0% found this document useful (0 votes)
193 views24 pages

Modeling and Analysis of Echo Data Hiding: Abstract

This document summarizes a paper that proposes using Wi-Fi technology in agriculture. It discusses how wireless sensor technologies can be applied to help agricultural development. Specifically, Wi-Fi allows portable computers to connect to wired networks without cables, which could enable monitoring soil conditions, detecting pests or diseases, and automating irrigation in agricultural fields from mobile devices. The paper presents an overview of applying recent wireless sensor technologies to help improve farming practices and operations.

Uploaded by

nirmalrajj
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
193 views24 pages

Modeling and Analysis of Echo Data Hiding: Abstract

This document summarizes a paper that proposes using Wi-Fi technology in agriculture. It discusses how wireless sensor technologies can be applied to help agricultural development. Specifically, Wi-Fi allows portable computers to connect to wired networks without cables, which could enable monitoring soil conditions, detecting pests or diseases, and automating irrigation in agricultural fields from mobile devices. The paper presents an overview of applying recent wireless sensor technologies to help improve farming practices and operations.

Uploaded by

nirmalrajj
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

Modeling And Analysis Of Echo Data Hiding

J.Vinodh- IV Year / B.E – RMK ENGINEERING COLLEGE


Abstract:
For years, people have devised different techniques for encrypting data while others
have attempted to break these encrypted codes. For our project we decided to put our wealth of
DSP knowledge to use in the art of steganography. Steganography is a technique that allows one
to hide binary data within an audio or image without adding noticeable changes. In this paper
we propose a superior approach for hiding data in the form of echoes to an audio signal. Digital
signal-processing techniques are used to place information containing ones and zeros into audio
signal by the introduction of synthetic resonances in the form of closely spaced echoes. These
echoes vary with respect to the information content . This method produces minimal
objectionable degradation of the original signal there by conceiving the presence of information
in the audio signal. In order to prove the transparency and robustness of our approach we
compared echo encoded signal with a signal encoded with usual steganographic encryption and
the results prove that the proposed approach causes less distortion to the audio signal.
A DATA MINING APPROACH FOR ON TIME DETECTION
OF SPYWARE THREAT

K.Yamini S.Sivapriyadarshini
[email protected] [email protected]
Ph: 9962990500 Ph: 9094042563
III rd Year
Department of Computer Science and Engineering
Sri Sai ram Engineering College, Chennai-600044

ABSTRACT:

Spyware is a kind of software that secretly monitors the user's activities. Spyware
programs can collect various types of personal information, such as user password, credit card
number, Internet surfing habits and sites that have been visited. There are various predefined
pattern based detection systems that detect a range of possible spywares. But they are not aware
of newly generated patterns and therefore not able to detect spyware accurately. In this paper,
we propose a data mining approach to detect spywares that can intrude into a system. We train
classifiers that are capable of classifying malicious code from legitimate code. A small training
set can be employed to detect spyware instead of large warehouses of collected signatures. This
training set grows with experience. When a new spyware pattern is identified by the classifier, it
is included in the spyware class. This is proved to be efficient in future searches as it takes less
time to classify the same pattern when encountered next time. The detection process is done
prior to the storage of any kind of file in the system. The webpages downloaded by the system
are also checked for threats. This process is performed by using association rule based
classifiers. The contents of the downloaded pages are scanned for spyware patterns. All these
processes ensure that the user information collected by any source reaches only the reliable
destination.
VISUAL CRYPTOGRAPHIC METHOD FOR SMALLER PIXEL
EXPANSION IN RIVC SCHEME

A.ARAVIND and T.ARAVIND , Final Year, Panimalar Engineering College, Chennai.

