Papers by Shivani Khurana
International journal of engineering research and technology, Mar 14, 2014
In the recent few years, it has become a daily need to distribute digital images as a part of wid... more In the recent few years, it has become a daily need to distribute digital images as a part of widespread multimedia technology by means of the World Wide Web. Digital Image Watermarking techniques have been developed to protect digital images from illegal reproductions and illegal modifications. So these techniques have developed widely to maintain the broadcasting media and content authentication, broadcast monitoring, tamper detection, copyright protection, and many other applications. This paper highlights a new scheme for Digital Image Watermarking using Spread Spectrum Technique under DWT Domain. It starts with the general watermarking procedure, the attributes and applications of Digital Image Watermarking and attacks on Digital Image Watermarking. Moreover, the experimental results showed that the proposed scheme provides better quality of watermarked images in terms of watermark invisibility to human eyes and low data payload during embedding and extraction process. In addition, some possible attacks on watermarked images are discussed. To check the Imperceptibility and Robustness, Peak Signal Noise Ratio (PSNR) is being used.
International journal of computer applications, Mar 26, 2014
As it is know that WiMAX and WLAN are two wireless developing technologies. The researchers are w... more As it is know that WiMAX and WLAN are two wireless developing technologies. The researchers are working on the integrated scenarios of these two technologies so as to approach the maximum benefits out of these technologies. Therefore in this paper we are performing simulations over the two scenarios i.e. with wormhole attack and without wormhole attack. The evaluation is taken on three different protocols i.e. DSR, OLSR and TORA. The results are shown in graphical figures and according to them results are made.
International Journal of Engineering Research and, 2015
There has been an increase in broadcasting media since the beginning of this century, because man... more There has been an increase in broadcasting media since the beginning of this century, because many techniques had been developed to solve this problem. Watermarking is the greatest bet from many researches around the world. Digital watermarks can be used by a lot of applications like: copyright protection, broadcast monitoring and owner identification. In this paper, we will show a classification of watermarks, propose a basic model for watermarking and explain some recent algorithms for image watermarking and their features, citing examples applicable to each category.
In the recent few years, it has become a daily need to distribute digital images as a part of wid... more In the recent few years, it has become a daily need to distribute digital images as a part of widespread multimedia technology by means of the World Wide Web. Digital Image Watermarking techniques have been developed to protect digital images from illegal modifications and illegal reproductions. So these techniques has developed widely to maintain the broadcasting media and content authentication, broadcast monitoring, tamper detection, copyright protection, and many other applications. This paper highlights the basic model of Digital Image Watermarking, its applications and its attributes. Moreover, it reviews some of the techniques used in Digital Image Watermarking. In addition, various possible attacks on watermarked images are discussed. To check the Imperceptibility and Robustness, Peak Signal Noise Ratio (PSNR) and Normalized Cross-Correlation (NCC) parameters are being used.
Steganography considered as a technique for secret communication without knowing the others and o... more Steganography considered as a technique for secret communication without knowing the others and only an authorized user can access the information which is embedding in the cover medium. Steganalysis is the process to detect of presence of Steganography and to destroy, extract it. In this Paper There is Adaptive Histogram Equalization
Abstract: Watermarking is a relatively an active research field. The invent of internet resulted ... more Abstract: Watermarking is a relatively an active research field. The invent of internet resulted in new opportunities for the creation and delivery of content in digitized form. Different applications can be included that is electronic advertising, real time video and audio delivery and Web publishing. An important issue that arises in these applications is the protection of the rights. It has been recognized that current copyright laws are not sufficient for dealing with digital data. One technical way is law enforcement and copyright protection for digital media and practical is digital watermarking which is aimed to automatically embed and detect copyright infringement. There has therefore been significant recent research into “watermarking ” and “fingerprinting”. The idea is to detect copyright violators, unethical hackers doing cyber crime and the former to prosecute them.
