International Journal for Research in Applied Science and Engineering Technology
Digital watermarking is a technique used for the information of the images that provides security... more Digital watermarking is a technique used for the information of the images that provides security for the confidentiality. The repetitions of the multimedia objects (i.e. audio, video, text, etc.) have been protected by some of the developed digital watermarking techniques. Digital Watermarking is the process of concealing messages in digital contents in order to verify the rightful owner of the copyright protection. In this paper we have proposed a method that would assist its users to embed a watermark to the cover image based on an adaptive approach in a much robust way while maintaining the quality of the cover image. The implementation of this algorithm is based upon cascading the features of DWT and PCA using Bhattacharyya distance and Kurtosis. PCA decompose and compress the watermark, which results in better PSNR and NCC values for the tested images. The proposed algorithm uses Bhattacharyya distance and Kurtosis to detect the scaling and embedding factors making it adaptive to the input image rather than providing constant value. Also, we take one step forward by investigating the construction of feed-forward denoising convolutional neural networks (DnCNNs) to embrace the progress in very deep architecture, learning algorithm, and regularization method into image denoising. Specifically, residual learning and batch normalization are utilized to speed up the training process as well as boost the performance.
Journal of Clinical and Experimental Neuropsychology, 1999
... Nicole E. Rielly1, Charles E. Cunningham2, JoAnne E. Richards3, Heather Elbard4, and William ... more ... Nicole E. Rielly1, Charles E. Cunningham2, JoAnne E. Richards3, Heather Elbard4, and William J. Mahoney3 Departments of 1Psychology ... Longitudinal (Baker & Cantwell, 1987) and epi-demiological (Beitchman, Nair, Clegg, Fergu-son, & Patel, 1986) studies suggest that ...
International Journal of Computer Science and Engineering, 2020
In this paper we aim to securely store information into the cloud, by splitting data into several... more In this paper we aim to securely store information into the cloud, by splitting data into several chunks and storing parts of it on cloud in a manner that preserves data confidentiality, integrity and ensures availability. The rapidly increased use of cloud computing in the many organization and IT industries provides new software with low cost. Cloud computing is beneficial in terms of low cost and accessibility of data. Cloud computing gives lot of benefits with low cost and of data accessibility through Internet. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers, but these providers may be untrusted. So sharing data in secure manner while preserving data from an untrusted cloud is still a challenging issue. Our approach ensures the security and privacy of client sensitive information by storing data across single cloud, using AES, DES and RC2 algorithm.
This project focusses on developing an android application which can be used for recommending pla... more This project focusses on developing an android application which can be used for recommending places to the user based on his current GPS location. For this we use user based collaborative filtering algorithm which evaluates places based on user's current location, check-in's and preferences. Collaborative filtering algorithm is used to recommend nearest and best places to the users from the device. For the purpose of recommendation, we use a self-driven database for information of places which incorporates real-world check-in spots. Our objective is to extract information about a place and recommend user their place of interest based on their ratings and system algorithm.
Cloud computing is a new generation technology that provides a number of services with great effi... more Cloud computing is a new generation technology that provides a number of services with great efficiency and performance by removing any forms of restrictions imposed by the limitations of user’s hardware and software. However such an advanced technology comes with a risk of having loop holes in its sophisticated design that makes the system vulnerable to attacks and failure in its purpose of design. Thus security forms one of the important aspects in cloud computing. One of the most fundamental requirements in cloud computing is access control which has the paramount responsibility of providing smooth and easy access to authorized users as well as, at the same time, preventing access to any unauthorized users. Not only users but the system is also prone to insider attacks by those who are familiar with the architecture of the system. Traditional models like Mandatory access model (MAC) and Discretionary access model (DAC) may prove suitable for applications run on computer hardware ...