Abstract-

Visual cryptography (VC) is a method for protecting image-based secrets that has a
computation-free decoding process. In general, there are two important parameters for a VC
scheme: 1) the pixel expansion, which refers to the number of pixels in a share used to encode a
pixel of the secret image and 2) the contrast, which is the luminance difference between black
and white pixels in the reconstructed image. For a VC scheme, a smaller pixel expansion
benefits the printing out and storage of shares and a high contrast makes the revealed secret
easier to recognize by the unaided eye. The method suggested in this paper is to have a smaller
pixel expansion in RIVC(Region Incrementing Visual Cryptography).It is achieved by using the
random grid method.
.
PARASITIC COMPUTING
- A novel approach to producing efficient systems
By
Beryl. G , Ganesh Babu. T
Third year CSE Department
SSN College of Engineering , Chennai
Abstract:

A `parasitic computer' is a realization of an abstract machine for a distributed computer that is


built upon standard Internet communication protocols. Throughout this paper, We illustrates the
basic underlying concepts of parasitic computing by demonstrating with the sample NP-complete
problem and then We came to the conclusion by presenting our new approach to make this
parasitic computing to be more efficient.
Design Of Embedded Web Server Based Wireless Sensor Networks
V. BHARATHI (final year),
ECE Department,Velammal Engineering college,
Chennai - 66.

Abstract—This paper presents an implementation o f a platform independent embedded web server and its integration into
wireless sensor nodes. The embedded web server is designed and built as an expansion module for one of the nodes in the w
network (WSN). It allows authorized Internet users to establish two-way communication with the sensor network. The serv
available hardware resources implement an interface to the WSN node and to serve dynamic HTML pages to the remote us
the user to monitor the operation of the WSN remotely, to periodically download the sensed data, and control the operatio
network through email alerts. In addition to providing monitoring and data collection services, the embedded web server ca
email alerts about critical issues in the WSN.
ATM Security Using Image Verification and Password
Authentication via GSM
Bodi Geethanand.B, Manikandan.S
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Sri Ramanujar Engineering College, Anna University
Chennai-600048, India
ABSTRACT:
The main aim of our paper is to prevent malfunctions or any illicit transactions that
occurs due to entry of any unauthorized persons. Nowadays ATM cards are misused by
other persons, and also we have to use multiple ATM cards for different banks and
password may be forgot, and the main drawback in the existing system is that the user
should carry their ATM cards and password should be remembered. So, to overcome this
disadvantage, we design a system in which the password is generated in mobile and
transmitted to ATM through GSM.
The camera in the ATM machine will capture the user’s image & compares it
with the user image in the server using MATLAB. Only when the image matches the
picture (password) is transferred to the ATM through GSM. Otherwise the process is
terminated.
MOBILE BANKING USING NETWORK WITHOUT WEB
BY
1)K.SUGANTHI(65)
SAI RAM COLLEGE OF ENGINEERING.

2)K.PRIYADARSINI(67)
JERUSALEM COLLEGE OF ENGINEERING

ABSTRACT
The financial services sector has experienced major changes during the last decade.
Among others, the technological development has reshaped the consumption of
financial services. Banking especially has undergone changes unprecedented in its
history. Understanding consumers, customer needs and values has become more
important for financial institutions, not only due to the changing environment but
also because of changed customer behaviour. The fundamental nature of grocery
shopping makes it an interesting domain for intelligent mobile assistants. Even
though the central role of shopping lists is widely recognized, relatively little
attention has been paid to facilitating shopping list creation and management. In
this paper we introduce a predictive text input technique that is based on association
rules and item frequencies. We also describe an interface design for integrating the
predictive text input with a web-based mobile shopping assistant. In a user study we
compared two interfaces, one with text input support and one without. Our results
indicate that, even though shopping list entries are typically short, our technique
makes text input significantly faster, decreases typing error rates and increases
overall user satisfaction. M-commerce can be termed as 'transacting on the cell
phone'. Right now, there are two modes to avail m-commerce facilities: First,
through a service that enables you link your mobile phone with your credit card
without using any software, & subsequently transact on the internet, through cal
centers or over SMS. Second is to have a java or SIM card client-based service that
allow either credit or debit cards to be used via the mobile phone, when making the
transactions at shops. New software is being introduced to make shopping through
the cell phone even simpler. For instance, with mCheck, you can link your
MasterCard/Visa credit card and create your own mCheckPIN. Subsequently, you
only have to enter the mCheckPIN on your mobile phone to authorize and complete
a transaction.
AGRICULTURE

