A Review of Colour Image Watermarking Scheme Based Image Normalized
Review Paper | Journal Paper
Vol.4 , Issue.7 , pp.183-185, Jul-2016
Abstract
Watermarking on Digital Images has dissimilar methods, some of them contracts with frequency domain. The Watermarking methods using frequency domain produce better results either concerns with image excellence or invisibility of the watermark. The numerical watermarking is such that it offers copyright protection by information hiding. The investigators all over the world are still trying to find out the way to create robust Digital Image Watermarking Methods. Digital image watermarking techniques have been developed widely in new years to maintain the broadcasting media and satisfied authentication, broadcast monitoring, copy control, and many other applications. The method involves introducing of the watermark in the host appearance in the Discrete Cosine Transform domain in a spread-spectrum format. The digital data are spread using the Internet. So digital data must be secure, copyright protected, and authenticated at the same time.
Key-Words / Index Term
Watermarking, DCT (Discrete Cosine Transformation), Digital Images, Techniques
References
[1] Saini, Lalit Kumar, and Vishal Shrivastava. "A survey of digital watermarking techniques and its applications." arXivpreprintarXiv:1407.4735 (2014)
[2] Saini, Lalit Kumar, and Vishal Shrivastava. "A survey of digital watermarking techniques and its applications." arXiv preprint arXiv:1407.4735 (2014).
[3] Cheddad, Abbas, et al. "Digital image steganography: Survey and analysis of current methods." Signal processing 90.3 (2010): 727-752.
[4] Tiwari, Niyati, Manoj Kumar Ramaiya, and Mukesh Sharma. "Digital Watermarking using DWT and DES." Advance Computing Conference (IACC), 2013 IEEE 3rd International. IEEE, 2013.
[5] Scholar, P. G. "A Survey: Digital Image Watermarking Techniques." (2014).
[6] Scholar, P. G. "A survey: Digital image watermarking techniques." Int. J. Signal Process. Image Process. Pattern Recognit 7, no. 6 (2014): 111-124.
[7] Ruanaidh, Joseph JK O., and Thierry Pun. "Rotation, scale and translation invariant spread spectrum digital image watermarking." Signal processing 66, no. 3 (1998): 303-317.
[8] Woo, Chan-Il, and Seung-Dae Lee. "Digital Watermarking for Image Tamper Detection using Block-Wise Technique." International Journal of Smart Home7.5 (2013): 115-124.
[9] Abdullatif, Mohammad, et al. "Properties of digital image watermarking."Signal Processing and its Applications (CSPA), 2013 IEEE 9th International Colloquium on. IEEE, 2013.
[10] Ravinder, Heng-Fu, and Xiao-Wei Chen. "A robust image-adaptive public watermarking technique in wavelet domain." Journal of Software 9 (2003): 021.
[11] Owalla, Felix O., and Elijah Mwangi. "A colour image watermarking technique resistant to affine geometric attacks." AFRICON, 2013. IEEE, 2013.
Citation
Ashminder Kaur, Ms. Lofty, "A Review of Colour Image Watermarking Scheme Based Image Normalized," International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.183-185, 2016.
Securing QR Codes with Encryption Schemes: A Survey
Research Paper | Journal Paper
Vol.4 , Issue.7 , pp.168-191, Jul-2016
Abstract
QR code (shortened from Quick Response code) matrix barcode (or two-dimensional code) initially intended for the car business is a trademark. QR code on the Internet, with the quick advancement of the transmission required, for the security of computerized data against unlawful use turns out to be increasingly imperative. To overcome basic restrictions in the one-dimensional disorganized framework,, our proposed scheme presents good encryption system with large key space. Due to bulky data capacity and very high relationship among pixels in QR Code documents, customary methods are not appropriate for QR Code encryption. QR code to get this paper proposes a chaotic scheme, enormous information limit and high relationship between's pixels in QR codes as documents, conventional systems are not reasonable for encryption QR code. (For example, AES and DES) as contrasted and chaos-based encryption schemes QR code has done well.
Key-Words / Index Term
Security, QR Codes, Chaotic Encryption.
References
[1]. Rouillard J.and Laroussi M."PerZoovasive: contextual pervasive QR codes as tool to provide an adaptive learning support." ACM ,In Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology, pp. 542-548., 2008.
[2]. Ceipidor U.-B., Medaglia C-M., Amedeo Perrone, Marsico M-D., and Romano G-D. "A museum mobile game for children using QR-codes." In Proceedings of the 8th International Conference on Interaction Design and Children, pp. 282-283. ACM, 2009.
[3]. Wang J.-T., Chia-NianShyi, T-W. Hou, and C. P. Fong. "Design and implementation of augmented reality system collaborating with QR code." IEEE Trans. In Computer Symposium (ICS), 2010 International, pp. 414-418., 2010.
[4]. Kieseberg P.,Leithner M.,Mulazzani M.,Munroe L., Schrittwieser S.,Sinha M., and Weippl E.. "QR code security." In Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia, pp. 430-435. ACM, 2010.
