ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: INFORMATION SECURED STEELTH STEGANOGRAPHY USING MMS (SSS IN MMS)
Author Name(s): N.V.L.Neelima, D.Himabindu, Rambabu M
Published Paper ID: - IJCRTNCES087
Register Paper ID - 180584
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRTNCES087 and DOI :
Author Country : Indian Author, 500075, India , Moinabad, India , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTNCES087 Published Paper PDF: download.php?file=IJCRTNCES087 Published Paper PDF: http://www.ijcrt.org/papers/IJCRTNCES087.pdf
Title: INFORMATION SECURED STEELTH STEGANOGRAPHY USING MMS (SSS IN MMS)
DOI (Digital Object Identifier) :
Pubished in Volume: 6 | Issue: 1 | Year: March 2018
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 6
Issue: 1
Pages: 495-504
Year: March 2018
Downloads: 2216
E-ISSN Number: 2320-2882
Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography is the word derived from Greek. Stego means hiding, graphy means writing. It is the science of embedding information into the cover image viz., text, video and image without causing statistically significant modification to the cover image. If the selected image is color image, then convert the image into pixels and the pixels into cells. Read each pixel and generate the color code for that pixel. Here we use LSB(least significant bit) technique to hide the message into the image. LSB data hiding technique does not affect the visible properties of the image. For using LSB technique, we first convert the color code into binary language. Now by using LSB technique, we change the least significant bit value for the binary code generated before. So after changing the least significant bit value whatever value we get, for that number we see the color code and then we hide our text in that pixel which will contain that particular color code. Repeat this process until we hide our full message.
Licence: creative commons attribution 4.0
Steganography, Cover image, Pixels, Cells, LSBTechnique, Binary code
Paper Title: EVALUATING THE IMPACT OF STEMMING ACCURACY ON INFORMATION RETRIEVAL
Author Name(s): MD.Afzal, Khaza.K.B.Vali Basha.SK
Published Paper ID: - IJCRTNCES086
Register Paper ID - 180596
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRTNCES086 and DOI :
Author Country : Indian Author, 500075, India , Moinabad, India , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTNCES086 Published Paper PDF: download.php?file=IJCRTNCES086 Published Paper PDF: http://www.ijcrt.org/papers/IJCRTNCES086.pdf
Title: EVALUATING THE IMPACT OF STEMMING ACCURACY ON INFORMATION RETRIEVAL
DOI (Digital Object Identifier) :
Pubished in Volume: 6 | Issue: 1 | Year: December - 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 6
Issue: 1
Pages: 491-494
Year: December - 2017
Downloads: 2253
E-ISSN Number: 2320-2882
In the present years, Text mining is a developing examination issue in Data Mining. Stemming is to discover stop of specific word. Stemming method is utilized to reduce words length to their resource structure, by expelling derivational and inflectional suffix. Various analysts have proposed the procedures for evaluating the quality and closeness of stemming calculations in various ways. This information the measure of the content quantity reduces by the stemming procedure however couldn't be valuable to numeral the exactness of the stemmer. In this paper, we have utilized one of them to evaluate the quality and proposed one basis for measuring the strength(WSF) and two criteria for measuring the accuracy(CSF and AWCF) of stemming calculation. The examination assesses the quality and exactness of four distinctive closes migration stemming calculations what's more, discovered that every one of the calculations allowed. in this paper are solid and heavier, yet are less precise. In any case, the precision of accurately stemmed words and conflating variation expressions of same gathering to medication source word is great, yet not edible, in Paice/Husk stemmer than alternate stemmers
Licence: creative commons attribution 4.0
Paper Title: --
Author Name(s): M. Muni Babu, K. Mamatha
Published Paper ID: - IJCRTNCES085
Register Paper ID - 180595
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRTNCES085 and DOI :
Author Country : Indian Author, 500075, India , Moinabad, India , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTNCES085 Published Paper PDF: download.php?file=IJCRTNCES085 Published Paper PDF: http://www.ijcrt.org/papers/IJCRTNCES085.pdf
Title: --
DOI (Digital Object Identifier) :
Pubished in Volume: 6 | Issue: 1 | Year: December - 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 6
Issue: 1
Pages: 486-490
Year: December - 2017
Downloads: 2418
E-ISSN Number: 2320-2882
