Sie sind auf Seite 1von 4

Title of Project: - A Digital Image Copyright Protection Scheme Based on Visual

Cryptography
Group Members:
Sr.
No.
1.

Name of the Student

Contact No.

Email-Id

Nikhil N. Baviskar
Prashant P.

9975511896

nikhilbaviskar1@gmail.com
prashantkshirsagar48@gmail.co

2.
3.

Kshirsagar
Abhijeet R. Borde

8390729222
8693034117

m
bordeabhijeet4@gmail.com

ABSTRACT
A simple and efficient watermark method is proposed in this paper. The
watermark method is an excellent technique to protect the copyright ownership of a digital
image. The proposed watermark method is built up on the concept of visual cryptography.
According to the proposed method, the watermark pattern does not have to be embedded into the
original image directly, which makes it harder to detect or recover from the marked image in an
illegal way. It can be retrieved from the marked image without making comparison with the
original image. The notary also can off-line adjudge the ownership of the suspect image by this
method. The watermark pattern can be any significant black/white image that can be used to
typify the owner. Experimental results show that the watermark pattern in the marked image has
good transparency and robustness. By the proposed method, all the pixels of the marked image
are equal to the original image.

Front End: - VB.Net


Back End: - Matlab, Access
Remark: -

Title of Project: - IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE


CHAOTIC MAPS
Group Members:
Sr.
No.
1.

Name of the Student

Contact No.

Email-Id

Nikhil N. Baviskar
Prashant P.

9975511896

nikhilbaviskar1@gmail.com
prashantkshirsagar48@gmail.co

2.
3.

Kshirsagar
Abhijeet R. Borde

8390729222
8693034117

m
bordeabhijeet4@gmail.com

ABSTRACT
In the recent world, security is a prime important issue, and encryption is one of
the best alternative way to ensure security. More over, there are many image encryption schemes
have been proposed, each one of them has its own strength and weakness. This paper presents a
new algorithm for the image encryption/decryption scheme. This paper is devoted to provide a
secured image encryption technique using multiple chaotic based circular mapping. In this paper,
first, a pair of sub keys is given by using chaotic logistic maps. Second, the image is encrypted
using logistic map sub key and in its transformation leads to diffusion process. Third, sub keys
are generated by four different chaotic maps. Based on the initial conditions, each map may
produce various random numbers from various orbits of the maps. Among those random
numbers, a particular number and from a particular orbit are selected as a key for the encryption
algorithm. Based on the key, a binary sequence is generated to control the encryption algorithm.
The input image of 2-D is transformed into a 1- D array by using two different scanning pattern
(raster and Zigzag ) and then divided into various sub blocks. Then the position permutation and
value permutation is applied to each binary matrix based on multiple chaos maps. Finally the
receiver uses the same sub keys to decrypt the encrypted images. The salient features of the
proposed image encryption method are loss-less, good peak signal to noise ratio (PSNR),
Symmetric key encryption, less cross correlation, very large number of secret keys, and keydependent pixel value replacement.

Front End: - VB.Net


Back End: - Matlab, Access
Remark: -

Title of Project: - A Fast Method for Image Mosaicing using Geometric Hashing

Group Members:
Sr.
No.
1.

Name of the Student

Contact No.

Email-Id

Nikhil N. Baviskar
Prashant P.

9975511896

nikhilbaviskar1@gmail.com
prashantkshirsagar48@gmail.co

2.
3.

Kshirsagar
Abhijeet R. Borde

8390729222
8693034117

m
bordeabhijeet4@gmail.com

ABSTRACT
The general problem of mosaicing is to create a single seamless image by aligning
a series of spatially overlapped images. The result is an image with a field of view greater than
that of a single image. Traditionally this research has been aimed at stitching together images
taken by aerial or satellite reconnaissance equipment. With the advancement of personal
computing equipment, the creation of image mosaic has entered the consumer market. Thus,
automation of the process is an important issue. This paper proposes a new method for automatic
generation of mosaics using Geometric Hashing. This speeds up the matching process. We show
the application of our method on two important cases namely, rigid planar motion and panoramic
mosaics. We provide experimental results in support of our proposed method.

Front End: - VB.Net


Back End: - Matlab, Access
Remark: -

Title of Project: - XML-based Data Mining Design and Implementation

Group Members:
Sr.
No.
1.

Name of the Student

Contact No.

Email-Id

Nikhil N. Baviskar
Prashant P.

9975511896

nikhilbaviskar1@gmail.com
prashantkshirsagar48@gmail.co

2.
3.

Kshirsagar
Abhijeet R. Borde

8390729222
8693034117

m
bordeabhijeet4@gmail.com

ABSTRACT
Abstract-this paper studies the basic methods and techniques of XML-based Web
data mining, describes data mining classification and process, as well as the related technologies
of XML. On this basis, it designs an application system of XML in Web data mining and
specifically provides the systemic and functional structure of it, finally, based on the MXL
technology to achieve the Web log mining and improve the main algorithm.

Front End: - .Net


Back End: - xml, Access
Remark: -

Das könnte Ihnen auch gefallen