![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Comparison Based Analysis and Prediction for Earlier Detection of Breast Cancer Using Different Supervised ML Approach
Breast cancer is one of the most leading diseases in women which leads to an increase in the mortality rate unexpectedly. The tremendous growth of breast cells forms tumors that sense as lumps. Generally, two ...
-
Chapter and Conference Paper
Randomised Key Selection and Encryption of Plaintext Using Large Primes
Study of ciphertext plays a major role in Cryptanalysis. Functionally correct realization of a cryptosystem does not ensure the confidentiality of message always. Most classical cryptosystem are not quantum se...
-
Chapter and Conference Paper
Automated Glaucoma Detection of Medical Image Using Biogeography Based Optimization
Gradual vision loss is an important challenging issue in medical imaging system. When optic nerve is damaged, vision loss and blindness introduced as a result known as glaucoma. So, eye pressure measurement is...
-
Chapter and Conference Paper
Audio File Digitization and Encryption Using ASCII Conversion
Audio File encryption is an advance encryption technique in real world. It is basically a technique of hybridization, combination of transformation and cryptography. To send message securely inside noisy chann...
-
Chapter
Computational Proteomics
Mass Spectrometry (MS) based high throughput proteomics generates huge amount of data, which necessitates the use of computational tools and statistical software for interpreting their biological significance....
-
Chapter and Conference Paper
Compact, Multi-band Microstrip Antenna with High Gain
In this paper, theoretical investigations of a printed microstrip antenna, using coaxial probe feed method is presented. The proposed antenna provides promising enhancement of gain. It also gives triple freque...
-
Chapter and Conference Paper
A Huffman Code Based Image Steganography Technique
We present here a novel steganographic method based on Huffman coding and the least significant bit substitution in order to provide high embedding capacity, a strong security and imperceptible visual quality ...
-
Chapter and Conference Paper
Image Secret Sharing in Stego-Images with Authentication
Recently, a polynomial-based (t,n) image sharing and hiding schemes with authentication was proposed to hid n shares of a secret image into n ordinary cover images and form n stego-images that can be transmitt...
-
Chapter and Conference Paper
An Image Authentication Technique in Frequency Domain Using Secure Hash Algorithm (FDSHA)
The demand of security is getting higher in these days due to the development of computers and Internet. In this paper, we proposed a novel image authentication scheme in frequency domain using SHA-1 that allo...