Computer Science Seminar Topic on Steganography

Introduction to Computer Science Seminar Topic on Steganography:

Steganography is a process of hiding the important messages and data by hiding the original message in another message by encrypting it. So there is no chance that intruders, hackers cannot get the original message. Steganography is also useful to protect the images, audio, messages, artistic creations by copyright. This software is also used to hide the data inside the images.

This message can be extracted by the rightful person only and there is no chance of extracting original message by intruders. Coming to the electronic communication steganography code is inserted inside the transport layer. The data that containing media files is ideal for steganography transmission because of their large size. The advantage of steganography is the messages do not attract themselves beside cryptography.

Stenographic Techniques:

  • Physical steganography
  • Digital steganography
  • Network steganography
  • Printed steganography
  • Text steganography

Physical Steganography:

In this technique the actual messages were written on wood and then hidden with wax covering on it. The messages are also written on the messenger’s body parts like head, back side. The messages are hidden by hair of the body. The messages are also written with invisible inks in olden days

Digital Steganography:

In Digital steganography the original image is hidden under another image. The original image is extracted by only removing two least significant bit of each color. Sounds can be steganography by modifying echo. Pictures are embedded in video files which are played faster are lower speed.

Network Steganography:

In network steganography the data is hidden by modifying communication protocols. The data hidden is very hard to detect. The secret messages are also include in voice over ip.

Printed Steganography:

In this technique the original plain text isconverted into cipher text. And the resulting is steganotext. The only decrypting known person can extract the hidden message.

Text Steganography:

This technique is considered as most difficult steganography technique.  In this data is compression is encodes one representation into another. So it is difficult to decrypt it.

Download  Computer Science Seminar Topic on Steganography .

Rushing Attack on Network Node CSE Project Report

Introduction to Rushing Attack on Network Node Project:

With the main applications in the field s like military and secured data communication, a modern day design of mobile nodes communicating with each other with no substructure is known as a mobile ad hoc network (MANET). 

Multicast

It is used in streaming videos. Single packets of data are moved by network and sent to the subset of network addresses. The multicast is preferred over many unicast transmissions because it saves bandwidth and resource. Wireless transmission is more prone to attack where the data can be traced from licentious mode. 

Rushing attack

Here the data is captured by utilizing the duplicate suppression mechanism and immediately gaining access to forwarding group. 

Impact of rushing attack

The protocols say that the nodes must only forward the first request received and the other requests coming at that time are ignored. The rushing attack acts as a denial of service attack against all networking protocols where attacking node is placed at the sender, receiver and anywhere in the network. Similarly the performance attack success rate can be calculated. 

Impact of rushing attack 

A graphical analysis is obtained when the rushing attack happens near the sender. In case of no rushing attack in the network will lead to average attack success rate to be least.  Similarly analysis can be obtained for the rushing attack near the receiver. The probability of getting the packet depends on the upcoming node when the rushing node is placed anywhere. 

Scope

The current system is designed for a single sender and multiple receivers which seem to be enhancing in future by having multiple senders and multiple receivers. 

Conclusion

The rushing attack on network node is likely to succeed while having multiple senders. The motive of this project would be draw a graph based on rushing attack position of network. 

Download  Rushing Attack on Network Node CSE Project Report .

Digital Image Processing Seminar Report

Introduction to Digital Image Processing Seminar Topic:

Biometrics enables us to obtain the identity of a system by the means of its physical characteristics. The system has identified the human as secured form identification where individuality of the person required.

Features of digital image processing

The image can be represented in two dimensional where the coordinates are called gray levels. When the amplitudes and value of gray level are finite then we call that image as discrete image. Image processing involves discretization, processing and constructive analysis describing the features of the image.

Merits of biometrics

The human body acts as a secured password code. This has reduced the headache of storing complicated passwords.

About biometrics

With the elapsing time the need of the hour where consistency in identification of individuals is reduced, biometrics have an important role in assessing behavior patterns of human beings and thus maintaining a consistency in the identification of individuals. Biometrics has optimized application in public sector, banking, computer networks and other avenues.

