首页 > 最新文献

2015 Fifth International Conference on Advances in Computing and Communications (ICACC)最新文献

英文 中文
Design and Performance Analysis of a High Speed MAC Using Different Multipliers 采用不同乘法器的高速MAC设计与性能分析
Priyanka Mavuri, B. Velan
The multiply and Accumulate unit consists of a multiplier unit for multiplication and the product of multiplier is added up with previous result by using an adder. The result of a MAC unit is stored in an Accumulator. MAC is one of the part of digital processing systems. By reducing the delay of multiplier and adder, the overall delay of MAC unit can be reduced. In this paper the MAC unit is designed using different multipliers and adders. The comparative study of different multipliers and adders has been shown. The multipliers used were Vedic multiplier (based on Urdhava Tiryagbhyam sutra) and Wallace tree multiplier. The adders used were Kogge stone adder and Carry look ahead adder. The efficiency of MAC is observed through reduced delay and lesser hardware complexity. The synthesis and simulation was done by Xilinx software and ISim simulator.
乘法累加单元由一个乘数单元组成,乘数的乘积通过加法器与前一个结果相加。MAC单元的结果存储在累加器中。MAC是数字处理系统的组成部分之一。通过减小乘法器和加法器的时延,可以减小MAC单元的总时延。本文采用不同的乘法器和加法器来设计MAC单元。对不同的乘法器和加法器进行了比较研究。使用的乘数是吠陀乘数(基于Urdhava Tiryagbhyam suam)和华莱士树乘数。使用的加法器是Kogge石加法器和Carry超前加法器。MAC的效率是通过降低延迟和降低硬件复杂性来观察的。采用Xilinx软件和ISim仿真器进行综合仿真。
{"title":"Design and Performance Analysis of a High Speed MAC Using Different Multipliers","authors":"Priyanka Mavuri, B. Velan","doi":"10.1109/ICACC.2015.95","DOIUrl":"https://doi.org/10.1109/ICACC.2015.95","url":null,"abstract":"The multiply and Accumulate unit consists of a multiplier unit for multiplication and the product of multiplier is added up with previous result by using an adder. The result of a MAC unit is stored in an Accumulator. MAC is one of the part of digital processing systems. By reducing the delay of multiplier and adder, the overall delay of MAC unit can be reduced. In this paper the MAC unit is designed using different multipliers and adders. The comparative study of different multipliers and adders has been shown. The multipliers used were Vedic multiplier (based on Urdhava Tiryagbhyam sutra) and Wallace tree multiplier. The adders used were Kogge stone adder and Carry look ahead adder. The efficiency of MAC is observed through reduced delay and lesser hardware complexity. The synthesis and simulation was done by Xilinx software and ISim simulator.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"496 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133970774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Linear Antenna Array Synthesis to Reduce the Interference in the Side Lobe Using Continuous Genetic Algorithm 利用连续遗传算法合成线性天线阵列以减少旁瓣干扰
S. Banerjee, V. Dwivedi
Sidelobes in the radiation pattern causes degradation of actual signal and hence antenna power efficiency. This paper discusses the problem of interference suppression by reducing the side lobe. Synthesis of linear antenna array using Continuous Genetic Algorithm is done to search for the optimum amplitude weights to minimize the maximum side lobe level. It has been demonstrated that side lobe level is reduced effectively by this technique. The simulated results shows an improved directivity, reduction in the first side lobe and fast convergence. This shows the effectiveness of this technique.
