Sie sind auf Seite 1von 7

i

A Project Dissertation
On
A MULTI LEVEL SWT & DWT TRANSFORM FOR IMAGE RESOLUTION
ENHANCEMENT
Submitted in partial fulfillment of the requirements for the award of the degree
of
MASTER OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING

BY
K.SRINIVAS (12951D5814)



INSTITUTE OF AERONAUTICAL ENGINEERING
(Accredited by NBA, New Delhi & Approved by AICTE, New Delhi)
(Affliated to JNTU, Hyderabad & Approved by AICTE)
Dundigal, Qutbullapur Mandal. R.R District.Hyderabad-500043
2012-2014


ii

A MULTI LEVEL SWT & DWT TRANSFORM FOR IMAGE
RESOLUTION ENHANCEMENT
Dissertation submitted in partial fulfillment of the requirements for the award of
the degree of
MASTER OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING
BY
K.SRINIVAS (12951D5814)

Under the esteemed guidance of
Mr. P.RAVINDRA




DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
INSTITUTE OF AERONAUTICAL ENGINEERING
(Affiliated to Jawaharlal Nehru Technological University)
DUNDIGAL, QUTHBULLAPUR MANDAL
R.R.DIST, HYDERABAD-500 043
2014


iii

INSTITUTE OF AERONAUTICAL ENGINEERING
DUNDIGAL
HYDERABAD-500 043

CERTIFICATE

This is to certify that the Dissertation entitled A MULTI LEVEL SWT & DWT TRANSFORM FOR
IMAGE RESOLUTION ENHANCEMENT is being submitted by K.SRINIVAS (Roll no.
12951D5814) in partial fulfillment of the requirement for the award of the degree of MASTER OF
TECHNOLOGY in COMPUTER SCIENCE AND ENGINEERING, to the, Jawaharlal Nehru
Technological University, Hyderabad is a record of bonafide work carried out by her under my
guidance.
The results present in this dissertation have been verified and are found to be satisfactory. The results
embodied in this dissertation have not been submitted to any other University for the award of any degree
or diploma.

INTERNAL EXAMINER EXTERNAL EXAMINER

HEAD OF THE DEPARTMENT
Computer Science and Engineering


iv
IARE

ACKNOWLEDGEMENT
I sincerely express my deep sense of gratitude to Mr. P.Ravindra for their valuable guidance, constant
encouragement and cooperation during all phases of the project.
It is great opportunity to render my sincere and honest thanks to Dr. N.ChandraShekar Reddy,
Professor and Head of the Department of Computer Science and Engineering for his timely guidance and
highly interactive attitude which helped me a lot in successful execution of the project.
I am also extremely thankful to our Principal Dr. G. POSHAL, who stood as an inspiration behind this
project and heart full thanks for his endorsement and valuable suggestions.
I thank all the teaching and non-teaching staff for their extreme co-operation and for their assistance. I
thank everyone who directly and indirectly helped me in completion of the project.



K.SRINIVAS
(12951D5814)





v

LIST OF FIGURES

FIGURE NO FIGURE NAME PAGENO
3.4 ARCHITECTURE

14
4.2.1 AES STRUCTURE

23


4.2.2 SHAMIRS SECRET SHARING
SCHEME

24
4.4.1

DATA FLOW DIAGRAMS

30
4.4.1.1
DFD Level 0

30
4.4.1.2
DFD Level 1

31
4.4.1.3
DFD Leve1 2

32
4.4.2
UML DIAGRAMS


33

4.4.2.1
USECASE DIAGRAM
33

4.4.2.2
CLASS DIAGRAM
34

4.4.2.3
SEQUENCE DIAGRAM

35
4.4.2.4
ACTIVITY DIAGRAM

36
4.4.2.5
COLLABORATION
DIAGRAM
37
4.4.2.6
ENTITY RELATIONSHIP
38


vi
DIAGRAM


LIST OF ABBREVATIONS


AES
ADVANCED ENCRYPTION STANDARD
SSS
S
SHAMIRS SECRET SHARING SCHEME
JSP JAVA SERVER PAGES






















vii

ABSTRACT

The major aims of this technique a secure multi-owner information sharing theme. It implies that
any user within the cluster will firmly share information with others by the world organization
trustworthy cloud. This theme is ready to support dynamic teams. expeditiously, specifically,
new granted users will directly rewrite information files uploaded before their participation while
not contacting with information house owners. User revocation will be simply achieved through
a completely unique revocation list while not change the key.Keys of the remaining users the
scale and computation overhead of coding are constant and independent with the amount of
revoked users.We have a tendency to gift a secure and privacy-preserving access management to
users, that guarantee any member during a cluster to anonymously utilize the cloud resource.
Moreover, the real identities of knowledge house owners will be disclosed by the cluster
manager once disputes occur.We offer rigorous security analysis, and perform intensive
simulations to demonstrate the potency of our theme in terms of storage and computation
overhead. Cloud computing provides a cost-effective and economical resolution for sharing
cluster resource among cloud users sharing information. An exceedingly in a very multi-owner
manner whereas conserving information and identity privacy from an untrusted cloud continues
to be a difficult issue, because of the frequent modification of the membership.

Das könnte Ihnen auch gefallen