(Wi-Fi in Agriculture)

Presented by

N.Vijayalakshmi

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

SRM VALLIAMMAI ENGINEERING COLLEGE

Chennai.
ABSTRACT: This paper presents an overview on recent development of wireless sensor
technologies and how it can be used for agricultural development.WI-FI (Wide Fidelity) is a
wireless communication technology that can provide connections between portable computers
and wired connections to the Internet.Examples of wireless sensors and sensor networks applied
in agriculture and food production for environmental monitoring, precision agriculture, M2M-
based machine and process control, building and facility automation and RFID-based traceability
systems are given.
NANO BIO COMPUTING – SYNTHESIS OF A NANO BIO
COMPUTER USING DNA AND NANOROBOTS
S.Vignesh
R.Vinayagam
B.Tech Information Technology
St.Joseph’s College of Engineering
Chennai.
ABSTRACT
1) The paper is on interfacing nanotechnology with bio technology and electronics to
result a nano bio computer.
2) This technology will be capable of replacing the present generation laptops.
3) DNA is used as a memory storage medium instead of hard disks.
Data’s are encoded and decoded in DNA strand by converting the text message to DNA
language (a, c, g, t).
4) The invention of nano processor which is eco friendly too has helped our way to
design this nano computer.
5) The processing unit consists of nano processors and nanorobots are made to carry
the signals from one unit to another.
SECURE COMMUNICATION BASED ON QUANTUM KEY
DISTRIBUTION USING CENTRAL AUTHORITY
(SECOQC)

B.Bhuvaneswaran, M P.Karthikeyan

S.A.Engineering College,
Chennai-77.
ABSTRACT:

Quantum Key Distribution (QKD), uses quantum mechanics to guarantee secure


communication. It enables two parties to produce a shared random bit string known only
to them, which can be used as a key to encrypt and decrypt messages. An important and
unique property of quantum cryptography is the ability of two communicating users to
detect the presence of any third party trying to gain knowledge of the key. A third party
trying to eavesdrop on the key must in some way measure it, thus introducing detectable
anomalies. The algorithm most commonly associated with QKD is the  one-time pad, as
it is provably secure when used with a secret, random key Our paper presents a even
more secure key distribution scheme using a central authority in Quantum Key
Distribution.

MUTHAYAMMAL ENGINEERING COLLEGE

RASIPURAM, NAMAKKAL

NEURAL NETWORK ARCHITECTURE


FOR
RECOGNITION OF RUNNING HANDWRITING

Presented by
G.KALIESWARAN
KRISH.A.THAYAPPAN
B.E – CSE
FINAL YEAR.
ABSTRACT
Handwriting recognition has been a problem that computers are not efficient at.
This is obviously due to the varying writing styles that exist. Today, efficient handwriting
recognition is limited to ones, using hardware like light pens wherein the strokes are
directly detected and the character is recognized. But if you want to convert a
handwritten document to digital text, we have to extract the characters and then
recognize the extracted character. But the problem with this approach is that there are not
many algorithms that could efficiently extract characters from a sentence. Therefore
character recognition using software is still not as efficient as it could be.
In this paper, we suggest the design of a software which could do this job of
translating handwritten text to digital text. We propose a new approach using which
the problem of recognizing handwritten text can be solved. We also provide the
implementation details of this software. For the implementation of our idea, we
propose a new Neural Network Architecture, which is a modifiedversion of the
conventional Back Propagation Network.
The technique adopted by the Lexical analysers used in Compilers guided and
stimulated us to design this paper. Details regarding the automatic preprocessing that
would be essential and the shortcomings are also included in the paper