辐射方向图中的副瓣会导致实际信号的退化,从而影响天线的功率效率。本文讨论了通过减小旁瓣来抑制干扰的问题。利用连续遗传算法对线性天线阵进行综合,寻找最大旁瓣电平最小的最优幅值权重。实验证明,该方法能有效地降低副瓣电平。仿真结果表明,该方法提高了信号的方向性,减小了第一副瓣的干扰,收敛速度快。这显示了这种技术的有效性。
{"title":"Linear Antenna Array Synthesis to Reduce the Interference in the Side Lobe Using Continuous Genetic Algorithm","authors":"S. Banerjee, V. Dwivedi","doi":"10.1109/ICACC.2015.23","DOIUrl":"https://doi.org/10.1109/ICACC.2015.23","url":null,"abstract":"Sidelobes in the radiation pattern causes degradation of actual signal and hence antenna power efficiency. This paper discusses the problem of interference suppression by reducing the side lobe. Synthesis of linear antenna array using Continuous Genetic Algorithm is done to search for the optimum amplitude weights to minimize the maximum side lobe level. It has been demonstrated that side lobe level is reduced effectively by this technique. The simulated results shows an improved directivity, reduction in the first side lobe and fast convergence. This shows the effectiveness of this technique.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124322305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Ring Partition and DWT Based Perceptual Image Hashing with Application to Indexing and Retrieval of Near-Identical Images 基于环分割和DWT的感知图像哈希及其在近同图像索引和检索中的应用
Govindaraj P, Sandeep R
The perceptual image hashing function maps an input image to a fixed size short binary string called the perceptual hash. The perceptual image hashing has been used for image authentication, image tamper detection and digital watermarking applications. In this paper, the perceptual hash value is generated using ring partition and Discrete Wavelet Transform (DWT). An rotation-invariant secondary image is constructed using ring-partition technique. Then, the DWT is applied on the secondary image using the various mother wavelets, to generate a final hash value. The perceptual hash was used to index and retrieve near-identical images from the database. The precision-recall curves are used to evaluate the performance of the application. The experiments shows that the proposed hashing algorithm is robust against content-preserving operations like image rotation, image scaling, Gaussian low-pass filtering, JPEG compression, brightness adjustment, and gamma correction.
感知图像哈希函数将输入图像映射到一个固定大小的短二进制字符串,称为感知哈希。感知图像哈希已被用于图像认证、图像篡改检测和数字水印应用。本文采用环分割和离散小波变换(DWT)生成感知哈希值。利用环分割技术构造了旋转不变副像。然后,使用各种母小波将DWT应用于次要图像,以生成最终的哈希值。感知哈希用于索引和检索数据库中几乎相同的图像。准确度-召回率曲线用于评估应用程序的性能。实验表明,该算法对图像旋转、图像缩放、高斯低通滤波、JPEG压缩、亮度调整和伽马校正等内容保留操作具有鲁棒性。
{"title":"Ring Partition and DWT Based Perceptual Image Hashing with Application to Indexing and Retrieval of Near-Identical Images","authors":"Govindaraj P, Sandeep R","doi":"10.1109/ICACC.2015.90","DOIUrl":"https://doi.org/10.1109/ICACC.2015.90","url":null,"abstract":"The perceptual image hashing function maps an input image to a fixed size short binary string called the perceptual hash. The perceptual image hashing has been used for image authentication, image tamper detection and digital watermarking applications. In this paper, the perceptual hash value is generated using ring partition and Discrete Wavelet Transform (DWT). An rotation-invariant secondary image is constructed using ring-partition technique. Then, the DWT is applied on the secondary image using the various mother wavelets, to generate a final hash value. The perceptual hash was used to index and retrieve near-identical images from the database. The precision-recall curves are used to evaluate the performance of the application. The experiments shows that the proposed hashing algorithm is robust against content-preserving operations like image rotation, image scaling, Gaussian low-pass filtering, JPEG compression, brightness adjustment, and gamma correction.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125182686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Interactive Gesture Based Cataract Surgery Simulation 基于交互式手势的白内障手术模拟
Akshay Jayakumar, Beenamol Mathew, N. Uma, Prema Nedungadi
India's medical education domain is one of the largest in the world. Medical Simulation aims to provide a medically accurate simulation that benefits the medical students to learn and understand any medical cases. Medical Simulations facilitates students with interactive learning and real-time feedback which does not risk the patient's life. Simulations can be performed any number of time until they have build their knowledge base and confidence in the given medical case. We propose a medically realistic cataract surgery simulation developed with a game engine. The users will be able to interact and use the on screen elements using hand gestures. A Motion recognition device captures every hand movement of the users and the simulation responds accordingly to provide feedback in real-time. Every movement is accurately tracked in the simulation and has a significant outcome on the subject based on the type of simulation. The simulated medical procedures for cataract surgery include using Surgical Tools, Surgical Procedures, Artificial Lens Implantation etc. Medical Simulation is being designed to provide an easy to use learning environment to replicate the clinical scenarios and allow features such as interactively practicing and providing feedbacks for medical skills development.
