Showing 1657–1668 of 2067 results

  • Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption

    Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption

    0 out of 5
    4,500

    Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption Abstract?Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption. Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is…

  • Reversible Data Hiding Using Controlled Contrast Enhancement and Integer Wavelet Transform

    Reversible Data Hiding Using Controlled Contrast Enhancement and Integer Wavelet Transform

    0 out of 5
    4,500

    Reversible Data Hiding Using Controlled Contrast Enhancement and Integer Wavelet Transform Abstract? Reversible Data Hiding Using Controlled Contrast Enhancement and Integer Wavelet Transform. The conventional reversible data hiding < Final Year Projects 2016 > RDH. al-gorithms pursue high Peak-Signal-to-Noise-Ratio (PSNR) at the certain amount of embedding bits. Recently, Wu et al .deemed that the improvement…

  • Reversible Image Data Hiding with Contrast Enhancement

    Reversible Image Data Hiding with Contrast Enhancement

    0 out of 5
    4,500

    Reversible Image Data Hiding with Contrast Enhancement Abstract?Reversible Image Data Hiding with Contrast Enhancement. In this letter, a novel reversible data hiding (RDH) algorithm is proposed for digital images. Instead of trying to keep the PSNR value high, the proposed algorithm enhances the contrast of a host image to improve its visual quality. The highest…

  • Review Selection Using Micro-Reviews

    Review Selection Using Micro-Reviews

    0 out of 5
    4,500

    Review Selection Using Micro-Reviews Abstract? Review Selection Using Micro-Reviews. Given the proliferation of review content, and the fact that reviews are highly diverse and often unnecessarily verbose, users frequently face the problem of selecting the appropriate reviews to consume. Micro-reviews are emerging as a new type of online review content in the social media. Micro-reviews…

  • Review Selection Using Micro-Reviews

    Review Selection Using Micro-Reviews

    0 out of 5
    4,500

    Review Selection Using Micro-Reviews Abstract? Review Selection Using Micro-Reviews. Given the proliferation of review content, and the fact that reviews are highly diverse and often unnecessarily verbose, users < Final Year Projects 2016 > frequently face the problem of selecting the appropriate reviews to consume. Micro-reviewsare emerging as a new type of online review content…

  • Revisiting Attribute-Based Encryption with Verifiable Outsourced Decryption

    Revisiting Attribute-Based Encryption with Verifiable Outsourced Decryption

    0 out of 5
    4,500

    Revisiting Attribute-Based Encryption with Verifiable Outsourced Decryption Abstract? Revisiting Attribute-Based Encryption with Verifiable Outsourced Decryption. Attribute-based encryption < Final Year Projects 2016 > ABE [1] is a promising technique for ?ne-grained access control of encrypted data in a cloud storage, however, decryption involved in ABEs is usually too expensive for resource-constrained front-end users, which greatly…

  • Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks

    Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks

    0 out of 5
    4,500

    Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks Abstract? Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks. To ensure the security and privacy of the patient?s health status in the wireless body area networks < Final Year Projects 2016 > WBANs., it is…

  • RFID based tollgate collection system

    RFID based tollgate collection system

    0 out of 5
    4,500

    RFID based tollgate collection system Abstract?RFID based tollgate collection system. A customized radio frequency identification (RFID)-based sensor system is proposed to achieve reliable data collection and transmission between downhole and ground for the intelligent oilwell. In this paper, the overall system architecture is introduced first, and then, the corresponding hardware systems are designed in detail….

  • Rich Receiver initial client head multicast approach for grid application

    Rich Receiver initial client head multicast approach for grid application

    0 out of 5
    4,500

    Rich Receiver initial client head multicast approach for grid application Abstract? Rich Receiver initial client head multicast approach for grid application Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″…

  • RIHT:A Novel Hybrid ip tracebackscheme

    RIHT:A Novel Hybrid ip tracebackscheme

    0 out of 5
    4,500

    RIHT:A Novel Hybrid ip tracebackscheme   Abstract? Because the Internet has been widely applied in various fields, more and more network security issues emerge and catch people’s attention.< Final Year Project > However, adversaries often hide themselves by spoofing their own IP addresses and then launch attacks. For this reason, researchers have proposed a lot…

  • Risk Aware Query Replacement Approach For Secure Databases Performance Management

    Risk Aware Query Replacement Approach For Secure Databases Performance Management

    0 out of 5
    4,500

    Risk Aware Query Replacement Approach For Secure Databases Performance Management Abstract?Risk Aware Query Replacement Approach For Secure Databases Performance Management. Large amount of data and increased demand to extract, < Final Year Projects > analyze and derive knowledge from data are impairing nowadays performance of enterprise mission-critical systems such as databases. For databases, the challenging…

  • Risk Aware Query Replacement Approach For Secure Databases Performance Management

    Risk Aware Query Replacement Approach For Secure Databases Performance Management

    0 out of 5
    4,500

    Risk Aware Query Replacement Approach For Secure Databases Performance Management Abstract?Risk Aware Query Replacement Approach For Secure Databases Performance Management. Large amount of data and increased demand to extract,analyze and derive knowledge from data are impairing nowadays performance of enterprise mission-critical systems such as databases.For databases,the challenging problem is to manage complex and sometimes non-optimized…

End of content

End of content