SECURE COMMUNICATION BASED ON QUANTUM KEY DISTRIBUTION USING CENTRAL


AUTHORITY
(SECOQC)
B.Bhuvaneswaran, M P.Karthikeyan
[email protected], [email protected],
Ph: 9952079946, Ph: 9444987603,
S.A.Engineering College, S.A.Engineering College,
Chennai-77. Chennai-77.
ABSTRACT:

Quantum Key Distribution (QKD), uses quantum mechanics to guarantee secure


communication. It enables two parties to produce a shared random bit string known only
to them, which can be used as a key to encrypt and decrypt messages. An important and
unique property of quantum cryptography is the ability of two communicating users to
detect the presence of any third party trying to gain knowledge of the key. A third party
trying to eavesdrop on the key must in some way measure it, thus introducing detectable
anomalies. The algorithm most commonly associated with QKD is the  one-time pad, as
it is provably secure when used with a secret, random key Our paper presents a even
more secure key distribution scheme using a central authority in Quantum Key
Distribution.
Hybrid Intrusion Detection with Weighted Signature Generation Over
Anomalous Internet Episodes

R.Nikitha ,AL.Periyanayagi
Velammal Engineering College
Abstract—This paper reports the design principles and evaluation results of a new
experimental hybrid intrusion detection system (HIDS). This hybrid system combines the
advantages of low false-positive rate of signature-based intrusion detection system (IDS) and the
ability of anomaly detection system (ADS) to detect novel unknown attacks. By mining
anomalous traffic episodes from Internet connections, we build an ADS that detects anomalies
beyond the capabilities of signature-based SNORT or Bro systems. A weighted signature
generation scheme is developed to integrate ADS with SNORT by extracting signatures from
anomalies detected. HIDS extracts signatures from the output of ADS and adds them into the
SNORT signature database for fast and accurate intrusion detections.
Velammal college of engg & tech
madurai

ROBOTIC CHESS
“A ROBOTIC ARM BASED CHESSBOARD FOR
VISUALLY CHALLENGED”

PRESENTED BY
M.DINESH & S.KAVIN
PRE FINAL YEAR (MECHANICAL ENGG)
ABSTRACT

“Equal opportunity is good, but special privilege is better”, thus the visually challenged people are the
most unfortunate people who bare darkness throughout their life time. Chess is a mind game that goes beyond sight.
Perhaps the only universal game that the visually challenged can play against sighted persons on an equal footing. In
the conventional boards present today the visually challenged need to ‘see’ through ‘touch’. ROBOTIC CHESS is an
electronic, robotic hand based chessboard that makes the game played easier and quicker. The main feature of this
project includes Coin movement and cancellation using special keyboard input, coin identification using bar code
technique and move identification using speech recognition. A simple programmable robotic arm is utilized in doing
the necessary actions commanded by the user. The special 4*4 keyboard containing A to H and 1 to 8, is used in
giving the inputs by the visually challenged for conveying the movement(as trained),which is sensed by the
microcontroller which in turn would process it and makes the robotic arm to do the corresponding action. In the coin
identification process where the position of his own or opponent’s coin can also be identified by giving the speech
input as trained during the training sessions which is recognized by the microcontroller and fed to the voice
enhancer, the output of which is fed to the headphone of each player. Thus the move is made audible to both the
players. The moves are heard in the same order irrespective of the player, be it player one or two, i.e., from a1 to h8.
In an International level no visually challenged has ever won a game against a normal person. Playing on ROBOTIC
CHESS the history is expected to turn on.

