The field of image retrieval has been an active research area for several decades and has gained ... more The field of image retrieval has been an active research area for several decades and has gained steady momentum in recent years as a result, large collection of digital images are growing day by day in government, hospitals, banking, etc. Interest in image retrieval has increased in large part due the rapid growth of the World Wide Web. With the proliferation of image data, the need to search and retrieve images efficiently and accurately from a large collection of image databases has drastically increased. Query based text retrieval from database is done through tools like SQL, MYSQL etc. In this process we consider constraint based query to retrieve text records from database. But image retrieval is not as easy as query processing. For this proposed system a broad literature survey of data mining technique have been made. Clustering technique has been identified as best suited for this system. In clustering technique there exist algorithms like BIRCH, CURE, DBSCAN, STING, K-Means...
Diabetic foot ulcers represent a serious health issue. Today clinicians and nurses produce wound ... more Diabetic foot ulcers represent a serious health issue. Today clinicians and nurses produce wound assessment by observing the wound size and healing status visually. Here the patients also have an opportunity to play an active role. This method enables the patients and clinicians to take a more active role in daily wound care which can quicken wound healing and also saves the travel cost, reduce healthcare expenses. As the pervasiveness of Smartphone's with a highresolution digital camera, assessing wounds by analyzing the images of constant foot ulcers. A wound image analysis system is implemented on the android smart phone. The wound image is occupied by the camera on the smart phone with the help of an image capture box. Later that, the smart phone performs wound segmentation by applying the accelerated mean-shift algorithm. The outline of the foot is identified based on skin color, and the wound boundary is recognized using a simple connected region detection method. The healing status is beside assessed based on red-yellow-black color evaluation model with in the boundary of the wound. Further, the healing status is significantly assessed, based on the analysis of patient's time records. The test results on wound images collected in UMASS-Memorial Health Center Wound Clinic (Worcester, MA).
With the increasing volume of images users share through social sites, maintaining privacy has be... more With the increasing volume of images users share through social sites, maintaining privacy has become a major problem, as demonstrated by a recent wave of publicized incidents where users share personal information. In light of these incidents, the need of tools to help users control access to their shared content is apparent. Toward addressing this need, we propose an Adaptive Privacy Policy Prediction (A3P) system to help users compose privacy settings for their images. We examine the role of social context, image content, and metadata as possible indicators of users' privacy preferences. We propose a two-level framework which determines the best available privacy policy for the user's images being uploaded. Our solution relies on an image classification framework for image categories which may be associated with similar policies, and on a policy prediction algorithm to automatically generate a policy for each newly uploaded image, also according to users' social features.
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suf... more Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Cipher text-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. In this paper, we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network.
The applications that we use in our mobile devices often access sensitive data and resources. But... more The applications that we use in our mobile devices often access sensitive data and resources. But when the users data has been misused due to some malicious applications which may lead to leakage of sensitive data and also reflect in privacy. An example is a malicious application records users banking details. The problem starts when the user have installed the application by granting all the privileges on which the user have no control on operating the features. To avoid this problem we propose a context based access control system by which a user can activate and deactivate some of the applications that are already present in the users mobile based on the context that is provided. It can also perform its action in a particular location by using GPS, Wi-Fi etc.. based on the context that is provided by the user. We have preformed many experiments for accessing the data in a particular location based on context.
This report discusses advent of the Screen less display which is an emerging new technology, has ... more This report discusses advent of the Screen less display which is an emerging new technology, has become a good prospect in the near future for a wide range of applications. As the name implies it deals with the display of several things without the use of screens using projector. It involves the following 3 different working principles. The Visual image, Virtual retinal display, Synaptic interface. This report mainly illustrates and demonstrates how the screen less displays works and its applications in various fields of science. This technology would bring about the revolution in the field of displays and monitors that are costly, huge and are proven difficult to manage the power requirements and constraints. It is also the futuristic technological innovation.
