Image Steganography Technique -Based On Block-DCT and Huffman Encoding

Introduction: 

This paper describes about a Image steganography technique to hide information into a cover page based on Block-DCT, and Huffman coding. Huffman encoding is on the secret messages/images before embedding and each bit of secret message/image is embedded in the frequency domain by modifying the least significant bit of cover image blocks DCT coefficients. This algorithm has a good invisibility and capacity. Peak signal to Noise Radio of cover image with stego-image gives better results when compared to that of existing steganography approaches. The secret message/image cannot be extracted without knowing Huffman table and decoding rules. 

Image Steganography Algorithm: 

The main objective of Steganography is the true message cannot able to observe by an observer. Unauthorized users are not supports to differentiate a cover-image i.e., an image does not contain an secret message and stego-mage i.e., cover-image is modified and results a stego-image with secret message.  Now-a-days steganograhpy is widely used in computer where digital data acts as carriers and networks acts as speed delivery channels.  

 Image steganography schemes are classified spatial-domain based category and transform-domain based category.  In spatial domain approaches, the embedding of secret messages takes place directly. The simplest stegonographic method in spatial domain is Least Significant Bits Insertion method.   Secret image is encoded using Huffman coding and then the secret image is embedded into cover image. Huffman codes are optimal codes in which one symbol maps to one code word. 

Conclusion: 

In spatial domain, a steganography process improved security and image quality, compared to that of existing algorithms. It is very difficult to differentiate original image with the steganography algorithm resultant stego-image.  This algorithm also provides 3 layers of security to cover image transformation. But the demand for image robustness in steganography is not as much as in watermarking field.  Image in steganography process neglects the basic demand of robustness. This algorithm performs few operations and Huffman encoding of secret image helps to protect the images from stealing or misuse by unintended users. 

 Download  Image Steganography Technique -Based On Block-DCT and Huffman Encoding.

A Novel Algorithm for Hiding Sensitive Frequent Item Sets

Introduction to A Novel Algorithm for Hiding Sensitive Frequent Item Sets Project:

This paper discussed about fast hiding sensitive frequent itemsets (FHSFI) approach to hide sensitive frequent itemsets with one database scan and generate limited side effects. 

Overview: 

In a database, with an association analyzer, if an itemset with support above a given minimal support then that itemset is called a frequent itemset.  There is a need to analyze the correlations between the sensitive itemsets and each transaction in a database.  The transactions order to be altered can be decided based on the each transaction weight which is given by heuristic function. 

So by this there is a possibility of saving time by only consider the actual required transactions to modified and then hide the given sensitive frequent itemsets. There is no need to deal with all the transactions to hide the sensitive frequent itemsets.  FHSFI provides the facility to hide the SFI without generating many side effects but still there is loss in rule sets, so researches have been takes place to overcome this issue. The main goal of FHSFI is to hide sensitive frequent itemsets by allowing minimum support thresholds, by limited side effects and by executed only one database scan. 

Conclusions: 

In network and data mining world, there is a severe need to protect the confidentiality of sensitive information in a database. The relationships hidden among large data sets are in a form of frequent item sets or association rules.  Privacypreserving data mining is an important issue which needs the immediate attentions in the current industry. 

When the support of each given sensitive itemsets are reduced then it will help to hide sensitive frequent itemsets, and this can be achieved by modifying transaction in database but at the same time will have enough side effects due to it.  So FHSFI emerged to hide sensitive frequent itemsets with limited side effects.

 Download  A Novel Algorithm for Hiding Sensitive Frequent Item Sets.

Forward-Secure Digital Signature Scheme Project Abstract

Introduction to Forward-Secure Digital Signature Scheme Project:

This paper discussed about “forward security” , that is a security approach which ensures using secrets for short time periods and also reduces the damage when the secrets are exposed. This paper also describes how to design a forward-secure signature scheme.

Overview:

In a forward-secure signature scheme, if the current secret key is compromised, signatures from past time periods can still be trusted. A forward-secure digital signature scheme is a key-evolving digital signature scheme. Like a standard signature scheme, a key-evolving digital signature scheme contains algorithms related to key generation, signing and verification. Throughout the lifetime of this scheme, the public key remains unchanged. In this scheme, operations are divided into certain time periods and each period uses a different secret key to sign a message.

