ABSTRACT Information security is one of the most important factors to be considered when secret information has to be communicated between two parties. Cryptography scrambles the information, but it reveals the existence of the information....
ABSTRACT Steganography is one of the methods of secret communication that hides the existence of message so that a viewer cannot detect the transmission of message and hence cannot try to Extract it. It is the process of embedding...
ABSTRACT Steganography is one of the methods of secret communication that hides the existence of message so that a viewer cannot detect the transmission of message and hence cannot try to Extract it. It is the process of embedding...
ABSTRACT Steganography is one of the methods of secret communication that hides the existence of message so that a viewer cannot detect the transmission of message and hence cannot try to Extract it. It is the process of embedding...
ABSTRACT The lossless compression is that allows the original data to be perfectly reconstructed from the compressed data. Lossless compression programs do two things in sequence: the first step generates a statistical model for...
ABSTRACT Preserving the attendance is very crucial in all the institutes for checking the overall performance of students. Each institute has its very own method in this regard. A few are taking attendance manually using the old paper or document...
ABSTRACT Handwriting recognition is one of the compelling research works going on because every individual in this world has their own style of writing. It is the capability of the computer to identify and understand handwritten...
ABSTRACT Barcodes are the symbols which represents the products information which is present at the backside of the product of a company. Barcodes are the thick and thin lines which are parallel to each other and it is in the form...
ABSTRACT The subject of face recognition is as old as computer vision because of the practical importance of the topic and theoretical interest from cognitive scientists. Despite the fact that other methods of identification...
ABSTRACT Doing image processing and especially blob analysis it is often required to check some objects' shape and depending on it perform further processing of a particular object or not. For example, some applications...
ABSTRACT In addressing the worldwide Covid-19 pandemic situation, the process of flattening the curve for coronavirus cases will be difficult if the citizens do not take action to prevent the spread of the virus. One of the most important...
ABSTRACT Steganography is one of the methods of secret communication that hides the existence of message so that a viewer cannot detect the transmission of message and hence cannot try to decrypt it. It is the process of embedding...
ABSTRACT During the last decade information security has become the major issue. The encrypting and decrypting of the data has been widely investigated because the demand for the better encryption and decryption of the data is gradually...
ABSTRACT Brain tumors are the most common issue in children. Approximately 3,410 children and adolescents under age 20 are diagnosed with primary brain tumors each year. Brain tumors, either malignant or benign, that originate in the cells...
ABSTRACT During the last decade information security has become the major issue. The encrypting and decrypting of the data has been widely investigated because the demand for the better encryption and decryption of the data is gradually...