← Back to Archives
National Conference on Recent Trends in Engineering & Technology
NCRTET-17
📅 Date: April 2026
🏫 Organized by: Government Polytechnic College Kasaragod, Kerala
📖 Volume: VOLUME 5, SPECIAL ISSUE 1, 2018
New Secure Image Transmission Technique via Secret-Fragment-Visible Mosaic Image with Improved Visual Quality
Sudheesh KP
Combined Global And Grid Features Based Handwritten Signature Recognition And Verification Using Support Vector Machine
Thejasree M
Incrests: Incremental Short Text Summarization On Comment Streams From Social Network Services
Jaseela Mahamood
Modified GDI technique for low power and high efficient adders using 0.13μm technology
Prashanth Barla, Gourish S Hegde
Abstract
New Secure Image Transmission Technique via Secret-Fragment-Visible Mosaic Image with Improved Visual Quality
Sudheesh KP
Abstract:Image transmission is one of the important parts in our day to day life. Basically in the internet, images are transmitting for various applications, such as online personal photograph albums, confidential enterprise archives, document storage systems, medical imaging systems and military image databases etc. All these images contain some secrecy so to protect this secrecy we want to provide some techniques that makes the images secret. Mosaic image transmission is a new image transmission technique, which transforms a given large-volume secret image into a so-called secret-fragment-visible mosaic image of the same size. But there are issue related to clarity and time take for producing mosaic image is very large. Here talented techniques are designed to conduct the color transformation process so that the secret frame may be recovered nearly lossless.Here I propose a new technique for producing mosaic image and the experimental results shows good visual clarity and less time taken for producing result as compare to the conventional algorithms. Performance evaluation has been increased a in significant way. Keywords: Terms-Color transformation, data hiding, image encryption, mosaic image, secure image transmission..
Abstract
Combined Global And Grid Features Based Handwritten Signature Recognition And Verification Using Support Vector Machine
Thejasree M
Abstract– The paper presents a Hand Written Signature Recognition and Verification System based on haar wavelet transform and Support Vector Machines (SVM). Signature recognition and verification systems are existing research area in which a number of research works are there and ongoing. This paper presents a system which recognizes and verifies signatures within less time, good accuracy in a less complicated way. For feature Extraction global features and grid features are considered mainly based on the Discrete Wavelet Transform (DWT) using the haar wavelets. Recognition of signatures done using Support Vector Machines (SVM) and Artificial Neural Network (ANN) and compared with the output accuracy. The inputs are images and outputs are the name of the signer if the test input is the genuine signature otherwise shows as forged signature. The features are extracted after pre-processing of the images and Principal Component Analysis is used for global wavelet feature reduction. Support Vector Machine training for combined grid and global features gives higher accuracy than other comparable methods here. Keywords-Handwritten signature; Signature Recognition; Signature Verification; Support Vector Machine; Discrete Wavelet Transform
Abstract
Apache Cassandra-The Data Storage Framework for Hadoop
Sereena.M.V, Zahid Ansari
Abstract-The primary data storage for business applications use RDBMSs (Traditional relational databases) for 20 years. Today, another revolutionize is required because most of the applications must now scale to levels that were unbelievable just a few years ago. But scaling alone isn't enough; companies also require that their applications are always available and scattering fast. Hence Apache Cassandra is a massively scalable Distributed database (NoSQL) that allows for amazing performance at extreme data. This paper provides a brief overview of the Apache Cassandra. Keywords- Hadoop, HDFS, MapReduce, Cassandra, CQL.
Abstract
Incrests: Incremental Short Text Summarization On Comment Streams From Social Network Services
Jaseela Mahamood
Abstract: In this paper we are focusing on the problem of short text summarization on the comment stream of a specific message from social network services (SNS). The quantity of comments may increase at a high rate after a social message is published, due to the high popularity of SNS.Then users may desire to get a brief understanding of a comment stream without reading the whole comment list, we attempt to group comments with similar content together and generate a concise opinion summary for this message. Since distinct users will request the summary at any moment, existing clustering methods cannot be directly applied and cannot meet the real-time need of this application. In this paper, we model a novel incremental clustering problem for comment stream summarization on SNS. Moreover, we propose IncreSTS algorithm that can incrementally update clustering results with latest incoming comments in real time. Furthermore, we design an at-a-glance visualization interface to help users easily and rapidly get an overview summary .IncreSTS possesses the advantages of high efficiency, high scalability, and better handling outliers. Keywords-real-time short text summarization, incremental clustering, comment streams, social network services
Abstract
Video Content Analysis
Divya M B
Abstract: Video content analysis is a system which can be used for retrieving the contents inside a video and indexing the video according to that. The advances in the data capturing, storage, and communication technologies have made vast amounts of video data available to consumer and enterprise applications. However, interacting with multimedia data, and video in particular, requires more than connecting with data banks and delivering data via networks to customers' homes or offices. We still have limited tools and applications to describe, organize, and manage video data. The fundamental approach is to index video data and make it a structured media. Manually generating video content description is time consuming and thus more costly-to the point that it's almost impossible. Moreover, when available, it's subjective, inaccurate, and incomplete.We perceive a video program as a document. Video indexing should be analogous to text document indexing, where we perform a structural analysis to decompose a document into paragraphs, sentences, and words, before building indices. When someone authors a book, they create a table of contents for browsing the content's order and a semantic index of keywords and phrases for searching by content. Similarly, to Facilitate fast and accurate content access to video data, we should segment a video document into shots and scenes to compose a table of contents, and we should extract key-frames or key sequences as index entries for scenes or stories. Therefore, the core research in content-based video retrieval is developing technologies to automatically parse video, audio, and text to identify meaningful composition structure and to extract and represent content attributes of any video sources. Keywords: surveillance ,metadata,CBVR, skeletisation.
