Comparative Analysis of Image Hiding Approach in Encrypted Domain Based on Histogram Shifting Method IJTSRD
In this paper we have used an efficient algorithm for hiding secret image also called payload in different types of cover image using histogram shifting method of reversible data hiding technique. Image utilized is jpeg, bmp and tiff images. We have analyzed this algorithm in MATLAB simulation tool. In this analysis we have calculated some […]
Security Issues and the energy consumption in the optical burst switched networks IJTSRD
Optical burst switching is an optical network technology that helps in improving the use of the optical networks resources. In OCS, the network is configured to establish a circuit, from an entry to an exit node, by adjusting the optical cross connects circuits in the core routers in a manner that the data signal, in […]
Classification of Leukemia Detection in Human Blood Sample Based on Microscopic Images IJTSRD
Nowadays, the automatic specific tests such as Cytogenetics, Immunophenotyping and morphological cell classification can identify the leukemia disease by making experienced operators observing blood or bone marrow microscopic images. The early identification of Acute Lymphoblastic Leukemia ALL symptoms in patients can greatly increase the probability of recovery. When typical symptoms appear in normal blood analysis, […]
Graphical Password Authentication Using Image Segmentation for Web Based Applications IJTSRD
One of the most important topics in information security today is user authentication. User authentication is a fundamental component in most computer security contexts. It provides the basis for access control and user accountability. While there are various types of user authentication systems, alphanumeric passwords are the most common type of user authentication. They are […]
Multimodal Biometrics Authentication System using Fusion of Fingerprint and Iris IJTSRD
In the present era of information technology, there is a need to implement authentication and authorization techniques for security of resources. There are number of ways to prove authentication and authorization. But the biometric authentication beat all other techniques. Biometric techniques prove the authenticity or authorization of a human being based on his her physiological […]