ABSTRACT: Internet-of-Things (IoT) devices are increasingly being found in civilization and military contexts, ranging from smart cities and the smart grid to Internet-of-Medical-Things, Internet-of-Vehicles, Internet-of-Military-Things, Internet-of-Battlefield-Things, and so forth. Mention the various number of observations, including the lack of publically accessible IoT datasets that can be utilized by the exploration and specialist networks. Given the […]
.NET MINI PROJECTS
SC02-Semantic-based Compound Keyword Search over Encrypted Cloud Data
ABSTRACT: Keyword search over encrypted data is essential for getting to outsourced sensitive data in cloud computing. In some conditions, the keywords that the client searches on are only semantically identified with the data instead of by means of a correct or fuzzy match. Subsequently, semantic-based keyword search over scrambled cloud data becomes of paramount importance. […]
SC01-Scheduling Inter-Datacenter Video Flows for Cost Efficiency-service computing
ABSTRACT: As video streaming applications are deployed on the cloud, cloud providers are charged by ISPs for inter-data center transfers under the dominant percentile-based charging models. In order to minimize the payment costs, existing works expect to keep the traffic on each link under the charging volume. Be that as it may, these strategies can’t […]
IP05-Robust and Fast Decoding of High-Capacity Color QR Codes for Mobile Applications
ABSTRACT: Colour brings extra data capacity with regards to QR codes, however, it likewise conveys tremendous challenges to the decoding because of color interface and illumination variation, particularly for high-density QR codes. In this project, we put forth a system for high-capacity QR codes, HiQ, which optimizes the decoding algorithm for high-density QR codes to […]
IP03-Robust Foreground Estimation via Structured Gaussian Scale Mixture Modeling
ABSTRACT: Recovering the background and foreground area parts from video frames has important applications in video observation. Under the assumption that the background parts are stationary and the foreground is spare, the most part of existing techniques depend on the system of robust principal components analysis (RPCA), i.e., modeling the background and foreground parts as a […]
IP04-Robust Coverless Image Steganography based on DCT and LDA Topic Classification
ABSTRACT: So as to enhance the robustness and capability removing steganalysis, a novel coverless steganography algorithm based on Discrete Cosine Transform and Latent Dirichlet Allocation point classification is proposed. Firstly, the LDA point model is used for characterizing the image database. Also, the images have a place with one topic are chosen, and 8×8 block DCT […]
IP02-Spatial and Motion Saliency Prediction Method using Eye Tracker Data for Video Summarization
ABSTRACT: Video summarization is the procedure to extract the most significant contents of a video and to represent it concise form. The existing strategies for video summarization couldn’t achieve the satisfactory result for a video with camera movement, and critical illumination changes. To tackle these issues, in this project new system for video summarization is proposed […]
CC17-Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras
ABSTRACT: There has been a tremendous development in the amount of visual data available on the Internet in recent years. One kind the of visual data particular interest is produced by network cameras giving real-time views. Millions of network cameras around the world continuously stream information to viewers connect with the Internet. This information might be […]
IP01-Separable and Reversible Data Hiding in Encrypted Images using Parametric Binary Tree Labeling
ABSTRACT: This project presents a parametric binary tree labeling scheme (PBTL) to label image pixels in two different classes. Utilizing PBTL, a data embedding technique (PBTL-DE) is proposed to enhance proposed data to an image by exploiting spatial redundancy within small image blocks. We at that point apply PBTL-DE into the encrypted domain and propose […]
CC16-Efficient Traceable Authorization Search System for Secure Cloud Storage
ABSTRACT: Secure search over encrypted remote information is crucial in cloud computing to guarantee the data privacy and usability. To prevent unauthorized data utilization, fine-grained access to control is essential in the multi-client system. However, the authorized client may initially leak the secret key for financial benefit. Consequently, tracing and revoking the malicious client who […]