Pub Date : 2019-11-01DOI: 10.1109/ICSSIT46314.2019.8987910
G. Anjaneyulu, J. Varma
This work contains design and simulation of 8 element corporate fed microstrip patch antenna array model using HFSS software. In this simulation, RT Duroid 5880 was used as dielectric material with 1.57mm as its thickness. To enhance the gain, feed network is optimized carefully after several parametric analysis patch dimensions are chosen. The simulation results show that rectangular array antenna is resonating at 10.72 GHz frequency with 15.47 dBi and return loss of −24.62 dB. The efficiency of the antenna in the operating bandwidth is also above 84%. This antenna array is having applications in space exploration, fixed satellite services and X band satellite applications.
{"title":"Design and simulation of 8 Element patch antenna array for X band satellite applications","authors":"G. Anjaneyulu, J. Varma","doi":"10.1109/ICSSIT46314.2019.8987910","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987910","url":null,"abstract":"This work contains design and simulation of 8 element corporate fed microstrip patch antenna array model using HFSS software. In this simulation, RT Duroid 5880 was used as dielectric material with 1.57mm as its thickness. To enhance the gain, feed network is optimized carefully after several parametric analysis patch dimensions are chosen. The simulation results show that rectangular array antenna is resonating at 10.72 GHz frequency with 15.47 dBi and return loss of −24.62 dB. The efficiency of the antenna in the operating bandwidth is also above 84%. This antenna array is having applications in space exploration, fixed satellite services and X band satellite applications.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127601663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Because of the quickly transforming IT condition and the spread of cell phones, there has been a sudden increment that sought after for perusing records of different configurations, which oversaw in the current framework on the versatile. In any case, the electronic records being overseen in the current OS have a wide assortment of shape and stage; in this manner understanding them on a keen gadget has its points of confinement. Along these lines, this paper proposed planning and setting up a Smart Data Hub System, which gives the data administration of a brilliant establishment, via naturally changing over electronic report records being circled in an assortment of electronic archive administration frameworks into all around upheld designs (PDFs, ePub), with a specific end goal to utilize them in savvy gadgets. This framework incorporates order of records, XML change, and the security of electronic reports. Outfitting data innovation to oversee reports is a standout amongst the most vital difficulties confronting I/S supervisors in this decade. It is vital in light of the fact that the majority of the important data in associations is as records, for example, business frames, reports, letters, updates, arrangement explanations, contracts, agreements, and so on. Also, a large portion of the imperative business forms in associations depend on, or driven by, report streams. Electronic Document Management (EDM) guarantees real profitability and execution increments by applying new innovation to records and report handling. In this day and age of shared working, data is by all accounts growing exponentially. This development is making it harder to successfully and safely store data while as yet giving simple access to the individuals who require it. The response for some is to utilize an Electronic Document Management System (EDMS).
{"title":"An Effective Technique For EDMS Using Smart Data Hub System","authors":"Pankaj Verma, Vijaylaxmi Bittal, Nilima Dongre Jawade","doi":"10.1109/ICSSIT46314.2019.8987884","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987884","url":null,"abstract":"Because of the quickly transforming IT condition and the spread of cell phones, there has been a sudden increment that sought after for perusing records of different configurations, which oversaw in the current framework on the versatile. In any case, the electronic records being overseen in the current OS have a wide assortment of shape and stage; in this manner understanding them on a keen gadget has its points of confinement. Along these lines, this paper proposed planning and setting up a Smart Data Hub System, which gives the data administration of a brilliant establishment, via naturally changing over electronic report records being circled in an assortment of electronic archive administration frameworks into all around upheld designs (PDFs, ePub), with a specific end goal to utilize them in savvy gadgets. This framework incorporates order of records, XML change, and the security of electronic reports. Outfitting data innovation to oversee reports is a standout amongst the most vital difficulties confronting I/S supervisors in this decade. It is vital in light of the fact that the majority of the important data in associations is as records, for example, business frames, reports, letters, updates, arrangement explanations, contracts, agreements, and so on. Also, a large portion of the imperative business forms in associations depend on, or driven by, report streams. Electronic Document Management (EDM) guarantees real profitability and execution increments by applying new innovation to records and report handling. In this day and age of shared working, data is by all accounts growing exponentially. This development is making it harder to successfully and safely store data while as yet giving simple access to the individuals who require it. The response for some is to utilize an Electronic Document Management System (EDMS).","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125349891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICSSIT46314.2019.8987892