A public update algorithm in this scheme is used to computes the secret key for the new time period based on the previous period. But in this scheme we can able to get the secret key for the current period but not able to get any previously used secret keys. So, in order to overcome this drawback a forward-secure signature scheme comes into picture.
The public key for the forward-secure scheme is located at the root of the tree. In order to sign a message in a certain time period there is a need to use the secret key of the corresponding leaf and attach to the signature a certification chain depends on the root path to that leaf.  In this scheme nodes are created dynamically to maintain forward security. 

Transformation form secure identification scheme into a secure signature scheme without depends on random oracles is based on the concept of authentication trees.      Forward-secure signature scheme is designed by not relying on random oracles.  In this scheme whole tree nodes are created dynamically similar to that of GMR scheme.

The resulting scheme needs to remember previous message signature to compute the next signature. The length of each signature grows along with the signed messages. The main advantage of Forward-Secure Digital Signature Scheme is that we can obtain a signature scheme which is forward secured based on the security of the corresponding identification scheme.

An Approach for FEC Decoding Based on the BP Algorithm LTE and WiMAX Systems

This paper describes about unified belief propagation (BP) algorithm and how it helps in decoding in tailbiting convolutional and turbo codes.  For all convolutional code classes and turbo codes, BP algorithm provides an effective general methodology for devising low-complexity iterative decoding algorithms. If a small performance has taken place during decoding turbo codes with BP instead of MAP, then this will be offset by the lower complexity of the BP algorithm. 

Overview: 

Prerequisites like generator matrix and parity check matrix are required to apply BP algorithm on tail-biting convolutional code by a Tanner graph for decoding.  In order to replace the traditional decoders of turbo codes with the BP decoder, there is a need to obtain the turbo code party-check matrix. As the BP decoder is less complex than traditional decoder and also due to enables a unified decoding approach, the loss in BER performance is acceptable.  When compares MAP and SOVA decoders, BP algorithm yields the lowest implementation complexity over all the required operations.  BP algorithm for turbo codes is about 1.7 dB worse at a BER value of 10−2, than that of traditional decoders for turbo codes. 

Conclusions: 

The usage of BP algorithm is determined in this paper and also describes the feasibility of decoding arbitrary tailbiting convolutional and turbo codes. This algorithm helps to speeds up the error correction convergence and decreases the decoding computational complexity in WiMAX systems. Besides, based on forward-only algorithm, BP algorithm performs a non-trellis.

BP decoder for turbo codes in a combined architecture is having more benefits based on the efficient reuse of computational hardware and memory resources of the two separate decoders. As traditional turbo decoders having a higher complexity, there is a high loss in performance with BP. In fact, the low decoding complexity of BP decoder brings end-to-end efficiency as both encoding and decoding takes place with low hardware complexity.

A New Approach to Intrusion Detection System Evaluation in Distributed Real-Time Systems

Introduction: 

This paper describes about a metric-based approach which will help Real-Time systems to get the best facilities by making use of best intrusion detection system.  This metric-based approach addresses all real-time and distributed processing issues. Also, this paper discussed about the metric scorecard to test 3 commercial intrusion detections systems. 

Intrusion Detection Systems:

Always Intrusion detection systems checks the effectiveness of other access controls and by this provides defense-in-depth.  ID’s detects both internal misuse of computer and network resources and also external attacks. ID technologies always points to a soft real-time problems. To prevent the damages from intrusion there is a severe need that arrived data must be analyzed and alerts must be issued in equal intervals of time. Besides, IDs considers the needs of real-time and distributed system before providing protection to those.

IDs must not disturb system performance.  IDS are classified into three types signature-based, anomaly-based and hybrid based on the corresponding detection mechanisms.  Anomaly-based or behavior-based IDS are helpful to detect behavior which is inconsistent with normal behavior. Anomaly-based IDS generates a suspicious activity alert when it detects hundreds of login within a few seconds.  A signature-based ID detects patterns in network traffic. Signature-based IDS are also known as “misuse-based” or “knowledge-based” IDS.  A hybrid IDS uses either series or parallel technologies. Based on monitoring scope IDS are characterized further. IDs that monitors one or more or both hosts in a network.  IDS monitors a network collects and also analyzes the packets from network.

Conclusions:

Information security services frequently have conflicts with the highly distributed and real-time systems performance. These systems grow more complex and constrained. These issues can be overcome by intrusion detection. Intrusion detections assure integrity by keeping it clear whenever access controls have failed. This paper also proposed a testing technology to test ID products as per user-definable and dynamically-changing standards.

