Manuscripts

Recent Papers

Hiding Information in Encrypted Video Stream by Using Code word Technique

To preserving the privacy as well as maintain security of video it needs to be stored in an encrypted format. For copyright protection, access control and transaction tracking we use information hiding techniques, that can be embedded a secret message and secret image into a video bit stream. The quality of video in the absence of the original reference assesses by information hiding techniques. The edge quality information and the no of the bit streams processed in an encrypted format to maintain security as well as privacy. In this paper hiding information directly in the encrypted version of H.264/AVC video stream is proposed. The proposed scheme contains the three main parts, i.e. encryption of video, embedding secret message and extraction of secret message and video. After analyzing the H.264/AVC codec property, the code words of intra prediction modes (IPM), the code words of motion vector differences (MVD), and the code words of residual coefficients are encrypted. The data hider embeds additional data in the encrypted domain, they use the code word substitution technique. The code word substitution technique gives information without knowing the original video content. After decryption of video secret message remains hidden, its invisible to a human observer. The extraction of data can be done either in the encrypted or in the decrypted domain.

Published by: Gote Yogita Ram, Prof. Ashruba Korde

Author: Gote Yogita Ram

Paper ID: V3I3-1539

Paper Status: published

Published: June 15, 2017

Full Details

Design and Analysis of Composite Tank with End Domes

The work is aims to establish an optimal design method of vacuum molded composite tank under internal pressure specifically for storage of LPG. In this geodesic path equation was used to calculate the variable thickness of the dome portions, instead of constant thickness throughout the structures. The head shape is obtained by the numerical solution of the elliptical integral. The finite element analysis was performed to identity of safest design cylindrical and dome portion of the structure. The stagnation of fiber matrix composite leads to the variable thickness dome. The experimental test of leak proof and the pressure test also carried out and the results also investigated.

Published by: Ramesh Kumar .M, S. Raja

Author: Ramesh Kumar .M

Paper ID: V3I3-1534

Paper Status: published

Published: June 15, 2017

Full Details

Designing and Performance Evaluation of a 3-Level Watermarking Based On Encryption and Compression

As the mobile handheld gadgets geared up with fingerprint sensors, it turns out to be important to protect the private records of a user (i.e., fingerprint image) in the remote applications. Virtual image watermarking is the process of hiding statistics in any shape (text, image, audio and video) in original image without degrading its visual quality. Watermarking is carried out for copyright protection of the authentic records. In this work, we have introduced a new concept with current gray-scale image watermarking strategies. The novelty of the method is that first we have compressed the cover image with the usage of wavelet compression method before going for the encryption of the same. After that we have encrypted the cover and watermark image that is based on random key array generation, the usage of consumer key, a few constants and fixed operations. The mixture of all 3 steps collectively made the proposed approach extra robust and more secure in term of watermarking as compression itself is pretty endorsed for facts transfer and information protection. Also, watermark is extracted with reverse application of the same steps. Some output parameters are also calculated to reveal the accuracy and robustness of proposed method. Those parameters are Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR) and Correlation value between unique watermark image and extracted watermark image. The PSNR, MSE and Correlation values imply that the visual similarity of the signed and attacked images is right. Additionally, we've computed the behavior by clubbing the same watermark with different Cover images in terms of MSE, PSNR and Correlation Value and analyze the difference between authentic watermark and extracted watermark. The embedding algorithm is robust against common image processing operations. It is concluded that proposed algorithm is agreeably optimized, robust and show the development over different comparable said strategies.

Published by: Kirtika Gupta, C. S. Rai

Author: Kirtika Gupta

Paper ID: V3I3-1536

Paper Status: published

Published: June 15, 2017

Full Details

Literature Review on Sugar Mill Coupling and It`s Bearing Materials

In sugar mill power from driver to top roller is transmitted by solid shaft coupling. After that development is power transmission mechanism lead to improve is crushing efficiency. In this literature serve is done on the all most on coupling development is study. For the latest coupling called as rope coupling with spherical plain bush required selection of bushing material. Non-metallic bushing material is study and by Appling AHP method material is sleeted Keywords— Sugar Mill, AHP, Link coupling, Nylon impregnated with 6% of oil, PEEK.

Published by: Vinod P. Hage, A. U. Gandigude, G. Iratkar

Author: Vinod P. Hage

Paper ID: V3I3-1546

Paper Status: published

Published: June 15, 2017

Full Details

IOT Based Waste Management System for Smart Cities

In the Present Scenario we have seen that there are different waste boxes and over-weight trash cans in the urban gatherings and the area territories that are flooding an immediate aftereffect of wealth waste. It might prompt to a few issue and physical pain to the comprehensive group that take in the foul to stay away from such circumstance we are expecting to Design an IOT Base Waste Management structure to make our city neat and clean. In this research work we are making the correct precision level based and E-mail caution based framework giving quick chance of agreeable waste. To execute this framework, the running with sections, for example, 1) ARM Processor 2) IR sensors 3) RF Module can be utilized. We are giving in this idea on the off chance that we need to make a city clean, by then nature and the comprehensive group must be smart. So we are utilizing smart watches, Smart Phones and other Digital Display Devices to make the city clean.

Published by: Akhil Nair .R, Dr. P. Valarmathie

Author: Akhil Nair .R

Paper ID: V3I3-1545

Paper Status: published

Published: June 15, 2017

Full Details

Seclusion, Categorization and Molecular Documentation of Microorganisms from Intestine of Gut from Fish by Using 16s R DNA Sequencing

The genomic DNA sequence of an organism specifies the features of its vender, but knowing this string of letters by no means tells you the exact Mother Nature of the conforming organism. This present study deals with to Isolation, characterization and molecular identification of Microorganisms from Intestine of Gut from fish by using 16DNA Sequencing. Bacterial strain was isolated and characterized using various biochemical tests and confirmed through molecular approach. Bacterial 16S r DNA gene was amplified using suitable primers. The amplified 16S r DNA gene sequence was compared with the sequence in NCBI sequence database and Phylogenetic and molecular evolutionary analyses were conducted using 16S r DNA sequencing. There are different organisms were isolated and identified the three of its bacillus spand remaining one is Pseudomonas sp. Bacillus sp. is a gram positive, oval shaped bacteria which forms white raised irregular colony. The Pseudomonas is a gram negative aerobic gammaproteo bacteria. The sequence when submitted to NCBI gene bank database using BLAST showed 99 – 100% maximum identityand query coverage.

Published by: R. Senthil Malar, Dr. A. Kumaraswamy, Dr. T. Selvamohan, N. K Parameswaran

Author: R. Senthil Malar

Paper ID: V3I3-1456

Paper Status: published

Published: June 15, 2017

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X