Dual-image-based reversible data hiding method using center folding strategy Abstract? Steganography is the art of hiding secrect information such as image, audio and video. The purpose of Steganography is to conceal the existence of the secret information in any given medium. A third order Debauchies? wavelet and five level decomposition is utilized to segregate the…
Dynamic and Fault-Tolerant Clustering for Scientific Workflows Abstract?Task clustering has proven to be an effective method to reduce execution overhead and to improve the computational granularity of scientific workflow tasks executing on distributed resources. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram…
iShuffle: Improving Hadoop Performance with Shuffle-on-Write Abstract– Many data-driven personalized services require that private data of users is scored against a trained machine learning model. In this paper we propose a novel protocol for privacypreserving classification of decision trees, a popular machine learning model in these scenarios. Our solutions is composed out of building blocks,…
Encryption for High Efficiency Video Coding with Video Adaptation Capabilities Abstract? Video encryption techniques enable applications like digital rights management and video scrambling. Applying encryption on the entire video stream can be computationally costly and prevents advanced video modifications by an untrusted middlebox in the network, like splicing, quality monitoring, watermarking, and transcoding.< Final…
Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud Abstract?Despite the advances in hardware for hand-held mobile devices, resource-intensive applications < Final Year Projects 2016 > e.g., video and image storage and processing or map-reduce type still remain off bounds since they require large computation and storage capabilities. Recent research has attempted to address these…
Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET Abstract? Vehicular ad hoc network (VANET) can significantly improve the traffic safety and efficiency. The basic idea is to allow vehicles to send traffic information to roadside units (RSUs) or other vehicles. Vehicles have to be prevented from some attacks on their privacy and…
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems Abstract-Data integrity, a core security issue in reliable cloud storage, has received much attention. Data auditing protocols enable a verifier to efficiently check the integrity of the outsourced data without downloading the data. A key research challenge associated with existing designs of data auditing protocols…
Human Effects of Enhanced Privacy M anagement Models Abstract?Human Effects of Enhanced Privacy M anagement Models. We enhance existing and introduce new social network privacy management models and we measure their human effects. First, < Final Year Projects > we introduce a mechanism using proven clustering techniques that assists users in grouping their friends for…
Improving security and efficiency for encrypted data sharing in online social networks Abstract?Improving security and efficiency for encrypted data sharing in online social networks. Despite that existing data sharing systems in online social networks (OSNs) propose to encrypt data before sharing, the multiparty access control of encrypted data has become a challenging issue. In this…
Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks Abstract? Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks. To achieve secure communications in wireless sen-sor networks (WSNs), sensor nodes < Final Year Projects 2016 > SNs must establish secret shared keys with neighboring nodes. Moreover, those keys must be updated…
Malware Clearance for Secure Commitment of OS-Level Virtual Machines Abstract? Malware Clearance for Secure Commitment of OS-Level Virtual Machines. A virtual machine(VM) can be simply created upon use and disposed upon the completion of the tasks or the detection of error. The disadvantage of this approach is that if there is no malicious activity, the…