[5]. Lorenzi D., BasitShafiq, Vaidya J.,Nabi G.,Chun S., and Atluri VL. "Using QR codes for enhancing the scope of digital government services." In Proceedings of the 13th Annual International Conference on Digital Government Research, pp. 21-29. ACM, 2012.
[6]. IoannisKapsalis, "security of QR codes." (2013).
[7]. Timothy Vidas, Emmanuel Owusu, Shuai Wang, Cheng Zeng, Lorrie Faith Cranor, and Nicolas Christin. "QRishing: The susceptibility of smartphone users to QR code phishing attacks." In Financial Cryptography and Data Security, pp. 52-69. Springer Berlin Heidelberg, 2013.
[8]. Kim S.-H.,Choi D., Jin S.-h., and Lee S.-H. "Geo-location based QR-Code authentication scheme to defeat active real-time phishing attack." In Proceedings of the 2013 ACM workshop on Digital identity management, pp. 51-62. ACM, 2013.
[9]. Krombholz K.,Frühwirt P., Kieseberg P.,Kapsalis I.,Huber M., and Weippl E. "QR code security: A survey of attacks and challenges for usable security." In Human Aspects of Information Security, Privacy, and Trust, pp. 79-90. Springer International Publishing, 2014.
[10]. Chen J-H.,Chen W-Y., andChen C-H. "Identification recovery scheme using quick response (QR) code and watermarking technique." Applied Mathematics & Information Sciences 8, no. 2 (2014): 585.
[11]. R. M. Muthaiah, and N. Krishnamoorthy. "An Efficient Technique for Data Hiding with use of QR Codes-Overcoming the Pros and Cons of Cryptography and Steganography to Keep the Hidden Data Secretive." International Journal of Computer Applications 100, no. 14 (2014).
[12]. Andra Dobrescu "Implications of QR Codes for the Business Environment." Calitatea 16, no. S3 (2015): 166.
Citation
Tarunika Anita Sahoo, "Securing QR Codes with Encryption Schemes: A Survey," International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.168-191, 2016.
A Systematic Survey of Natural Language Processing (NLP) Approaches in Different Systems
Survey Paper | Journal Paper
Vol.4 , Issue.7 , pp.192-198, Jul-2016
Abstract
Natural Language Processing and Programming Languages are both established areas in the field of Computer Science, each of them with a long research tradition. Natural Language processing Frameworks can make conceivable the use of natural language to express ideas. In education system, Natural Language Processing gives solution in a assortment of differing fields related with the social and cultural context of language learning. Natural Language Processing is broadly integrated with the expansive number of education connections such as research, science, linguistics, e-learning, evaluations system, and contributes resulting positive outcomes in other education settings such as schools, higher education system, and universities. In healthcare, NLP Frameworks decrease fetched as well as improve the quality of electronic healthcare systems. It is therefore against this foundation that this paper reviews the NLP techniques, uses in education, healthcare and their applications as well as their limitations. The reason of this relook is to overview and report the current state and the future bearings of the use of NLP innovations in different frameworks in the corporate world.
Key-Words / Index Term
NLP, Education, Application, Education System, Electronic Healthcare Systems, Healthcare, NLP Techniques.
References
[1] Chetan Arora, Mehrdad Sabetzadeh, Lionel Briand & Frank Zimmer, “Automated Checking of Conformance to Requirements Templates Using Natural Language Processing”, in IEEE Transactions on Software Engineering, Vol-41, Issue: 10, PP. 944 – 968, 2015.
[2] Henrik Leopold, Jan Mendling and Artem Polyvyanyy, “Supporting Process Model Validation through Natural Language Generation”, in IEEE Transactions on Software Engineering, Vol- 40, Issue-8, PP.818 – 840, 2015.
[3] Julia Hirschberg, Bruce W. Ballard and Donald Hindle, “Natural language processing”, in AT&T Technical Journal, Vol- 67, Issue-1, PP. 41 – 57, 1988.
[4] Erik Cambria and Bebo White, “Jumping NLP Curves: A Review of Natural Language Processing Research”, in IEEE Computational Intelligence Magazine, Vol-9, Issue-2, PP.48 – 57, 2014.
[5] Michael T. Mills and Nikolaos G. Bourbakis, “Graph-Based Methods for Natural Language Processing and Understanding-A Survey and Analysis”, in IEEE Transactions on Systems, Man, and Cybernetics: Systems, Vol-44, Issue-1, PP.59 – 71, 2014.
[6] T. Patten and P. Jacobs, “Natural-language processing”, in IEEE Expert, Vol- 9, Issue- 1, PP. 35, 1994.
[7] Minhwa Chung and D. Moldevan, “Applying parallel processing to natural-language processing”, in IEEE Expert, Vol-9, Issue-1, PP. 36 – 44, 1994.
[8] B. W. Wah and T. S. Huang, “Report on workshop on high performance computing and communications for grand challenge applications: computer vision, speech and natural language processing, and artificial intelligence”, in IEEE Transactions on Knowledge and Data Engineering, Vol- 5, Issue-1, PP. 138 – 154, 1993.
Citation
N.Vasunthira Devi, R. Ponnusamy, "A Systematic Survey of Natural Language Processing (NLP) Approaches in Different Systems," International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.192-198, 2016.