Logo

e-ISSN: 2455-6491 | Published by Global Advanced Research Publication House (GARPH)







Archives of International Journal of Advanced Innovative Technology in Engineering(IJAITE)


Volume 7 Issue 5 September 2022



1. Multimedia Data Security through Embedded Image

AUTHOR NAME : Pankaj M. Bhuyar, Dr. S. W. Mohod

ABSTRACT : Hiding information in an image in a way that does not affect the original cover image pixels or cause a permanent distortion after extracting that information is known as reversible data hiding technology. Many reversible data hiding schemes have been proposed and successfully applied in military applications. Such schemes are developed to ensure digital images authenticity and integrity without any distortion on the original images. They guarantee that any attempt to change the watermarked image will be detected by the image owner. In this research, an algorithm is proposed to reversibly hide data into encrypted grayscale images in a separable manner. The proposed work exploits only LSB insertion for steganography based on Text, Image, and Audio. Scope exists for adopting frequency domain manipulation which may further improve the security of the signal. We compare the state-of-the-art methods; the proposed approach provides higher embedding capacity and is able to perfectly reconstruct the original image as well as the embedded message. Extensive experimental results are provided to validate the superior performance of our scheme.

Download





2. Study of Biometric Authentication Techniques and Its Application

AUTHOR NAME : Vishal Yuvraj Mulmule, Prof. C. S. Patil

ABSTRACT : One of the best and most sophisticated biometrics is fingerprint recognition. Fingerprints have been used for recognised proof for over a decade because of their novelty and constancy through time; more recently, though, they have begun to be computerised because to advancements in reasoning abilities. According to the inherent simplicity in security, the multiple sources available for collection, and their setup use and collection by legal requirement and mobility, fingerprint recognition is widely used. In this essay, we looked at the value and various applications of fingerprint recognition. Additionally, we talk about the uses for fingerprint recognition. This essay outlines the basic FPR structure, various FPR systems, and challenges. In this paper we studied about the importance and different areas of fingerprint identification. We also discuss about the applications of fingerprint identifications. This paper presents outline of a fundamental FPR framework, different FPR systems and difficulties.

Download