1,901 research outputs found
Reversible Data Hiding scheme using modified Histogram Shifting in Encrypted Images for Bio-medical images
Existing Least Significant Bit (LSB) steganography system is less robust and the stego-images can be corrupted easily by attackers. To overcome these problems Reversible data hiding (RDH) techniques are used. RDH is an efficient way of embedding confidential message into a cover image. Histogram expansion and histogram shifting are effective techniques in reversible data hiding. The embedded message and cover images can be extracted without any distortion. The proposed system focuses on implementation of RDH techniques for hiding data in encrypted bio-medical images without any loss. In the proposed techniques the bio-medical data are embedded into cover images by reversible data hiding technique. Histogram expansion and histogram shifting have been used to extract cover image and bio- medical data. Each pixel is encrypted by public key of Paillier cryptosystem algorithm. The homomorphic multiplication is used to expand the histogram of the image in encrypted domain. The histogram shifting is done based on the homomorphic addition and adjacent pixel difference in the encrypted domain. The message is embedded into the host image pixel difference. On receiving encrypted image with additional data, the receiver using his private key performs decryption. As a result, due to histogram expansion and histogram shifting embedded message and the host image can be recovered perfectly. The embedding rate is increased in host image than in existing scheme due to adjacency pixel difference
Recommended from our members
Location Security - Where to Enforce?
Enforcing security in location based services is very crucial in the current mobile world. Past literature has examined both location and identity obfuscation techniques in order to optimally tradeoff security/privacy with utility − this primarily addresses the ‘how to enforce location security problem’; however, it does not address the ‘where to enforce location security problem’. This paper examines the ‘where’ problem and in particular, examines tradeoffs between enforcing location security at a device vs. enforcing location security at an edge location server. This paper also sketches an implementation of location security solutions at both the device and the edge location server and presents detailed experiments using real mobility and user profile data sets collected from various data sources (taxicabs, Smartphones). Our results show that while device-based solutions do not require trust in the edge location server, they either suffer from high false positive rate (about 25% probability of not meeting the desired security requirement) or low utility (about 600 meters higher error in obfuscated location data)
Interpretation of genotype x environment interaction and stability analysis for grain yield of pigeon pea (Cajanus cajan L.)
Fourteen pigeon pea (Cajanus cajan L.) genotypes were evaluated for their yield performance at two locations during kharif season of 2009-10 and 2010-11. A significant genotypic difference for yield character was observed. Highly significant genotype–environment interaction indicated differential response of the genotypes to the environmental changes. The stability analysis showed significance of linear component of variation for grain yield. The genotypes TJT-501 (1728.667Kg/Ha) and GRG-2009-3 (1570.000 Kg/Ha) exhibited low meanperformance along with regression value nearer to unity (bi=1) and non significant deviation from regression (S2 di=0) indicating, the high stability and wider adaptability across the different environments. The genotype ICPH-2671 (3134.833 Kg/Ha) exhibited highest mean value and regression value (bi>1) and non significant deviation (S2 di < 0). But genotypes JKM-197 (3072.667 Kg/ha), GRG-2009 (29993.167 Kg/ha), TS-3R (2823.333 Kg / Ha) and ICP-8863 (2740.417 Kg/Ha) exhibited high mean performance but higher regression value (bi>1) and significant deviation (S2 di < 0) value indicating adapted for high performance environments showing these genotypes are sensitive to environments and give maximum yield when inputs are not limited
Effect of timing and graded levels of nitrogen and potassium in SRI cultivation
A field experiment was carried out at Annamalai University Experimental farm, Annamalai nagar, during Kuruvai and Navarai in the year 2008-09. To study the timing and graded levels of nitrogen and potassium in rice crop under SRI (System of rice intensification) cultivation. The experiment was laid out on deep clay soil by adopting randomized block design with factorial technique (FRBD). The results of field experiment revealed that the maximum growth and yield attributes were recorded in the treatment which received P2O5 as fully basal dose and nitrogen as three split doses viz., 50% basal and 25% each at tillering and panicle initiation stages. Potassium was applied as 33.3% K2O each at 15, 30 and 45 DAT. This treatment significantly recorded higher grain yield of 6278.7 kg ha-1 in field experiment – I and 6577.9 kg ha-1 in field experiment – II; and the straw yield of 7010.3 and 7309.7 kg ha-1 in field experiment I and II respectively. The shoot and grain uptake of nutrients (N, P and K) were high during 15, 30 and 45 DAT and at harvest which received 33.3 % K2O each at 15, 30 and 45 DAT