This paper presents a new approach for providing limited information only that is necessary for f... more This paper presents a new approach for providing limited information only that is necessary for fund transfer during online shopping thereby safe guarding customer data and increasing customer confidence and preventing identity theft. In recent time there is rapid growth in E-Commerce market. Major concerns for customers in online shopping are debit card or credit card fraud and personal information security. Identity theft and phishing are common threats of online shopping. The approach uses combined application of BPCS Steganography and visual cryptography for this purpose. Payment portal, a channel between consumers and payment processors, use numerous security tools to secure a consumer's payment information, ordinarily card data, during an online transaction. Moreover, not all merchants provide a secure payment environment to their consumers and, in spite of having a standard payment plan, adhere to it. Consequently, this exposes a consumer's payment information to risks of being compromised or misused by merchants or stolen by hackers and spammers.
Personal authentication by multiple biometric is the main purpose to identify moderate performanc... more Personal authentication by multiple biometric is the main purpose to identify moderate performance because the information carried is discriminatory by Two-dimensional (2-D) hand-geometry features. So it investigates a new approach to achieve performance improvement by simultaneously acquiring and combining three-dimensional and 2-D features from the human hand. Two new representations that effectively characterize the local finger surface features are extracted from the acquired range images and are matched using the proposed matching metrics. In addition, the characterization of 3-D palm surface using Surface Code is proposed for matching a pair of 3-D palms. The proposed 3-D hand-geometry features have significant discriminatory information to reliably authenticate individuals. By consolidating 3-D and 2-D hand-geometry features results in significantly improved performance that cannot be achieved with the traditional 2-D hand-geometry features alone.
Chrome cast is a small HDMI dongle device which is of 72mm long which provide users to stream onl... more Chrome cast is a small HDMI dongle device which is of 72mm long which provide users to stream online videos, music ,games to the television of high definition or house audio systems . Chromecast which is a digital media player developed by Google it directly streams audio and videos on HD TV via WI-FI or a local internet. Users can also cast personal computers screen as well as cast enabled android devices to HD TV. Chromecast streams content from the cloud, so you get the highest quality 1080p HD video and surround sound. With 2.4 / 5GHz Wi-Fi support built in, which keeps video resolution high definition and buffering at low. Chromecast comes with micro USB cable with source of energy as adapter . Also setting up of Chromecast is also simple and easy. Supported mobile apps for Chrome cast are available for iOS 7.1+, Android 4.0+ and web based apps enabled for Chromecast are available on computers enabled Google Chrome (on Windows xp,7+, Mac OS 10.
Collaborative filtering explores techniques for matching people with similar interests and making... more Collaborative filtering explores techniques for matching people with similar interests and making personalized recommendations on the web. The Collaborative Filtering (CF) is widely employed for making Web service recommendation. The main aim is to predict missing QoS (Quality-of-Service) values of Web services. Although several CF-based Web service QoS prediction methods have been proposed in recent years, the performance still needs significant improvement. In this the Quality of Service (QoS) prediction methods rarely consider personalized influence of users and services and it consider Web service QoS factors, such as response time and throughput, usually depends on the locations of Web services and users. In this paper, we propose a location-aware personalized CF method for Web service recommendation.
Data Mining has wide applications in many areas such as banking, medicine, scientific research an... more Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications. For the past decade, due to the rise of various privacy issues, many theoretical and practical solutions to the classification problem have been proposed under different security models. However, with the recent popularity of cloud computing, users now have the opportunity to outsource their data, in encrypted form, as well as the data mining tasks to the cloud. Since the data on the cloud is in encrypted form, existing privacy-preserving classification techniques are not applicable. In this paper, we focus on solving the classification problem over encrypted data. In particular, we propose a secure k-NN classifier over encrypted data in the cloud. The proposed protocol protects the confidentiality of data, privacy of user's input query, and hides the data access patterns. To the best of our knowledge, our work is the first to develop a secure k-NN classifier over encrypted data under the semi-honest model. Also, we empirically analyze the efficiency of our proposed protocol using a real-world dataset under different parameter settings.
Identification of truthful packet dropping in wireless ad-hoc networks using HLA algorithm's main... more Identification of truthful packet dropping in wireless ad-hoc networks using HLA algorithm's main purpose is to determine whether the is loss of packets are caused by link errors only or by the combined effect of link errors and malicious drop errors that are the two causes in multi-hop wireless adhoc networks. It is particularly considered for insider attack case, where by malicious nodes which are part of the route exploit cognition of communication context to selectively drop a small amount of packets that act critical to the network performance. Development of homo_morphic linear authenticator [HLA] is necessary to ensure truthful calculation of these correlations and to verify truthfulness of the packet loss information reported by nodes. This construction is privacy preserving, collusion proof and provokes low communication and storage overheads. To reduce computation overhead a packet block based mechanism is also proposed to trade detection accuracy for low computation complexity.
