IJCSWS-Menu
IJCSWS - Volume :04 Issue:03
Page No |
Title
|
---|
268-273 |
Image Forgery Detection Based On Local Texture Descriptors -- Ms.G.Clara Shanthi, Dr.V.Cyril Raj |
Abstract
Image forgery detection is developing as one of the major research topic among researchers in the area of image forensics. The authentication of digital image has become more important as these images can be easily manipulated by using image processing tools leading to various problems such as copyright infringement and hostile tampering to the image contents. The image forgery detection is addressed by two different types: (i) Active, (ii) Passive. Further consist of some different methods, such as Copy-Move, Image Splicing, and Retouching. In this paper, an efficient forgery detection and classification technique is proposed by three different stages. At first stage, preprocessing is carried out using bilateral filtering to remove noise. At second stage, extract unique features from forged image by using efficient feature extraction technique namely Gray Level Co-occurrence Matrices (GLCM). Finally, forged image is detected by classifying the type of image forgery using Multi Class-Support Vector Machine (SVM). The performance is analyzed using the following metrics: accuracy, sensitivity and specificity. Keywords: Image Forgery Detection, Image splicing, Image Retouching, Copy-Move, Support Vector Machine, Gray Level Co-occurrence Matrices. ![]() |
274-275 |
A Efficient Of Preservation Techniques For Maintaining H-care Records -- M.Charumathy, G.Thiyagarajan, T.Sunitha |
Abstract
PROXY RE-ENCRYPTION is a Intermediate Server that improves efficiency, reliability, economics. It Play importance role when Maintain sensitive information. Before that, major of stored information data’s, Encryption Key’s are managed by cloud provider, so it may be possible to hack the information. It is proposed that proxy—re-encryption technique , performs two level encryption before actual data store in cloud , for using this technique two server is needed one –local server, another -cloud server It proposes two Encryption key index level, privacy level. index key are managed by Cloud server because it is less secure, contains only searchable keywords, privacy key are managed by local server because it more secure only know data owner’s ,which contains all privacy information’s. Re-identification for more security is used here. A secure cloud computing based framework for big data information management in smart grids, which is called as “Smart-Frame.” The main idea of this framework is to build a hierarchical structure of cloud computing centers to provide different types of computing services for information management and big data analysis is been proposed. In addition to this structural framework, a security solution based on identity-based encryption, signature and proxy re-encryption to address critical security issues of the proposed framework is presented. Keywords: PROXY RE-ENCRYPTION,big data information management. ![]() |
276-277 |
Userfriendly Application For Visually Impared People Using Android --A.Parameshwari, L.Indu |
Abstract
Android is a resourceful invention of technology that includes applications which helps the visually impaired and blind people in functioning. Speech Recognition constructs models for the grammatical structure and uses some kind of statistical model to improve prediction. Speech is uttered in an environment of sounds, a clock ticking, Computer humming, a radio playing somewhere in the corridor, another human speaking in the background etc. this is actually called Noise, i.e., unwanted information in the speech signal. Speech Recognition identifies and filters out these noises from the speech signal. Continuous Speech, Channel Variability, Speech Variability, Speaking Style, Speed of Speech, Ambiguity are to be considered while building the speech recognition. Keywords: Continuous Speech, Channel Variability, Speech Variability, Speaking Style, Speed of Speech, Ambiguity. ![]() |
Remaining articles under review process