Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014
Volume 2
Chapter and Conference Paper
In this paper, a bit-level secret-key block cipher system is proposed which follows the principle of substitution. The decimal equivalent of the block under consideration is is evaluated and the modulo-2 opera...
Chapter and Conference Paper
In this paper a new (2, 2) visual cryptographic technique has been proposed, where the aspect ratio and the dimension of the secrete image/share with respect to source image remains constant during the process...
Chapter and Conference Paper
In this paper an All Neighbor Directional Weighted Pixels (ANDWP) based filter has been proposed for removal of highly random valued impulse noise (RVIN). The proposed approach works in two phases. The first p...
Chapter and Conference Paper
With commercial growth of digital processing of audio signals like song, voice, speech etc the intention to make piracy of originality of the same is increasing day by day. It is a real problem of intellectual...
Chapter and Conference Paper
In this paper, a novel two-dimensional Discrete Fourier Transformation based information embedding has been proposed for color image authentication (DFTIECIA). The DFT is applied on each 2 x 2 sub-image block ...
Chapter and Conference Paper
To enhance the payload of secret data a scheme on the basis of least significant bit (LSB) substitution cascaded with pixel value differencing (PVD) has been proposed in this paper. Firstly secret bits are emb...
Chapter and Conference Paper
Embedding message into audio signal especially within songs without compromising its audible quality is one of the growing research areas. The techniques are used for different purposes in practical life. Vari...
Chapter and Conference Paper
This paper presents the technique for finding the suitable locations for building new facility areas, such as Schools, Cold Storages etc. in the given map. The maps are combination of irregular polygons. Infor...
Article
The paper presents an image/legal-document authentication and secures message transmission technique by embedding message/image/message-digest into color images. Image authentication is done by embedding messa...
Chapter and Conference Paper
In this paper a novel two-dimensional Separable Discrete Hartley Transform based invisible watermarking scheme has been proposed for color image authentication (SDHTIWCIA). Two dimensional SDHT is applied on e...
Chapter and Conference Paper
In this paper a transformed domain based gray scale image authentication/data hiding technique using Z transform (ZT) termed as ANGAFDZT, has been proposed. Z-Transform is applied on 2 x 2 mask of the source i...
Chapter and Conference Paper
This paper presents an invisible image watermarking technique in frequency domain through Z transform, with a hiding capacity of 1.5 bpB (1.5 bits per byte). Z(rejω ) is a complex variable comes fro...
Chapter and Conference Paper
Steganography is the technique of hiding confidential information within a media. In this paper a Genetic Algorithm based image authentication technique in transformed domain using haar wavelet transform is pr...
Chapter and Conference Paper
In this paper a copyright protection technique based on visual patterns (CAV) has been proposed for color image. This technique manipulates bits of color image to hide the hash of secret without embedding secr...
Chapter and Conference Paper
The two key issues related to steganography techniques are, statistical undetectability and picture quality. Image steganography takes the advantage of limited power of Human Visual System (HVS). The proposed ...
Chapter and Conference Paper
In this paper, Triple Layer Perceptron harmonized one time session key exchange and authentication (CBTLP) has been proposed based on the structural design of complete binary tree. In this proposed technique 3...
Chapter and Conference Paper
Authentication of song signal is one of the assessments to detect the originality in ease of alteration of its content. In this paper, DCT transform has been applied to song signal to extract a unique key for ...
Article
This paper proposed a fuzzy-based switching technique that aims at detection and filtering of impulse noises from digital images. Two types of noise models are used to obtain the noisy images. In this two-step...
Book and Conference Proceedings
Book and Conference Proceedings