picture transmission
Recently Published Documents


TOTAL DOCUMENTS

44
(FIVE YEARS 1)

H-INDEX

7
(FIVE YEARS 1)

Paper In the field of medication, information security is central. The photographs that are dealt with in the information base and those that are transmitted over the web ought to be shielded from threatening exercises. This paper proposes a novel picture encryption plan helped with reversible information covering framework to improve the nature of the shielded picture transmission. Confusion and DNA encoding norms are utilized for the encryption philosophy. Piecewise Linear Chaotic Map (PWLCM) and Logistic Map are related with produce all parameters the demonstrated calculation needs and DNA encoding headway fills in as an accomplice instrument. The information disguising and extraction process in the blended area submits mistake during the unraveling framework. This is in light of the way that the pixel estimations of the blended spread picture change during the information concealing technique. Thusly the usage of reversible information covering structure rather than the standard information masking methods helps in recuperation of the spread picture, acknowledging immaculate unscrambling. The test results display that the proposed procedure beats the current secure picture transmission approachs


2018 ◽  
Vol 7 (2.24) ◽  
pp. 307
Author(s):  
Manish Dandwani ◽  
Vishal Vaibhav ◽  
S Nagadevi

A great many dynamic clients all around the globe are utilizing on the web informal community, for example, Facebook, Twitter, Tumbler and LinkedIn. These shortcomings make it easy to abuse client's data and do personality cloning assault to frame counterfeit profile. In this proposed framework, information concealing systems to shroud some data in profile pictures with a specific end goal to identify botnets and counterfeit profiles. This venture introduces an order and examination of discovery instruments of clone attacks on online interpersonal organization, in light of trait similitude, companion arrange closeness, and profile investigation for a period interim and record of Internet Protocol groupings. In this task we have proposed discrete wavelet change calculation for information covering up. In this manner this would keep the clone assaults and giving complete client information protection saving. Likewise when clients transfer the profile pictures they can be watermarked and refreshed. For the watermarking method Java static watermark can be used. Any phony clients refreshing a similar profile picture can be distinguished and their separate IP would be followed and blocked. Likewise for secure picture transmission, we utilized Discrete Wavelet Transform (DWT) for information concealing/steganography and Discrete Cosine Transform (DCT) for picture pressure.  


2018 ◽  
Vol 218 ◽  
pp. 02002
Author(s):  
Romi Wiryadinata ◽  
Muhammad Khoirussolih ◽  
Neneng Rohanah ◽  
Imamul Muttakin ◽  
Teguh Firmansyah

Satellite imaging is widely used in monitoring weather patterns and interpreting satellite images. The limited access to weather satellite image data in real-time is still major issues faced by satellite enthusiasts. NOAA 18 and NOAA 19 weather satellites provide free accessible weather data continuously through Automatic Picture Transmission at 137.9125 MHz and 137.1000 MHz frequencies. In this research the data acquisition system is designed with the help of a Quadrifilar Helix antenna and RTL-SDR. In order to receive both frequencies, the Quadrifilar Helix antenna at 137,5 MHz is designed. Recording, decoding, editing, and viewing of Automatic Picture Transmission signals using WXtoImg software. The result showed that the weather satellite image receptions are sufficiently clear and descriptive, although there are 0.0685% frequency offsets of Automatic Picture Transmission signal reception on NOAA 18 and 0.0686% on NOAA 19.


Author(s):  
A. Suwa ◽  
T. Ino-Oka ◽  
T. Makiyama ◽  
K. Fukuzaki ◽  
T. Iwano ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document