The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Image encryption takes been used by armies and governments to help top-secret communication. Nowadays, this one is frequently used for guarding info among various civilian systems. To perform secure image encryption by means of various chaotic maps, in such system a legal party may perhaps decrypt the image with the support of encryption key. This reversible chaotic encryption technique makes use...
Reversible logic is the emerging field for research in present era. The aim of this paper is to design and synthesize a Programmable Read Only Memory (PROM) using a reversible decoder which is designed using reversible logic with minimum quantum cost. The PROM is a Programmable Logic device which consists of fixed AND Gates and programmable OR gates array. Fixed AND gates can be termed as a decoder...
The need in today's wireless applications is to design antennas that are compact, robust and effortless to integrate with RF circuit components. Microstrip patch antenna is one such type which satisfies these requirements. But the two main performance parameters of an antenna namely the gain and the bandwidth are near to the ground for patch antennas. Usually the gain range of a patch antenna is 1–2dB...
A proficient technique to distinguish changes in the geometry of an urban environment is proposed in this paper. Generally, many of the change detection techniques involve a pixel to pixel comparison by using an algebraic or a transform method of change detection. This technique profoundly depends on the optimum choice of threshold value to separate the real altered pixels. Moreover all these techniques...
Reversible logic is the emerging field for research in present era. The aim of this paper is to design and synthesize a Programmable array Logic (PAL) and Programmable Logic array (PLA) using reversible logic with minimum quantum cost. The PAL is a Programmable Logic device which consists of programmable AND Gates and fixed OR gates array. The PLA is the PLD which contains programmable AND array and...
Digital image processing techniques are commonly used to enhance an image to extract the useful information from it. Images acquired by a visual system are seriously degraded under hazy and foggy weather, which will affect the detection, tracking, and recognition of targets. The degraded images have reduced contrast and the local information is lost. Thus, restoring the true scene from such a foggy...
Reversible logic is the emerging field for research in present era. The aim of this paper is to realize different types of combinational circuits like full-adder, full-subtractor, multiplexer and comparator using reversible decoder circuit with minimum quantum cost. Reversible decoder is designed using Fredkin gates with minimum Quantum cost. There are many reversible logic gates like Fredkin Gate,...
The trend in today's wireless application is to design antennas that are compact, robust and ease to integrate with RF circuit components. Microstrip patch antenna is one such type that satisfies the above requirement. But the two main factors of an antenna namely the gain and the bandwidth are low for patch antennas. Usually the gain range of patch antenna is 1–2dB. The most straightforward way of...
Face expression recognition has made considerable growth in last decade due to its versatile applications in various fields such as emotion analysis, biometrics, surveillance and robotics. This paper proposes a quality face descriptor in which the local information of the face surface is concealed by means of Local Directional Number (LDN) pattern and it generates a more discriminative code compared...
In this project, an efficient design of circular shaped microstrip patch antenna for Ultra Wide Band (UWB) applications is proposed with partial ground structure. In the recent era, microstrip patch antenna plays a vital role as they are found to be immensely useful due to its compact nature, easy integration and its light weight. UWB systems are popular because of their larger bandwidth and power...
The trend in today's wireless application is to design antennas that are compact, robust and ease to integrate with RF circuit components. Microstrip patch antenna is one such type that satisfies the above requirements. But the two main factors of an antenna namely the gain and the bandwidth are low for patch antennas. Usually the gain range of patch antenna is 1–2dB. The most straightforward way...
Image edge detection plays a vital role in image processing. Edges are the pre-dominant features of an image which is mainly used to analyze the images and to process that image. Hardware implementation of image edge detection is essential for real time applications to increase the speed of operation. This paper proposes a method that uses a graphical user interface that combines MATLAB, SIMULINK...
Modern healthcare systems are based on managing diagnostic information of patients through E-health. E-health refers to the Internet enabled healthcare applications involving transacting personal health records or information and other internet based services including e-Pharmacy where security threats is a major concern . This paper introduces a hybrid watermarking and encryption technique for copyright...
For the past few decades, an explosion of interest is being shown in the sharing of digital data over internet. The data which are transmitted over such network environments are often subjected to eavesdropping and malicious interventions. Steganography can be defined as the practice of undetectably altering a work to embed a secret message. People are more interested in sending secret information...
Cognitive growth of computer communication lead to radical improvement in wireless technology and shrunken the world into palms of user. During storing and sharing, avoiding third party access of data is a challenge. Image encryption is a popular technique widely used in the present scenario to protect secret information. Encryption achieves this by converting original data into unintelligible form...
Images act as major source for the assessment of data in many major fields relating to astronomical, medical, and geographical. While capturing the image or because of background lighting, some features may be lost or may be given less priority. In order to accentuate the important features present in the image we prefer enhancement process. In this paper, a new type of algorithm is used to enhance...
An efficient image encryption algorithm with improved image security has been developed by using chaotic function, deoxyribonucleic acid (DNA) sequencing and genetic algorithm (GA). A chaotic sequence of desired length is generated by using the logistic map function whose initial value is calculated using the secret key. A number of DNA masks are generated and these masks along with the chaotic sequences...
A reversible data hiding (RDH) algorithm with improved security, which can reacquire the cover in separable manner from the marked stego-image is presented in this paper. In the content owner side cover image is encrypted by deploying user-defined security key derived-chaotic based transposition algorithm. Then the data hider conceals secret data into the encrypted image by perturbing its histogram,...
An image encryption algorithm based on chaotic theory and Deoxyribonucleic acid (DNA) sequencing is proposed here. Initially, two chaotic sequences are generated from the logistic map function, one for image permutation and other for image diffusion. The two internal secret keys derived from the 120 bit user defined secret key serve as the initial condition for the chaotic sequences. Both the image...
This paper proposes a reversible data hiding (RDH) scheme for grayscale cover images with highly sensitive cover content. The scheme exploits least complexity in computation by incorporating histogram shifting method to embed secret bits in confused cover, where cover confusion has been implemented using logistic map function. To achieve high capacity or configurable embedding rates, multi-level peak...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.