Abstract
BPN Based Rainfall Forecasting: A Review
Biju M J, Aneesha N
Abstract: Rainfall is a natural climatic phenomenon. Since the economy of India is highly dependent on agriculture , accuracy of rainfall forecasting is important. Accurate rainfall information is critical for the planning and management of water resources. Fluctuation in rainfall timing makes the rainfall prediction a challenging task. Climate and rainfall are highly nonlinear and complicated process. They required advanced computer modelling and simulation for their accurate prediction. ANN can be used to predict the behaviour of such nonlinear systems. Back propagation networks (BPN) are one of the most popular and effective model for complex and multi layered networks. This paper aims to provide a review of some methodologists employed by researchers to utilize Back Propagation based ANN for rainfall prediction. Keywords: forecasting, simulation, ANN, BPN, multilayered network.
Abstract
Image Transmission Techniques
Neena M K
Abstract: Applications of digital image processing become more common, especially as the transfer of images from one entity to another using the internet as the medium of transfer is increasing. Digital image transmission technology has found advanced applications in various areas where security is of paramount importance. Examples of such applications include medical databases and confidentiality of patient records and information's, military databases and prevention of leaking of classified materials, business databases and protection of enterprise-wide records; online document storage systems, etc.This paper reviews Digital image encryption and mosaic image transmission are two approaches to secure image transmission. Keywords-database, encryption, secure image transmission.
Abstract
Security in Multimedia Cloud Computing
Gowrimol D
Abstract: Cloud computing is a computing paradigm in which resources of the computing infrastructure are provided as services of the internet. Cloud computing permits the usage of applications without installation. It also allows the access of personal files at any computer through the Internet. Multimedia data is a group of some of the following medium: content, audio, moving image, and film. With the development of Internet multimedia computing has emerged as a technology to generate, edit, process, and search media contents, such as images, video, audio, graphics, and so on.Multimedia cloud computing has the tremendous potential but faces many challenges. A major challenge is the security of the multimedia content in the cloud. In order to keep the user data confidential against untrusted servers, various methods have been proposed. This paper conducts a survey on multimedia storage security solutions in organizations with cloud computing. This purpose of the study is to offer state of the art information to new researchers in this field multimedia cloud security. This paper explores a method which is a combination of roll based access control with advanced encryption algorithm ,signature verification to enhance security when storing text, image ,audio ,video files onto cloud server and OTP verification while accessing data stored in the cloud. Keywords: cloud security, multimedia, encryption
Abstract
Searching On Encrypted Data With The Help Of A Keyword Server
Deepu Mathew, Hima Anns Roy
Abstract:In this modern computational age every devices generating data. Processing and storing the mass amount of data become an issue. To solve this problems every one use cloud storage. Because of privacy user favor encrypted data for storing on the cloud. Searching performed on encrypted data is not like an ordinary searching. Public key encryption with keyword search is one of the traditional methods to perform the searching on encrypted data. But it is vulnerable to the offline keyword guessing attack. In this work, searching performed with the help of a keyword server which provides keywords for searching and avoids such kind of keyword guessing attacks. The keyword server acts like a trusted third person and share the keys of users with the server. Every time user uploads their data into the database, a randomly generated keyword is also stored along with that data. Public key encryption technique ECC (Elliptic Curve Cryptography) is used to perform encryption. Keywords: KGA ( Keyword Guessing Attack) Keyword Server , ECC ( Elliptic Curve Cryptography)
Abstract
Multikeyword Search Supporting Classified Sub-Dictionary Over Encrypted Cloud Data
Nayana VM
Abstract: Cloud computing is a method for delivering information technology (IT) services in which resources are retrieved from the Internet through web-based tools and applications, as opposed to a direct connection to a server. Rather than keeping files on a proprietary hard drive or local storage device, cloud-based storage makes it possible to save them to a remote database. Cloud computing is a forth coming revolution in information technology (IT) industry because of its performance , accessibility, low cost and many other luxuries. It is an approach to maximize the capacity or step up capabilities vigorously without investing in new infrastructure, nurturing new personnel or licensing new software. It provides gigantic storage for data and faster computing to customers over the internet. It essentially shifts the database and application software to the large data centers, i.e., cloud, where management of data and services may not be completely trustworthy. To keep the outsourced data more secure ,the owner of the data will encrypt the data using AES encryption method. And owner provide the service to search and use these outsourced data by other users in the cloud. But it difficult perform the search on the encrypted outsourced data, for these First, I am introduce the relevance scores and preference factors upon keywords which enable the precise keyword search and personalized user experience. Second, I develop a practical and very efficient multi-keyword search scheme. The proposed scheme can support complicated logic search the mixed "AND", "OR" and "NO" operations of keywords. Third, I further employ the classified sub-dictionaries technique to achieve better efficiency on index building, trapdoor generating and query. Through this I will achieve efficient search .
