Tuesday 19 August 2014

#IJSRD Digital Watermarking Methods in Spatial Domain and Transform Domain

#IJSRD
Digital Watermarking Methods in  Spatial Domain and Transform Domain
Abstract--- The ease of digital media modification and dissemination necessitates content protection beyond encryption. Information hidden as digital watermarks in multimedia i.e. text, image, video, audio enables protection mechanism in decrypted contents. In a way that protects from attacks several common image processing techniques are used in Spatial Domain and Transform Domain. In Spatial Domain Least Significant Bit(LSB) is used and in Transform domain Discrete Cosine Transform(DCT) & Discrete Wavelet Transform(DWT) are used. Among these DWT is best method due because of using embedded zero tree wavelet image compression scheme and high frequency sub bands.  

For More Details 
Click on Below Links :



Friday 15 August 2014

#IJSRD advanced persistent threat (APT)


Advanced Persistent Threats (APTs) are a cybercrime category directed at business and political targets. APTs require a high degree of stealithiness over a prolonged duration of operation in order to be successful. The attack objectives therefore typically extend beyond immediate financial gain, and compromised systems continue to be of service even after key systems have been breached and initial goals reached.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students....
kindly share to all engineers...
Visit us on www.ijsrd.com

#IJSRD MOBILE PROTECTION VICTIMISATION VOICE VERIFICATION


Cellular communication business has developed leaps and bounds to become the core of day to day science. Mobile phones is that the spirit of cellular business. the quantity of mobile phones users is rising exponentially. however the privacy of user and security of mobile phones leftovers a difficult question. Theft of mobile phones has become the attention catching business for offender. There ought to be a reliable methodology of protective the instrument from thief. My paper proposes a brand new innovative, reliable, trick proof precautions for mobile phones victimization VOICE VERIFICATION. Voice verification is that the identification of a personal identity victimization speech because the spotting quality. The voice of the user is processed employing a digital gesture processor that is that the prime a part of a mobile. we have a tendency to are programming this DSP to implement this safety technique. For most a resourceful voice record of the user is formed. This record is hold on within the Flash read-only storage that is out there within the mobile. Then whenever the user speaks through the mobile phones a part of the speech sample is taken and hold on. This processed voice of the user is compared with the first folder to examine the identity of the user. If the user is allowed, he’s allowed to continue his speak. If not the transmission is cut unexpectedly by creating the DSP in inactive state. Therefore the mobile is being shielded from any extralegal user. Not with standing the mobile phones was purloined or lost it won’t be helpful for the other individual. The programmability of DSP and generality of Voice based mostly classification has given our methodology a twin advantage. Our set up demands neither external hardware nor additional price. The on top of methodology cause no hardship for the user not like this safety systems. This methodology may be adopted universally altogether models of Mobile phones and mobile phones for cover.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students….
kindly share to all engineers…
Visit us on www.ijsrd.com

Wednesday 13 August 2014

#IJSRD Cost effective and innovative housing technology


The current paper describes how quaternions are used successfully and effectively in simulations of unmanned aerial vehicles (UAVs) and satellite motion through definition of the UAV airframe or satellite body as a rigid body. By such means the authors try to raise interest among students and scientists in the mathematical formalism of quaternions that was very popular more than 100 years ago, but was replaced by vectors and matrices. Nevertheless, quaternions benefits make them valuable in numerous tasks, among others the numerical integration of rigid body motion dynamics equations.Simulations, part of the current project, can be viewed on http://ialms.net/sim/ web address.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students....
kindly share to all engineers...
Visit us on www.ijsrd.com

#IJSRD Cost effective and innovative housing technology


Shelter is amongst the three basic human needs but now-a-days, about two-third of the total Indian population does not have their own shelter. This two-third population belongs to the middle and lower income class. These people find it difficult to construct their houses at an affordable cost by using conventional construction technology. It is found in many cases that people serve their whole life constructing their own house, but fail. The mission and dream of these people can be achieved by appropriate use of cost effective and innovative construction technology. As a whole, the housing shortage of the country can be overcome within lesser FUNDS, without compromising with the quality control and structural stability of the structure.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students....
kindly share to all engineers...
Visit us on www.ijsrd.com