Downloads: 132
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014
Reserving Room before Encryption Using Reversible Data Hiding Through Encrypted Images
A. Mallareddy [2] | P Anjibabu
Abstract: Privacy has acquired considerable attention but is still largely ignored inside multimedia local community. Consider some sort of cloud research scenario the spot that the server can be resource-abundant, and is also capable regarding finishing the particular designated duties. It can be envisioned in which secure advertising applications using privacy preservation is going to be treated seriously. In view that the scale-invariant characteristic transform (SIFT) has become widely adopted in several fields, this project may be the first to the fact that privacy-preserving SORT (PPSIFT) and to address the condition of safeguarded SIFT characteristic extraction and also representation inside encrypted domain. .
Keywords: Feature Extraction, Privacy Preservation, Security
Edition: Volume 3 Issue 9, September 2014,
Pages: 432 - 436
Similar Articles with Keyword 'Feature Extraction'
Downloads: 0
Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022
Pages: 1023 - 1029A Survey and High-Level Design on Human Activity Recognition
Abhishikat Kumar Soni | Dhruv Agrawal | Md. Ahmed Ali | Dr. B. G. Prasad [4]
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 629 - 634A Face Spoof Detection using Feature Extraction and SVM
Lovely Pal [2] | Renuka Singh [2]