The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The fragile watermarking technique presented in this paper is based on the pixel information. The authentication data is calculated from the pixels by using Local Binary Pattern concept. Spatial information of pixels is used for watermark calculation and it is having spatial relationship of pixels. The authentication information is calculated for the block of 3×3 using LBP operator and we have used...
Use of mobile has increased day by day. Nowadays, the mobile users prefer to use smartphones to access all types of mobile Application. These smartphones are converted from phone to smartphone by using inbuilt or downloaded mobile Applications. Generally, users download mobile Applications depending on how many users already have downloaded that Application?, What are the ratings and reviews?, What...
Nowadays, the consumer reviews for various products are playing a very important role not only for consumers but also for the firms. A large collection of consumer reviews is now available on the internet. These reviews are very helpful to get quality information about the products. The consumer reviews are used as a feedback by the firms in their product development strategies and consumer relationship...
Scalable image search based on similarity matching has been an active topic in recent years. Currently use of web has been increased significantly for information recovery and it is challenging to extract the relevance information in less time. For this the State-of-the-art methods usually use hashing approaches to embed high-dimensional image features into given Hamming space, where result search...
Human thumbprints are rich in details called minutiae, which can be used as recognition marks for thumbprint verification. Therefore attacker can track our fingerprints and use them for their purpose. Hence, to provide security to the fingerprints is an important issue. Here, system is designed to provide protection and to maintain the privacy of fingerprints. To provide privacy protection to the...
Now a day's fingerprint database can be stolen. Therefore attacker can track our fingerprints and use them for their purpose. Hence, to provide security to the fingerprints is an important issue. Here, system is designed to provide protection and to maintain the privacy of fingerprints. To provide privacy protection to the fingerprints, system combines two distinct thumbprints into a new virtual Individuality...
Online social and news media has become a very popular for users to share their opinions. It generates rich and timely information about actual world actions of all types. Several efforts were dedicated for mining topics, sentiments and opinions automatically from natural language in news, social media messages, and commercial reviews of product and services. Social media like facebook, twitter, online...
The controversial news issues grab much attention from the public. But it is difficult to understand completely the issue for a normal reader. “Disputant relation based method” classifies the opposing views of the news which can help readers to understand the issues easily. Generally for classifying news articles Disputant relation based method is used. We study disputant relation based method and...
Based on the increased awareness towards digital rights in commercial activity, the internet and media demands protection to enhance security. In this paper, predicated level of reversible watermarking scheme for image integrity and tamper detection or localization aspect. The proposed integrity analysis process is based on the region of interest watermarking with signatures and the use of alpha channel...
Fragile watermarking is discovered for authentication and content integrity verification. This paper introduces a modified fragile watermarking technique for image recovery. Here we can detect as well as recovered the tampered image with its tampered region. This modified approach helps us to produce resistance on various attacks like birthday attack, college attack and quantization attacks. Using...
This paper proposes a modified approach of fragile watermarking. The watermark generation is based on Local Binary Pattern (LBP). The proposed method is having recovery ability. Local Binary Pattern (LBP) is an operator that describes the surroundings of a pixel by generating a LBP code. LBP is mostly used for face detection, texture classification, pattern recognition and image classification. In...
Over the last few years, there is tremendous use of online social networking sites. It's also providing opportunities for hackers to enter easily in network and do their unauthorized activities. There are many notable social networking websites like Twitter, Facebook and Google+ etc. These are popularly practiced by numerous people to become linked up with each other and partake their daily happenings...
This paper presents an implementation of face recognition, which is a very important task of human face identification. Line scratch detection in images is a highly challenging situation because of various characteristics of this defect. Few characteristics are considered with the different texture and geometry of images. We propose a useful algorithm for frame-by-frame line scratch detection in face...
This paper presents an implementation of face recognition, which is a very important task of identifying human faces. Representation of a face image is dealing with keypoints clustering and curve matching approach. In our work we implement the methods for recognition of a 3-D face image with missing and occluded part. The solutions for this problem is found out with the help of SIFT and RANSAC algorithms...
The research and application of digital watermark is being paid more focus for content authentication. In recent times, the fast growth of the Internet has made copyright protection of digital contents a critical issue. Watermarking of multimedia content is important to authenticate, copy-control and ownership detection. The scheme used in this paper used two different categories of the watermark...
Now a days in context of online social media, hackers have started using social networks like Twitter, Facebook Google+ etc for their unauthorized activities. These are very popular social networking sites which are used by numerous people to get connected with each other and share their every day's happenings through it. In this paper we consider twitter as such a social networking site to experiment...
Watermarking of multimedia content is important to authenticate, copy-control and ownership detection. In this paper, multimedia authentication and tamper detection scheme is proposed with the security of AES(Advanced Encryption Standard) ciphered watermarking and hash function. The algorithm embeds two watermarks in the host image for authentication and tamper detection. We first used Unique Identification...
Nowadays there has been great interest in field of image texture classification and retrieval. The increasing use of digital images has increased the size of image database which resulted in the need to develop a system that will classify and retrieve the required image of interest efficiently and accurately. This paper presents an effective and accurate method to classify and retrieve image using...
In today's world, signatures are the most widely accepted form of biometric identity verification. However, they have big side-effect of being easily misused or stolen by those who would pretend the identification or intent of an individual. Signature verification helps to identify the original and forged signature. This paper presents current approaches to off-line signature verification with the...
Steganography is define as the process of hiding information in a multimedia carrier. Its ultimate objectives are undetectability and robustness of the hidden data. It is recognized as adaptive steganography as the data is embed in to the specific Region of Interest (ROI) of the cover image for the purpose of safety of the inserted data. The assurance of both imperceptibility and robustness requirements...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.