Keyword search is an intuitive paradigm for searching linked data sources on the web. We propose ... more Keyword search is an intuitive paradigm for searching linked data sources on the web. We propose to route keywords only to relevant sources to reduce the high cost of processing keyword search queries over all sources. We propose a novel method for computing top-k routing plans based on their potentials to contain results for a given keyword query. We employ a keyword-element relationship summary that compactly represents relationships between keywords and the data elements mentioning them. A multilevel scoring mechanism is proposed for computing the relevance of routing plans based on scores at the level of keywords, data elements, element sets, and subgraphs that connect these elements. Experiments carried out using 150 publicly available sources on the web showed that valid plans (precision@1 of 0.92) that are highly relevant (mean reciprocal rank of 0.89) can be computed in 1 second on average on a single PC. Further, we show routing greatly helps to improve the performance of keyword search, without compromising its result quality.
Steganography is the art and science of sending covert messages such that the existence and natur... more Steganography is the art and science of sending covert messages such that the existence and nature of such a message is only known by the sender and intended recipient. The process of hiding the information in other information without altering is known as Steganography. It is the art of hiding message inside a multimedia block. Attacks, misuse or unauthorized access of information is of great concern today which makes the protection of documents through digital media is a priority problem. Digital images are widely used in order to store the information. For hiding secret information in images, there exists a large variety of techniques. Some applications may require absolute invisibility of secret information, while some require large secret message to be hidden. This project report intends to give an overview of image Steganography, its uses and techniques. It also attempts to identify the requirements of a good steganography algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.
Project Loon is a network of balloons traveling on the edge of space, designed to connect people ... more Project Loon is a network of balloons traveling on the edge of space, designed to connect people in rural and remote areas, help fill coverage gaps, and bring people back online after disasters. Project Loon balloons float in the stratosphere, twice as high as airplanes and the weather. They are carried around the Earth by winds and they can be controlled by rising or descending to an altitude with winds moving in the desired direction. People connect to the balloon network using a special Internet antenna attached to their building. The signal bounces from balloon to balloon, then to the global Internet back on Earth.
Key agreement is a mechanism that allows two or more parties to securely share a secret key (call... more Key agreement is a mechanism that allows two or more parties to securely share a secret key (called a session key). Starting from Diffie-Hellman for the two-party case. However, almost all the protocols assume a complete connectivity graph: any two users can communicate directly. In the real world, this is not always true. For instance, in social networks such as Face book, Skype, Wechat and Google+, a user is only connected with his friends. For a group of users (e.g., the faculty union in a university) who wish to establish a session key, it is not necessary that any two of them are friends. But they might still be connected indirectly through the friend network. Of course, we can still regard them as directly connected by regarding the intermediate users as routers. However, this is quite different from a direct connection. First, indirectly connected users may not have the public information of each other (e.g., public-key certificate). Second, indirectly connected users may not know the existence of each other (e.g., in our faculty union example, one professor in one department may not know another professor in a different department). Third, a message between two indirectly connected users travels a longer time than that between directly connected users. We study the group key agreement with an arbitrary connectivity graph, where each user is only aware of his neighbors and has no information about the existence of other users. Further, he has no information about the network topology. Under this setting, a user does not need to trust a user who is not his neighbor. Thus, if one is initialized using PKI, then he need not trust or remember public-keys of users beyond his neighbors.
Due to the design complexities involved the video data hiding is still an important research topi... more Due to the design complexities involved the video data hiding is still an important research topic. We propose a new video data hiding method that makes use of erasure correction capability of repeat accumulate codes and superiority of forbidden zone data hiding. Selective embedding is utilized in the proposed method to determine host signal samples suitable for data hiding. This method also contains a temporal synchronization scheme in order to withstand frame drop and insert attacks. The proposed framework is tested by typical broadcast material against MPEG-2, H.264 compression, frame-rate conversion attacks, as well as other well-known video data hiding methods. The decoding error values are reported for typical system parameters. The simulation results indicate that the framework can be successfully utilized in video data hiding applications. Data hiding is the process of embedding information into a host medium. In general, visual and arual media are preferred due to their wide presence and the tolerance of human perceptual systems involved. Although the general structure of data hiding process does not depend on the host media type, the methods vary depending on the nature of such media.