Recommended from our members
Reasoning with Streamed Uncertain Information from Unreliable Sources
Humans or intelligent software agents are increasingly faced with the challenge of making decisions based on large volumes of streaming information from diverse sources. Decision makers must process the observed information by inferring additional information, estimating its reliability, and orienting it for decision making. Processing streaming trust framework, when fact is getting created and inferred is a process in online mode and our paper works effciently in online mode. In online mode, someone initiates a query and gets an output based on the query. In this paper we have mainly shown that unstructured reports from unreliable and heterogeneous sources are processed to generate structured information in Controlled English. Uncertainty in the information is modelled using Subjective Logic that allows statistical inference over uncertain information. Trustworthiness of information is modelled and conflicts are resolved before fusion. This process is totally undertaken on streaming information resulting in new facts being inferred from incoming information which immediately goes through trust assessment framework and trust is propagated to the inferred fact. In this paper, we propose a comprehensive framework where unstructured reports are streamed from heterogeneous and potentially untrustworthy information sources. These reports are processed to extract valuable uncertain information, which is represented using Controlled Natural Language
and Subjective Logic. Additional information is inferred using deduction and abduction operations over subjective opinions derived from the reports. Before fusing extracted and inferred opinions, the framework estimates trustworthiness of these opinions, detects conflicts between them, and resolve these conflicts by analysing evidence about the reliability of their sources. Lastly, we describe an implementation of the framework using International Technology Alliance (ITA) assets (Information Fabric Services and Controlled English Fact Store) and present an experimental evaluation that quantifies the efficiency with respect to accuracy and overhead of the proposed framework
Numerical Characterization of a Composite Bonded Wing-Box
The development of composite wing structures has focused on the use of mechanical fasteners to join heavily-loaded areas, while bonded joints have been used only for select locations. The focus of this paper is the examination of the adhesive layer in a generic bonded wing box that represents a "fastenerless" or unitized structure in order to characterize the general behavior and failure mechanisms. A global/local approach was applied to study the response of the adhesive layer using a global shell model and a local shell/solid model. The wing box was analyzed under load to represent a high-g up-bending condition such that the strains in the composite sandwich face sheets are comparable to an expected design allowable. The global/local analysis indicates that at these wing load levels the strains in the adhesive layer are well within the adhesive's elastic region, such that yielding would not be expected in the adhesive layer. The global/local methodology appears to be a promising approach to evaluate the structural integrity of the adhesively bonded structures
Effect of water and air flow on concentric tubular solar water desalting system.
This work reports an innovative design of tubular solar still with a rectangular basin for water desalination with flowing water and air over the cover. The daily distillate output of the system is increased by lowering the temperature of water flowing over it (top cover cooling arrangement). The fresh water production performance of this new still is observed in Sri Ramakrishna Mission Vidyalaya College of Arts and Science, Coimbatore (11° North, 77° East), India. The water production rate with no cooling flow was 2050ml/day (410ml/trough). However, with cooling air flow, production increased to 3050ml/day, and with cooling water flow, it further increased to 5000ml/day. Despite the increased cost of the water cooling system, the increased output resulted in the cost of distilled water being cut in roughly half. Diurnal variations of a few important parameters are observed during field experiments such as water temperature, cover temperature, air temperature, ambient temperature and distillate output
VALIDATING EFFECTIVE RESUME BASED ON EMPLOYER’S INTEREST WITH RECOMMENDATION SYSTEM
In current technological world, recruitment process of corporate has evolved to the greater extent. Both the candidates and the recruiters prefer resumes to be submitted as an e-document. Validating those resumes manually is not much flexible and effective and time saving. The team requires more man power to scrutinize the resumes of the candidates. The aim of our work is to help the recruiters to find the most appropriate resume that match all their requirements. The system allows the recruiter to post his/her requirement as query, and the system will recommend the relevant resume by calculating the similarity between the query and the resume using Vector Space Model (VSM)
- …
