scholarly journals An Image Based Encryption Algorithm for Multimedia Applications

Multimedia is the most popular domain in recent era, where it handles distinct information such as text, image, music, video and etc. The security and channel capacity are the challenging parameters in real time multimedia applications. In this research work, an image based double encryption scheme has proposed along with DCT compression technique. The input image is encrypted by Chaotic Baker map and Advanced Encryption Standard (AES) algorithms. The encrypted image is compressed by DCT compression technique. The PSNR and MSE of proposed double encryption method attains 77.1617 and 0.0013 respectively. The experimental results are compared with the individual encryption methods shows that the performance of Double encryption is superior to the other existing methods.

2015 ◽  
Vol 1 (7) ◽  
pp. 313
Author(s):  
Kameswara Rao.S ◽  
Yusuf MD. ◽  
Saraswathi P. ◽  
Ch.R.Raghavendra Rao ◽  
Murali P. ◽  
...  

The aim of the present investigation is to formulate Enalapril maleate oral disintegrating tablet by using natural and synthetic superdisintegrents..ODTs may also be used to deliver drugs to the oral cavity, for local action or, in some cases, absorption across the oral mucosa, thereby avoiding first-pass hepatic metabolism and potentially increasing the rate and extent of uptake, and reducing undesirable metabolites. The objectives of the research work is to formulate oral disintegrating tablets of Enalapril maleate by using different super disintegrates(Natural, Synthetic) in different ratio by direct compression technique and tablets were evaluated for precompressional and postcompressional Parameters such as angle of repose, bulk density, tapped density, compressibility index, drug content and in-vitro drug release study, hardness, friability, wetting time and invitro dispersion time. To study the physical characteristics of the individual drug and optimized formulations by FTIR spectroscopy. To evaluate various characteristics of the resulting tablets. Formulation CCS3, IH2 were subjected to stability Studies as per ICHguidelines at temperatures and humidity of 255C/605%RH; and 405C/755%RH.Tablets didnt reveal any appreciable changes in respect to hardness, disintegration time, drug content and dissolution profile.


Author(s):  
J. Magelin Mary ◽  
Chitra K. ◽  
Y. Arockia Suganthi

Image processing technique in general, involves the application of signal processing on the input image for isolating the individual color plane of an image. It plays an important role in the image analysis and computer version. This paper compares the efficiency of two approaches in the area of finding breast cancer in medical image processing. The fundamental target is to apply an image mining in the area of medical image handling utilizing grouping guideline created by genetic algorithm. The parameter using extracted border, the border pixels are considered as population strings to genetic algorithm and Ant Colony Optimization, to find out the optimum value from the border pixels. We likewise look at cost of ACO and GA also, endeavors to discover which one gives the better solution to identify an affected area in medical image based on computational time.


Energies ◽  
2021 ◽  
Vol 14 (14) ◽  
pp. 4116
Author(s):  
Krzysztof Siodla ◽  
Aleksandra Rakowska ◽  
Slawomir Noske

A medium voltage (MV) cable network is a substantial component of the distribution network. Present management of this grid segment is mainly based on the failure rate analysis, i.e., a rise in the number and kind of faults on the actual line means that its technical condition is getting worse. The efficiency of the power system is low and additional costs of repair works, supply interruption, difficulties in the investment planning and operation and maintenance works are necessary. The aim of the R&D works done in the realised project is to implement the management of the MV cable network based on the estimated condition of the individual cable line, obtained from diagnostic measurements. The diagnostic investigations of the cable lines are the reference. Many years of research work have led to the development of the Health Index based on diagnostic, technical and service data.


Perception ◽  
1986 ◽  
Vol 15 (4) ◽  
pp. 373-386 ◽  
Author(s):  
Nigel D Haig

For recognition of a target there must be some form of comparison process between the image of that target and a stored representation of that target. In the case of faces there must be a very large number of such stored representations, yet human beings seem able to perform comparisons at phenomenal speed. It is possible that faces are memorised by fitting unusual features or combinations of features onto a bland prototypical face, and such a data-compression technique would help to explain our computational speed. If humans do indeed function in this fashion, it is necessary to ask just what are the features that distinguish one face from another, and also, what are the features that form the basic set of the prototypical face. The distributed apertures technique was further developed in an attempt to answer both questions. Four target faces, stored in an image-processing computer, were each divided up into 162 contiguous squares that could be displayed in their correct positions in any combination of 24 or fewer squares. Each observer was required to judge which of the four target faces was displayed during a 1 s presentation, and the proportion of correct responses for each individual square was computed. The resultant response distributions, displayed as brightness maps, give a vivid impression of the relative saliency of each feature square, both for the individual targets and for all of them combined. The results, while broadly confirming previous work, contain some very interesting and surprising details about the differences between the target faces.