印度的医学教育领域是世界上最大的之一。医学模拟旨在提供医学上准确的模拟,以帮助医学生学习和理解任何医学案例。医学模拟为学生提供互动式学习和实时反馈,不会危及患者的生命。模拟可以执行任意次数,直到他们在给定的医疗案例中建立了知识库和信心。我们提出了一个医学上真实的白内障手术模拟与游戏引擎开发。用户将能够通过手势进行交互和使用屏幕上的元素。一个动作识别设备捕捉用户的每一个手部动作,并相应地进行模拟,实时提供反馈。在模拟中,每个动作都被精确地跟踪,并根据模拟的类型对受试者产生重要的结果。模拟白内障手术的医疗程序,包括使用手术工具、手术程序、人工晶状体植入等。医学模拟旨在提供一个易于使用的学习环境来复制临床场景,并允许诸如交互式练习和为医疗技能发展提供反馈等功能。
{"title":"Interactive Gesture Based Cataract Surgery Simulation","authors":"Akshay Jayakumar, Beenamol Mathew, N. Uma, Prema Nedungadi","doi":"10.1109/ICACC.2015.20","DOIUrl":"https://doi.org/10.1109/ICACC.2015.20","url":null,"abstract":"India's medical education domain is one of the largest in the world. Medical Simulation aims to provide a medically accurate simulation that benefits the medical students to learn and understand any medical cases. Medical Simulations facilitates students with interactive learning and real-time feedback which does not risk the patient's life. Simulations can be performed any number of time until they have build their knowledge base and confidence in the given medical case. We propose a medically realistic cataract surgery simulation developed with a game engine. The users will be able to interact and use the on screen elements using hand gestures. A Motion recognition device captures every hand movement of the users and the simulation responds accordingly to provide feedback in real-time. Every movement is accurately tracked in the simulation and has a significant outcome on the subject based on the type of simulation. The simulated medical procedures for cataract surgery include using Surgical Tools, Surgical Procedures, Artificial Lens Implantation etc. Medical Simulation is being designed to provide an easy to use learning environment to replicate the clinical scenarios and allow features such as interactively practicing and providing feedbacks for medical skills development.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116789223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Modified Iterative Reconstruction Algorithm for Spiral MRI 螺旋MRI改进迭代重建算法
Anju George, Ajay Kumar
The MRI imaging is an efficient tool for disease diagnosis, and the features of the taken image has much importance. The reconstruction of such images needs much attention. The main limitation of MRI imaging is its long scan time. The time taken for acquisition can be reduced by non Cartesian acquisition. Spiral MRI is a non Cartesian MRI imaging and is less affected by motion and flow artifacts. Still, reconstruction of images from non-Cartesian MRI data will suffer from reconstruction errors and in-homogeneity artifacts. This will adversely affect the disease diagnosis. Algorithms like conjugate phase method, Field map calculating Methods, iterative Next Neighbor re-gridding algorithms etc were proposed for solving such issues. Among these, iterative Next Neighbor re-gridding algorithm proved efficient. The main focus of this paper is on efficient reconstruction of spiral MRI image with an improved Iterative next neighbor algorithm which will result in comparatively better picture quality.