The primary aim of this project is to implement techniques for fingerprint image enhancement and ... more The primary aim of this project is to implement techniques for fingerprint image enhancement and minutiae extraction. Recognition of people by means of their biometric characteristics very popular among the society. But a fingerprint image consists of enormous amount of data. For a given whole fingerprint, divide it into small blocks called patches. Obtaining an over complete dictionary from a set of fingerprint patches allows us to represent them as a sparse linear combination of dictionary atoms. In the algorithm, we first construct a dictionary for predefined fingerprint image patches. Large volume of fingerprint is collected and stored everyday in a wide range of applications. The experiments demonstrate that this is efficient compared with several competing compression techniques especially at high compression ratios. There are many image compression techniques available. Fingerprint images are rarely of perfect quality. There are many image compression techniques available. JPEG, JPEG 2000, Wavelet Scalar Quantization (WSQ) are the existing image compression techniques. The JPEG, JPEG 2000 methods are for general image compression. Fingerprint identification methods are widely used by police agencies and customhouse to identify criminals or transit passengers since the late nineteenth century. ISO standardized the characteristics of the fingerprint in 2004.
The paper presents a novel algorithm for performing k-means clustering. It organizes all the patt... more The paper presents a novel algorithm for performing k-means clustering. It organizes all the patterns in a k-d tree structure such that one can find all the patterns which are closest to a given prototype efficiently. The main intuition behind the approach is as follows. All the prototypes are potential candidates for the closest prototype at the root level. However, for the children of the root node, may be able to prune the candidate set by using simple geometrical constraints. This approach can be applied recursively until the size of the candidate set is one for each node. Experimental results demonstrate that the scheme can improve the computational speed of the direct k-means algorithm by an order to two orders of magnitude in the total number of distance calculations and the overall time of computation.
The field of image retrieval has been an active research area for several decades and has gained ... more The field of image retrieval has been an active research area for several decades and has gained steady momentum in recent years as a result, large collection of digital images are growing day by day in government, hospitals, banking, etc. Interest in image retrieval has increased in large part due the rapid growth of the World Wide Web. With the proliferation of image data, the need to search and retrieve images efficiently and accurately from a large collection of image databases has drastically increased. Query based text retrieval from database is done through tools like SQL, MYSQL etc. In this process we consider constraint based query to retrieve text records from database. But image retrieval is not as easy as query processing. For this proposed system a broad literature survey of data mining technique have been made. Clustering technique has been identified as best suited for this system. In clustering technique there exist algorithms like BIRCH, CURE, DBSCAN, STING, K-Means...
Diabetic foot ulcers represent a serious health issue. Today clinicians and nurses produce wound ... more Diabetic foot ulcers represent a serious health issue. Today clinicians and nurses produce wound assessment by observing the wound size and healing status visually. Here the patients also have an opportunity to play an active role. This method enables the patients and clinicians to take a more active role in daily wound care which can quicken wound healing and also saves the travel cost, reduce healthcare expenses. As the pervasiveness of Smartphone's with a highresolution digital camera, assessing wounds by analyzing the images of constant foot ulcers. A wound image analysis system is implemented on the android smart phone. The wound image is occupied by the camera on the smart phone with the help of an image capture box. Later that, the smart phone performs wound segmentation by applying the accelerated mean-shift algorithm. The outline of the foot is identified based on skin color, and the wound boundary is recognized using a simple connected region detection method. The healing status is beside assessed based on red-yellow-black color evaluation model with in the boundary of the wound. Further, the healing status is significantly assessed, based on the analysis of patient's time records. The test results on wound images collected in UMASS-Memorial Health Center Wound Clinic (Worcester, MA).
