{"title":"Image Encryption Using Chaotic Maps in Hybrid Domain ","authors":"S. Ramahrishnan, R. Geetha, P. Vasuki","doi":"10.31838/ijccts/02.02.01","DOIUrl":"https://doi.org/10.31838/ijccts/02.02.01","url":null,"abstract":"All image encryption systems are in the single domain. Hybrid domain (frequency and time domain) system is proposed to make the system more secured. We use the chaotic maps to generate pseudo random images. Since the chaotic maps have very good properties ,it will help us to encrypt the image in more secured manner. In our proposed system we employs two units: Transformation and substitution unit. We perform dft and dwt for the image. Transformation unit uses the tent map and substitution unit uses Bernoulli map.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123260028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Key Hiding of Multimedia Applications in Multimedia File ","authors":"V. Gupta, M. Shoeb","doi":"10.31838/ijccts/01.02.05","DOIUrl":"https://doi.org/10.31838/ijccts/01.02.05","url":null,"abstract":"The project entitled Effective key Generation for Multimedia Application is the application developed to embed an video file in another video signal. It is concerned with embedding information in an innocuous cover Speech in a secure and robust manner. This system makes the Files more secure by using the concepts Steganography and Cryptography, Steganography, poor cousin of Cryptography is the art of hiding messages inside other messages such that the very existence of the message is unknown to third party. The goal of cryptography is to make data unreadable by a third party, the goal of Steganography is to hide the data from a third party Through the use of advanced computer software, authors of images and software can place a hidden trademark in their product, allowing them to keep a check on piracy. This is commonly known as watermarking. Hiding serial numbers or a set of characters that distinguishes an object from a similar object is known as finger printing. Together, these two are intended to fight piracy. The latter is used to detect copyright violators and the former is used to prosecute them. But these are only examples of the much wider field of Steganography. The cover data should not be significantly degraded by the embedded data, and the embedded data should be as imperceptible as possible. The embedded data should be as immune as possible to modifications from intelligent attacks or anticipated manipulations. Thus it is necessary that the hidden message should be encrypted.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114219556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Mining Based Accuracy Enhancement Of ANN Using Swarm Intelligence ","authors":"","doi":"10.31838/ijccts/02.01.07","DOIUrl":"https://doi.org/10.31838/ijccts/02.01.07","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120993219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Approach For Handwritten Text Recognition Using Neural Network","authors":"Aman Puri, Kamlesh Lakhwani, Suresh Gyan Vihar","doi":"10.31838/ijccts/01.02.02","DOIUrl":"https://doi.org/10.31838/ijccts/01.02.02","url":null,"abstract":"The off-line character recognition is a process which is used to recognition the pattern. The problem for recognition is to segment the character into isolated word. In this paper, we use a new method which calculates the approximation width of the word for the segmentation. After using this algorithm characters are segmented which may have some extra stokes, braked image. To remove these errors some pre-processing steps are performed to make the character smoother. A new feature extraction algorithm is applied to this segmented character, in this algorithm we used to calculate the pixels range and also exact value of a image. The range value is used for the classification. The classifier has been used to train the neural network. Recognition of a character image we used to calculate the approximation value of this image and the value of this image has tested on the trained neural networks, which shows the recognized character. This system is developed by using JAVA. This system converts the handwritten document into structural text form. Keyword: Segmentation, Neural Network, Pixels calculation, Feature extraction, Java","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"2007 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125616829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Sivaselvan, V.Vennila Pg Scholar, Asst . Prof, Tiruchencode
{"title":"Techniques of Opinion Mining and Sentiment Analysis: A Survey ","authors":"D. Sivaselvan, V.Vennila Pg Scholar, Asst . Prof, Tiruchencode","doi":"10.31838/ijccts/03.02.05","DOIUrl":"https://doi.org/10.31838/ijccts/03.02.05","url":null,"abstract":"Sentiment analysis is the most emerging field, that extract the customer's opinion about particular product or service. In order to enhance the sales of a product and to improve the customer satisfaction, most of the on-line shopping sites provide the opportunity for customers to write reviews about products. For a popular product, the number of reviews can be in hundreds. Due to immense amount of customers opinions, views and feedback available, it is very much significant to analyse, explore and organize their views for better decision making. Opinion Mining or Sentiment Analysis is the mining of opinions and sentiments automatically from text, speech, and database sources through Natural Language Processing (NLP). This survey paper gives an outline of the techniques that classify the opinions as positive or negative.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132230546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review of Secure Protocols on Wireless Network Technologies ","authors":"","doi":"10.31838/ijccts/03.02.06","DOIUrl":"https://doi.org/10.31838/ijccts/03.02.06","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134557047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advanced Approaches of Handwritten Digit Recognition Using Hybrid Algorithm ","authors":"Deepak Kumar Bishnoi, Kamlesh Lakhwani, Suresh Gyan Vihar","doi":"10.31838/ijccts/01.01.07","DOIUrl":"https://doi.org/10.31838/ijccts/01.01.07","url":null,"abstract":"Image processing is an interesting and widely used field in the research area. Handwritten digit recognition is a sub module of the image processing. Although lots of research has been done so for in this field and still continues. This paper suggested a novel approach of off-line handwritten digit recognition. The paper classified the digits into four regions: the left part, right part, upper part and lower part. In these four parts the images are identified on the basis of curve. The curve of a left part image is converted into pixels and as well as rest of all parts. Then these pixels are compared through decision tree and the result of comparison describes the format of digit. This method is used to test the various handwritten digit form modified NIST and MNIST databases, which shows the great success rate. Keyword: Digit recognition, Curve matching, Thinning, Smoothing, Regions Classification.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114876591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER ","authors":"","doi":"10.31838/ijccts/03.01.04","DOIUrl":"https://doi.org/10.31838/ijccts/03.01.04","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125758021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Santhi, N. Kumar, G. Kumar, S.Mohandoss, R.Venkatasubramaniyan
{"title":"Quantum-Dot Cellular Automata based Public Key Cryptography","authors":"M. Santhi, N. Kumar, G. Kumar, S.Mohandoss, R.Venkatasubramaniyan","doi":"10.31838/ijccts/07.02.04","DOIUrl":"https://doi.org/10.31838/ijccts/07.02.04","url":null,"abstract":"In the field of Nanotechnology, Quantum-dot Cellular Automata is a new nascent technology. In order to overcome \u0000the CMOS limitations, less area and low power consuming QCA circuits are designed. Cryptography in QCA has \u0000been used to provide high data security during transmission. When comparing with symmetric cryptography, \u0000Asymmetric cryptography are confidential and authentication. In our paper, we designed a Public key cryptography \u0000using RSA algorithm that encrypts and decrypts the data using different keys. We also designed a full adder circuit \u0000with less area and latency when compared with previous works. The proposed architecture has been design and \u0000tested using QCA Designer tool.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129281045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BLOCKCHAIN BASED UNFORGED LICENSE","authors":"","doi":"10.31838/ijccts/07.02.02","DOIUrl":"https://doi.org/10.31838/ijccts/07.02.02","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131499575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}