MRI成像是一种有效的疾病诊断工具,其图像特征具有重要意义。这类图像的重建需要特别注意。MRI成像的主要限制是扫描时间长。非笛卡儿式习得可以减少习得所需的时间。螺旋核磁共振成像是一种非笛卡尔核磁共振成像,受运动和流动伪影的影响较小。然而,从非笛卡尔核磁共振数据重建图像将遭受重建误差和非均匀性伪影。这将对疾病的诊断产生不利影响。针对这类问题,提出了共轭相位法、场图计算法、迭代近邻重网格法等算法。其中,迭代近邻重网格算法被证明是有效的。本文主要研究了一种改进的迭代下邻算法对螺旋MRI图像的有效重建,从而获得相对较好的图像质量。
{"title":"Modified Iterative Reconstruction Algorithm for Spiral MRI","authors":"Anju George, Ajay Kumar","doi":"10.1109/ICACC.2015.83","DOIUrl":"https://doi.org/10.1109/ICACC.2015.83","url":null,"abstract":"The MRI imaging is an efficient tool for disease diagnosis, and the features of the taken image has much importance. The reconstruction of such images needs much attention. The main limitation of MRI imaging is its long scan time. The time taken for acquisition can be reduced by non Cartesian acquisition. Spiral MRI is a non Cartesian MRI imaging and is less affected by motion and flow artifacts. Still, reconstruction of images from non-Cartesian MRI data will suffer from reconstruction errors and in-homogeneity artifacts. This will adversely affect the disease diagnosis. Algorithms like conjugate phase method, Field map calculating Methods, iterative Next Neighbor re-gridding algorithms etc were proposed for solving such issues. Among these, iterative Next Neighbor re-gridding algorithm proved efficient. The main focus of this paper is on efficient reconstruction of spiral MRI image with an improved Iterative next neighbor algorithm which will result in comparatively better picture quality.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116226022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compact Band Notched UWB Filter for Wireless Communication Applications 用于无线通信应用的紧凑型带陷波超宽带滤波器
C. J. Bindu, B. Paul, S. Mridula, P. Mohanan
The paper presents an ultra wide band filter using asymmetrical interdigital coupled line with a transmission notch at the WLAN band. The lower side transmission zero can be conveniently tuned by stepped impedance resonators of proper dimensions. The frequency notch for WLAN band is introduced by two half wavelength open ring resonators etched on the ground plane. The attenuation in lower and upper stopbands is controlled by the use of series capacitors and Defected Ground Structures respectively. The insertion loss in the passband is improved by circular apertures in the ground plane. Measured frequency response of the fabricated filter shows good agreement with simulated results.
本文提出了一种基于非对称数字间耦合线的超宽带滤波器,该滤波器在WLAN频段上具有传输陷波。通过适当尺寸的阶跃阻抗谐振器可以方便地调谐下侧传输零。无线局域网频段的频率陷波由两个半波长开环谐振器蚀刻在地平面上引入。下阻带和上阻带的衰减分别由串联电容和缺陷接地结构控制。通过在地平面上设置圆形孔,可以改善通带内的插入损耗。所制滤波器的频率响应实测结果与仿真结果吻合较好。
{"title":"Compact Band Notched UWB Filter for Wireless Communication Applications","authors":"C. J. Bindu, B. Paul, S. Mridula, P. Mohanan","doi":"10.1109/ICACC.2015.91","DOIUrl":"https://doi.org/10.1109/ICACC.2015.91","url":null,"abstract":"The paper presents an ultra wide band filter using asymmetrical interdigital coupled line with a transmission notch at the WLAN band. The lower side transmission zero can be conveniently tuned by stepped impedance resonators of proper dimensions. The frequency notch for WLAN band is introduced by two half wavelength open ring resonators etched on the ground plane. The attenuation in lower and upper stopbands is controlled by the use of series capacitors and Defected Ground Structures respectively. The insertion loss in the passband is improved by circular apertures in the ground plane. Measured frequency response of the fabricated filter shows good agreement with simulated results.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115165013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CPW Fed Wideband Printed Antenna for Wireless Communications 用于无线通信的CPW馈电宽带印刷天线
M. S. Nishamol, V. Sarin, S. M. Nair, M. P. Jayakrishnan, P. Mohanan, K. Vasudevan
A simple radiating structure for achieving omni-directional radiation pattern from a monopole antenna fed by a CPW feed is presented. The proposed antenna has a 2:1 VSWR bandwidth of 76% from 2.7GHz to 5.7GHz. Hence it is suitable for WLAN 5.2(5.15-5.35GHz) band, WiMAX 2.5/3.5(2.5-2.69GHz, 3.4-3.69GHz) bands, HiperLAN2 (5.47-5.725 GHz) and HiSWaNa (5.15-5.25GHz) wireless application bands. The simulated and measured reflection characteristics of the antenna along with the radiation patterns and gain are presented and discussed.
