Search This Blog

DATA SECURITY


DATA SECURITY

Steganography is the art and science of communication in such a way that the presence of any messages can not be tracked. It may be associated with field of hiding information which has received considerable attention in recent times. One may differentiate two general directions in information hiding which is determined by the power of an adversary and protection against only the detection of a message by passive adversary and hiding a message such that can never be removed by an any active adversary .So information theoretic model for steganography with passive adversary is proposed. The adversarys task of distinguishing between an innocent cover message C & the modified message S containing hidden information is interpreted as a hypothesis testing problem.

Brain Controlled Car

Brain Controlled Car
Abstract : (seminar) It's important to understand the complexity of the human brain. The human brain weighs only three pounds but is estimated to have about 100 billion cells. It is hard to get a handle on a number that large (or connections that small). Let's try to get an understanding of this complexity by comparing it with something humans have created--the entire phone system for the planet. If we took all the phones in the world and all the wires (there are over four billion people on the planet), the number of connections and the trillions of messages per day would NOT equal the complexity or activity of a single human brain. Now let's take a "small problem"--break every phone in Michigan and cut every wire in the state. How long would it take for the entire state (about 15 million people) to get phone service back? A week, a month, or several years? If you guessed several years, you are now beginning to see the complexity of recovering from a head injury. In the example I used, Michigan residents would be without phone service while the rest of the world had phone service that worked fine. This is also true with people who have a head injury. Some parts of the brain will work fine while others are in need of repair or are slowly being reconnected

Artificial Photosynthesis

Artificial Photosynthesis
Photosynthesis is the process by which plant survives and acts as a greatest sink for carbon dioxide. This paper shows that how a photosynthesis reaction in plants takes place artificially with the help of electronic components. This paper starts with introducing the basic reactions that occurs in plant in the process of photosynthesis. Next it gives information about photovoltaic cell. This paper also deals four steps describing the process of Artificial photosynthesis (AFP). First is the chlorophyll in a leaf is replaced with a photovoltaic cell which release electrons when exited by solar energy. Second step is to split water molecule where as artificially it is done with biomimetric engineering by fabricating new core with new geometry for splitting of water molecule. The third step that bioenergy transfer that occurs because of adenosine triphosphate (ATP) and sodium diphosphate (NADPH). The last process is to convert CO2 to other organic components. Then it goes to micro fabrication of AFP.

A FINGER PRINT RECOGNISER USING FUZZY EVOLUTIONARY PROGRAMMING

A FINGER PRINT RECOGNISER USING FUZZY EVOLUTIONARY PROGRAMMING
Abstract : (seminar) A fingerprint recognizing system is built with two principal components: the fingerprint administrator and the fingerprint recognizer.Fingerprints are identified by their special features such as ridge endings, ridge bifurcation, short ridges, and ridge enclosures,
which are collectively called the minutiae. It explains the finger print characteristics that
are used to identify individuals and the process of minutiae extraction. The fingerprint administrator uses the method of gray scale ridge tracing backed up by a validating procedure to extract the minutiae of fingerprints. The fingerprint recognizer employs the technique of fuzzy
evolutionary programming to match the minutiae of an input fingerprint with those from a database.

DATA SECURITY


DATA SECURITY

Steganography is the art and science of communication in such a way that the presence of any messages can not be tracked. It may be associated with field of hiding information which has received considerable attention in recent times. One may differentiate two general directions in information hiding which is determined by the power of an adversary and protection against only the detection of a message by passive adversary and hiding a message such that can never be removed by an any active adversary .So information theoretic model for steganography with passive adversary is proposed. The adversarys task of distinguishing between an innocent cover message C & the modified message S containing hidden information is interpreted as a hypothesis testing problem.