Ankita R Shekar
In this internet era people are likely to use the mobile application very often for their daily needs like: Mobile recharge, Food delivery, Online shopping, Fitness tracking application and many more. It's necessary to make sure application is secure so that the user details are not exposed. This paper narrates the feature of fitness mobile application and explain about the security of Fitness mobile application in detail. As people are more concerned about their health and fitness, so people tend to take care of their heath using the fitness mobile application which monitors the health in the single application. Basically, the mobile device data base will not be secured, i.e., SQLite Data base of the mobile application is not secure enough. If the application which the user is using has some sort of security, then that security is used to secure the applications database. So, the fitness application defined in this paper has the following: activity tracker, calories finder, user position, emergency message sender, URL, and user details. Here these data are been stored in the SQLite, so if the security is not provided for the application then there will be a chance in manipulation of data in the server side. And the user data might be altered, and false data is been displayed for the user in the application. To make sure the user data is not altered there should be some encryption algorithm which has to be used to secure the application. There are plenty of encryption algorithm but from the study done in the paper, AES algorithm can be used to secure the application and to prevent the manipulation of the user data because time taken to secure the data is less when compared with the other algorithm.
{"title":"Preventing Data Manipulation and Enhancing the Security of data in Fitness Mobile Application","authors":"Ankita R Shekar","doi":"10.1109/ICSSIT46314.2019.8987892","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987892","url":null,"abstract":"In this internet era people are likely to use the mobile application very often for their daily needs like: Mobile recharge, Food delivery, Online shopping, Fitness tracking application and many more. It's necessary to make sure application is secure so that the user details are not exposed. This paper narrates the feature of fitness mobile application and explain about the security of Fitness mobile application in detail. As people are more concerned about their health and fitness, so people tend to take care of their heath using the fitness mobile application which monitors the health in the single application. Basically, the mobile device data base will not be secured, i.e., SQLite Data base of the mobile application is not secure enough. If the application which the user is using has some sort of security, then that security is used to secure the applications database. So, the fitness application defined in this paper has the following: activity tracker, calories finder, user position, emergency message sender, URL, and user details. Here these data are been stored in the SQLite, so if the security is not provided for the application then there will be a chance in manipulation of data in the server side. And the user data might be altered, and false data is been displayed for the user in the application. To make sure the user data is not altered there should be some encryption algorithm which has to be used to secure the application. There are plenty of encryption algorithm but from the study done in the paper, AES algorithm can be used to secure the application and to prevent the manipulation of the user data because time taken to secure the data is less when compared with the other algorithm.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126133932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICSSIT46314.2019.8987883
K. Reddy, P. Rao
In this paper, the power dissipation model to estimate the junction temperature of LDO circuits is presented. The Steady-state ripple magnitude of LDO circuits will be affected by ripple currents and clock frequency. Therefore, the proposed model considers ripple voltage, reference voltage and, clock frequency. Power dissipation proportional to input parameters of the model and it is a function of $I_{load}, v_{ripple}, v_{ref}, f_{clk}$. Power dissipation estimated for four different test cases (changing the input parameter model). The junction temperatures obtained are 49.7 °C, 49.7 °C, 55.8°C and 40.4°C for test cases I, II, III, IV, respectively. Finally, reliability prediction using Arrhenius-Weibull relation performed to identity at which test case LDO circuit demonstrates high operation life.
