A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Visalakshi, P.
- Design and Implementation of Augmented and Advanced Software Stego Archiever System
Authors
1 Department of Computer Science and Engineering, P.S.G. College of Technology, Coimbatore, Tamil Nadu, IN
2 Department of Information Technology, Anna University, Coimbatore, Tamil Nadu, IN
Source
Programmable Device Circuits and Systems, Vol 1, No 3 (2009), Pagination: 47-55Abstract
The objective of the paper is to design and develop a Sotware model Stego Archiver that deals with 4 levels of security in terms of cryptography using RSA algorithm, Compression using Zip algorithm, CRC Checking and Steganography. In addition to these four levels of security, radix 30 method is also employed. Stego Archiver can hide the files in any image formatted file and other multimedia file formats including audio and video files. Stego Archiver is capable of hiding data in any kind of audio files including mp3 files and any kind of video files including mpg, data etc. Since CRC checking is also employed, any attempt to make any changes in original data can be find out easily.
Keywords
Software Stego Archiever, Compression, Cryptography, Steganography, CRC Checking, Embedding.- Design and Implementation of a Novel Cryptographic Mail Composer
Authors
1 Department of Computer Science and Engineering, P.S.G. College of Technology, Coimbatore, Tamil Nadu, IN
2 Department of Information Technology, Kalaignar Karunanidhi Institute of Technology, Kannampalayam, Coimbatore, Tamil Nadu, IN
Source
Networking and Communication Engineering, Vol 1, No 5 (2009), Pagination: 200-209Abstract
In today’s dynamic and information rich environment, information systems have become vital for any organization to survive. With the increase in the dependence of the organization on the information system, there exists an opportunity for the competitive organizations and disruptive forces to gain access to other organizations information system. This hostile environment makes information systems security issues critical to an organization.This paper describes the implementation of a Cryptographic Mail Composer, in an Integrated Development Environment (IDE) that is used to send the mail in encoded format. By using this encoding method the mail will be sent very safe, the preventing the hackers from reading the mail. The mailer is used to send the encrypted mail directly to the mail box as it is. It can also send the effective html page, images and textual mails. Instead of this, the composer will send the mail with the enclosures and not as attachment.
Keywords
Mail Composer, Cryptography, Encryption, Decryption, Integrated Development Environment.- Augmented and Advanced Human Computer Software System to Abridge Desk-Space
Authors
1 Department of Computer Science and Engineering, P.S.G. College of Technology, Coimbatore, Tamil Nadu, IN
2 Department of Computer Science and Engineering, P.S.G. College of Technology, Coimbatore, Tamil Nadu, IN
3 Department of Information Technology, Anna University, Coimbatore, Tamil Nadu, IN
Source
Fuzzy Systems, Vol 1, No 3 (2009), Pagination: 29-36Abstract
The need for Augmented and Advanced Human-Computer Interaction is to provide the user with the advantage of taking up no desk space as well as being wireless, accompanied by the advantage of being able to disappear when not in use. By means of designing a virtual keyboard, characters can be projected and touchedonto any white surface. A webcam attached with Personal Computer can witness the finger movements and translate the action into keystrokes in the device. Touching a key's image generates a unique electronic signal corresponding to the key's image that was touched.The ultimate aim of the paper is to bring in an open standard culture which should benefit the growth of Software industry by providing opportunities for people, especially for the upcoming graduates, who can share resources and collaborate by putting forth their innovative ideas.Keywords
Unique Electronic Signal, Open Standard Culture, Software Industry, Personal Computer, Resource, Virtual Keyboard.- A Novel Image Enhancement Scheme for Computer Aided Diagnosis of Breast Cancer using Fully Digital Mammography
Authors
1 Department of Computer Science and Engineering, P.S.G. College of Technology, Coimbatore, Tamil Nadu, IN
2 Department of Information Technology, KalaignarKarunanidhi Institute of Technology, Kannampalayam, Coimbatore, Tamil Nadu, IN
Source
Digital Image Processing, Vol 1, No 5 (2009), Pagination: 170-179Abstract
The purpose of this paper is to develop a imageenhancement system for computer-aided diagnosis (CAD) of breast cancer using full digital mammography. The proposed system can be used to enhance the mammogram and detect tumors and other related problems. There are some new image rocessing methods to extract tumor masses and clustered micro calcifications have been developed and implemented in the CAD system. The aim is to delineate regions, each of which to a certain extent uniform in some appropriate measure. A new filter called Iris Filter has been developed to detect tumor candidates. It realizes reliable detection of tumor candidates regardless of their sizes and their contrast against their background on mammograms. Previous works suggests exhaustive search technique in which we have to apply the filter in each and every pixels of the image. In this research the search space will be reduced by approximately segmenting the potential tumor areas by using suitable threshold based segmenting operation and then applying the filter only in the segmented region. In this work, apart from Iris filter, various segmentation and edge detectionalgorithms are also under consideration. Since the data storage and speed of performance issues are critical in such kind of software design, they also will be taken in to account.