1-3Student, Information Technology, Xavier Institute of Engineering, Mumbai, India 4Assistant Pro... more 1-3Student, Information Technology, Xavier Institute of Engineering, Mumbai, India 4Assistant Professor, Department of Information Technology, Xavier Institute of Engineering, Mumbai, India -----------------------------------------------------------------------------***---------------------------------------------------------------------------Abstract Artificial intelligence has been a growing resource for video games for years now. Most video games, whether they’re racing games, shooting games, or strategy games, have various elements that are controlled by AI, such as the enemy bots or neutral characters. Even the ambiguous characters that don’t seem to be doing much are programmed to add more depth to the game, and to give you clues about what your next steps should be. AI in video games is a distinct subfield and differs from academic AI. It serves to improve the game-player experience rather than machine learning or decision making. During the golden age of arcade video games, ...
2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA), 2017
Chip functionality testing can greatly benefit from a Built In Self-Test (BIST). The Self-Test Us... more Chip functionality testing can greatly benefit from a Built In Self-Test (BIST). The Self-Test Using MISR and Parallel Shift Register Sequence Generator (STUMPS) architecture uses a compression technique to generate a set of test patterns, to submit them to the circuit undergoing testing, and to compare the output with that of a “gold” (known to be good circuit) by loading and comparing the contents of a Multiple Input Shift Register (MISR). We propose to use algebraic signatures as the comparison signature implemented by the MISR. As we will see, the MISR is still basically a Linear Feedback Shift Register (LFSR), but can now be made to guarantee to discover one or up to k output discrepancies, where k is a very small number that determines the length of the MISR register. The construction of the algebraic signature register is generic and only the comparison value needs to be programmed.
This paper presents a hybrid blind watermarking technique for color images based on DCT in wavele... more This paper presents a hybrid blind watermarking technique for color images based on DCT in wavelet transform. Advantages of two powerful transforms namely DCT and DWT are combined. Carrier image is first decomposed into 3 channels, namely R, G, B. Harr DWT is applied to Blue channel and HH band is selected for watermark insertion. HH band is divided into blocks of size 8×8. DCT is applied to each 8×8 sized block. Finally binary watermark bits are inserted into middle frequency coefficients by adjusting coefficients DCT(4,3) and DCT(5,2). Simulation results shows that the proposed technique is imperceptible as well as robust against wide variety of attacks like noise attacks and filtering attacks etc. It achieves PSNR as 66.26 dB and recovers watermark completely with NC value as 1. Results are compared with DCT watermarking algorithm, it is proved that hybrid watermarking results are better than implementing a single algorithm alone.
This paper presents a new blind secure video watermarking algorithm using DCT (discrete cosine tr... more This paper presents a new blind secure video watermarking algorithm using DCT (discrete cosine transform). In this proposed algorithm cover video is divided into frames and watermark is inserted into selected frames. For selected video frames two-dimensional 8×8 discrete cosine transform is carried out on luminance component. Finally binary watermark is embedded into mid frequency DC coefficients by adjusting coefficients DCT(4,3) and DCT(5,2). Experimental results shows that the proposed algorithm is imperceptible as well as robust against wide variety of signal and video processing attacks like Gaussian noise, Salt-pepper noise, Gaussian filter, Median filter, Histogram Equalization etc. The technique is fairly acceptable and watermarked video is of good quality, achieves high PSNR. The technique shows efficient extraction of watermark with NC value of the retrieved watermark as 1.
International Journal of Computer Applications, 2014
In this paper a novel blind watermarking technique for color images using DCT has been proposed. ... more In this paper a novel blind watermarking technique for color images using DCT has been proposed. Inproposed technique cover image is decomposed into 3 planes, namely R, G, B and for watermarking B plane is selected. B plane is divided into blocks of size 8×8. DCT is applied to each 8×8 sized block and middle frequency coefficients are selected for embedding watermark. Finally binary watermark is embedded into each8×8DCT block by adjusting middle frequency coefficients DCT(4,3) and DCT(5,2). Experimental results shows that the proposed technique is imperceptible as well as robust against wide variety of attacks like Gaussian noise, Salt-pepper noise, Gaussian filter, Median filter, Histogram equalization etc and achieves average PSNR as 58.90 dB. Proposed technique does not require cover image at the time of watermark extraction then too watermark is extracted completely and better than its counterparts available.
