-
AN SVD BASED IMAGE WATERMARKING ALGORITHM BASED ON IMAGE INVARIENT MOMENTS
Anupriya Singhal ; Prof. Vedant Rastogi
Computer Engineering
Year: 2015, Volume:2, Issue : 4
Pages: 81 - 100
Digital watermarking refers to the process of embedding watermark data in some host media with a view to claim ownership or copyright if the need arises. Digital Image watermarking is the need of time in exponential growing jargon of internet and high speed data transfer. Robustness is a critical aspect of a image watermarking for a wide class of application. It refers to the property of watermark, being resistant against attacks, which includes several image processing operations. There exists several techniques in literature, for robust watermarking against pixel intensity change, jpg compression etc. However, watermarking robustness against cutting and cropping operations is difficult and not much progress has been achieved till date. Majority of the work in watermarking techniques, for robustness against cutting and cropping, proposes a method in which watermark is embedded redundantly in several segments of the images so as to provide resistance against cropping operations in which some area, might containing a useful portion of information is lost. In this dissertation, a watermarking technique is proposed in which watermarking is implemented using SVD decomposition. To achieve robustness, the image invariant moments are computed which are invariant against scaling, rotation and translation. The centroid of the image is calculated and a segment of the image is identified which has least probability of go through some cropping operation in any image processing. The watermark information, encoded in invariant moments is embedded in the selected image segment. At the detector end, the same image segment is located and watermark is detected and extracted. This provides a way of blind and robust watermarking against a large number of attacks. The proposed approach is simulated using MATLAB and the results indicate a considerable improvement in watermark resistance for attacks as compared to existing approaches.
Read More...
-
Hop-By-Hop Cross-Layer Congestion Control Scheme for Delay and Interference Constrain to Reduce Power in MANET
P. Punitha ; B. Santhosh Kumar; Dr. S Karthik
Computer Engineering
Year: 2015, Volume:2, Issue : 4
Pages: 101 - 102
A mobile ad-hoc network (MANET) is a self-structure network of mobile routers connected by wireless link. The nodes are free to move randomly and independently. Ad-hoc networks suitable for emergency situations like natural or human made disasters, military conflicts, emergency medical situations etc . Major problem in a mobile ad-hoc network is constrains. In this paper focused on a intrusion constrain and delay constrain. Objective of the topology control algorithm satisfactory the both interference constrain and delay constrain. Topology control mainly focused on diminishes the interference between the nodes then increasing the network capacity. We are going to discussed about the constrain in a mobile ad-hoc networks.
Read More...
-
Electro-Milktester
Anoop Ravindran ; Anish Unnikrishnan M.; Arjun K. Sreedhar; Swaroop Varghese Kuruvila
Electronics, Communication & Instrumentation
Year: 2015, Volume:2, Issue : 4
Pages: 103 - 108
The milk industry in India is a huge contributor to the income of a nation and this industry rests on the existence of cooperation that bring together dairy Farmers by combining their individual, small contributions. Most of these co-operations use a dual axis price fixing that is used to set the price of milk. But even at this age of technology, these establishments use old equipments to get convenient and in most of the cases, wrong quality readings and thus the small dairy farmers are cheated out of their money because of this. So we plan on designing and implementing an embedded solution which would allow for fast and accurate determination of the sample parameters and which can replace the existing methods as the primary test. This paper describes one of the applications of embedded system that we call the Electro-MilkTester.
Read More...
-
Randomized Image Passwords and a QR Code based Circumnavigation Mechanism for Secure Authentication
Shabna Kabeer ; Avanish Kumar Singh
Computer Science and Engineering
Year: 2015, Volume:2, Issue : 4
Pages: 109 - 114
Passwords are the security primitives used in proving a user’s identity online. Passwords can be grouped as alphanumeric passwords, biometric passwords and graphical passwords. Graphical passwords are more secure than alphanumeric password. In this paper, we present a secure and user friendly graphical password authentication system named as RIP (Randomized Image Passwords) which is based on randomizing the visual objects used as passwords so that each time the user gets different image for login. This adds security since the visual objects do not maintain a fixed position on login image. In order to avoid shoulder surfing attack and spyware attack, a circumnavigation mechanism is proposed for which we will be using QR codes. The proposed authentication method using RIP and QR codes can be a solution to security threats like shoulder surfing attack, attack using malwares such as screen recorders, which are the major security issues associated with graphical password schemes. This scheme offers reasonable security, user friendliness and will fit well with many practical applications.
Read More...
-
A Survey on localization in Wireless Sensor Network by Angle of Arrival
Shubhra Shubhankari Dash ; Tanmay Kumar Behera
Computer Science and Engineering
Year: 2015, Volume:2, Issue : 4
Pages: 115 - 122
Wireless sensor network is a type of sensor network which consist of a large number of sensor nodes, which are low cost small in size. When sensor nodes send the data to the user it must be localized itself. Here basically we focus on cooperative and distributed localization. Here we use cooperative positioning algorithm which is a hybrid positioning method used for the improvement of coverage network positioning and accuracy which is based on ultra-wide band technique, normally in harsh environment. In cooperative localization nodes are work together to make measurements and after that it form a map of network. There is a method for selection of neighbors for the distributed localization. Basically distributed algorithms are simple, have asynchronous operations that are there is no global coordination between nodes is required, and have the capability to operate in a disconnected network. Here also describe a Distributed algorithm in which whole network can be divided into cluster, after the initial cluster localized, by stitching together into other cluster whole network can be localized. The graph rigidity theory is define here for the new structure and their relationship. So the algorithm can provide relative location to maximum number of nodes. A hybrid scheme of AOA/TOA explained here. This hybrid scheme employ in multiple seeds in the line of sight scenario. Here we have to find the position of target sensor which not changes its moving direction.
