The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Iris recognition is very difficult to perform as it requires an environment that is highly controlled for better image acquisition. As compared to other biometric technologies, iris recognition is prone to poor image quality. Specially, images captured from a distance introduce noises such as blur, off axis, specular reflections and occlusions. For proper recognition good quality of captured image...
A variety of photo sharing applications overmobile networks have gained popularity in recent years. The mobile network is a public network and is highly vulnerable to security attacks. This makes it essential to deploy cryptographic algorithms to address the security issues. However, the encrypted data when transmitted over the mobile network is vulnerable to the channel noise and is improved by various...
Mobile communication has become an essential part of our daily life for accessing and sharing data over internet in addition to voice communication. Mobile communication channel is an open network and hence maintaining the confidentiality and reliability of the data has always been an area of concern. Reliability of data against channel noise can be ensured by various error correcting codes. Turbo...
Steganography, the study of invisible communication, deals with ways of hiding the existence of the communicated data in unsuspected digital media, such that it remains confidential. The objectives to be considered in the steganography methods are high capacity, imperceptibility and robustness. In this paper, a new data hiding scheme based on magic square blocks is proposed to obtain better image...
Steganography is the art of hiding covert message in unsuspected digital media and is generally used in secret communication between acknowledged parties. A good approach to steganography must provide good visual quality, high embedding capacity and security. In this paper, a new data hiding scheme based on octagon shaped shells is proposed to obtain better image quality and higher embedding capacity...
Turbo Convolutional Codes (TCC) are widely used to reduce Bit Error Rate (BER) for Second Generation (2G) and Third Generation (3G) wireless networks. However, TCC require large decoding complexity. Recently, Low Density Parity Check Codes (LDPC) have been included in standards for 3G wireless networks. But encoding complexity of LDPC is larger than that of TCC. Modified Turbo codes (MTC) are low...
This paper proposes a new class of Turbo type codes referred to as Improved Low Complexity Hybrid Turbo Codes (ILCHTC). For low Bit Energy to Noise Ratio (Eb/No)ILCHTC shows better convergence of errors than that of Low Complexity Hybrid Turbo Code (LCHTC). Simulation results show that ILCHTC achieves Bit Error Rate (BER) of 10-5 at Eb/No of 1.9 dB, which is 0.4 dB more than that for Turbo Convolutional...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.