An Efficient Wireless Architecture to Connect Rural Regions Project

Introduction to An Efficient Wireless Architecture to Connect Rural Regions Project:

This paper discussed about a new wireless network architecture WiRE (Wi-Fi-based Rural Extensions), which provides connectivity to rural regions at very low costs. To enhance the features of WiRE architectural, this paper also addressed the challenges at various protocols. Operations costs of WiMAX and cellular networks are higher in rural areas, because significant power consumption requires covering large areas with low user densities. So there is a need of WiRE network to provide connectivity to rural areas at low cost. 

WiRE Network Architecture: 

The main working principle of WiRE is to provide coverage to specific rural regions where connectivity is more required rather than providing broad coverage. The six important network components of WiRE are wireless nodes, point-to-multipoint links, low cost computing devices, point-to-point links, multi-radio mesh links and large local storage.  The scope of WiRE network architecture is much broader when compared to that of WiLD networks. A wiRE network provides rural connectivity, supports wide range of applications and also focuses on challenges across different protocol layers. WiRE network provider uses unlicensed spectrum so there is no need to pay spectrum costs.

As the manufactures of Wi-Fi chipsets supports open source drivers which help to tailor the protocol in order to meet our needs.  Low power single board computers are used by every wireless router in a WiRE network. PCs/ kiosks or the cell phones are the end-devices of WiRE. WiRE architecture is helpful to enable specific services like telephony services, tele consultation and telemedicine services, interactive distance learning service and mobile banking services to rural regions. But in order to provide the above mentioned services, WiRE network has to face some challenges which come across network and transport layers.  WiRE network is designed in a way to tolerate all failures and address all challenges in these two layers. 

Conclusions:

The WiRE architecture is developed for the typical rural regions to connect them to the city. WiRE is a wireless distribution network which extends connectivity from the city to village.

 Download  An Efficient Wireless Architecture to Connect Rural Regions Project.

Property Management System Implementation for a Organization Project

Introduction to Property Management System Implementation for a Organization Project:

This paper discussed about the how to manage the property in an organization and discussed about the importance of Property management system. Locating, tracking and controlling fixed assets can be called as Property Management. Solid Benefits can be obtained by an organization with the help of effective Controlling and Tracking of Property.

Overview:

When there is a tracking of fixed assets then can obtain benefits with the proper utilization of those fixed assets.  Property Managements includes few tasks like controlling the property, accounting the fixed asset, managing the maintenance, control the inventory, security control, Warranty control, Calibration system control, billing and invoicing and tool control. A Property Management Program helps in accurate accounting and efficient compilation.  Ultimately, the success of a Property Management Program depends on the support of top management and the commitment of an entire organization. 

Across a wide range of organizational activities and concerns, using Property identification Program yields effective and numerous benefits. For implementing an effective tracking and controlling program there is a need to gather inputs from the employees during planning of the program and whose support is needed for implementing and perpetuating the program.  

NPMA and ASTM organizations can assist the organization employees in implementing property management Program. Need to determine what property information records are needed and also determine what are the rules and regulations that applies to that organization.  Determine the number of assets to be located recorded and estimate the cost for identification and protection of those assets from unauthorized usage. 

There is a need to define which software should use for organization property identification. Should prepare a detailed written copy about the assets and must make it as a part of company’s policy.  A Property Management program with procedures documents will help the organization to meet ISO standards.  Each asset should be recorded in a detailed manner with necessary details like when the assets is purchased , from where it is purchased,  current cost and asset benefits.

 Download  Property Management System Implementation for a Organization Project.

NIT Project on A Fast and Low Bit rate Speech Coding Algorithm Pulse Position Linear Predictive Coding

Introduction to A Fast and Low Bit rate Speech Coding Algorithm Pulse Position Linear Predictive Coding Project:

This paper discussed about a robust algorithm which provides quality speech less algorithmic complexity and at low bit rates. From the implementation point of view, high quality speech at low bit rate always come with the huge algorithmic complexities. There is a need to develop robust low rate coders which can accommodate signals other than speech. Current research is focused upon achieving high quality speech at low information rates. 