提出了一种简单的辐射结构,用于实现CPW馈电单极天线的全向辐射方向图。该天线在2.7GHz至5.7GHz范围内的VSWR带宽为2:1,为76%。适用于WLAN 5.2(5.15-5.35GHz)频段、WiMAX 2.5/3.5(2.5-2.69GHz、3.4-3.69GHz)频段、HiperLAN2 (5.47-5.725 GHz)和HiSWaNa (5.15-5.25GHz)无线应用频段。给出并讨论了天线的模拟和实测反射特性以及辐射方向图和增益。
{"title":"CPW Fed Wideband Printed Antenna for Wireless Communications","authors":"M. S. Nishamol, V. Sarin, S. M. Nair, M. P. Jayakrishnan, P. Mohanan, K. Vasudevan","doi":"10.1109/ICACC.2015.9","DOIUrl":"https://doi.org/10.1109/ICACC.2015.9","url":null,"abstract":"A simple radiating structure for achieving omni-directional radiation pattern from a monopole antenna fed by a CPW feed is presented. The proposed antenna has a 2:1 VSWR bandwidth of 76% from 2.7GHz to 5.7GHz. Hence it is suitable for WLAN 5.2(5.15-5.35GHz) band, WiMAX 2.5/3.5(2.5-2.69GHz, 3.4-3.69GHz) bands, HiperLAN2 (5.47-5.725 GHz) and HiSWaNa (5.15-5.25GHz) wireless application bands. The simulated and measured reflection characteristics of the antenna along with the radiation patterns and gain are presented and discussed.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124764152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Steganographic Technique Using Secure Adaptive Pixel Pair Matching for Embedding Multiple Data Types in Images 基于安全自适应像素对匹配的图像多数据类型嵌入隐写技术
T. Edwina Alias, Dominic Mathew, Abraham Thomas
Steganography is one of the newly emerging area of development in the field of signal processing. It is the technique of hiding the fact that communication is even taking place, by hiding information in any other information. In this paper, a secure data-hiding method is proposed for hiding multiple datatypes such as text, image and audio within images by Secure Adaptive Pixel Pair Matching(SAPPM) which can be effectively used for colour images as well as gray scale images. The secret message is encrypted using a pseudo random sequence, which is generated according to the secret key given by the user. The encrypted secret message is hidden in cover image using SAPPM algorithm. Compared with previous methods like Least Significant Bit(LSB) substituition, simple Diamond Encoding(DE) and APPM, the proposed method provides a much more stronger algorithm which incorporates cryptography along with steganography, and always have a lower distortion.
隐写术是信号处理领域中一个新兴的发展领域。它是一种通过将信息隐藏在其他信息中来隐藏正在进行的交流的技术。本文提出了一种基于安全自适应像素对匹配(SAPPM)的安全数据隐藏方法,用于隐藏图像中的文本、图像和音频等多种数据类型,该方法可以有效地用于彩色图像和灰度图像。秘密消息使用伪随机序列进行加密,该序列是根据用户给出的秘密密钥生成的。采用SAPPM算法将加密后的秘密信息隐藏在封面图像中。与LSB (Least Significant Bit)替换、简单钻石编码(simple Diamond Encoding, DE)和APPM等方法相比,该方法将密码学和隐写术结合在一起,提供了更强的算法,并且总是具有更低的失真。
{"title":"Steganographic Technique Using Secure Adaptive Pixel Pair Matching for Embedding Multiple Data Types in Images","authors":"T. Edwina Alias, Dominic Mathew, Abraham Thomas","doi":"10.1109/ICACC.2015.60","DOIUrl":"https://doi.org/10.1109/ICACC.2015.60","url":null,"abstract":"Steganography is one of the newly emerging area of development in the field of signal processing. It is the technique of hiding the fact that communication is even taking place, by hiding information in any other information. In this paper, a secure data-hiding method is proposed for hiding multiple datatypes such as text, image and audio within images by Secure Adaptive Pixel Pair Matching(SAPPM) which can be effectively used for colour images as well as gray scale images. The secret message is encrypted using a pseudo random sequence, which is generated according to the secret key given by the user. The encrypted secret message is hidden in cover image using SAPPM algorithm. Compared with previous methods like Least Significant Bit(LSB) substituition, simple Diamond Encoding(DE) and APPM, the proposed method provides a much more stronger algorithm which incorporates cryptography along with steganography, and always have a lower distortion.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131380549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Approach for Car License Plate Detection Based on Vertical Edges 一种基于垂直边缘的车牌检测新方法
Ashwathy Dev
License plate can be used for identifying vehicle since it is unique for each vehicle. In this paper proposes a fast technique for identifying the vehicle licenseplate. Here first the input image is binarized by adaptive thresholding and then image is enhanced by unwanted-line elimination algorithm (ULEA). Then on applying VEDA vertical edges of the image is detected. Then number of possible candidate license plate region is extracted out of which original LP is detected.
