, IWT, MSE, Spatial, XOR, Image Steganography, Edge Detection, Image Processing, Security, Data Hiding.- Implementation of Image Steganography with Least Significant Bit Insertion for Secure Communication
Authors
Source
Artificial Intelligent Systems and Machine Learning, Vol 8, No 7 (2016), Pagination: 235-239Abstract
Data hiding is a methodology of hiding secret message into a cover media such that an illegal observer does not predicts the presence of the existence of the hidden messages. It defines a group of processes used to embed data, into different forms of media such as audio, image or text. Data hiding, while similar to compression, is different from encryption. This new method is called steganography. In this one is the message image and other is the cover image. We can hide our message image in the cover image by using bit shifting method. Characteristics of cover image will not change so there will be no evidence of the presence of message inside an image. We can decode this and at the end we can separate the message image and the cover image. The methods which are initially proposed like, cryptography, water marking etc. are not readable but the existence of secret is evidenced, so one can easily notice that some sort of data has been transferred. Also, the security mechanism of these methods can be easily broken. Hence previous methods lack in providing complete security for data transfer.
So this paper is organized in different sections. First section explains the different type of images. Second section explains the data hiding techniques followed by a section that explains steganography. Last section includes the results and discussions.