Portable Network Graphics Approach to the Authentication of Halftone Images with Henon Map Encryption

G RajKumar, G Udhaya Sankar, G Ravi… - Smart …, 2020 - Taylor & Francis
ABSTRACT A new method of blind image authentication based on secret sharing and data
repair capability via the use of Portable Network Graphics (PNG) is proposed. The method …

[PDF][PDF] PHISHING WEBSITE DETECTION USING MACHINE LEARNING

N Manoj, G Praveen, PA Kumar - ijarst.in
Phishing sites represent a serious gamble to web security since they attempt to get private
data from naïve guests. Specialists have fostered various strategies to recognize phishing …

[PDF][PDF] AN INTELLIGENT APPROACH TO IMPROVING THE PERFORMANCE OF THREAT DETECTION IN IOT

VL Chaitanya, S Afrin, B Nikhila, K Sreevani… - ijprems.com
The project focuses on bolstering threat detection efficacy within Internet of Things (IoT)
systems through an intelligent approach. IoT systems, comprising devices, sensors …

Sustainable analysis of liver tumour detection using various segmentation techniques

R Jose, S Chacko - World Review of Science, Technology …, 2021 - inderscienceonline.com
The death rate of liver cancer disease is the most astounding among every other kind of
tumour. Survival from liver disease is specifically identified with its development at its …

[PDF][PDF] Secure and Efficient Online Fingerprint Authentication Scheme Based on Cloud Computing

MA Kumar, T Mahesh, VR Ganesh, GV Sai, O Diwakar - ijaeast.com
Abstract Background: The e-Finga online fingerprint authentication system, while efficient, is
vulnerable to privacy breaches due to its use of deterministic encryption. Objectives …

[PDF][PDF] UNVEILING DARK PATTERNS ON WEBSITES

KVS Phani, KM Venkatesh, MB Kumar, B Deekshith… - ijprems.com
ABSTRACT “Dark patterns” are tricks used in design to make people do things they might
not want to do. They're like sneaky tactics that websites and apps use to get users to click on …

[PDF][PDF] FACE RECOGNITION BASED ATTENDANCE SYSTEM USING HAAR CASCADE AND LOCAL BINARY PATTERN HISTOGRAM ALGORITHM

MSMR Naik, P Jayanth, NSMK Yadav, SK Basha… - ijprems.com
An attendance system is crucial for monitoring student presence in classes, with various
methods available such as biometric, RFID card, face recognition, and traditional paper …

[PDF][PDF] STATE GOVERNMENT FUND ALLOCATION & TRACKING SYSTEM OVER BLOCKCHAIN

SMDR Naik, SS Banu, NL Manasa, GH Sudha… - ijprems.com
There are several departments within the state government, each of which manages a
variety programs for citizens eho qualify based on the criteria established by the government …

[PDF][PDF] AIR QUALITY INDEX FORECASTING VIA GENETIC ALGORITHM BASED IMPROVED EXTREME LEARNING MACHINE

JDS Kumar, P Rizwana, M Pushpanjali, YS Mallika… - ijprems.com
Air quality has always been one of the most important environmental concerns for the
general public and society. Using machine learning algorithms for Air Quality Index (AQI) …

[PDF][PDF] IRIS RECOGNITION MODERN VOTING SYSTEM BASED ON DEEP LEARNING

MJDS Kumar, ASS Reddy, S Inthiyas, U Sridhar… - ijprems.com
ABSTRACT A Project ballot or an Electronic Voting Machine (EVM) based on Direct
Response Electronic (DRE) or Identical Ballot Boxes have traditionally been used for voting …