With the increasing volume of images users share through social sites, maintaining privacy has be... more With the increasing volume of images users share through social sites, maintaining privacy has become a major problem, as demonstrated by a recent wave of publicized incidents where users share personal information. In light of these incidents, the need of tools to help users control access to their shared content is apparent. Toward addressing this need, we propose an Adaptive Privacy Policy Prediction (A3P) system to help users compose privacy settings for their images. We examine the role of social context, image content, and metadata as possible indicators of users' privacy preferences. We propose a two-level framework which determines the best available privacy policy for the user's images being uploaded. Our solution relies on an image classification framework for image categories which may be associated with similar policies, and on a policy prediction algorithm to automatically generate a policy for each newly uploaded image, also according to users' social features.
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suf... more Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Cipher text-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. In this paper, we propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network.
The applications that we use in our mobile devices often access sensitive data and resources. But... more The applications that we use in our mobile devices often access sensitive data and resources. But when the users data has been misused due to some malicious applications which may lead to leakage of sensitive data and also reflect in privacy. An example is a malicious application records users banking details. The problem starts when the user have installed the application by granting all the privileges on which the user have no control on operating the features. To avoid this problem we propose a context based access control system by which a user can activate and deactivate some of the applications that are already present in the users mobile based on the context that is provided. It can also perform its action in a particular location by using GPS, Wi-Fi etc.. based on the context that is provided by the user. We have preformed many experiments for accessing the data in a particular location based on context.
This report discusses advent of the Screen less display which is an emerging new technology, has ... more This report discusses advent of the Screen less display which is an emerging new technology, has become a good prospect in the near future for a wide range of applications. As the name implies it deals with the display of several things without the use of screens using projector. It involves the following 3 different working principles. The Visual image, Virtual retinal display, Synaptic interface. This report mainly illustrates and demonstrates how the screen less displays works and its applications in various fields of science. This technology would bring about the revolution in the field of displays and monitors that are costly, huge and are proven difficult to manage the power requirements and constraints. It is also the futuristic technological innovation.
This paper presents a new approach for providing limited information only that is necessary for f... more This paper presents a new approach for providing limited information only that is necessary for fund transfer during online shopping thereby safe guarding customer data and increasing customer confidence and preventing identity theft. In recent time there is rapid growth in E-Commerce market. Major concerns for customers in online shopping are debit card or credit card fraud and personal information security. Identity theft and phishing are common threats of online shopping. The approach uses combined application of BPCS Steganography and visual cryptography for this purpose. Payment portal, a channel between consumers and payment processors, use numerous security tools to secure a consumer's payment information, ordinarily card data, during an online transaction. Moreover, not all merchants provide a secure payment environment to their consumers and, in spite of having a standard payment plan, adhere to it. Consequently, this exposes a consumer's payment information to risks of being compromised or misused by merchants or stolen by hackers and spammers.
Personal authentication by multiple biometric is the main purpose to identify moderate performanc... more Personal authentication by multiple biometric is the main purpose to identify moderate performance because the information carried is discriminatory by Two-dimensional (2-D) hand-geometry features. So it investigates a new approach to achieve performance improvement by simultaneously acquiring and combining three-dimensional and 2-D features from the human hand. Two new representations that effectively characterize the local finger surface features are extracted from the acquired range images and are matched using the proposed matching metrics. In addition, the characterization of 3-D palm surface using Surface Code is proposed for matching a pair of 3-D palms. The proposed 3-D hand-geometry features have significant discriminatory information to reliably authenticate individuals. By consolidating 3-D and 2-D hand-geometry features results in significantly improved performance that cannot be achieved with the traditional 2-D hand-geometry features alone.
Chrome cast is a small HDMI dongle device which is of 72mm long which provide users to stream onl... more Chrome cast is a small HDMI dongle device which is of 72mm long which provide users to stream online videos, music ,games to the television of high definition or house audio systems . Chromecast which is a digital media player developed by Google it directly streams audio and videos on HD TV via WI-FI or a local internet. Users can also cast personal computers screen as well as cast enabled android devices to HD TV. Chromecast streams content from the cloud, so you get the highest quality 1080p HD video and surround sound. With 2.4 / 5GHz Wi-Fi support built in, which keeps video resolution high definition and buffering at low. Chromecast comes with micro USB cable with source of energy as adapter . Also setting up of Chromecast is also simple and easy. Supported mobile apps for Chrome cast are available for iOS 7.1+, Android 4.0+ and web based apps enabled for Chromecast are available on computers enabled Google Chrome (on Windows xp,7+, Mac OS 10.