Watermarking is the process of embedding a watermark into host signal that can be in the form of ... more Watermarking is the process of embedding a watermark into host signal that can be in the form of Audio, Video, and Image .The watermark can be embedded as Logo, Text, and String. The main objective of embedding watermark is to protect the data from unethical hackers over Internet. This watermarking scheme can be embedded in different domains which can be referred as Spatial and Transform domain. Further Transform domain is divided into different types which are DCT, DWT, DFT. Watermarking can also be said as Information-Hiding, because the main factor is to hide the original details from the people who are sitting on internet. KeywordsWatermarking, Audio, Image, SpatialDomain, Transform-Domain
Artificial neural network has been a widely used tool in various fields of medical and engineerin... more Artificial neural network has been a widely used tool in various fields of medical and engineering applications as an intelligent tool, such as artificial intelligence, pattern recognition, medical diagnosis, machine learning and many more. Breast cancer classification is medical applications that possess great challenge for scientists and researchers. Neural network has become a very popular tool in diagnosis of breast cancer and classification of cancer datasets. Breast Cancer is one of the fatal diseases causing more number of deaths in women. For early and efficient diagnosis of breast cancer more and more techniques are being developed. Classical methods required cytopathologists or oncologists to examine the breast lesions for detection and classification of various stages of the cancer. Artificial neural network is a branch of artificial intelligence and has been widely accepted as a new technology in computer science. In carcinogenesis, artificial neural networks have been s...
As we, all know that in every field it is very important to have quality of services. In the fiel... more As we, all know that in every field it is very important to have quality of services. In the field of Real-time, applications like ATM and Wi-Fi are few examples. Some metrics for quality of services are Cost, Flexibility, Reliability and Efficiency. In this paper, we deal with quality of services in relation to admission control of the packets. In admission control, it should concentrate on scheduling and routing that at which time a packet should sent from source to destination for less jitter and delay. There should be regular intervals of checkpoints, which show statistics of the networks that how the packets are, delivered.
International Journal of Computer Applications, 2014
Steganography considered as a technique for secret communication without knowing the others and o... more Steganography considered as a technique for secret communication without knowing the others and only an authorized user can access the information which is embedding in the cover medium. Steganalysis is the process to detect of presence of Steganography and to destroy, extract it. In this Paper There is Adaptive Histogram Equalization Technique that performed on the Stego Image that is category of the Histogram Equalization attack and measuring the quality of Image after applying the Attack.
International Journal of Computer Applications, 2014
Cloud Computing is buzzword in market now days. It has been developed to reduce the overall expen... more Cloud Computing is buzzword in market now days. It has been developed to reduce the overall expenses as it provides the on demand services at any time on pay-per-use pattern. Internet is the medium for deploying cloud computing services for users to access the required application and services .It allows the users to access the services which are actually not reside in their own data centers. It provides an efficient and very flexible way for the services, applications to meet business needs. Its infrastructure consist three layers-IAAS, PAAS and SAAS. Cloud computing deploy its services through:-Private, Public and Hybrid Cloud. As the Cloud Computing is still on its initial stage of development and can say in its growing phase, so it suffers from various threats, attacks and vulnerabilities that sometime prevent the user, customers from trusting on it. User's sensitive data resides on Cloud, but due to its lack of security control the confidential data of the clients are comes under the risk of malicious activities or the unauthorized access from illegal users. So it needs an efficient method for ensuring security. In this paper it is recommend to use of Firewalls and VPN_Firewall (virtual private network) in cloud networks for its security. There is a performance evaluation of OSPF, IGRP and EIGRP protocols under two scenarios-with Firewall, and VPN_Firewall.
2013 International Conference on Green Computing, Communication and Conservation of Energy (ICGCE), 2013
ABSTRACT Cloud Computing is an on-demand access to a shared pool of resources. Vendor's o... more ABSTRACT Cloud Computing is an on-demand access to a shared pool of resources. Vendor's of cloud computing provide application and enable technology, infrastructure, hardware, software, and integration for client. The flip side of the cloud computing is availability and performance of their internet connection [8]. If excessive network latency is causing the application to spend a large amount of time waiting for response from a data located at distant center, then the bandwidth utilization will not be properly done and performance will suffer. In our research paper, we have presented a practical approach to calculate the network latency which hampers the cloud performance and also in another section revealed the effect of DDoS attack on cloud computing with the simulated results.
International Journal of Advanced Research in Computer Science, 2014
Cloud computing is an emerging technique that describes new class of network. Cloud computing sha... more Cloud computing is an emerging technique that describes new class of network. Cloud computing share resources connected to each other via a link and uses concept of distributed computing, grid computing, utility computing and virtualization. Scheduling in cloud computing is interest of area to schedule processes that is a difficult task. Scheduling in cloud computing is to manage and control processes. Basically selection of scheduling method depends on user requirement, choosing the right scheduling method can cause maximum packet transmission, can control packet loss and can increase CPU utilization. This paper describes different scheduling method used in cloud computing such that First Come First Serve (FCFS), Priority Queue (PQ), Round Robin (RR), Multi Level Feedback Queue (MLFQ), Multi Level Queue (MLQ). Keywords: Cloud Computing, Scheduling, Job, Resources, Processes, Task.