Integrated Drunken Driving Prevention System


P.Vignesh
B.Tech – Information Technology
Veltech Hightech Dr.RR Dr.SR Engg College
Chennai

Abstract: As is needless to say, a majority of accidents occur due to drunken driving. Here we
have designed an integrated system to prevent this. Alcohol content in the driver’s body is detected
by means of an infrared breath analyzer placed at the steering wheel. An infrared cell directs
infrared energy through the sample and any unabsorbed energy at the other side is detected. The
higher the concentration of ethanol, the more infrared absorption occurs. Thus the alcohol level of
the driver is continuously monitored and calibrated on a scale. When it exceeds a particular limit
the fuel supply is cutoff. If the device is removed also, the fuel supply will be automatically cut off
or an alarm is sounded depending upon the requirement. This does not happen abruptly and
special indicators are fixed at the back to avoid inconvenience to other drivers using the highway
signals. Frame work for integration of sensors and control module in a scalable multi-agent
system is provided. A SMS which contains the current GPS location of the vehicle is sent via a
GSM module to the police control room to alert the police.
An Intelligent GSM Enabled Robot to Detect Fire and Poisonous
Gases
K.Balachandran (IV yr MECH)9659399865,
N.Balasubramanian(IV yr MECH)9659666815

St,peter’s University, Avadi , Chennai 600054.


[email protected]
Abstract

Robotics has revolutionized the field of computer science ‘As Knowledge is power’. Its
application can be beneficial or detrimental in the entire field like Science, Engineering,
Communication, Control, Wireless etc. This paper briefly discusses the Design, Fabrication,
implementation and operation of electrical and electronics systems hardware involved to control
any robot with the help of the GSM communication. In the present design, we have used coded
multi-frequency to control the robot from any other mobile phone. The circuits used are
acoustically coupled to the telephone instrument to make independent on telephone department
and to save cost of call. The switching is performed by coded telephone ring signal. The paper
deals with design and experimental of GSM based robotic coded telephone ring signal, which
can be useful for the people who are working in research laboratory, industry & education in the
field of Robotics Control for vehicle, fountain sprayer and spying purpose in the enemy area.
The world is moving towards complete automation and also the challenges are aplenty. Leakage
due to poisonous gases and destruction due to fire is a common threat in oil refineries and other
agencies that work with hydrocarbons.
The devices that exist today to track the leakage of gases or existence of fire can do so only
with a shorter range. What we thought was, why not implement a technology that is cheap
foremost and secondly, has a very wide range of communication.
So we came up with this solution of using the GSM for detection and reporting to the user
about the threat. This method makes sure that no newer equipments are needed for the user
except for the small programming involved with interfacing the mobile with the 8051
microcontroller. So we have proposed a plan to design a low cost robot mounted with GSM
handset to react and respond to user’s commands.

BLIND’s VISION
An Innovative Braille System Keyboard for the Visually Impaired
HARIKRUPA.G.R
Bhajarang Engineering College
B.Tech IT

Abstract:

The world today demands people to be independent, irrespective of their challenges, mentally or physically.
Visually impaired people have to rely on someone for fulfilling even the minor needs. The probability for them to
interact with the computer is very minimal except for the speech recognition technology which is really complicated
and unreliable. Thus to make them stronger in their working on the computers, This project provides them the total
enhancements for interaction with the system and servicing their necessities.
This project is an original project work of ours, is a unique innovation making them visual across the globe,
interact with computers easily and independent.
A keyboard is an external input device that is connected to the computer using a fiber optic cable. An ordinary
conventional keyboard contains around 104 keys in it, buried inside the keyboards case is an 8042 microcontroller
chip that constantly scans the switches on the keyboard to see if any keys are down. A typical keystroke starts with
the user pressing a key on the keyboard This closes an electrical contact in the switch so the microcontroller and
sense that you've pressed the switch. The PC keyboard actually generates two scan codes for every key you press. It
generates a down code when you press a key and an up code when you release the key. But it is definitely
impossible for every visually impaired people to learn the regular typing pattern and work on these keyboards.
Thus there must be an alternative for the blind people to interact with the computer to meet their needs. Hence there
were projects introduced for making them to interact with the computer, but really failed to prove their qualities.
CONTENT BASED APPROACH FOR CLASSIFICATION OF RSS
FEEDS USING ARTIFICIAL IMMUNE SYSTEM
BUVENESWARI SURIYAN, BALASUBRAMANIAN POURNIMA
COMPUTER SCIENCE AND ENGINEERING DEPARTMENT
MEENAKSHI SUNDARARAJAN ENGINEERING COLLEGE
CHENNAI 600024