Keywords
Computer Aided Diagnosis (CAD), Breast Cancer, Iris Filter, Mammogram, Tumor.- A New Approach for Task Scheduling Using Elite Particle Swarm Optimization
Authors
1 Department of CSE, PSG College of Technology, Coimbatore, IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 1, No 2 (2009), Pagination: 45-51Abstract
This paper presents a modified approach for task assignment problem or multiprocessor scheduling using Elite Particle Swarm Optimization. Particle Swarm Optimization (PSO) is a population based heuristic optimization technique. The concept of elitism is combined with the Particle Swarm Optimization which yields promising result when compared to Normal PSO. Elitism is the process of preserving the best solutions for computation to achieve near optimal solutions. The strategy of replacing the worst string of the new population with the best string of the current population is adopted in this method. Particle Swarm Optimization Algorithms with this strategy are referred as Elite Particle Swarm Optimization Algorithm or EPSO. Elitism can rapidly increase the performance of PSO, because it prevents losing the best found solution to date.Elitism is also combined with mutation to prevent the algorithm being stuck at local optima. The result show that the Particle Swarm Optimization with elitism and mutation performs better than the normal Particle Swarm Optimization with dynamically varying inertia method.Keywords
PSO, EPSO, TAP, Inertia, Mutation, Elitism.- Secure Cloud-based Access Control Optimization (SCACO)
Authors
1 Department of Computer Science and Engineering SRM University, Kattankulathur campus, Kancheepuram District - 603 203, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 37 (2016), Pagination:Abstract
Objective: We propose a decentralized access controlled scheme for secure data storage in clouds that supports public key encryption. Our scheme also has the added feature of generating attribute key-value pairs with ciphers for easily granting permission to transfer data. The scheme prevents tampering by performing integrity checks and verifying the message digest. Methods/Statistical Analysis: In the proposed scheme, the data is transferred by public key encryption among users by the RSA algorithm. The attributes are sent via e-mail and can trigger an encrypted transfer of data stream, which can be decrypted only by the validated users. The cloud does not store the private keys of users and only stores public keys. Findings: The computation and transfer of cipher text, and storage overheads are the same as a centralized scheme. The decentralization of data makes it private and the encrypted copy on the cloud provides a redundant backup which cannot be read by the cloud. The performance of the scheme has been measured by time complexity of the operations using big-O notation. Applications/Improvement: The scheme can be improved with signatures. Signatures can be studied in detail and come in various types. Some signatures verify the authenticity of files while other complex ones work with multi-party authentication.Keywords
Access Control in Cloud, Cryptography, MVC, RSA.- Database Migration using Recovery Manager
Authors
1 Department of Computer Science and Engineering, SRM University, Kattankulathur Kancheepuram Dist - 603203, Tamil Nadu, IN