ABSTRACT: Video summarization is the procedure to extract the most significant contents of a video and to represent it concise form. The existing strategies for video summarization couldn’t achieve the satisfactory result for a video with camera movement, and critical illumination changes. To tackle these issues, in this project new system for video summarization is proposed […]
.NET MINI PROJECTS
CC17-Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras
ABSTRACT: There has been a tremendous development in the amount of visual data available on the Internet in recent years. One kind the of visual data particular interest is produced by network cameras giving real-time views. Millions of network cameras around the world continuously stream information to viewers connect with the Internet. This information might be […]
IP01-Separable and Reversible Data Hiding in Encrypted Images using Parametric Binary Tree Labeling
ABSTRACT: This project presents a parametric binary tree labeling scheme (PBTL) to label image pixels in two different classes. Utilizing PBTL, a data embedding technique (PBTL-DE) is proposed to enhance proposed data to an image by exploiting spatial redundancy within small image blocks. We at that point apply PBTL-DE into the encrypted domain and propose […]
CC16-Efficient Traceable Authorization Search System for Secure Cloud Storage
ABSTRACT: Secure search over encrypted remote information is crucial in cloud computing to guarantee the data privacy and usability. To prevent unauthorized data utilization, fine-grained access to control is essential in the multi-client system. However, the authorized client may initially leak the secret key for financial benefit. Consequently, tracing and revoking the malicious client who […]
CC15-A New Lightweight Symmetric Searchable Encryption Scheme for String Identification
ABSTRACT: In this project, we give an efficient and simple-to-implement symmetric searchable encryption scheme (SSE) for string search, which takes one round of communication, O(n) times of calculations over n documents. Not at all like previous scheme, we utilize hash-chaining rather than the chain of encryption tasks for an index generation, which makes it reasonable […]
CC14-Disaggregated Cloud Memory with Elastic Block Management
ABSTRACT: With the growing importance of in-memory data processing, cloud service providers have launched large memory virtual machine services to accommodate memory-intensive workloads. Such large memory services utilizing low volume scaled-up machines are far less cost-proficient than scaled-out services consisting of high volume commodity servers. By exploiting memory utilization imbalance across over cloud nodes, disaggregated […]
CC13-Provably secure and lightweight identity-based authenticated data sharing protocol for the cyber-physical cloud environment
ABSTRACT: Secure and efficient file storage and sharing by means of authenticated physical devices remain challenging to accomplish in a cyber-physical cloud environment, especially because of the diversity of devices used to get to the services and data. In this manner in this project, we exhibit a lightweight identity based authenticated data sharing protocol to […]
CC11-SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud
ABSTRACT: The Personal Health Record (PHR) is an emerging framework of health data exchange, which is regularly stored at cloud servers. Be that as it may, there are as still different privacy problems as personal health data could be discovered to unauthorized people. To ensure the patient’s control over to their own particular PHRs, it is […]
CC12-Energy-Efficient Scheduling of Servers with Multi-Sleep Modes for Cloud Data Center
ABSTRACT: In a cloud data center, servers are always over-provisioned in an active state to meet the peak demand of requests, wasting a large amount of energy as a result. One of the options to reduce the power utilization of server farms is to diminish the quantity of sit still servers or to switch idle […]
CC10-Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage
ABSTRACT: Proof of Storage (POR or PDP) is a cryptographic tool, which enables information proprietor or third-party auditor to audit integrity of information stored remotely in a cloud storage server, without keeping a local copy of information or downloading information back during auditing. We observe that all existing publically verifiable POS plans to experience the ill effects of a serious […]