<p>The developing utilization of web has advanced a simple and quick method for e-correspondence. The outstanding case for this is e-mail. Presently days sending and accepting email as a method for correspondence is prominently utilized. Be that as it may, at that point there stand up an issue in particular, Spam mails. Spam sends are the messages send by some obscure sender just to hamper the improvement of Internet e.g. Advertisement and many more. Spammers introduced the new technique of embedding the spam mails in the attached image in the mail. In this paper, we proposed a method based on combination of SVM and KNN. SVM tend to set aside a long opportunity to prepare with an expansive information set. On the off chance that "excess" examples are recognized and erased in pre-handling, the preparation time could be diminished fundamentally. We propose a k-nearest neighbor (k-NN) based example determination strategy. The strategy tries to select the examples that are close to the choice limit and that are effectively named. The fundamental thought is to discover close neighbors to a question test and prepare a nearby SVM that jelly the separation work on the gathering of neighbors. Our experimental studies based on a public available dataset (Dredze) show that results are improved to approximately 98%.</p>
Intravenous (IV) procedures are often difficult due to the poor visualization of subcutaneous veins. Because existing vein locators lack the ability to assess depth, and also because mis-punctures and poor vascular access remain problematic, we propose an imaging system that employs diffuse reflectance images at three isosbestic wavelengths to measure both the depth and thickness of subcutaneous veins. This paper describes the proposed system as well as proof-of-principle experimental demonstrations. We initially introduce the working principle and structure of the system. All measurements were based on the Monte Carlo (MC) method and accomplished by referring an optical density (OD) ratio to a multi-layer diffuse reflectance model. Results were all validated by comparative ultrasound measurements. Experimental trials included 11 volunteers who were subjected to both ultrasound measurements and the proposed optical process to validate the system's applicability. However, the unreliability of the "thickness" measurement of the vein may be due to the fact that the veins have collapsible walls - so excess pressure by the transducer will give a false thickness.
In order to improve the security and efficiency of image encryption systems comprehensively an image encryption based on enhanced design of Blowfish scheme is proposed. The proposed system is employed block based image encryption technique combined with chaotic map properties. Firstly the digital image is scrambled and decomposed into several key based blocks randomly to decorrelated the relationship between original and processed image then each block is passed through an enhanced blowfish algorithm. The enhancement in design is to gain advantage of the strong facility, which is maintained by blowfish algorithm by overcoming its flaws, which leads to a significant improvement in security/performance. As a result the proposed system offers good performance for image encryption. The proposed algorithm is 320-bit Blowfish-like block cipher, where cascaded looking composition of F-functions is used instead of rounds. The key is accepted a variable length up to 400 bytes. The pragmatic aim of the proposed system is to decrease memory requirements and execution time while keeping the cipher simple and highly adaptable to future demands. To ensure improved encryption algorithm, the implementation of both techniques has been carried out for experimental purposes which is showed that the original image has a flat histogram after encrypted, a decreasing correlation between adjacent pixels in all color components and increasing entropy for the cases studied. The proposed algorithm has a sufficiently large key space and a very high sensitivity to the key. A comparative study with previous Blowfish algorithm shows the superiority of the modified algorithm.
<p>Multiple Secret Image Sharing scheme is a protected approach to transmit more than one secret image over a communication channel. Conventionally, only single secret image is shared over a channel at a time. But as technology grew up, there is a need to share more than one secret image. A fast (r, n) multiple secret image sharing scheme based on discrete haar wavelet transform has been proposed to encrypt m secret images into n noisy images that are stored over different servers. To recover m secret images r noise images are required. Haar Discrete Wavelet Transform (DWT) is employed as reduction process of each secret image to its quarter size (i.e., LL subband). The LL subbands for all secrets have been combined in one secret that will be split later into r subblocks randomly using proposed high pseudo random generator. Finally, a developed (r, n) threshold multiple image secret sharing based one linear system has been used to generate unrelated shares. The experimental results showed that the generated shares are more secure and unrelated. The size reductions of generated shares were 1:4r of the size of each of original image. Also, the randomness test shows a good degree of randomness and security.</p>
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.