{"title":"Digital Low Drop-Out Regulator-Power Dissipation Modeling and Reliability Modeling","authors":"K. Reddy, P. Rao","doi":"10.1109/ICSSIT46314.2019.8987883","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987883","url":null,"abstract":"In this paper, the power dissipation model to estimate the junction temperature of LDO circuits is presented. The Steady-state ripple magnitude of LDO circuits will be affected by ripple currents and clock frequency. Therefore, the proposed model considers ripple voltage, reference voltage and, clock frequency. Power dissipation proportional to input parameters of the model and it is a function of $I_{load}, v_{ripple}, v_{ref}, f_{clk}$. Power dissipation estimated for four different test cases (changing the input parameter model). The junction temperatures obtained are 49.7 °C, 49.7 °C, 55.8°C and 40.4°C for test cases I, II, III, IV, respectively. Finally, reliability prediction using Arrhenius-Weibull relation performed to identity at which test case LDO circuit demonstrates high operation life.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126142785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICSSIT46314.2019.8987865
Deeheem Ansari, Gurtej Kochar
Over the last few years, self-driving vehicles have expanded dramatically. They look promising in decreasing traffic accidents and congestion on roads. In order for this approach to work, simulations tend to be a cheaper, more efficient, and a safer way than live testing. In this paper, we present a simulator that tests the self-driving car's CNN model in a virtual environment. To avoid the hassle of collecting huge amount of training and testing data for preliminary testing, we also propose a method to collect data (images, steering value and throttle value) using PID controllers in the virtual environment itself.
{"title":"Simulation of Steering a Self-Driving Car Using 1) PID Controller 2) Neural Network","authors":"Deeheem Ansari, Gurtej Kochar","doi":"10.1109/ICSSIT46314.2019.8987865","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987865","url":null,"abstract":"Over the last few years, self-driving vehicles have expanded dramatically. They look promising in decreasing traffic accidents and congestion on roads. In order for this approach to work, simulations tend to be a cheaper, more efficient, and a safer way than live testing. In this paper, we present a simulator that tests the self-driving car's CNN model in a virtual environment. To avoid the hassle of collecting huge amount of training and testing data for preliminary testing, we also propose a method to collect data (images, steering value and throttle value) using PID controllers in the virtual environment itself.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126231291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICSSIT46314.2019.8987592
S. Pandit, Rohit Mohan Krishna G V L, R. Akash, Minal Moharir
The rise in population is a major concern as management of resources becomes difficult. With the increase in population, there is a need for smart cities. Smart cities are developed in such a way that the problems are solved using technologies like Internet of Things (IoT) technology. One such problem is parking. Parking in busy streets is difficult and is a cause of lot of inconvenience to the people. The difficulty lies in the fact that people will not know the availability of parking slots. The aim of this paper helps to ease the parking issues faced by the people by the use of a smart parking system. The free parking slot is determined using IR sensors connected to an Arduino board and the data is uploaded to the ThingSpeak Cloud. The data from the cloud can be fetched and the parking slot availability can be obtained in real time through a mobile application. This paper also emphasizes on explaining the functionalities and architectural details of ThingSpeak Cloud, Arduino and PLX_DAQ Software. The paper also provides the methodology for implementing this work. The efficient software, devices have been identified and the further improvements which are probable have been described briefly.
{"title":"Cloud Based Smart Parking System for Smart Cities","authors":"S. Pandit, Rohit Mohan Krishna G V L, R. Akash, Minal Moharir","doi":"10.1109/ICSSIT46314.2019.8987592","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987592","url":null,"abstract":"The rise in population is a major concern as management of resources becomes difficult. With the increase in population, there is a need for smart cities. Smart cities are developed in such a way that the problems are solved using technologies like Internet of Things (IoT) technology. One such problem is parking. Parking in busy streets is difficult and is a cause of lot of inconvenience to the people. The difficulty lies in the fact that people will not know the availability of parking slots. The aim of this paper helps to ease the parking issues faced by the people by the use of a smart parking system. The free parking slot is determined using IR sensors connected to an Arduino board and the data is uploaded to the ThingSpeak Cloud. The data from the cloud can be fetched and the parking slot availability can be obtained in real time through a mobile application. This paper also emphasizes on explaining the functionalities and architectural details of ThingSpeak Cloud, Arduino and PLX_DAQ Software. The paper also provides the methodology for implementing this work. The efficient software, devices have been identified and the further improvements which are probable have been described briefly.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127783434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Despite of swift advancements happening in digital technology, financial institutions like banks still rely upon conventional medium of processing the bank cheques by humans. The process is cumbersome and takes couple of days for actual transfer of money which involves verification by the intermediaries. This leads to high time and costs. In this paper, we propose an automated system which extracts relevant details on a bank cheque like Payee Name, Amount, Date, Bank Name using Optical Character Recognition and Deep Learning and verifies the signature on the cheque with the existing signature stored in the database using feature extraction and principal component analysis. The signature for a new user is stored using it's hash value for security purposes. The proposed system uses modified convolution neural network to extract the handwritten content on cheque leaf where in IAM dataset is used to train the model and get the optimized results. This system will facilitate the process and lead to reduction in time and costs. The efficiency and performance is measured on the self generated data set of bank cheques.