Classification of biometrics

It can be classified into physiological based technique and behavioral based technique. The former involves fingerprint, facial and vein analysis. The latter involves hand written signature and speech analysis. The steps involved are authentication and verification. Similarly the setting of tolerance level involves false rejection and false acceptance.

Enrollment

The first step is to capture the biometric. Then the second step is to store the biometric. Thirdly template is stored in local repository.

Accessing the database

The biometric passes through live scanning. Then it is processed and template is extracted. The biometric is matched against existing templates that have been stored. Provision of matching score is also there when the biometric is successfully verified.

In order to improve the identification hashing is used. It is perfect match of particular input record from the large database.

Download  Digital Image Processing Seminar Report .

CSE Latest Seminar Topic on Image Retrieval Using Image Segmentation

Introduction to Seminar Topic on Image Retrieval Using Image Segmentation :

Objective

The proposed algorithm for image retrieval has been designed to retrieve the image using the constituent segments within a defined discrete channel. The feature of a particular segment can be used to calculate its distance from another segment while the matching process is done.

Introduction

The design basis has two approaches namely global feature based image retrieval which is more objective and local feature which overcomes the shortcomings of the former.

Content based image retrieval system

After homogeneous segregation of the image and automated segmentation the features of the image are stored in database so that it can be utilized in CBIR.

Image segmentation and feature extraction

The algorithm used here is unique and denoted by K-means.  Through mathematical equations we can draw a relation between K and number of pixels, intensity and number of iterations. Such an algorithm broadly differentiates the bright spots, noise and speckles.

Feature extraction

The three parameters considered here are color, texture and shape. Texture features can found by Euclidean distance and other coefficients.  The shape is determined by Fourier shape descriptors.

Segment based image retrieval

Here the image goes through a process of segmentation and then the dominant component is highlighted.  A relation is established between the weight of the image and the shape features.  An experimental setup infers that color and shape are given equal weight and image retrieval is done.

Conclusion

Retrieval algorithm can be improved using the process of segmentation. The scope of algorithm appears to be good. Examining the k-means step it is expected the system of producing classes can be automated.  The enhancement of the algorithm would be to add texture while classifying the segments. The experiments also conclude that a variety of images with peculiar features will enable us to setup an assessable image retrieval system.

Download  CSE Latest Seminar Topic on Image Retrieval Using Image Segmentation .

CSE PPT Presentation on Smart Dust Technology

Introduction to PPT Presentation on Smart Dust Technology :

A smart Dust is a small gadget which has very special and extra facilities which is often called as the Micro electro mechanical sensors. This is the synthesis of sensing, computing, communication through wireless service, large power supply and many more. This is used to monitor the current world abnormality without updating the original process. It is very small in size and also very low weight. It is very critical to track the appearances of the Smart Dust and it is very difficult to get the question solved.

The architecture of the smart dust is a semiconductor diode and the beam mirrors are used for functioning visual transmissions. A reflector named as MEM is used for passive visual transmissions. An optical receiver is used as a source of the output, sensory devices, signals which are used to process the control circuits. A power factor depended on batteries and solar cells.

The applications of the Smart Dust are Environmental protections which are used to identify the survey of pollutions. Habitat monitoring which is used to observe the emotions of the animals in their daily day. Military applications which is used to monitor the activities in the some areas. Indoor or Outdoor for the environment monitoring.  

Security and tracking system are the main devices in the Smart Dust. Health as well as wealth monitor for the whole human body. Process management, Structure monitoring, traffic system, information’s about the planets and tracking the dangerous disease like the cancer are some other applications of Smart Dust.

The problems raised here are that it is very hard to install all the mechanisms in a small smart dust by the matter of size as well as by the matter of energy too. As these gadget is micro the batteries are little heavy in weight. The design and mechanism of the Smart Dust is very critical and very confusing.

Download  CSE PPT Presentation on Smart Dust Technology .