Abstract
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Seetha Das V
Abstract: Cloud computing is an internet based computing that provides shared computer processing resources and data to computers and other devices on demand. Data sharing has never been easier and less demanding to the advanced cloud computing, and the correct examination on the information gives a variety of advantages t both the society and people. Data sharing with an extensive number of participants must consider a few issues, includes efficiency, data integrity and privacy of data owner. Ring signature is a promising candidate to build an anonymous and authentic data sharing system. It allows a data owner to anonymously authenticate the data which can be stored into the cloud or analysis purpose. Identity-based (ID) ring signature is an alternative to traditional public key cryptography, based on infrastructures (PKI). In PKI have a cost consuming certificate verification which is becomes bottleneck for the solution to be scalable. So the ID based ring signature reduces the process of certificate verification. Key words: authentication, data sharing, cloud computing, forward security
Abstract
The Non-Uniform Characteristics of A Photodiode
Chandrakanta A.S, Honey Devassy
Abstract: Silicon photodiodes are semiconductor devices responsive to high energy particles and photons. Photodiodes are widely used in applications such as light intensity measurements, photography, optical position sensors, laser range finders, optical communications, and medical imaging instruments. The non-uniform characteristic of the photodiode do not affect these applications in a considerable way. In this paper, an experimental study on the non-uniformity characteristics of photodiodes is performed using a laser source. Keywords: photodiode, responsivity, non-uniformity, linearity
Abstract
Modified GDI technique for low power and high efficient adders using 0.13μm technology
Prashanth Barla, Gourish S Hegde
Abstract-Gate Diffusion Input-(GDI) is a novel technique for low power digital VLSI circuits to reduce the powerdissipation, propagation delay and transistor count thereby reducing the size and the area occupied by the circuit on the chip. The conventional GDI technique suffers from the voltage degradation problem. This paper presents a modified version of the GDI technique where a strong logic 1 as well as strong logic 0 is obtained. Using the Modified-GDI technique adders like RCA along with fast adders such as Carry Skip adder and Carry Look Ahead adders are built and simulated using 130nm technology. The results obtained for the Modified GDI based adders are compared with the conventional Complementary CMOS RCA, CSA and CLA adders. It is found that using the Modified GDI technique there is a significant (i.e. 45%) reduction in the power dissipation for basic 4-bit CLA adder, along with reduction in the transistor count and less propagation delay (i.e. 20%) in the RCA when using GDI Technique. The simulation is carried out in the Electric Software and LT-Spice VLSI EDA CAD tool with SPICE BSIM3 model file. Keywords: CMOS, GDI, M-GDI, RCA, CSA,CLA
Abstract
Wind-Solar-Hydel Cogeneration Systems in Remote Areas
Raimon P Francis, Rinil M R
Abstract: This paper proposes a control strategy for accomplishing reliable coordination of wind-solar-hydel energy conversion systems in islanded mode of operation. With this integrated scheme, it is viable to generate electrical power from inexhaustible resources in regions having favourable meteorological conditions with limited or no connectivity to grid. In this work, the control technique is formulated to utilize the available renewable energy sources in an efficacious manner to render power at almost constant voltage and frequency to the isolated load. The control strategy of this wind - solar - hydel cogeneration system is implemented by using simulation software and its effectiveness and working is demonstrated through simulation results.
Abstract
Enthalpy Wheel and its Application in Air Conditioning
Sathyanath M, Sourav R
Abstract: This paper presents about the enthalpy wheel and its application in air conditioning. Enthalpy wheels have two major applications-air dehumidification and enthalpy recovery. Control of relative humidity is an essential aspect of maintaining indoor air quality in an air-conditioned space. The enthalpy wheel dehumidifies and heats the supply air. The regeneration of desiccant is accomplished by the return air, which gets cooled and humidified. Since the operating conditions are different, heat and mass transfer behaviors in the wheels are quite different. Keywords: Enthalpy wheel; Dehumidification; Silica gel; Humidity control; Air conditioning.