{"title":"Automation of Cheque Transaction using Deep Learning and Optical Character Recognition","authors":"Mukesh Jha, Madhur Kabra, Sahil Jobanputra, Rupali Sawant","doi":"10.1109/ICSSIT46314.2019.8987925","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987925","url":null,"abstract":"Despite of swift advancements happening in digital technology, financial institutions like banks still rely upon conventional medium of processing the bank cheques by humans. The process is cumbersome and takes couple of days for actual transfer of money which involves verification by the intermediaries. This leads to high time and costs. In this paper, we propose an automated system which extracts relevant details on a bank cheque like Payee Name, Amount, Date, Bank Name using Optical Character Recognition and Deep Learning and verifies the signature on the cheque with the existing signature stored in the database using feature extraction and principal component analysis. The signature for a new user is stored using it's hash value for security purposes. The proposed system uses modified convolution neural network to extract the handwritten content on cheque leaf where in IAM dataset is used to train the model and get the optimized results. This system will facilitate the process and lead to reduction in time and costs. The efficiency and performance is measured on the self generated data set of bank cheques.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"289 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131624685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICSSIT46314.2019.8987799
Niveditha E, C. H, Kalaigar Afrose, Susan Thomas
A novel circularly polarized, broadband and high gain printed monopole antenna is proposed for RF energy harvesting. The antenna has an excellent impedance matching over a wide band which includes various frequencies bands such as GSM 1800 MHz, Wi-Fi 2400MHz and LTE 2500MHz. The antenna structure consists of multiple elliptical patches arranged in a circular fashion to enable the reception of ambient RF signals in different orientations. The simulation results of the designed antenna show that an axial ratio less than 3dB are maintained for frequencies ranging from 2.1GHz to 2.5GHz. The presented broadband antenna exhibits 10dB return loss bandwidth of 84% which is advantageous to accumulate the power over the multiple bands and increase the ambient RF input power density. The antenna has a gain more than 5.2dB over the entire band.
{"title":"A Novel Circularly Polarized Multiple Elliptical Printed Monopole Antenna","authors":"Niveditha E, C. H, Kalaigar Afrose, Susan Thomas","doi":"10.1109/ICSSIT46314.2019.8987799","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987799","url":null,"abstract":"A novel circularly polarized, broadband and high gain printed monopole antenna is proposed for RF energy harvesting. The antenna has an excellent impedance matching over a wide band which includes various frequencies bands such as GSM 1800 MHz, Wi-Fi 2400MHz and LTE 2500MHz. The antenna structure consists of multiple elliptical patches arranged in a circular fashion to enable the reception of ambient RF signals in different orientations. The simulation results of the designed antenna show that an axial ratio less than 3dB are maintained for frequencies ranging from 2.1GHz to 2.5GHz. The presented broadband antenna exhibits 10dB return loss bandwidth of 84% which is advantageous to accumulate the power over the multiple bands and increase the ambient RF input power density. The antenna has a gain more than 5.2dB over the entire band.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125715184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICSSIT46314.2019.8987756
Vani A. Hiremani, K. K. Senapati
Feature extraction is the most vital stage in edifice of any system under image processing. The prominent features play important role in the process of image recognition. Features are broadly classified as Conventional and Non-Conventional. The type of features is being selected affects the image classification phase. The state of the art work has achieved commendable success under face recognition using conventional features like skin tone, face shape, eyes, eyebrows, nose and mouth etc.,. Moving slight away from traditional approach of working with only conventional facial features the underlying work aimed to establish an empirical research to understand the significant role of non-conventional features like dressing style, physic, moustache, style of applying vermillion, regional amulet thread, traditional jewellery along with conventional features in face recognition process. These two features can effectively be used to pursue emotions, behaviour and geographic regional information of a person who is under surveillance. Human intellect is significantly effective in recognising face even in unfavourable conditions like occlusion, blurred image and variation in pose. In this research work ample empirical evidences are gathered and are analysed quantitatively and qualitatively to comprehend that not only the conventional features but many non-conventional features prompted human intelligence to make out native information of a person in given face image. Human Intelligence ensured 96% accuracy in this research work.