The usage of buffer cache improves the system performance and throughput when buffer cache utilized very effectively. For effective use of buffer cache having many techniques in those pattern based methodology works very efficiently and enhance the system performance. Future block reference is identified from the detected pattern. Marginal gain functions are used for managing the partitions. This proposed methodology main aim is improve the buffer cache hit ratio used to enhance the performance
Licence: creative commons attribution 4.0
Buffer Cache, Cache Partition, Replacement policies
Paper Title: TWO- FACTOR DATA SECURITY PROTECTION FOR DATA STORED IN THE CLOUD STORAGE
Author Name(s): CH.Sangeetha, P.Prashanth Kumar, A.Ravi Kumar
Published Paper ID: - IJCRTNCES084
Register Paper ID - 180594
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRTNCES084 and DOI :
Author Country : Indian Author, 500075, India , Moinabad, India , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTNCES084 Published Paper PDF: download.php?file=IJCRTNCES084 Published Paper PDF: http://www.ijcrt.org/papers/IJCRTNCES084.pdf
Title: TWO- FACTOR DATA SECURITY PROTECTION FOR DATA STORED IN THE CLOUD STORAGE
DOI (Digital Object Identifier) :
Pubished in Volume: 6 | Issue: 1 | Year: December - 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 6
Issue: 1
Pages: 482-485
Year: December - 2017
Downloads: 2187
E-ISSN Number: 2320-2882
This Scheme proposed an upgrade information security system for cloud the use of two Components. In this framework sender sends an encoded message to a recipient with the help of cloud component. The sender requires to catch distinguishing proof of collector however no need of different data which joins declaration or open key. To decode the outline content, recipient wants components. The main information or is an exceptional non-open security device or some tools associated with the tablet framework. Second one is close to home key or discharge key put away inside the PC. Without having those issues outline message in no way, nature or form decoded. The critical part is the security apparatus lost or stolen, at that point form content can't be decoded and equipment device is rejected out to decode outline fictional matter. The execution and security assessment show that the device is secure not resisted for all reasons and purposes connected. The device makes utilization of another equipment tool. This paper proposes Identity Based and characteristic based encryption approach of distributed storage which might be implementable On cloud stage. The record investigations the attainability of the applying encryption set of arrangements for information security and privacy in distributed storage with all sort of present day calculations.
Licence: creative commons attribution 4.0
Two- Factor Data Security Protection
Paper Title: SECURE AND EFFICIENT KEYWORD SEARCH IN MULTIPLE CLOUD SERVERS WITH USING PKE & SSE
Author Name(s): Nagarapu Urmila, P.Prashanth Kumar, A.Ravi Kumar
Published Paper ID: - IJCRTNCES083
Register Paper ID - 180593
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRTNCES083 and DOI :
Author Country : Indian Author, 500075, India , Moinabad, India , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTNCES083 Published Paper PDF: download.php?file=IJCRTNCES083 Published Paper PDF: http://www.ijcrt.org/papers/IJCRTNCES083.pdf
Title: SECURE AND EFFICIENT KEYWORD SEARCH IN MULTIPLE CLOUD SERVERS WITH USING PKE & SSE
DOI (Digital Object Identifier) :
Pubished in Volume: 6 | Issue: 1 | Year: December - 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 6
Issue: 1
Pages: 478-481
Year: December - 2017
Downloads: 2184
E-ISSN Number: 2320-2882
we explore the security of an outstanding cryptographic primitive, in particular Public Key Encryption with Keyword Search which is exceptionally valuable in numerous uses of distributed storage. Unfortunately, it has been demonstrated that the normal PEKS structure experiences a natural weakness called inside Keyword Guessing Attack forced by the harmful server. Distributed computing, huge scope of clients and measurements administrators are affected to outsource their realities to cloud servers for enormous accommodation and diminished cost required for data administration. In any case, vital actualities should be scrambled sooner than outsourcing for security necessities, which utilizes records use method like catchphrase fundamentally, based record recovery. Accessible encryption is of expanding excitement for ensuring the information insurance in quiet accessible circulated carport. In this paper, we thinks about the security of a remarkable cryptographic primitive, especially, Public Key Encryption with Keyword Search (PEKS) that is very profitable in a few usages of distributed storage. The customary PEKS structure reports an unavoidable precariousness known as inside Brute Force catchword guesses attack moved through the cruel server. To address this security helplessness, we recommend some other PEKS framework named Dual Server PEKS (DS-PEKS). Through this propose framework, we can enhance the security for distributed storage frameworks.