Brain Tumor is basically the unusual growth of some new cells found in the brain. This can happen... more Brain Tumor is basically the unusual growth of some new cells found in the brain. This can happen in any area of the brain. Tumor are categorized by finding the origin of the cell which has tumor and if the cells are cancerous or not. Segmentation process is carried out to find if brain tumor exists or not, then the response of the patient to the tests performed is collected, different therapy sessions and also by creating models which has tumor growth in it. This one is different from the other types of tumor. Anyone can suffer from this disease. Primary tumors are basically Benign or Malignant. Here, we propose CNN (Convolutional Neural Network) based approach for improving accuracy. It also have capacity to detect certain features without any interaction from human beings. With the help of this model it classifies whether the MRI brain scan has tumor or not. There are other different algorithms, but this paper shows that CNN gives more accuracy than the rest. This model gives validation accuracy between 77%-85%. gives more precise and accurate results. CNN also let us to train large data sets and cross validate results, hence the most easy and reliable model to use.
Abstract: The Wireless adhoc network is comprised of nodes with wireless radio boundary. Nodes ar... more Abstract: The Wireless adhoc network is comprised of nodes with wireless radio boundary. Nodes are joined among themselves and are free to move. It is a multi hop process due to the incomplete transmission range of energy constrained wireless nodes. Many protocols are reported in this field but it is difficult to decide which one is best. In this paper FSR, DYMO and LANMAR are surveyed and characteristic summary of these routing protocols is presented under Blackhole Attack. Their performance is analyzed on packet delivery ratio, Throughput, Average end to end and Jitter using Qualnet 5.1 simulator.
— Optical character recognition is an active field for recognition pattern. In this paper we trie... more — Optical character recognition is an active field for recognition pattern. In this paper we tried to present how processes work in OCR system, pre-processing in OCR and document analysis. To review the process for analysis pattern from document proper page segmentation should be done. So various categories of page segmentation algorithms are
We are in advanced world of internet with new technologies in these days. So many new wireless ne... more We are in advanced world of internet with new technologies in these days. So many new wireless networks technologies have been emerged. WiMAX and WLAN are such wireless technologies which are being adopted by most of the users. WiMax is one of the advanced technologies from those. Due to advancement, the security related issues has also been increased. Security has become one of the challenging and important tasks to maintain the integrity, availability and confidentiality of the information. This paper is all about the study of WLAN,WiMax, WLAN-WiMAX interfaced technology. During the research we learn that there are several security related threats and attacks in these The scope of this paper is to review these two technologies i.eWiMAX and WLAN with their interfaced scenario and to research the security related issues in the WiMax technology .
IOSR Journal of Computer Engineering, 2014
As it is know that WiMAX and WLAN are two wireless developing technologies. The researchers are w... more As it is know that WiMAX and WLAN are two wireless developing technologies. The researchers are working on the integrated scenarios of these two technologies so as to approach the maximum benefits out of these technologies. Therefore in this paper we are performing simulations over the two scenarios i.e. with wormhole attack and without wormhole attack. The evaluation is taken on three different protocols i.e. DSR, OLSR and TORA. The results are shown in graphical figures and according to them results are made.
A movable ad hoc system (MANET) is a self-configuring communications set of connections of mobile... more A movable ad hoc system (MANET) is a self-configuring communications set of connections of mobile procedure associated by wireless. Each mechanism in a MANET is free to move independently in some way, and will therefore modify its relations to other devices frequently [2]. The primary purpose of any ad-hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish an efficient route connecting every two nodes. In this paper three protocols FSR, LANMAR and DYMO are compared by using random waypoint mobility in few nodes with varying packet sizes in CBR traffic. The parameters or metrics are used to assess the performance of protocols with and without Black Hole attack, that are data Packet Delivery ratio and Average Jitter with varying data traffic CBR (Constant Bit Ratio) using Qual Net 5.0.2 simulator.
Uploads
Papers by Shivani Khurana