车牌可以用来识别车辆,因为每辆车都是唯一的。提出了一种快速车牌识别技术。首先采用自适应阈值法对输入图像进行二值化处理,然后采用不需要线消除算法对图像进行增强处理。然后应用VEDA检测图像的垂直边缘。然后提取可能的候选车牌区域数量,从中检测原始车牌。
{"title":"A Novel Approach for Car License Plate Detection Based on Vertical Edges","authors":"Ashwathy Dev","doi":"10.1109/ICACC.2015.62","DOIUrl":"https://doi.org/10.1109/ICACC.2015.62","url":null,"abstract":"License plate can be used for identifying vehicle since it is unique for each vehicle. In this paper proposes a fast technique for identifying the vehicle licenseplate. Here first the input image is binarized by adaptive thresholding and then image is enhanced by unwanted-line elimination algorithm (ULEA). Then on applying VEDA vertical edges of the image is detected. Then number of possible candidate license plate region is extracted out of which original LP is detected.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130233030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Computing Privacy Risk and Trustworthiness of Users in SNSs sns中用户隐私风险与可信度的计算
Akansha Pandey, A. C. Irfan, K. Kumar, S. Venkatesan
The immense growth of Social Networking Sites (SNSs) has provided fast interactions with strangers, friends and people known in person. This has increase the religious, political and social possibilities for maintaining virtually every type of significant bonds or groups. The personal information used while interacting on social networking sites is an asset for every user profile that may be traded intentionally by a third party for its benefits. Privacy of users is completely based on their awareness of how much of their personal information could be shared without risk. Moreover, users do not give much importance to the privacy risk arising by their information sharing activities. With the rise in different online crimes and malicious behaviors, it is necessary to evaluate the reliability of a profile user. The objective of this paper is to present a method for computing the trust value and privacy risk of users in online social networking sites by integrating basic trust parameters like personal information, recommendations, followings, and customized privacy settings. This will help other users in social network to check whether a person is trustworthy, before accepting him/her in their network. We used real-world data collected from Facebook for calculating and demonstrating the proposed trust model.
社交网站(sns)的迅猛发展为人们提供了与陌生人、朋友和熟人的快速互动。这增加了维持几乎所有类型的重要纽带或团体的宗教、政治和社会可能性。在社交网站上互动时使用的个人信息是每个用户档案的资产,可能会被第三方有意交易以获取利益。用户的隐私完全是基于他们意识到他们的个人信息有多少可以无风险地共享。此外,用户对其信息共享活动所带来的隐私风险也不太重视。随着各种网络犯罪和恶意行为的增多,有必要对个人资料用户的可靠性进行评估。本文的目的是通过整合个人信息、推荐、关注和自定义隐私设置等基本信任参数,提出一种计算在线社交网站中用户信任价值和隐私风险的方法。这将有助于社交网络中的其他用户在接受他/她进入他们的网络之前检查该人是否值得信赖。我们使用从Facebook收集的真实数据来计算和演示所提出的信任模型。
{"title":"Computing Privacy Risk and Trustworthiness of Users in SNSs","authors":"Akansha Pandey, A. C. Irfan, K. Kumar, S. Venkatesan","doi":"10.1109/ICACC.2015.50","DOIUrl":"https://doi.org/10.1109/ICACC.2015.50","url":null,"abstract":"The immense growth of Social Networking Sites (SNSs) has provided fast interactions with strangers, friends and people known in person. This has increase the religious, political and social possibilities for maintaining virtually every type of significant bonds or groups. The personal information used while interacting on social networking sites is an asset for every user profile that may be traded intentionally by a third party for its benefits. Privacy of users is completely based on their awareness of how much of their personal information could be shared without risk. Moreover, users do not give much importance to the privacy risk arising by their information sharing activities. With the rise in different online crimes and malicious behaviors, it is necessary to evaluate the reliability of a profile user. The objective of this paper is to present a method for computing the trust value and privacy risk of users in online social networking sites by integrating basic trust parameters like personal information, recommendations, followings, and customized privacy settings. This will help other users in social network to check whether a person is trustworthy, before accepting him/her in their network. We used real-world data collected from Facebook for calculating and demonstrating the proposed trust model.","PeriodicalId":368544,"journal":{"name":"2015 Fifth International Conference on Advances in Computing and Communications (ICACC)","volume":"60 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130371976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2015 Fifth International Conference on Advances in Computing and Communications (ICACC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1