153 research outputs found

    Study on Security of Online Voting System Using Biometrics and Steganography

    Get PDF
    Abstract: It is very important to provide security to voting system and mostly which is online one. In this paper we provide security to online voting system with secure user authentication by providing biometric as well as password security to voter accounts. Basic idea behind this is to combine secret key with cover image on the basis of key image. As a result such new image is produced by system called stego image which is quite same as cover image. The key image is a biometric measure, such as a fingerprint image. Extraction of stego image is take place at server side to perform the voter authentication. The system minimizes the risk factor as hacker needs to find not only the template but also secret key and it is not possible. It makes election procedure to be secure against a variety of fraudulent behaviors. To improve speed SHA 256 used for hashing is replaced with MD5

    IMAGE DENOISING USING TRADITIONAL WAVELET THRESHOLDING

    Get PDF
    ABSTRACT Edge-preserving denoising is of great interest in image processing. This paper presents a wavelet-based multiscale products thresholding scheme for noise suppression of the images. A dyadic wavelet transform (A Canny edge detector-) is also employed. An adaptive scale correlation wavelet thresholding technique is then proposed. In which the adaptive threshold will be calculated which is imposed on the products, instead of on the wavelet coefficients. This proposed scheme suppresses the noise effectively and preserves the edges features than other wavelet-thresholding denoising methods. In the result we can see the better visual quality and increment in the signal to noise the last node will die in the network is to be discussed

    An Empirical Proposal towards the Algorithmic Approach and Pattern in Web Mining for Assorted Applications

    Get PDF
    ABSTRACT: Data mining or the analysis phase of the knowledge discovery process is the computational process of discovering patterns in large data sets that involves methods at the intersection of artificial intelligence, machine learning, statistics, and database system. The classical goal of the data mining and machine learning process is to fetch and extract information from a data set and transform it into an understandable structure for further use. Besides raw analysis step, it involves database and data management aspects, data preprocessing, model and inference considerations, interestingness metrics, complexity considerations, post-processing of discovered structures, visualization, and online updating. Web Usage Mining is the type of data mining technique to discover interesting usage patterns from web data, in order to discover useful pattern and better serve the needs of web-based applications. Usage data captures the identity or origin of web users along with their browsing behavior at a web site. Web usage mining itself may be classified further depending on the kind of usage data considered. They are web server data, application server data and application level data. Web server data correspond to the user logs that are collected at web server. Some of the typical data collected and saved at a web server include IP addresses, page references, and access time of the users. In this paper a new technique is proposed to discover the web usage patterns of websites from the server log files with the foundation of clustering and improved Apriori algorithm

    Associate Professor,

    No full text
    Abstract: Searching of spatial information over search engines is still an important research issue in the field of spatial data mining.We are proposing an empirical model of mechanism for location based(Spatial) databases, Even though various approaches are delivered by the various researchers for finding the result based on the keywords, and usually spatial query is a combination of a location and set of features. In our approach we are handling the spatial queries in two ways and returns the only user specified number of optimal results, we implemented a cache based approach for efficient results. The World-Wide Web has reached a size where it is becoming increasinglychallenging to satisfy certain information needs. Whilesearch engines are still able t
    • …
    corecore