Overview: 

Vocoders works at low rates but also capable to produce synthetic quality speech.  Vocoders works based on making vocal tract as a simple tube as with an excitation source at one end.As the algorithms used in this thesis are of lower complexity, the codec delay is also very less.  The new algorithm proposed here is compared with the other existing algorithms on basis of voice quality, performance and voice intelligibility. 

A common man always expects a modern communication should takes place with high quality at low rates. Low cost VoIP devices can achieve this goal, and these are developed with a fast and low complexity voice codec. The algorithm proposed in this paper provides high speech quality and intelligibility at low bit rate and low algorithmic complexity.  Mean opinion scores and informal listening tests are used to verify the quality of these developed coders. 

Conclusions: 

Researches have been takes place to develop new speech coders which can able to produce high quality speech at low data rates.  Excitation signal is the main factor which affects natural sounding speech synthesis.  This paper discussed about the new parametric representation of an excitation signal and also designs a vocoder depends on the new excitation signal. When we placed pulses at peaks and residue signal valleys then the new excitation signal will created. The new vocoder which designed based on new excitation signal provides good quality at low bit-rate and codec delay.

 Download  NIT Project on A Fast and Low Bit rate Speech Coding Algorithm Pulse Position Linear Predictive Coding.

Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree

Introduction: 

This paper discussed about a distributed algorithm to compute all best swap edges for a minimum diameter spanning tree.   A Minimum Diameter Spanning Tree minimizes the largest distance between any pair of nodes, even if edge lengths are not uniform. 

Overview: 

One drawback of a spanning tree is that a single link failure disconnects the network. Whenever link failures occur, it has to replace by a single other link called swap link to reconnect the network. Among all possible swap links, there is a need to choose a best swap to minimize the resulting swap tree diameter.

Swap tree does not use the failed link like a minimum diameter spanning tree. The reason for preferring a swap tree is only one edge goes into service and routing can be managed with less effort. There is a moderate loss in diameter in choosing swap tree against adjusting an entire tree. When compared to that of the diameter of an entire adjusted tree which is a factor of 2.5 smaller than the swap tree diameter. There is a need to pre-compute each edge of the tree to get a best swap edge. Distributed computation of all best swaps has more efficiency as dependencies between the computations for failing edges can be exploited.  When a failing edge is replaced by a best swap edge, we have a compact routing scheme for trees which can quickly and inexpensively adapt routing in distributed algorithm.  

Distributed algorithm computes the best swap edge for every failing edge depends on the information available after the pre processing phase. To compute all best swap edges of a tree there is a need to execute this algorithm for each edge of tree independently. 

Conclusions: 

When computing best swap edges for a minimum diameter spanning tree, the solution obtained by this paper is asynchronous, needs a unique identifiers from a linearly ordered universe also uses time, small messages or messages size.


Domain Visible Watermarking Technique on Images Base Paper

Introduction to Domain Visible Watermarking Technique on Images Project:

To protect publicly available image, there is a need to use visible watermarking, which is one type of digital watermarking. This paper discussed about how a visible watermarking technique applies to a host image in the DCT domain.  Few significant modifications done to the algorithm in order to make the watermark robust.

Overview:

Digital watermarking is a process of inserting watermark into a multimedia object to protect the object’s owner’s right. The original and watermark images are divided into blocks and the corresponding DCT coefficients are also need to be observed. For each block of original image, some mathematical calculations need to be done as per algorithm. After all the modifications done to each block of the image, watermarked image will get generated. To protect the quality of watermarked image there is a need to consider and manage both embedding and scaling factors. 

Modification to watermark: 

The algorithm proposed to generate a watermark image from an original image is not robust for images having few objects and more uniform areas. So, if we apply this algorithm for such images then it is easier for a digital thief to remove the watermark from a watermarked image. So modifications need to be done to watermark insertion technique.   

Conclusions: 

In the DCT Domain, a visible watermarking technique has proposed. To exploit the HVS texture sensitivity a mathematical model has developed. This paper discusses about few modifications which need to be done for watermark insertion algorithm to make it more effective for all images and also to increase the robustness of the watermark. Watermark should be used in different portions in different sizes and for different images also it should not available publicly for more robustness.  Even when images are printed on paper, to make the watermark more prominent by consider lower values of amin and amax, also higher values of bmin and bmax.  Visible watermark is a technique which is used in current digital TV, ecommerce and digital library etc.

 Download  Domain Visible Watermarking Technique on Images Base Paper.