{"title":"Significance of Conventional and Nonconventional Features in Classification of Face through Human Intelligence","authors":"Vani A. Hiremani, K. K. Senapati","doi":"10.1109/ICSSIT46314.2019.8987756","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987756","url":null,"abstract":"Feature extraction is the most vital stage in edifice of any system under image processing. The prominent features play important role in the process of image recognition. Features are broadly classified as Conventional and Non-Conventional. The type of features is being selected affects the image classification phase. The state of the art work has achieved commendable success under face recognition using conventional features like skin tone, face shape, eyes, eyebrows, nose and mouth etc.,. Moving slight away from traditional approach of working with only conventional facial features the underlying work aimed to establish an empirical research to understand the significant role of non-conventional features like dressing style, physic, moustache, style of applying vermillion, regional amulet thread, traditional jewellery along with conventional features in face recognition process. These two features can effectively be used to pursue emotions, behaviour and geographic regional information of a person who is under surveillance. Human intellect is significantly effective in recognising face even in unfavourable conditions like occlusion, blurred image and variation in pose. In this research work ample empirical evidences are gathered and are analysed quantitatively and qualitatively to comprehend that not only the conventional features but many non-conventional features prompted human intelligence to make out native information of a person in given face image. Human Intelligence ensured 96% accuracy in this research work.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128891653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICSSIT46314.2019.8987785
Pala Mahesh Kumar, K. Srinivas
Information hiding with a cover object is referred as steganography. Here the cover object might be an image, video or speech. Speech steganography is a process of hiding the message data into a cover speech without degrading the quality of cover speech. This article has introduced a spread spectrum representation-based speech steganography using decimated wavelet transform (DWT), which decomposes the cover speech signal into approximated and detail coefficients i.e., low frequency and high frequency. Our proposed speech steganography provides enhanced imperceptibility since DWT reconstructs the decomposed information without degrading the quality of speech. Our proposed approach is an extended version of existing Fast fourier transform (FFT) based steganography, where there is a lack of imperceptibility. Simulation results proved that the proposed algorithm is superior to the conventional algorithms. Also performed good enough simulations with low bit error rate and excellent imperceptibility.
{"title":"Real Time Implementation of Speech Steganography","authors":"Pala Mahesh Kumar, K. Srinivas","doi":"10.1109/ICSSIT46314.2019.8987785","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987785","url":null,"abstract":"Information hiding with a cover object is referred as steganography. Here the cover object might be an image, video or speech. Speech steganography is a process of hiding the message data into a cover speech without degrading the quality of cover speech. This article has introduced a spread spectrum representation-based speech steganography using decimated wavelet transform (DWT), which decomposes the cover speech signal into approximated and detail coefficients i.e., low frequency and high frequency. Our proposed speech steganography provides enhanced imperceptibility since DWT reconstructs the decomposed information without degrading the quality of speech. Our proposed approach is an extended version of existing Fast fourier transform (FFT) based steganography, where there is a lack of imperceptibility. Simulation results proved that the proposed algorithm is superior to the conventional algorithms. Also performed good enough simulations with low bit error rate and excellent imperceptibility.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133877920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}