Collaborative filtering explores techniques for matching people with similar interests and making... more Collaborative filtering explores techniques for matching people with similar interests and making personalized recommendations on the web. The Collaborative Filtering (CF) is widely employed for making Web service recommendation. The main aim is to predict missing QoS (Quality-of-Service) values of Web services. Although several CF-based Web service QoS prediction methods have been proposed in recent years, the performance still needs significant improvement. In this the Quality of Service (QoS) prediction methods rarely consider personalized influence of users and services and it consider Web service QoS factors, such as response time and throughput, usually depends on the locations of Web services and users. In this paper, we propose a location-aware personalized CF method for Web service recommendation.
Data Mining has wide applications in many areas such as banking, medicine, scientific research an... more Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications. For the past decade, due to the rise of various privacy issues, many theoretical and practical solutions to the classification problem have been proposed under different security models. However, with the recent popularity of cloud computing, users now have the opportunity to outsource their data, in encrypted form, as well as the data mining tasks to the cloud. Since the data on the cloud is in encrypted form, existing privacy-preserving classification techniques are not applicable. In this paper, we focus on solving the classification problem over encrypted data. In particular, we propose a secure k-NN classifier over encrypted data in the cloud. The proposed protocol protects the confidentiality of data, privacy of user's input query, and hides the data access patterns. To the best of our knowledge, our work is the first to develop a secure k-NN classifier over encrypted data under the semi-honest model. Also, we empirically analyze the efficiency of our proposed protocol using a real-world dataset under different parameter settings.
Identification of truthful packet dropping in wireless ad-hoc networks using HLA algorithm's main... more Identification of truthful packet dropping in wireless ad-hoc networks using HLA algorithm's main purpose is to determine whether the is loss of packets are caused by link errors only or by the combined effect of link errors and malicious drop errors that are the two causes in multi-hop wireless adhoc networks. It is particularly considered for insider attack case, where by malicious nodes which are part of the route exploit cognition of communication context to selectively drop a small amount of packets that act critical to the network performance. Development of homo_morphic linear authenticator [HLA] is necessary to ensure truthful calculation of these correlations and to verify truthfulness of the packet loss information reported by nodes. This construction is privacy preserving, collusion proof and provokes low communication and storage overheads. To reduce computation overhead a packet block based mechanism is also proposed to trade detection accuracy for low computation complexity.
Keyword search is an intuitive paradigm for searching linked data sources on the web. We propose ... more Keyword search is an intuitive paradigm for searching linked data sources on the web. We propose to route keywords only to relevant sources to reduce the high cost of processing keyword search queries over all sources. We propose a novel method for computing top-k routing plans based on their potentials to contain results for a given keyword query. We employ a keyword-element relationship summary that compactly represents relationships between keywords and the data elements mentioning them. A multilevel scoring mechanism is proposed for computing the relevance of routing plans based on scores at the level of keywords, data elements, element sets, and subgraphs that connect these elements. Experiments carried out using 150 publicly available sources on the web showed that valid plans (precision@1 of 0.92) that are highly relevant (mean reciprocal rank of 0.89) can be computed in 1 second on average on a single PC. Further, we show routing greatly helps to improve the performance of keyword search, without compromising its result quality.
Steganography is the art and science of sending covert messages such that the existence and natur... more Steganography is the art and science of sending covert messages such that the existence and nature of such a message is only known by the sender and intended recipient. The process of hiding the information in other information without altering is known as Steganography. It is the art of hiding message inside a multimedia block. Attacks, misuse or unauthorized access of information is of great concern today which makes the protection of documents through digital media is a priority problem. Digital images are widely used in order to store the information. For hiding secret information in images, there exists a large variety of techniques. Some applications may require absolute invisibility of secret information, while some require large secret message to be hidden. This project report intends to give an overview of image Steganography, its uses and techniques. It also attempts to identify the requirements of a good steganography algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.
Project Loon is a network of balloons traveling on the edge of space, designed to connect people ... more Project Loon is a network of balloons traveling on the edge of space, designed to connect people in rural and remote areas, help fill coverage gaps, and bring people back online after disasters. Project Loon balloons float in the stratosphere, twice as high as airplanes and the weather. They are carried around the Earth by winds and they can be controlled by rising or descending to an altitude with winds moving in the desired direction. People connect to the balloon network using a special Internet antenna attached to their building. The signal bounces from balloon to balloon, then to the global Internet back on Earth.