Read More...
-
Optimization of Femoral Intramedullary Nailing using Finite Element Analysis
Mohd. Shahjad. A. Sheikh ; Prof. A. P. Ganorkar
Mechanical Engineering Design
Year: 2015, Volume:2, Issue : 4
Pages: 123 - 125
The femur is the only bone located within the human thigh. It is both the longest and the strongest bone in the human body, extending from the hip to the knee. The method most surgeons use for treating femoral shaft fractures is intramedullary nailing. During this procedure, a specially designed metal rod is inserted into the marrow canal of the femur. The rod passes across the fracture to keep it in position. An intramedullary nail can be inserted into the canal either at the hip or the knee through a small incision. It is screwed to the bone at both ends. This keeps the nail and the bone in proper position during healing. Intramedullary nails are usually made of titanium. They come in various lengths and diameters to fit most femur bones. But the titanium is very costly metal; the cost of surgery is more. Therefore need for doing to find best alternative metal in low cost and the optimization of cross section of the rod is carried out to provide the best strength to weight ratio.
Read More...
-
Study on Tool Life and its Failure Mechanisms
M. Pradeep Kumar ; N. Ramakrishna; K. Amarnath; M. Sunil Kumar
Mechanical Engineering
Year: 2015, Volume:2, Issue : 4
Pages: 126 - 131
Machining is an important aspect in the field of manufacturing in order to shape the metal into required form and to get the good dimensional tolerances. Any machining process involves three basic elements viz., chip, cutting tool and work piece, in which the cutting tool is one of the major considerable factors. It is the ability of the cutting tool to shear the unwanted material form the work piece. It not only meant for the shearing the metal but also to achieve the required accuracy. These tasks can be performed efficiently when the cutting tool severs for a long period of time, which determines the rate of production and in turn governed by the number of times that a tool must re-grinded or reconditioned. The efficiency of the cutting tool not only enhances the productivity but also minimizes the cost of reconditioning of tool. Therefore there is a need to enhance the performance of the cutting tool and is measured as the time taken between two successive grindings which defines the cutting tool life. Knowledge on various machining parameters and tool failure mechanisms that affect the tool life is vital. Many globally reputed manufacturing organization of cutting tool with their rich experience of research and development, invented different ways of enhancing the life of cutting tool in order to optimise the rate of the production and to reduce the cost of production, which is highly acceptable to the manufacturing industry. To optimize the service life of a given tool, failures must be minimized in all manufacturing steps going into its production and its proper use must be ensured. A register of tool failures covering the full range of failure sources can therefore contribute signiï¬cantly to a tool service life improvement and hence, to more efï¬cient manufacturing. The main objectives for improving the cutting tool life are enhancing the productivity, reducing the manufacturing cost and to maintain the same accuracy till the end of the machining. This paper is devoted towards studying the effects of machining variables on tool life and various tool failure mechanisms.
Read More...
-
Design and Simulation of Gain Scheduled Adaptive Controller using PI Controller for Conical Tank Process
Mohini Narendra Naik ; Colaco Meryl Desiree; Shairlaine Nicole Monterio
Electronics, Communication & Instrumentation
Year: 2015, Volume:2, Issue : 4
Pages: 132 - 136
The Control of nonlinear process is a complicated task in industrial environment. In this paper, gain scheduled adaptive PI controlling technique to control the level in a single conical tank system has been used. Analytical modeling has been carried out and transfer function was obtained and the system has been implemented and simulated in MATLAB SIMULINK. The simulation studies were carried out for gain scheduled adaptive control and were compared with the direct synthesis control method. From the results of rise time of both the systems it is proved the controller implemented using gain scheduling adaptive control technique out performs direct synthesis method based PI controller.
Read More...
-
Performance Enhancement of Drilling Fluids using Molecular Encapsulated PCM in HP/HT Wells
Pranshu Praleya ; Prakhar Sarkar
Oil Engineering
Year: 2015, Volume:2, Issue : 4
Pages: 137 - 138
With the incessantly rising energy demands from the increasing population worldwide, the situation and the state-of-the-art petroleum and gas technology well herald the time to switch to High Pressure/High Temperature (HP/HT) mode of drilling. Being able to develop and produce from HP/HT wells is a relatively new concept for the upstream industry. This article introduces and discusses the benefits and limitations of a new technology to reduce the temperature of circulating fluids in wellbores. This technology makes use of phase-change materials (PCM), which utilize the latent heat of phase change to absorb the energy transferred to the drilling fluid from the formation or the drilling string.
Read More...