Licence: creative commons attribution 4.0
Paper Title: IMAGE PROCESSING IN DATA MINING BY USING COLOR K-MEANS CLUSTERING
Author Name(s): KRISHNA MOORTHY, KANNEDARI GOPIKRISHNA, RAMBABU M
Published Paper ID: - IJCRTNCES082
Register Paper ID - 180592
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRTNCES082 and DOI :
Author Country : Indian Author, 500075, India , Moinabad, India , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTNCES082 Published Paper PDF: download.php?file=IJCRTNCES082 Published Paper PDF: http://www.ijcrt.org/papers/IJCRTNCES082.pdf
Title: IMAGE PROCESSING IN DATA MINING BY USING COLOR K-MEANS CLUSTERING
DOI (Digital Object Identifier) :
Pubished in Volume: 6 | Issue: 1 | Year: December - 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 6
Issue: 1
Pages: 473-477
Year: December - 2017
Downloads: 2330
E-ISSN Number: 2320-2882
Now-a-days people are interested in using digital images. There is a great need for developing an efficient technique for finding an image. Image mining is a vital technique which is used to mine knowledge straight forwardly from image. Image segmentation is the primary phase in image mining. It has been a difficult task in computer vision. The role of image segmentation is to decompose an image into parts that are meaningful with respect to the particular applications. The goal of data mining process is to extract information from a data set and transform it into an understandable structure for further use. The pixel discovery is critical issue for any specialists. In this work a strategy to recognize pixels by utilizing picture preparing methods with incorporates picture pre-handling , picture division, extraction, morphological operations and grouping system is used. Abnormal pixels are identified in filtered image by using marker controlled watershed segmentation and gradient magnitude. This present work proposes a technique to identify the pixel point adequately from the filter pictures. It will minimize blunder made by the human exposed eye. MATLAB is broadly utilized programming for the investigation of data mining identification from filtered pictures. We utilized MATLAB 2017b for building up this anticipate.
Licence: creative commons attribution 4.0
picture identification, Gaussian mixture, watershed transform, morphological functions, L*a*b color based, k-means clustering, Thresholding, MATLAB 2017b
Paper Title: ENHANCING THE BUG TOSSING GRAPHS AND CHARACTERISTICS OF BUG SIMILARITIES
Author Name(s): T.L.N.Varaprasad, Rambabu M
Published Paper ID: - IJCRTNCES081
Register Paper ID - 180591
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRTNCES081 and DOI :
Author Country : Indian Author, 500075, India , Moinabad, India , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTNCES081 Published Paper PDF: download.php?file=IJCRTNCES081 Published Paper PDF: http://www.ijcrt.org/papers/IJCRTNCES081.pdf
Title: ENHANCING THE BUG TOSSING GRAPHS AND CHARACTERISTICS OF BUG SIMILARITIES
DOI (Digital Object Identifier) :
Pubished in Volume: 6 | Issue: 1 | Year: December - 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 6
Issue: 1
Pages: 467-472
Year: December - 2017
Downloads: 2212
E-ISSN Number: 2320-2882
A bug report is typically assigned to a single developer who is then responsible for fixing the bug. Development a new bug firstly is found by developers or users. Then the bug is described as a bug report, which is submitted to a bug repository. Finally the bug trigger checks the bug report and typically assigns a developer to fix the bug. The assignment process is time-consuming and error-prone. Furthermore, a large number of bug reports are tossed (reassigned) to other developers, which increases bug-fix time. In order to quickly identify the fixer to bug reports we present an approach based on the bug tossing history and textual similarities between bug reports. This proposed approach is evaluated on Eclipse and Mozilla. The results show that our approach can significantly improve the efficiency of bug assignment: the bug fixer is often identified with fewer tossing events.