International Journal for Research in Applied Science and Engineering Technology
Digital watermarking is a technique used for the information of the images that provides security... more Digital watermarking is a technique used for the information of the images that provides security for the confidentiality. The repetitions of the multimedia objects (i.e. audio, video, text, etc.) have been protected by some of the developed digital watermarking techniques. Digital Watermarking is the process of concealing messages in digital contents in order to verify the rightful owner of the copyright protection. In this paper we have proposed a method that would assist its users to embed a watermark to the cover image based on an adaptive approach in a much robust way while maintaining the quality of the cover image. The implementation of this algorithm is based upon cascading the features of DWT and PCA using Bhattacharyya distance and Kurtosis. PCA decompose and compress the watermark, which results in better PSNR and NCC values for the tested images. The proposed algorithm uses Bhattacharyya distance and Kurtosis to detect the scaling and embedding factors making it adaptive to the input image rather than providing constant value. Also, we take one step forward by investigating the construction of feed-forward denoising convolutional neural networks (DnCNNs) to embrace the progress in very deep architecture, learning algorithm, and regularization method into image denoising. Specifically, residual learning and batch normalization are utilized to speed up the training process as well as boost the performance.
Journal of Clinical and Experimental Neuropsychology, 1999
... Nicole E. Rielly1, Charles E. Cunningham2, JoAnne E. Richards3, Heather Elbard4, and William ... more ... Nicole E. Rielly1, Charles E. Cunningham2, JoAnne E. Richards3, Heather Elbard4, and William J. Mahoney3 Departments of 1Psychology ... Longitudinal (Baker & Cantwell, 1987) and epi-demiological (Beitchman, Nair, Clegg, Fergu-son, & Patel, 1986) studies suggest that ...
International Journal of Computer Science and Engineering, 2020
In this paper we aim to securely store information into the cloud, by splitting data into several... more In this paper we aim to securely store information into the cloud, by splitting data into several chunks and storing parts of it on cloud in a manner that preserves data confidentiality, integrity and ensures availability. The rapidly increased use of cloud computing in the many organization and IT industries provides new software with low cost. Cloud computing is beneficial in terms of low cost and accessibility of data. Cloud computing gives lot of benefits with low cost and of data accessibility through Internet. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers, but these providers may be untrusted. So sharing data in secure manner while preserving data from an untrusted cloud is still a challenging issue. Our approach ensures the security and privacy of client sensitive information by storing data across single cloud, using AES, DES and RC2 algorithm.
This project focusses on developing an android application which can be used for recommending pla... more This project focusses on developing an android application which can be used for recommending places to the user based on his current GPS location. For this we use user based collaborative filtering algorithm which evaluates places based on user's current location, check-in's and preferences. Collaborative filtering algorithm is used to recommend nearest and best places to the users from the device. For the purpose of recommendation, we use a self-driven database for information of places which incorporates real-world check-in spots. Our objective is to extract information about a place and recommend user their place of interest based on their ratings and system algorithm.
Cloud computing is a new generation technology that provides a number of services with great effi... more Cloud computing is a new generation technology that provides a number of services with great efficiency and performance by removing any forms of restrictions imposed by the limitations of user’s hardware and software. However such an advanced technology comes with a risk of having loop holes in its sophisticated design that makes the system vulnerable to attacks and failure in its purpose of design. Thus security forms one of the important aspects in cloud computing. One of the most fundamental requirements in cloud computing is access control which has the paramount responsibility of providing smooth and easy access to authorized users as well as, at the same time, preventing access to any unauthorized users. Not only users but the system is also prone to insider attacks by those who are familiar with the architecture of the system. Traditional models like Mandatory access model (MAC) and Discretionary access model (DAC) may prove suitable for applications run on computer hardware ...