Key agreement is a mechanism that allows two or more parties to securely share a secret key (call... more Key agreement is a mechanism that allows two or more parties to securely share a secret key (called a session key). Starting from Diffie-Hellman for the two-party case. However, almost all the protocols assume a complete connectivity graph: any two users can communicate directly. In the real world, this is not always true. For instance, in social networks such as Face book, Skype, Wechat and Google+, a user is only connected with his friends. For a group of users (e.g., the faculty union in a university) who wish to establish a session key, it is not necessary that any two of them are friends. But they might still be connected indirectly through the friend network. Of course, we can still regard them as directly connected by regarding the intermediate users as routers. However, this is quite different from a direct connection. First, indirectly connected users may not have the public information of each other (e.g., public-key certificate). Second, indirectly connected users may not know the existence of each other (e.g., in our faculty union example, one professor in one department may not know another professor in a different department). Third, a message between two indirectly connected users travels a longer time than that between directly connected users. We study the group key agreement with an arbitrary connectivity graph, where each user is only aware of his neighbors and has no information about the existence of other users. Further, he has no information about the network topology. Under this setting, a user does not need to trust a user who is not his neighbor. Thus, if one is initialized using PKI, then he need not trust or remember public-keys of users beyond his neighbors.
Due to the design complexities involved the video data hiding is still an important research topi... more Due to the design complexities involved the video data hiding is still an important research topic. We propose a new video data hiding method that makes use of erasure correction capability of repeat accumulate codes and superiority of forbidden zone data hiding. Selective embedding is utilized in the proposed method to determine host signal samples suitable for data hiding. This method also contains a temporal synchronization scheme in order to withstand frame drop and insert attacks. The proposed framework is tested by typical broadcast material against MPEG-2, H.264 compression, frame-rate conversion attacks, as well as other well-known video data hiding methods. The decoding error values are reported for typical system parameters. The simulation results indicate that the framework can be successfully utilized in video data hiding applications. Data hiding is the process of embedding information into a host medium. In general, visual and arual media are preferred due to their wide presence and the tolerance of human perceptual systems involved. Although the general structure of data hiding process does not depend on the host media type, the methods vary depending on the nature of such media.
The primary aim of this project is to implement techniques for fingerprint image enhancement and ... more The primary aim of this project is to implement techniques for fingerprint image enhancement and minutiae extraction. Recognition of people by means of their biometric characteristics very popular among the society. But a fingerprint image consists of enormous amount of data. For a given whole fingerprint, divide it into small blocks called patches. Obtaining an over complete dictionary from a set of fingerprint patches allows us to represent them as a sparse linear combination of dictionary atoms. In the algorithm, we first construct a dictionary for predefined fingerprint image patches. Large volume of fingerprint is collected and stored everyday in a wide range of applications. The experiments demonstrate that this is efficient compared with several competing compression techniques especially at high compression ratios. There are many image compression techniques available. Fingerprint images are rarely of perfect quality. There are many image compression techniques available. JPEG, JPEG 2000, Wavelet Scalar Quantization (WSQ) are the existing image compression techniques. The JPEG, JPEG 2000 methods are for general image compression. Fingerprint identification methods are widely used by police agencies and customhouse to identify criminals or transit passengers since the late nineteenth century. ISO standardized the characteristics of the fingerprint in 2004.
The paper presents a novel algorithm for performing k-means clustering. It organizes all the patt... more The paper presents a novel algorithm for performing k-means clustering. It organizes all the patterns in a k-d tree structure such that one can find all the patterns which are closest to a given prototype efficiently. The main intuition behind the approach is as follows. All the prototypes are potential candidates for the closest prototype at the root level. However, for the children of the root node, may be able to prune the candidate set by using simple geometrical constraints. This approach can be applied recursively until the size of the candidate set is one for each node. Experimental results demonstrate that the scheme can improve the computational speed of the direct k-means algorithm by an order to two orders of magnitude in the total number of distance calculations and the overall time of computation.
Uploads
Papers by Prasad Banoth