Licence: creative commons attribution 4.0
bug assignment, bug reports, bug tossing, information retrieval, software engineering
Paper Title: A COMPARATIVE STUDY ON BIGDATA WITH DTA MINING AND ITS APPLICATIONS
Author Name(s): Ganga Patur
Published Paper ID: - IJCRTNCES080
Register Paper ID - 180590
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRTNCES080 and DOI :
Author Country : Indian Author, 500075, India , Moinabad, India , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTNCES080 Published Paper PDF: download.php?file=IJCRTNCES080 Published Paper PDF: http://www.ijcrt.org/papers/IJCRTNCES080.pdf
Title: A COMPARATIVE STUDY ON BIGDATA WITH DTA MINING AND ITS APPLICATIONS
DOI (Digital Object Identifier) :
Pubished in Volume: 6 | Issue: 1 | Year: December - 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 6
Issue: 1
Pages: 462-466
Year: December - 2017
Downloads: 2188
E-ISSN Number: 2320-2882
Licence: creative commons attribution 4.0
Big data, big data architecture, Data mining issues
Paper Title: IMPROVING DATA SECURITY IN AUDIO STEGANOGRAPHY WITH PADDING LSB TECHNIQUES AND AUDIO FILES
Author Name(s): G.Srikanth, K.Ganesh Kumar, K.Shivangini Reddy, Rambabu M
Published Paper ID: - IJCRTNCES079
Register Paper ID - 180589
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRTNCES079 and DOI :
Author Country : Indian Author, 500075, India , Moinabad, India , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTNCES079 Published Paper PDF: download.php?file=IJCRTNCES079 Published Paper PDF: http://www.ijcrt.org/papers/IJCRTNCES079.pdf
Title: IMPROVING DATA SECURITY IN AUDIO STEGANOGRAPHY WITH PADDING LSB TECHNIQUES AND AUDIO FILES
DOI (Digital Object Identifier) :
Pubished in Volume: 6 | Issue: 1 | Year: December - 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 6
Issue: 1
Pages: 456-461
Year: December - 2017
Downloads: 2200
E-ISSN Number: 2320-2882
The project entitled Audio Steganography is the application developed to embed an audio file in another audio signal. It is concerned with embedding information in an innocuous cover Speech in a secure and robust manner. This system makes the Files more secure by using the concepts Steganography and Cryptography. Steganography, poor cousin of Cryptography is the art of hiding messages inside other messages such that the very existence of the message is unknown to third party. The goal of cryptography is to make data unreadable by a third party, the goal of stenography is to hide the data from a third party Through the use of advanced computer software, authors of images and software can place a hidden trademark in their product, allowing them to keep a check on piracy. This is commonly known as watermarking. Hiding serial numbers or a set of characters that distinguishes an object from a similar object is known as finger printing. Together, these two are intended to fight piracy. The latter is used to detect copyright violators and the former is used to prosecute them. But these are only examples of the much wider field of stenography.The cover data should not be significantly degraded by the embedded data, and the embedded data should be as imperceptible as possible. The embedded data should be as immune as possible to modifications from intelligent attacks or anticipated manipulations .Thus it is necessary that the hidden message should be encrypted.
Licence: creative commons attribution 4.0
Audio Steganography , Padding LSB Techniques
Paper Title: DESIGNING OF CONTENT BASED IMAGE RETRIEVAL USING BOTH COLOR AND SHAPE FEATURES
Author Name(s): Raghu Kumar Lingamallu
Published Paper ID: - IJCRTNCES078
Register Paper ID - 180587
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRTNCES078 and DOI :
Author Country : Indian Author, 500075, India , Moinabad, India , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTNCES078 Published Paper PDF: download.php?file=IJCRTNCES078 Published Paper PDF: http://www.ijcrt.org/papers/IJCRTNCES078.pdf
Title: DESIGNING OF CONTENT BASED IMAGE RETRIEVAL USING BOTH COLOR AND SHAPE FEATURES
DOI (Digital Object Identifier) :
Pubished in Volume: 6 | Issue: 1 | Year: December - 2017
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 6
Issue: 1
Pages: 451-455
Year: December - 2017
Downloads: 2180
E-ISSN Number: 2320-2882
Content-Based image acts to get back (CBIR) uses the seeing what is in of an image such as color, form, feeling of a material, and spatial general design to represent and list of words in a book the image. action-bound make observations in CBIR is geared in the direction of the development of methodologies for getting at details, interpreting price listing and giving pointer image knowledge-bases. In addition to their development, efforts are also being made to value the operation of image acts to get back systems. The quality of move is heavily dependent on the good quality of the careful way used to produce point gives directions to be taken and likeness measure for comparison of points. In this paper we offered an algorithm which makes into company the more chances of different other algorithms to get well the having no error and doing a play of acts to get back. The having no error of color histogram based matching can be increased by using Color soundness guide (CCV) for coming one after another polish. The rate of motion of form based acts to get back can be gave greater value to by giving thought to as rough form rather than the certain, errorless form. In addition to this a mix of color and form based acts to get back is also included to get well the having no error of the outcome
Licence: creative commons attribution 4.0
CBIR, Shape, Color Coherence Vector, Centroid