Tuesday, 19 August 2014

#IJSRD Digital Watermarking Methods in Spatial Domain and Transform Domain

#IJSRD
Digital Watermarking Methods in  Spatial Domain and Transform Domain
Abstract--- The ease of digital media modification and dissemination necessitates content protection beyond encryption. Information hidden as digital watermarks in multimedia i.e. text, image, video, audio enables protection mechanism in decrypted contents. In a way that protects from attacks several common image processing techniques are used in Spatial Domain and Transform Domain. In Spatial Domain Least Significant Bit(LSB) is used and in Transform domain Discrete Cosine Transform(DCT) & Discrete Wavelet Transform(DWT) are used. Among these DWT is best method due because of using embedded zero tree wavelet image compression scheme and high frequency sub bands.  

For More Details 
Click on Below Links :



Friday, 15 August 2014

#IJSRD advanced persistent threat (APT)


Advanced Persistent Threats (APTs) are a cybercrime category directed at business and political targets. APTs require a high degree of stealithiness over a prolonged duration of operation in order to be successful. The attack objectives therefore typically extend beyond immediate financial gain, and compromised systems continue to be of service even after key systems have been breached and initial goals reached.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students....
kindly share to all engineers...
Visit us on www.ijsrd.com

#IJSRD MOBILE PROTECTION VICTIMISATION VOICE VERIFICATION


Cellular communication business has developed leaps and bounds to become the core of day to day science. Mobile phones is that the spirit of cellular business. the quantity of mobile phones users is rising exponentially. however the privacy of user and security of mobile phones leftovers a difficult question. Theft of mobile phones has become the attention catching business for offender. There ought to be a reliable methodology of protective the instrument from thief. My paper proposes a brand new innovative, reliable, trick proof precautions for mobile phones victimization VOICE VERIFICATION. Voice verification is that the identification of a personal identity victimization speech because the spotting quality. The voice of the user is processed employing a digital gesture processor that is that the prime a part of a mobile. we have a tendency to are programming this DSP to implement this safety technique. For most a resourceful voice record of the user is formed. This record is hold on within the Flash read-only storage that is out there within the mobile. Then whenever the user speaks through the mobile phones a part of the speech sample is taken and hold on. This processed voice of the user is compared with the first folder to examine the identity of the user. If the user is allowed, he’s allowed to continue his speak. If not the transmission is cut unexpectedly by creating the DSP in inactive state. Therefore the mobile is being shielded from any extralegal user. Not with standing the mobile phones was purloined or lost it won’t be helpful for the other individual. The programmability of DSP and generality of Voice based mostly classification has given our methodology a twin advantage. Our set up demands neither external hardware nor additional price. The on top of methodology cause no hardship for the user not like this safety systems. This methodology may be adopted universally altogether models of Mobile phones and mobile phones for cover.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students….
kindly share to all engineers…
Visit us on www.ijsrd.com

Wednesday, 13 August 2014

#IJSRD Cost effective and innovative housing technology


The current paper describes how quaternions are used successfully and effectively in simulations of unmanned aerial vehicles (UAVs) and satellite motion through definition of the UAV airframe or satellite body as a rigid body. By such means the authors try to raise interest among students and scientists in the mathematical formalism of quaternions that was very popular more than 100 years ago, but was replaced by vectors and matrices. Nevertheless, quaternions benefits make them valuable in numerous tasks, among others the numerical integration of rigid body motion dynamics equations.Simulations, part of the current project, can be viewed on http://ialms.net/sim/ web address.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students....
kindly share to all engineers...
Visit us on www.ijsrd.com

Monday, 11 August 2014

#IJSRD PICTURE REGISTRATION ON FPGA PLATFORMS


Picture selection may be a computationally focused procurement inside the remedial imaging space that places stringent needs on execution and memory organization capability. This paper makes frameworks for mapping the picture selection orders on the configurable gear underneath time of time execution requests. Developing the arrangement of homogenized parameterized dataflow, that gives a profitable formal model of style and examination of supplies and workstation code for marker methodology procurements, we have a tendency to make novel procedures for identifying with and examining the fittings style house when mapping picture enlistment computations on the configurable gear. Our systems end in Associate in nursing calm framework for business off execution and configurable supplies stake use maintained the commitments of a given order. Maintained inclinations that we've got chose when applying these methods, we have a tendency to conjointly favoring a completely extraordinary development displaying that allows quickly-reconfigurable picture selection. 
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students....
kindly share to all engineers...
Visit us on www.ijsrd.com