PPT Presentation on Blue Eyes Technology

Introduction to PPT Presentation on Blue Eyes Technology:

Blue eyes are a concept which targets on developing the machines that are mechanical and computer dependent.  These machines also has the sensory capabilities and affective same as like those of the Human Beings. It is designed to be an interdependent system computer and here the system computer is made to work same like of those of the human behavior. Theses computer also recognize the emotional and physical condition of the human beings.

To bring this technology in real life use non-obstructive sensing devices, latest video cameras, microphones which are used to recognize the end user actions by the use of high sensory device. The name Blue eyes was set to this service because it works on Bluetooth and Eyes of the Human Beings. The devices that supports the Blue Eyes is the Emotion mouse which has the pressure sensor which traps the pressure the user operating the mouse Galvanic skin response which tracks the skin functions, the heart beat trap sensor which traps the beats of the users heart.

Eye tracker is a device which tracks the movement of the eyes of the user. A device named the IBM Almaden eye tracker is used to track the eye of the user. It aims the retina of the user’s eye through a web camp and shows and tracks the emotions of the user’s eye. Next comes the magic pointing which is a manual means the user enter facility and the input pointing.

Liberal magic pointing is the concept related to the magic pointing. It tracks about 95% of the user’s eye emotions. Speech recognizes system which is used to input the signal to the device by the form of Sounds. Suitor is a device which points out the user’s choice and his interest and then begins the work to search the matching interest.

The advantages of the Blue Eyes are it slows down the fatigue, perfect accuracy every time, large speed.

Download  PPT Presentation on Blue Eyes Technology.

PPT Presentation on Cloud Computing

Introduction to PPT Presentation on Cloud Computing:

Cloud computing is a system which compounds the topics related to old computing styles and techniques. It does it in two ways called the Physical and also the Virtual. The development done in the computing devices are Mobility explosion, Collaboration, Conversation between the users, Web technologies and the pressure generated due to the companies and the industries.

Cloud computing are used in the following services like Yahoo, Gmail, IBM, Amazon, VMware etc… according to the global survey of the scientist in the year 2012 about $95 billion. In that Microsoft has the largest in the survey graphs. Second comes the Google and third is the Amazon. The wireless technology here is very low price and very unique form other devices. Cloud computing connects to the PC, Kitchen Sink, Mobile, Code, servers and Database too…

The gallery and specifications of the Cloud computing is the hardware where money is very neatly used to develop the systems, Cost is the main factor in every person’s life, Global Model which send the data all over the world, Flexibility which is solved and answered very fastly by the team, Elasticity which has the structures which is send back, the alliance to this Cloud Computing are Intel, HP and Yahoo.

The advantages of cloud computing are Cost effective here the user are free from the problem like the time and balance kept money. Speed and scales which can be scaled more up and scaled down according to the user wish. Innovation here the management service is seen by itself so the user don’t have to look after it. Flexible, Location, Storage capacity, Custom settings, Device managements, multiple accesses are some to the other advantages of cloud computing.

This cloud computing developed from the internet and the cloud called as the space. Here the internet service is used as the cloud. This work is very responsible for the assessment of servers, bandwidth, channels, other functions.

PPT Presentation Topics for CSE on Wearable Computing

Introduction to PPT Presentation Topics on Wearable Computing:

The existing system is the device which is used to classify the self interval of the user. This device contains mechanism like sensor measure that measure the heart beat of the user according to the enlargement of the body and mind too. It is enclosed with the clothes that are transparent. The configuration and general settings are very silent here.

This system contains electronic fabrics which has the clothes which are even wash and wear and that have electronics devices and connections made inside it. In this clothes sensor devices are also directly circuited by the use of power distribution methods. The threads of these clothes are made up of very light electronic support metals and polymers etc… one of the cloth named the Silk Organza is a cloth that has two fabrics to make it electric supportive.

