The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Now a day, need for fast accessing of data is increasing with the exponential increase in the security field. QR codes have served as a useful tool for fast and convenient sharing of data. But with increased usage of QR Codes have become vulnerable to attacks such as phishing, pharming, manipulation and exploitation. These security flaws could pose a danger to an average user. In this paper we have...
There are many sorting techniques which were developed over the hundreds of years and also optimized to reduce the complexity for worst and average cases. This paper presents a technique, that can be used to optimize the sorting algorithms, named CutShort. The name ‘CutShort’ signifies cutting of original array into shorter pieces. In this technique, the input array is divided into several subarray...
From the past few years, vehicle plate recognition is becoming the most challenging and interesting topic of surveillance. It is challenging because number plate comes in different size, shape and written in different font style. It is interesting because of its use in security applications. In this paper we have proposed a robust and simple approach based on edge detection and segmentation with morphological...
Fog is one of the major sources of accident. It is the natural phenomenon which reduces the contrast and fades the colors of objects in the scene with respect to their distance from the driver. It results in poor visibility and thus brings great difficulty in driving, object identification, object tracking and monitoring in outdoor images. As a remedy to these problems we have proposed an algorithm...
In real world applications, tracking target in low resolution video is a challenging task because there is loss of discriminative detail in the visual appearance of moving object. The existing methods are mostly based on the enhancement of LR (low resolution) video by super resolution techniques. But these methods require high computational cost. This cost further increases if we are dealing with...
In Steganography there are many techniques which are used to hide the data in different formats. Most general one is the least significant bit (LSB) substitution method, which is commonly used due to its simplicity. It provides protection to data by hiding it in digital image. But simple use of this approach is more vulnerable to attack. In this paper we have discussed the art and science of Steganography...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.