-
An Analytical Approach to an Implementation of Reversible Image Transformation with Steganography for an Online Document Leakage Detection and Prevention
Mrunalinee Subhash Patil ; Prof. Z. I. Khan
Computer Science and Engineering
Year: 2017, Volume:3, Issue : 12
Pages: 125 - 132
Steganography are the most popular or widely used information security scheme or techniques. It is the act of covert communications. The algorithms for hiding data or message in a cover image, and extracting a message from a stego-image were implemented using C# programming language. In this paper, LSB Replacement technique was adopted as the embedding method. In this paper we propose a reversible high capacity data hiding method applying on binary images. We also proposed leakage detection and prevention with the help of unique hash values of the document/images. The paper proposes a novel framework for reversible data hiding in encrypted image (RDH-EI) based on reversible image transformation (RIT). Different from previous frameworks which encrypt a plaintext image into a cipher text form; RIT-based RDH-EI shifts the semantic of original image to the semantic of another image and thus protects the privacy of the original image. In our proposed system, we proposed a new mosaic image technique in which we divide the image/pdf document into parts, and the parts will then transformed, encrypted and encoded into target images. Steganography meaning covered writing. It includes the concealment of information within computer files. It is one of the techniques used for securing data or information over the internet.
Read More...
-
Logistics Management System Based on Wireless Technology
Frenie Koshy ; Prof. Bhagyashri Baviskar; Ashwini Gaikwad; Parimal Neve
Electronics and Telecommunication
Year: 2017, Volume:3, Issue : 12
Pages: 133 - 139
Logistics management is a supply chain management component that is used to meet customer demands through planning, control and implementation of the effective movement and storage of related information, goods and services from origin to destination. We know that shipment tracking and visibility is very important for logistics and financial interests so we offer both current and historical statuses of individual freight shipments. Updates and records from carrier partners on the status of each shipments can be maintained. Utilization of the electronics equipments will enhance the service quality and ensure faithful delivery with tracking system, so the customer and B2B industry can ensure timely and secure delivery .Features like GPS tracking –using the GPS module will keep the authorities informed about the location. The effective use of keypad password for the door opening ensures security, as the goods cannot be tampered or accessed by others. Besides air conditioning and cooling systems is attached for maintaining temperature as per the requirements of the goods. The major challenges in logistics systems are security issues and untimely delivery of goods. Thus then Logistics management system provides solutions to these common problems encountered during transport of goods. This project will enhance updated logistics system, timely and informed delivery and faithful transport.
Read More...
-
Rotary Ultrasonic Machining of Ni based Alloys
Dipesh Popli ; Meenu Gupta
Mechanical Engineering
Year: 2017, Volume:3, Issue : 12
Pages: 140 - 151
Inconel 718 is a high nickel content super alloy possessing high strength at elevated temperatures and resistance to oxidation and corrosion. The non-traditional manufacturing process of Rotary ultrasonic machining (RUM) possesses many advantages over traditional machining during the manufacture of Inconel 718 parts. An experimental investigation was conducted to determine the main RUM parameters which contribute to effects the metal removal rate and surface roughness of Inconel 718. It was found that feed rate is the most critical parameter in RUM.
Read More...
-
Studies on Scale Deposition in Oil Industries and Their Control
Dr. Lakkimsetty Nageswara Rao ; Yousuf M. Al Rawahi; S. Feroz
Chemical Engineering
Year: 2017, Volume:3, Issue : 12
Pages: 152 - 167
Scale formation is a vital issue in many industries leading to low operational efficiencies and economical losses. A good management strategy must be put in place to prevent the scale formation from building up or having further occurrence. Just as it has been acknowledged over the years that scale prevention is better than waiting until it forms and then taking remedial action. Many diverse expertise that could possibly be deployed by the oilfield operatives to decrease the risk of scale formation, control scale formation and to eliminate it if formed within down hole and topside oil/gas facilities are critically reviewed. With the important development and improvements in chemistry and fluid finish for effective scale inhibitions, oilfield scale can be distant from inside the tubular without risk to the steel tubing. In order to prevent scale in an as environmentally friendly way as possible, a good understanding of the chemical background for scale formation is necessary. There are fundamental differences between different scales that can lead to more scaling if the wrong choices are made. To avoid all extra costs related to scaling is unrealistic. But the costs can be minimized by thoroughly risk analyses and a focus on scale prevention. This paper presents a complete review on scale formations in oil industries and its potential impact during process.
Read More...
-
Efficient Security of Data by QR Code Encryption and Steganography
Muhamed Jasim TK ; Pinky Mohan; Mitha Raj; Janeeba Sherin; Mohyiddin
Electronics & Communication Engineering
Year: 2017, Volume:3, Issue : 12
Pages: 168 - 173
QR Code (QUICK RESPONCE) are basically embedded with data that can be easily decoded, OR code have substantial role in mobile application like online payment, adhar card etc... In every camera enabled smartphone can scan QR code. The QR code are 2D barcodes that encode text information. In recent year’s security of information have become big concern in the internet, so the information hiding has become an important issue. In steganography, Steganography hides the data in a medium suchas text file, image, audio, video etc., and restrain the very existence of the message in the medium from a third party .In this paper ithides the message inside a cover image. The main approaches to steganography must provide two attributes: High security against the dissimilar assaults called steganalysis and second is compression. In this paper a latest approach is proposed for secret communication by combining the concept of steganography and QR codes. In the suggested method include two phase: (1) Encrypting the text message by a QR code encoder and creating a QR code, (2) Hiding the secret image inside the generated QR code. This proposed approach has to be employed in communicating confidential information.