A Brand of clothes named Luminex developed a fabric shirt in Italy which contains LED called as the light emitting diode to make the shirt shine. It is also made up of LED fibers which are seen to be a Taylor made clothing style. These fibers are connected with the small rechargeable batters and also a switch to turn the LED’s on and off whenever wanted.

The mechanisms used here to develop this clothing are Sports monitoring, wearable health monitoring, wealth and intelligence monitoring CPU’s. The components used here are Privacy, sensory device, gateways and sensor fusions and some networks too… some of the application used in daily needs is Medical applications which are used in data processing, patient monitoring, Mobile guide and digital image system. In defense a device called Night vision glass which can be used at night time to command the army and also to track the movement of enemies.

This is a fusion of electronic and clothes. They are used like the clothes we use daily. They are also available cheaply in market and the demands of these clothes are also increasing.

Download  PPT Presentation Topics for CSE on Wearable Computing.

PPT Presentations Topics for CSE on Bluetooth

Introduction to PPT Presentations Topics for CSE on Bluetooth:

This service is the wireless technology which is an open free usage and that too very low cost. Less power range, radio technology and ad hoc wireless technology that can communicate anywhere all over the world. In other words Bluetooth is wireless technology used for transferring the data information in less distances only from the fixed host or any other mobile devices only.

This can be done using software named as PAN called as the Personal Area Network. The name of this service was kept in 10th century by the person named Danish king and herald blatand. In 1994 this services came into various mobile brands like Nokia, Samsung etc…

This device permits connection and data transfer upon eight other devices. This is done by the concept called pico net. Pico net plays an important role like the masters in the concepts of Bluetooth. As the Bluetooth is less range device it data transfer range is only up to 10 meters. This range can be incremented by using software called the scatter net which is known as the high power antina. A scatternet is the group of pico net which is joined to the Bluetooth devices to get the increase in the Transfer range.

There are total three classes of Bluetooth devices like class 1 radio which has the range of 100 meters to 300 meters.  Class 2 radio which has the range up to 10 meters to 30 feet.  Class 3 radio which has 1 meter to 3 feet of data transfer range. PC card, Cell Phones, PDA’s, hand sets are some of the Bluetooth activated devices.

Advantages of Bluetooth are it is completely a wireless connection so no cables are required, No need of Setup to install Bluetooth, very less power consumption, has a great Industry support. Some of the dis-advantages are short data transfer range, less data rate, only for personal use, little expensive in cost.

Download  PPT Presentations Topics for CSE on Bluetooth.

Super Scalar And VLIW Processors PPT Presentation

Introduction to Super Scalar And VLIW Processors Presentation:

The existing system is a special planning by which various rules and regulations can be introduced everything at a time and then is assassinated each one separately. A concept called as the pipe lining which allows eliminating many instructions at the same time. But the problem is all the instructions has to in different pipe lining and separate from each other.

The planning of the super scalar is it permits many instructs that must be fully executed as per the single minute of the clock hand revolutions. These also contain various many pipelines which are in working state side by side. Trusting on the number of the working pipelines the set of rules and regulations can be assassinated parallel.

This parallel elimination has some of the limitations like the condition in which it protects the assassination done parallel is similarly to those which are even protected by the pipeline architectures. Resources conflicts, Control dependency and data conflicts are other some of the limitations of the super scalar architectures. Parallel execution has some related policies like in-order issue along with in-order completion, in-order issue along with out-order completion, out-order issue along with out-order completion.

These super scalars are very dependable on the topics like True data dependency, out dependency, Anti dependency etc… True dependency comes when the output of one program is used as the input for the other program to execute the output. Output dependency comes when two set of regulations are written on the same place or same address. Anti dependency comes when a instruct is used when the other regulation is under writing process.

Some of the more architecture are Power PC 604 which contains Brand, Load unit, integer unit and float units too. Power PC 620, Pentium, Pentium II is other architectures of the super scalar   The advantage of the super scalar is Simple Scalar, Power consumption, Good Compilers etc and much more. As per the advantages there are some problems.

Download  Super Scalar And VLIW Processors PPT Presentation.