ABSTRACT

Artificial Immune Systems (AIS) have been used in a number of applications from
autonomous navigation to computer security because of their ability to rapidly adapt and evolve.
In this project we examine the application of an AIS for the purpose of determining which news
articles from a set of RSS feeds are relevant. Because the articles we are examining come from
RSS feeds, the articles can vary greatly in length and detail. Our training set is composed of a set
of news articles that represent articles a user has already deemed relevant. Then we have the AIS
determine which articles from another set are related to the relevant articles. For the
classification, in order to split the contents into various types we use baysian classification.
Bayesian learning framework for adapting information extraction wrappers with new attribute
discovery, reducing human effort in extracting precise information from unseen Web sites. Our
approach aims at automatically adapting the information extraction knowledge previously
learned from a source Web site to a new unseen site, at the same time, discovering previously
unseen attributes. Two kinds of text-related clues from the source Web site are considered. The
first kind of clue is obtained from the extraction pattern contained in the previously learned
wrapper. The second kind of clue is derived from the previously extracted or collected items. A
generative model for the generation of the site-independent content information and the site
dependent layout format of the text fragments related to attribute values contained in a Web page
is designed to harness the uncertainty involved. Bayesian learning and expectation-maximization
(EM) techniques are developed under the proposed generative model for identifying new training
data for learning the new wrapper for new unseen sites. Previously unseen attributes together
with their semantic labels can also be discovered via another EM-based Bayesian learning based
on the generative model. INFORMATION extraction systems aim at automatically extracting
precise and exact text fragments from documents. They can also transform largely unstructured
information to structured data for further intelligent processing. A common information
extraction technique for semi structured documents such as Web pages is known as wrappers. A
wrapper normally consists of a set of extraction rules which were typically manually constructed
by human experts in the past.

Surface Target Identification with Velocity


Calculation Using FSR
Christina Daniel & Kavitha. N, Sri Muthukumaran Instutute of Technology, Mangadu

Abstract: Forward scattering radar (FSR) is a special mode of bi static radar that can be used
for target detection and classification. FSR offers a number of interesting features such as:
relatively simple hardware; an enhanced target radar cross section (compared to traditional
radar); a long coherent interval of the receiving signal; robustness to stealth technology and
possible operation using non-cooperative transmitters. In this paper we proposed a system using
FSR to detect the surface targets and the efficiency of the system towards stealth technology
using principal component analysis. we also proposed a system for standard deviation
exploitation to estimate the speed of the target.
Keywords: forward scattering radar, principal component analysis, standard deviation, target
classification.
ST. JOSEPH’S COLLEGE OF ENGINEERING, CHENNAI-117
DEPARTMENT OF MECHANICAL ENGINEERING

HARISH V
PRE FINAL YEAR
FUZZY BASED TAMIL HAND WRITTEN CHARACTER RECOGNITION

ABSTRACT: Automated handwritten character recognition has gained popularity in recent


years. Development of Optical Character Recognition (OCR) for Indian scripts is an active
area of research today. This Paper presents a novel approach for recognizing the handwritten
Tamil characters with crucial features of the fuzzy values. The main idea is to spilt the
character into four quadrants and extract the crucial features from the partitions. The fuzzy
values are obtained based on the intensity of the character in the specific quadrants.

You might also like