ABSTRACT: Colour brings extra data capacity with regards to QR codes, however, it likewise conveys tremendous challenges to the decoding because of color interface and illumination variation, particularly for high-density QR codes. In this project, we put forth a system for high-capacity QR codes, HiQ, which optimizes the decoding algorithm for high-density QR codes to […]
.NET MINI PROJECTS
IP03-Robust Foreground Estimation via Structured Gaussian Scale Mixture Modeling
ABSTRACT: Recovering the background and foreground area parts from video frames has important applications in video observation. Under the assumption that the background parts are stationary and the foreground is spare, the most part of existing techniques depend on the system of robust principal components analysis (RPCA), i.e., modeling the background and foreground parts as a […]
IP04-Robust Coverless Image Steganography based on DCT and LDA Topic Classification
ABSTRACT: So as to enhance the robustness and capability removing steganalysis, a novel coverless steganography algorithm based on Discrete Cosine Transform and Latent Dirichlet Allocation point classification is proposed. Firstly, the LDA point model is used for characterizing the image database. Also, the images have a place with one topic are chosen, and 8×8 block DCT […]
IP02-Spatial and Motion Saliency Prediction Method using Eye Tracker Data for Video Summarization
ABSTRACT: Video summarization is the procedure to extract the most significant contents of a video and to represent it concise form. The existing strategies for video summarization couldn’t achieve the satisfactory result for a video with camera movement, and critical illumination changes. To tackle these issues, in this project new system for video summarization is proposed […]
CC17-Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras
ABSTRACT: There has been a tremendous development in the amount of visual data available on the Internet in recent years. One kind the of visual data particular interest is produced by network cameras giving real-time views. Millions of network cameras around the world continuously stream information to viewers connect with the Internet. This information might be […]
IP01-Separable and Reversible Data Hiding in Encrypted Images using Parametric Binary Tree Labeling
ABSTRACT: This project presents a parametric binary tree labeling scheme (PBTL) to label image pixels in two different classes. Utilizing PBTL, a data embedding technique (PBTL-DE) is proposed to enhance proposed data to an image by exploiting spatial redundancy within small image blocks. We at that point apply PBTL-DE into the encrypted domain and propose […]
CC16-Efficient Traceable Authorization Search System for Secure Cloud Storage
ABSTRACT: Secure search over encrypted remote information is crucial in cloud computing to guarantee the data privacy and usability. To prevent unauthorized data utilization, fine-grained access to control is essential in the multi-client system. However, the authorized client may initially leak the secret key for financial benefit. Consequently, tracing and revoking the malicious client who […]
CC15-A New Lightweight Symmetric Searchable Encryption Scheme for String Identification
ABSTRACT: In this project, we give an efficient and simple-to-implement symmetric searchable encryption scheme (SSE) for string search, which takes one round of communication, O(n) times of calculations over n documents. Not at all like previous scheme, we utilize hash-chaining rather than the chain of encryption tasks for an index generation, which makes it reasonable […]
CC14-Disaggregated Cloud Memory with Elastic Block Management
ABSTRACT: With the growing importance of in-memory data processing, cloud service providers have launched large memory virtual machine services to accommodate memory-intensive workloads. Such large memory services utilizing low volume scaled-up machines are far less cost-proficient than scaled-out services consisting of high volume commodity servers. By exploiting memory utilization imbalance across over cloud nodes, disaggregated […]
CC13-Provably secure and lightweight identity-based authenticated data sharing protocol for the cyber-physical cloud environment
ABSTRACT: Secure and efficient file storage and sharing by means of authenticated physical devices remain challenging to accomplish in a cyber-physical cloud environment, especially because of the diversity of devices used to get to the services and data. In this manner in this project, we exhibit a lightweight identity based authenticated data sharing protocol to […]