Srividya B.V.,DSCE |
Proceedings of International Conference on Circuits, Communication, Control and Computing, I4C 2014 | Year: 2014
Public key cryptosystem or the asymmetric crypto system is more secure than secret key method because of a pair of related keys used by both sender and receiver. The problem in most of the cryptosystem is that the plain text is considered as an integer number that leads poor security. In this paper we propose an efficient Bezier curve based public key cryptography technique over Galois field GF(pm), where p=2,3,5,7. Here the plaint text is considered as a (x, y) coordinate over curve elements. © 2014 IEEE.
Santhosh B.,DSCE |
Advances in Intelligent Systems and Computing | Year: 2016
With tremendously increasing demand for multimedia communication, it is essential to safeguard the video data from various attacks during its transmission over internet. Video encryption ensures privacy and security of the video content. For the purpose of authentication or to identify tampering if any, secret information is concealed in these encrypted videos. This paper puts forward an efficient and robust methodology for embedding the secret information directly into encrypted videos, which guarantees the confidentiality of the video content. The input video is first compressed using the popular H.264/AVC compression technique and by analyzing the properties of H.264 encoding technique, the three portions containing the sensitive data are encrypted. A standard RC4 stream cipher has been employed for encrypting the codewords of Motion vector differences, Intra prediction modes and Residual coefficients. The secret data can then be hidden by the data hider using a unique Codeword substitution technique without being aware of the video contents. Thus the technique ensures confidentiality of the video content. The hidden data can then be directly extracted by the intended authenticated receiver even without decrypting the video sequence. To validate the feasibility and the performance of the proposed work, the result metrics PSNR, SSIM and VQM have been estimated. © Springer India 2016.
Jamuna S.,DSCE |
2012 International Conference on Devices, Circuits and Systems, ICDCS 2012 | Year: 2012
Today Field Programmable Gate Arrays (FPGAs) are widely used in many applications. These FPGAs are prone to different types of faults similar to other complicated integrated circuit chips. Faults may occur due to many reasons like environmental conditions or aging of the device. The rate of occurrence of permanent faults can be quite high in emerging technologies, and hence there is a need for periodic testing of such FPGAs. The Configurable Logic Blocks (CLBs) are the main logic resources for implementing sequential as well as combinatorial circuits. Built-in self-test (BIST) is a design technique that allows a circuit to test itself. It is a set of structured-test techniques for combinational and sequential logic, memories, multipliers and other embedded logic blocks. BIST controller coordinates the operations of different blocks of the BIST. BIST controller is designed to work in different modes. Here, we introduce a new approach for FPGA testing that exploits the reprogramability of an FPGA to create the BIST logic by configuring it only during off-line testing. In this way, testability is achieved without any overhead, since the BIST logic "disappears" when the circuit is reconfigured for its normal system operation. We are implementing a restartable logic BIST controller for the configurable logic blocks in Virtex-5 FPGAs by using the resources of FPGA itself. We have used XILINX ISE12.1 for simulation and synthesis. © 2012 IEEE.
Sudir P.,SJCIT |
Advances in Intelligent Systems and Computing | Year: 2014
Proposed approach explores a new framework for Curved video text detection and extraction by utilizing fast texture descriptor LU-transform and Maximal H-Transform for the text detection. Connected Component filtering method and Nearest Neighborhood (NN) constraint is utilized for false positive elimination. B-Spline curve is fitted to centroid of each character and each oriented character is vertically aligned by finding angle that aligns the normal vector to the vertical axis. The aligned text string is fed to OCR for recognition. Experiments on various curved video data and Hua’s horizontal video text dataset shows that proposed method is efficacious and robust in detecting and recognizing multioriented videotext. © Springer International Publishing Switzerland 2015.
Siddappaji,BMS College of Engineering |
Proceedings - 2015 International Conference on Communication, Information and Computing Technology, ICCICT 2015 | Year: 2015
This paper compares the performance analysis of our proposed New Time Varying LMS (NTVLMS) algorithm with other well-known adaptive algorithms such as LMS, NLMS, RVSSLMS, NVSSLMS and TVLMS algorithm. These algorithms have been tested for their adaptive noise cancellation capabilities in the context of stationary signal corrupted by additive white Gaussian noise. The parameters Convergence rate, output SNR are used to analyse the performance. The computer simulation results show that the performance of proposed NTVLMS algorithm is better compared to the other algorithms. © 2015 IEEE.