Author(s):  
Hamza Sajjad Ahmad ◽  
Muhammad Junaid Arshad ◽  
Muhammad Sohail Akram

To send data over the network, devices need to authenticate themselves within the network. After authentication, the device will be able to send the data in-network. After authentication, secure communication of devices is an important task that is done with an encryption method. IoT network devices have a very small circuit with low resources and low computation power. By considering low power, less memory, low computation, and all the aspect of IoT devices, an encryption technique is needed that is suitable for this type of device. As IoT networks are heterogeneous, each device has different hardware properties, and all the devices are not on one scale. To make IoT networks secure, this paper starts with the secure authentication mechanism to verify the device that wants to be a part of the network. After that, an encryption algorithm is presented that will make the communication secure. This encryption algorithm is designed by considering all the important aspects of IoT devices (low computation, low memory, and cost).


Popular Music ◽  
1988 ◽  
Vol 7 (3) ◽  
pp. 247-266 ◽  
Author(s):  
Will Straw

Writing on music video has had two distinctive moments in its brief history. The first wave of treatments tended to come from the culture surrounding rock music and from those who were primarily interested in music video as something which produced effects on that music. Here, two claims were most common, and generally expressed in the terms and the contexts of rock journalism:(1) that music video had made ‘image’ more important than the experience of music itself, with effects which were to be feared (for example, the potential difficulties for artists with poor ‘images’, the risk that theatricality and spectacle would take precedence over intrinsically ‘musical’ values, etc.);(2) that music video would result in a diminishing of the interpretative liberty of the individual music listener, who would now have visual or narrative interpretations of song lyrics imposed on him/her, in what would amount to a semantic and affective impoverishment of the popular music experience.


Author(s):  
Darakhshan R. Khan

Region filling which has another name inpainting, is an approach to find the values of missing pixels from data available in the remaining portion of the image. The missing information must be recalculated in a distinctly convincing manner, such that, image look seamless. This research work has built a methodology for completely automating patch priority based region filling process. To reduce the computational time, low resolution image is constructed from input image. Based on texel of an image, patch size is determined. Several low resolution image with missing region filled is generated using region filling algorithm. Pixel information from these low resolution images is consolidated to produce single low resolution region filled image. Finally, super resolution algorithm is applied to enhance the quality of image and regain all specifics of image. This methodology of identifying patch size based on input fed has an advantage over filling algorithms which in true sense automate the process of region filling, to deal with sensitivity in region filling, algorithm different parameter settings are used and functioning with coarse version of image will notably reduce the computational time.


2016 ◽  
Vol 1 (2) ◽  
pp. 603-616 ◽  
Author(s):  
Marek Lampart ◽  
Jaroslav Zapoměl

AbstractThis paper concentrates on the vibrations attenuation of a rotor driven by a DC motor and its frame flexibly coupled with a baseplate by linear cylindrical helical springs and damped by an element that can work either in inertia or impact regime. The system oscillation is governed by three mutually coupled second-order ordinary differential equations. The nonlinear behaviour occurs if the impact regime is adjusted. The damping element operating in inertia mode reduces efficiently the oscillations amplitude only in a narrow frequency interval. In contrast, the damping device working in impact regime attenuates vibrations of the rotor frame in a wider range of the excitation frequencies and it can be easily extended if the clearances between the rotor casing and the damping element are controlled. The development of a computational procedure for investigation of vibration of a flexibly supported rotor and for its attenuation by the inertia and impact dampers; learning more on efficiency of the individual damping regimes; finding possibilities of extension of the frequency intervals of applicability of the damping device; and obtaining more information on the character of the vibration induced by impacts are the main contributions of this research work.


2020 ◽  
Vol 6 (1) ◽  
pp. 4
Author(s):  
Puspad Kumar Sharma ◽  
Nitesh Gupta ◽  
Anurag Shrivastava

In image processing applications, one of the main preprocessing phases is image enhancement that is used to produce high quality image or enhanced image than the original input image. These enhanced images can be used in many applications such as remote sensing applications, geo-satellite images, etc. The quality of an image is affected due to several conditions such as by poor illumination, atmospheric condition, wrong lens aperture setting of the camera, noise, etc [2]. So, such degraded/low exposure images are needed to be enhanced by increasing the brightness as well as its contrast and this can be possible by the method of image enhancement. In this research work different image enhancement techniques are discussed and reviewed with their results. The aim of this study is to determine the application of deep learning approaches that have been used for image enhancement. Deep learning is a machine learning approach which is currently revolutionizing a number of disciplines including image processing and computer vision. This paper will attempt to apply deep learning to image filtering, specifically low-light image enhancement. The review given in this paper is quite efficient for future researchers to overcome problems that helps in designing efficient algorithm which enhances quality of the image.


2018 ◽  
Vol 8 (9) ◽  
pp. 1540 ◽  
Author(s):  
Xiaoqiang Zhang ◽  
Xuesong Wang

With the increasing use of multimedia in communications, the content security of remote-sensing images attracts much attention in both the academia and industry. The Advanced Encryption Standard (AES) is a famous symmetric cryptosystem. A symmetric remote-sensing image encryption algorithm using AES is presented. Firstly, to reduce the encryption times, the sender groups 16 pixel values together, and converts them into big integers; secondly, the sender encrypts big integers with AES and the chaotic system; finally, the encrypted image is obtained from encrypted big integers. Simulation data show that our algorithm exhibits both the high security and efficiency.


Sign in / Sign up

Export Citation Format

Share Document