i-manager's Journal on Computer Science (JCOM)


Volume 1 Issue 2 June - August 2013

Research Paper

Enhancing Efficiency of SPIHT Using HCC for Medical Image Sequences

Ferni Ukrit* , G.R.Suresh**
* Research Scholar, Sathyabama University, Chennai
** Professor, Easwari Engineering College, Chennai
Ukrit, M.F., and Suresh, G.R. (2013). Enhancing Efficiency of SPIHT Using HCC for Medical Image Sequences. i-manager’s Journal on Computer Science, 1(2), 1-7. https://doi.org/10.26634/jcom.1.2.2446

Abstract

Medical image sequences are produced in enormous amount which requires a large storage capacity. These image sequences are of great importance, hence it is necessary to develop a system that produces high degree of compression while preserving the medical information. Lossless compression Technique is required to reduce the number of bits to store these image sequences and take less time to transmit over the network. This paper proposes a method that combines SPIHT with HCC to enhance the compression ratio. Inter-frame coding is used to exploit the correlation among image sequences. Initially SPIHT is applied with fast block matching process, Diamond Search. To enhance the efficiency of compression ratio a new scheme Head Code Compression is introduced. Results are compared in terms of Compression Ratio and Peak Signal-to-Noise Ratio with other state of art coding. Experimental results of our proposed methodology achieves 25% more reduction than the other state-of-the-art algorithms.

Research Paper

Enhancing Security in Medical Image Communication with ROI Based Lossless Watermarking and Novel Digital Signature

Umamageswari* , G.R.Suresh**
* Research Scholar, Sathyabama University, Chennai
** Professor, Easwari Engineering College, Chennai.
Umamageswari, A., and Suresh, G.R. (2013). Enhancing Security In Medical Image Communication With ROI Based Lossless Watermarking And Novel Digital Signature. i-manager’s Journal on Computer Science, 1(2) ,8-16. https://doi.org/10.26634/jcom.1.2.2447

Abstract

The patient's information plays a very vital role for tele-diagnosis and tele-surgery in Medical Industry. Medical image content authentication is very important, since medical image contents are more and more widely distributed. Reversible watermarking becomes a promising technique to embed the information into medical images. This paper defines the Region of Interest (ROI) in an image and tries to embed data in Region of Non Interest (RONI). When medical image is shared through network, for the compression purpose, we propose the JPEG-LS algorithm and to provide security, to maintain secrecy, reliability and accessibility of embedded data we have proposed two Novel algorithms ACC(Advanced Classical Cipher) and SHA-I (Secure hash Algorithm) to produce the Digital Signature and used Arnold's cat map method (Arnold's Transform). Patient information, disease information and DS is embedded into DICOM images. Increase in authentication can be achieved when medical experts access secured medical images from web servers using Kerberos technique.

Research Paper

Survey on Feature Selection Algorithms for Speech Recognition

M.Kalamani* , S.Valarmathy**, poonkuzhali chellamuthu***
*-**-*** Department of Electronics and Communication Engineering, Bannari Amman Institute of Technology, Sathyamangalam, Erode, Tamilnadu, India.
Kalamani, M., Valarmathy, S., and Poonkuzhali, C. (2013). Survey On Feature Selection Algorithms For Speech Recognition. i-manager’s Journal on Computer Science, 1(2), 17-23. https://doi.org/10.26634/jcom.1.2.2448

Abstract

Speech is one of the most promising model through which various human emotions such as happiness, anger, sadness, normal state can be determined, apart from facial expressions. Researchers have proved that acoustic parameters of a speech signal such as energy, pitch, Mel Frequency Cepstral Coefficient (MFCC) are vital in determining the emotional state of a person. There is an increasing need for a new feature selection method, to increase the processing rate and recognition accuracy of the classifier, by selecting the discriminative features. This study investigates the various feature selection algorithms, used for selecting the optimal features from speech vectors which are extracted using MFCC. The feature selected is then used in the modeling stage.

Research Paper

Enhancing Security in Cloud Computing by Combining Dynamic Broadcast Encryption and Group Signature

V. Ganesh Karthikeyan* , R.Malar Priya**, R.Kalpana***
* Assistant Professor, Adithya Institute of Technology,
**-*** PG Scholars, Adithya Institute of Technology
Karthikeyan, V.G., Priya, R.M., and Kalpana, R. (2013). Enhancing Security In Cloud Computing By Combining Dynamic Broadcast Encryption And Group Signature. i-manager’s Journal on Computer Science, 1(2), 24-28. https://doi.org/10.26634/jcom.1.2.2449

Abstract

Cloud computing refers to a network that distributes processing power, applications, and large systems among many computers. Cloud computing seems to offer some incredible benefits for communicators: the availability of an incredible array of software applications, access to lightning-quick processing power, unlimited storage, and the ability to easily share and process information. All of this is available through the browser any time it can access the Internet. While this might all appear enticing, there remain issues of reliability, portability, privacy, and security, since the data transmission on the internet or over any networks are vulnerable to the hackers attack. The authors are in great need of encrypting the data. This paper combines the techniques of cloud data storage and content Distribution by dynamic broadcast encryption algorithm along with the Bit Torrent application which results in minimizing the difficulties of bulky data and aims in resulting efficient sharing of the secure storage services in cloud computing.

Research Paper

Asymmetric Based Algorithm Using LC - PRNG as Basic Primes for Security Corroboration

D.Kowsalya* , G.Jothilakshmi**, N. Karthikeyan***
*-** UG Students, Department of ECE, University College of Engineering, Ramanathapuram.
*** Assistant Professor, Department of ECE, University College of Engineering, Ramanathapuram.
Kowsalya, D., Jothilakshmi, G., and Karthikeyan,N. (2013). Asymmetric Based Algorithm Using LC - PRNG As Basic Primes For Security Corroboration. i-manager’s Journal on Computer Science, 1(2), 29-34. https://doi.org/10.26634/jcom.1.2.2450

Abstract

With the explosion of networks and huge amount of data transmitted along, securing data content is becoming more and more important. The protection afforded to an automated information system is to attain the applicable objectives of preserving the integrity, accountability, authenticity and non repudiation. Many cryptographic Symmetric and Asymmetric algorithms are proposed. But symmetric key have some weakness such as suffering Brute Force, desynchronization etc.To get rid of from the weakness and reduce the system workload, we adopt Rivest Shamir Adleman (RSA) to construct an asymmetric key [2].Among the asymmetric algorithms the most widely accepted and implemented approach is the RSA encryption. Pseudo Random Numbers (PRN) are used in a number of areas such as Cryptography, Scientific Statistical Simulation etc. In cryptography the pseudo random number is a crucial element in the secret keys for cryptography algorithms and protocols. In this paper we have introduced new concept of RSA algorithm which is based on PN (Prime Numbers). These PN are selected from PRN sequence. The PN are used as input to RSA (Rivest Shamir Adleman) algorithm [3]. This technique is implemented by MATLAB