Read More...
-
GPS and GSM based Voice Guidance System for Blinds
Avantika Agrawal ; Prerna Sonkar ; Manish Kumar; Avinash Kaushal
Electronics, Communication & Instrumentation
Year: 2017, Volume:3, Issue : 12
Pages: 174 - 178
The paper describes a theoretical model and a software based concept for the construction of an overall Electronic travelling Aid (ETA). This paper puts forth a detailed navigation device with the help of which every obstacle and direction related problem of the visually impaired person can be easily solved. To make the device an updated and more reliable, it is being based upon Global Positioning System (GPS). GSM system is also adapted for further ease. These both techniques together contribute towards a proper ETA added with some special features. Microcontroller is being used for the interfacing of the GPS, GSM and voice module.
Read More...
-
Enhancement in Automobile Vehicle Safety System and Reduce Human Errors in Vehicle Operating System
Axay Shethwala ; M. D. Patel; Dhaval Modi; Sanket Prajapati; Akshay Modi
Mechanical Engineering
Year: 2017, Volume:3, Issue : 12
Pages: 179 - 184
We all enjoy driving vehicles. But there are certain safety and security concern about which you must aware while driving an automobile vehicle. The biggest concern is with hand brake, gear and seat belt system on the vehicle. In this system that all three sensors and switch ensure much more safety in the automobile vehicle the security and safety of your automobile vehicle can be increased by proper installation of mechanism.
Read More...
-
Design of Compact Microstrip Patch Antenna for Wireless Applications
Joel Sequeira ; Steffie Tom; Shruti Mardolkar; Yeshudas Muttu
Electronics and Telecommunication
Year: 2017, Volume:3, Issue : 12
Pages: 185 - 190
In this paper a novel design of compact microstrip antenna with impedance of 187Ω is proposed. The antenna consists of a rectangular patch with slits on the top face and a partial ground with slots at the rear end. The antenna is fabricated on FR-4 epoxy dielectric with relative permittivity of 4.4. The designed antenna has the capability of operating at 5.78GHz for wireless applications. Single element, 1x2 array and 1x4 array has been designed and it is studied that from single element design to the 1x4 array design the antenna gain has kept on increasing respectively. The proposed antenna has Omni-directional radiation pattern and it also poses a relatively excellent return loss. Radiation pattern is measured in antenna anechoic chamber. Feed line used has characteristic impedance of 50Ω. Antenna parameters such as return loss and radiation pattern show reasonable agreement with the simulated results. The antenna simulation is done using the Zeland Ie3D simulation software.
Read More...
-
A Study and Comparison on Sentiment Analysis for the Products Available in E- Commerce
S.Muthukumaran
Computer Engineering
Year: 2017, Volume:3, Issue : 12
Pages: 191 - 195
This paper explains different methods for sentiment analysis and showcases an efficient methodology. It also highlights the importance the product reviews are of utmost importance for the buyers to decide based on their concerns regarding product's various aspects for example a monitor, processor speed, memory etc. Hence this sentiment analysis of product review provides nearly accurate statistics regarding a product, providing an ease to the customers for analyzing the product and zero down his/her search for an online product. The key focus here is efficient feature extraction, polarity classification thereby summarizing positive and negative or neutral polarity. The proposed work is able to collect information from various sites and perform a sentiment analysis of a user reviews based on that information to rank a product. Also these reviews suffer from spammed reviews from unauthenticated users. So to avoid this confusion and make this review system more transparent and user friendly we propose a technique to extract feature based opinion from a diverse pool of reviews and processing it further to segregate it with respect to the aspects.
Read More...
-
Mathematical Model in Chemotherapy and Radiotherapy Treatment for Cervical Cancer
N. Latha ; Dr. G. Komahan
MATHEMATICS
Year: 2017, Volume:3, Issue : 12
Pages: 196 - 201
Radiation therapy uses special equipment to send high doses of radiation to the cancer cells. Most cells in the body grow and divide to form new cells. But cancer cells grow and divide faster than many of the normal cells around them. Radiation works by making small breaks in the DNA inside cells. These breaks keep cancer cells from growing and dividing, and often cause them to die. Nearby normal cells can also be affected by radiation, but most recover and go back to working the way they should. Unlike chemotherapy, which exposes the whole body to cancer-fighting drugs, in most cases, radiation therapy is a local treatment. It’s aimed at and affects only the part of the body being treated. The goal of radiation treatment is to damage cancer cells, with as little harm as possible to nearby healthy cells. In this model the combined treatment of chemotherapy and radiation therapy and its side effects for cervical cancer are discussed.
Read More...