1-3Student, Information Technology, Xavier Institute of Engineering, Mumbai, India 4Assistant Pro... more 1-3Student, Information Technology, Xavier Institute of Engineering, Mumbai, India 4Assistant Professor, Department of Information Technology, Xavier Institute of Engineering, Mumbai, India -----------------------------------------------------------------------------***---------------------------------------------------------------------------Abstract Artificial intelligence has been a growing resource for video games for years now. Most video games, whether they’re racing games, shooting games, or strategy games, have various elements that are controlled by AI, such as the enemy bots or neutral characters. Even the ambiguous characters that don’t seem to be doing much are programmed to add more depth to the game, and to give you clues about what your next steps should be. AI in video games is a distinct subfield and differs from academic AI. It serves to improve the game-player experience rather than machine learning or decision making. During the golden age of arcade video games, ...
2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA), 2017
Chip functionality testing can greatly benefit from a Built In Self-Test (BIST). The Self-Test Us... more Chip functionality testing can greatly benefit from a Built In Self-Test (BIST). The Self-Test Using MISR and Parallel Shift Register Sequence Generator (STUMPS) architecture uses a compression technique to generate a set of test patterns, to submit them to the circuit undergoing testing, and to compare the output with that of a “gold” (known to be good circuit) by loading and comparing the contents of a Multiple Input Shift Register (MISR). We propose to use algebraic signatures as the comparison signature implemented by the MISR. As we will see, the MISR is still basically a Linear Feedback Shift Register (LFSR), but can now be made to guarantee to discover one or up to k output discrepancies, where k is a very small number that determines the length of the MISR register. The construction of the algebraic signature register is generic and only the comparison value needs to be programmed.
This paper presents a hybrid blind watermarking technique for color images based on DCT in wavele... more This paper presents a hybrid blind watermarking technique for color images based on DCT in wavelet transform. Advantages of two powerful transforms namely DCT and DWT are combined. Carrier image is first decomposed into 3 channels, namely R, G, B. Harr DWT is applied to Blue channel and HH band is selected for watermark insertion. HH band is divided into blocks of size 8×8. DCT is applied to each 8×8 sized block. Finally binary watermark bits are inserted into middle frequency coefficients by adjusting coefficients DCT(4,3) and DCT(5,2). Simulation results shows that the proposed technique is imperceptible as well as robust against wide variety of attacks like noise attacks and filtering attacks etc. It achieves PSNR as 66.26 dB and recovers watermark completely with NC value as 1. Results are compared with DCT watermarking algorithm, it is proved that hybrid watermarking results are better than implementing a single algorithm alone.
This paper presents a new blind secure video watermarking algorithm using DCT (discrete cosine tr... more This paper presents a new blind secure video watermarking algorithm using DCT (discrete cosine transform). In this proposed algorithm cover video is divided into frames and watermark is inserted into selected frames. For selected video frames two-dimensional 8×8 discrete cosine transform is carried out on luminance component. Finally binary watermark is embedded into mid frequency DC coefficients by adjusting coefficients DCT(4,3) and DCT(5,2). Experimental results shows that the proposed algorithm is imperceptible as well as robust against wide variety of signal and video processing attacks like Gaussian noise, Salt-pepper noise, Gaussian filter, Median filter, Histogram Equalization etc. The technique is fairly acceptable and watermarked video is of good quality, achieves high PSNR. The technique shows efficient extraction of watermark with NC value of the retrieved watermark as 1.
International Journal of Computer Applications, 2014
In this paper a novel blind watermarking technique for color images using DCT has been proposed. ... more In this paper a novel blind watermarking technique for color images using DCT has been proposed. Inproposed technique cover image is decomposed into 3 planes, namely R, G, B and for watermarking B plane is selected. B plane is divided into blocks of size 8×8. DCT is applied to each 8×8 sized block and middle frequency coefficients are selected for embedding watermark. Finally binary watermark is embedded into each8×8DCT block by adjusting middle frequency coefficients DCT(4,3) and DCT(5,2). Experimental results shows that the proposed technique is imperceptible as well as robust against wide variety of attacks like Gaussian noise, Salt-pepper noise, Gaussian filter, Median filter, Histogram equalization etc and achieves average PSNR as 58.90 dB. Proposed technique does not require cover image at the time of watermark extraction then too watermark is extracted completely and better than its counterparts available.
Uploads
Papers by Jaya Jeswani