Steganography Using Reversible Texture Synthesis Abstract? Steganography Using Reversible Texture Synthesis. We propose a novel approach for steganography using a reversible texture synthesis. A texture synthesis process resamples a smaller texture image, which synthesizes a new texture image with a similar local appearance and an arbitrary size. We weave the texture synthesis process into steganography…
Stegnography techniques to mitigate using Smar phone Application Abstract?By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon complex hardware/software frameworks leading to a number of vulnerabilities, < Final Year Projects > attacks and hazards to profile…
Stochastic Geometry Study on Device-to-Device Communication as a Disaster Relief Solution Abstract?Abstract With the unprecedented new capabilities introduced by modern broadband wireless networks, public safety (PS) agencies are increasingly depending on such networks for their mission-critical communications. One of the key enablers for this adoption is the device-to-device (D2D) communications, where mobile devices can connect…
Stochastic-Geometry-Based Performance Analysis of Delayed Mobile Data Offloading With Mobility Prediction in Dense IEEE 802.11 Networks Abstract– Mobile data offloading through Wi-Fi is a promising solution to alleviate the explosive data increase in cellular network. While extensive attempts have been made at mobile data offloading, previous studies have rarely paid attention to network characteristics (e.g….
Stocks Market Prediction Using Support Vector Machine Abstract-A lot of studies provide strong evidence that traditional predictive regression models face significant challenges in out-of sample predictability tests due to model uncertainty and parameter instability. Recent studies introduce particular strategies that overcome these problems. Support Vector Machine (SVM) is a relatively new learning algorithm that has…
STOLEN MOBILE TRACKING Abstract?STOLEN MOBILE A novel paradigm to detect smartphone physical capture attacks is proposed. Using received signal strength indicator and general system problem solving framework, the paradigm recognizes indoors moving pattern of a phone user. Most existing approaches in detection of physical capture attacks focus on protecting the network not the device. This…
Strong Key-Exposure Resilient Auditing for Secure Cloud Storage Abstract– Key exposure is one serious security problem for cloud storage auditing. In order to deal with this problem, cloud storage auditing scheme with key-exposure resilience has been proposed. However, in such a scheme, the malicious cloud might still forge valid authenticators later than the key-exposure time…
Structural Vulnerability Assessment of Community-based Routing in Opportunistic Networks Abstract?Opportunistic networks enable mobile devices to communicate with each other through routes that are built dynamically, while messages are en route between the sender and the destination(s). The social structure and interaction of users of such devices dictate the performance of routing protocols in those networks….
Structured Sparse Error Coding for Face Recognition With Occlusion Abstract?Face recognition with occlusion is common in the real world. Inspired by the works of structured sparse representation, we try to explore the structure of the error incurred by occlusion from two aspects: the error morphology and the error distribution. Since human beings recognize the…
Student data mining solution?knowledge management system related to higher education institutions Abstract?Higher education institutions (HEIs) are often curious whether students will be successful or not during their study. Before or during their courses the academic institutions try to estimate the percentage of successful students. But is it possible to predict the success rate of students…
Student faculty relationship application Abstract?Abstract Student faculty relationship application is becoming a very essential component in education in this modern day age. With the help of Student faculty relationship application we can gather all the useful information needed to the management in few clicks.Willingness to transform to go digital even at a much lower level….
Student Information Management System Abstract? Student Management System deals with all kind of student details, academic related reports, college details, department details, exam mark details, section details and graph details too. It tracks all the details of a student from the day one to the end of his course which can be used for all…