Siddappaji,BMS College of Engineering |
2014 4th World Congress on Information and Communication Technologies, WICT 2014 | Year: 2014
This paper compares the performance analysis of our proposed New Time Varying LMS (NTVLMS) algorithm with other well-known adaptive algorithms such as LMS, NLMS, RVSSLMS and TVLMS algorithm. These algorithms have been tested for their adaptive noise cancellation capabilities in the context of Speech signals corrupted by four variants of noise signals viz White Gaussian noise, Conference noise, Engine noise and Traffic noise. Performance of these algorithms is analyzed based on output SNR. The computer simulation results show that the performance of proposed algorithm is better compared to other algorithms in White Gaussian noise Environment. For the other three noise environments, NLMS algorithm performs well. © 2014 IEEE.
Amutha S.,DSCE |
Ramesh Babu D.R.,DSCE |
Ravi Shankar M.,DSCE |
Harish Kumar N.,DSCE
ITME 2011 - Proceedings: 2011 IEEE International Symposium on IT in Medicine and Education | Year: 2011
Mammography is an effective method for breast cancer detection and breast tumor analysis. In mammography, low dose x-ray is used for imaging, due to which the images are poor in contrast and are contaminated by noise. Hence it is difficult for the radiologist to screen the mammograms for diagnostic signs such as micro calcifications and masses. This ensures the need for image enhancement to aid radiologist. In this paper we present a different algorithm for enhancement of digital mammographic images. The proposed methodology uses mathematical morphology for contrast enhancement and wavelet for denoising. The main contribution of this paper is in differentiating the edge pixels from noise. A quantitative measure of Contrast Improvement Index (CII) and Edge Preservation Index (EPI) are used to evaluate the performance of the algorithm. The algorithm has been tested on a large number of images from standard dataset, comparing the results with the state-of-the-art. By both the analytical indices and ROC analysis, the proposed algorithm shows promising results in early detection of breast cancer and diagnosis. © 2011 IEEE.
Savitha S.K.,Visvesvaraya Technological University |
Proceedings of the 2016 IEEE International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2016 | Year: 2016
Accuracy in diagnostics of life-threatening disease based on chest x-ray images is an atmost importance in healthcare sector, where medical image processing has already played a contributory role from more than a decade. In this regards, image enhancement plays a critical role in exposing more information to the foreground image of clinical importance. We have reviewed the most existing system pertaining to chest image enhancement and found that more enhancements could be done to enhance the signal quality. Therefore, we present a sophisticated algorithm that performs multiple operations for enhancing the chest x-rays. The proposed paper introduces techniques for enhancing chest x-rays using non-linear enhancement, primary enhancement, secondary enhancement algorithms on JSRT database. The proposed system shows better quality of enhanced region in comparison to the most frequently adopted techniques for medical image enhancement. © 2016 IEEE.
Christa S.,DSCE |
ACM International Conference Proceeding Series | Year: 2016
Software even though intangible should undergo evolution to fit into the ever changing real world scenarios. In this context software maintenance is an inevitable activity; further optimizing the activities related to maintenance is not possible due to the lacuna in various aspects of the pre-production phases. Since 1969, the issues raised by Lehman related to software maintenance remain the same. Each issue faced by the maintenance team directly reflects in the quality of the software product. According to the related work, very few research is going on in the field of software maintenance and still scarce when it comes to research on incident and associated ticket; a part of corrective maintenance. In depth research on incident tickets should be viewed as critical since, it provides information related to the kind of maintenance activities that is performed in any timestamp. Therefore classifying and analyzing tickets becomes a critical task in managing the operations of the service since each incident will be having a service level agreement associated with it. Further, incident analysis is essential to identify the patterns associated. Due to the existence of huge population of software in each organization and millions of incidents get reported per software product every year, it is practically impossible to manually analyze all the tickets. This paper focuses on projecting the importance of ticket analytics to maintain the quality of software products and also identifying the incidents and related tickets based on various factors which are supported by a case study from the data collected from various organizations. © 2016 ACM.
Khaiyum S.,DSCE |
2014 International Conference on Electronics and Communication Systems, ICECS 2014 | Year: 2014
Real time software systems is an integral part of each and every application domain which includes aerospace and defence, power and energy sector, medical sector, industrial automation, etc. Design and development of any software system requires time, domain expertise, tools, capital and infrastructure. Nevertheless, the software industry has been constantly improving; the percentage of software failures has also increased. This in turn has led to a major loss of capital, time, good-will, loss of information and in some cases severe failures of critical applications leading to the loss of lives. This is because, software could fail due to faults injected in various phases of software or product development life cycle starting from project initiation to deployment. This paper therefore aims to show the transformation of failures based on severity in Real-time embedded software projects through a case study. This study thus brings in awareness in the pattern of failure transformation based on their severity. This knowledge enables one to take preventive and corrective measures during the software development process such that it reduces the probability of their occurrences and further aids the developing team to provide strategies that can resolve the impact of severity of the existence failures during the development process. © 2014 IEEE.