Saurabh Saoji - Academia.edu (original) (raw)

Papers by Saurabh Saoji

Research paper thumbnail of Tooth Liner Techniques Using Harris Corner Detection Method

CERN European Organization for Nuclear Research - Zenodo, Nov 25, 2014

The significance of identifying early non-cavitated carious lesions and monitoring the lesion ext... more The significance of identifying early non-cavitated carious lesions and monitoring the lesion extent has led to increasing prospects for prevention, early diagnosis, and implementation of conservative treatments for the accurate parameters of human teeth. The Harris algorithm was evaluated to measure the ability of different methods for measuring the parameters of teeth and in order to detect the corners of the teeth image, which were acquired by intra oral camera for oral cavity. The corner detector techniques is used with morphology open operation and median filtering and then segment the image by the threshold based on the gray value of the image.

Research paper thumbnail of Furniture Layout Application Based on Marker Detection and Using Augmented Reality

Nowadays information and communication technology supports the development of human interaction w... more Nowadays information and communication technology supports the development of human interaction with physical, computer and virtual environment such as science, commercial, banking, education, etc. Augmented reality is a field of computer research which deals combination of reality with computer related data. In early days if we users wanted to buy a furniture objects without visiting the shops it was possible but it was not possible to check how the object actually looks in home structure. Now in our proposed system, it is possible for user to buy the furniture objects sitting in the home without visiting the shops. The main purpose of the project is to develop a windows application for trying different furniture in virtual way. The application will eliminate the human efforts by physically visiting the furniture store which is very time consuming activity.

Research paper thumbnail of Phishing Detection System Using Visual Cryptography

Phishing is an attempt by an individual or a group of individuals to thieve personal confidential... more Phishing is an attempt by an individual or a group of individuals to thieve personal confidential information such as passwords, credit card information etc. from different users and systems for gaining money and other fake activities. In this thesis has been projected a new loom named as "Phishing Detection System using visual cryptography" to solve the difficulties encountered because of phishing. Here a picture base verification by means of Visual Cryptography (vc) is used. The main aim of visual cryptography is to preserve the privacy of image captcha by decomposing the original image captcha into two shares that are stored in separate database servers such that the original image captcha can be revealed only when both are simultaneously available; the individual sheet of images do not reveal the identity of the original picture captcha which was generated previously. Once the unique picture captcha is discovered to the user then that picture captcha can be used as a password for detecting phishing.

Research paper thumbnail of Design & Implementation Interface for Electrical or Electronics Lab Simulator

Research paper thumbnail of A Survey on Textual Graphical Password Scheme

Information and computer security has large numbers of combinations of passwords for the authenti... more Information and computer security has large numbers of combinations of passwords for the authentication process, but in which alphanumeric username and passwords has too much drawbacks. To reduce all this vulnerabilities of traditional methods, textual graphical password scheme using color combinations have been developed for the possible alternative solution to old one traditional system. The textual password authentication is not secure and has high failure rate compare to the others because shoulder surfing is too much easy for textual based password. To overcome these, the primary design without any extra complexity into the authentication process is improved. With this textual graphical scheme using color, user can efficiently and securely login to the system without worrying of shoulder surfing attack.

Research paper thumbnail of Line Analyzer Techniques for Teeth Using Edge-Based Method and Gray-Based Method

2014 Fourth International Conference on Communication Systems and Network Technologies, 2014

As every field is going to be advance in and each field use an upcoming technology, the oral medi... more As every field is going to be advance in and each field use an upcoming technology, the oral medicine are also updating the instrument for measuring the dimension of teeth for proper alignment at proper place, there are many instrument which are used to calculate the parameters of teeth for line analyzer, but the calculated value considered was not in point fraction which had lead to improper data as after teeth preparation, filler was used to align and fit the teeth at proper position. But with use of HD micro-camera the image will be taken which will go under various calculating measure for finding the proper fraction value.

Research paper thumbnail of Textual Graphical Password Scheme against Shoulder Surfing Attack

International Journal of Engineering and Computer Science, 2015

Schemes like conventional password schemes such as textual password scheme, graphical scheme are ... more Schemes like conventional password schemes such as textual password scheme, graphical scheme are commonly used for authentication. But these schemes are vulnerable to dictionary attack, shoulder surfing attack, accidental login. Hence the text-based shoulder surfing resistant graphical password schemes have been proposed. These existing schemes are not secure and efficient enough and have high failure rate. The text-based shoulder surfing resistant graphical password scheme is improved by using colors. In addition one time password is also used. So it has become more secure. User can easily login to the system. Unauthorized user cannot get the password easily. Hence this scheme provide protection against the shoulder surfing.

Research paper thumbnail of Tooth Liner Techniques Using Harris Corner Detection Method

CERN European Organization for Nuclear Research - Zenodo, Nov 25, 2014

The significance of identifying early non-cavitated carious lesions and monitoring the lesion ext... more The significance of identifying early non-cavitated carious lesions and monitoring the lesion extent has led to increasing prospects for prevention, early diagnosis, and implementation of conservative treatments for the accurate parameters of human teeth. The Harris algorithm was evaluated to measure the ability of different methods for measuring the parameters of teeth and in order to detect the corners of the teeth image, which were acquired by intra oral camera for oral cavity. The corner detector techniques is used with morphology open operation and median filtering and then segment the image by the threshold based on the gray value of the image.

Research paper thumbnail of Furniture Layout Application Based on Marker Detection and Using Augmented Reality

Nowadays information and communication technology supports the development of human interaction w... more Nowadays information and communication technology supports the development of human interaction with physical, computer and virtual environment such as science, commercial, banking, education, etc. Augmented reality is a field of computer research which deals combination of reality with computer related data. In early days if we users wanted to buy a furniture objects without visiting the shops it was possible but it was not possible to check how the object actually looks in home structure. Now in our proposed system, it is possible for user to buy the furniture objects sitting in the home without visiting the shops. The main purpose of the project is to develop a windows application for trying different furniture in virtual way. The application will eliminate the human efforts by physically visiting the furniture store which is very time consuming activity.

Research paper thumbnail of Phishing Detection System Using Visual Cryptography

Phishing is an attempt by an individual or a group of individuals to thieve personal confidential... more Phishing is an attempt by an individual or a group of individuals to thieve personal confidential information such as passwords, credit card information etc. from different users and systems for gaining money and other fake activities. In this thesis has been projected a new loom named as "Phishing Detection System using visual cryptography" to solve the difficulties encountered because of phishing. Here a picture base verification by means of Visual Cryptography (vc) is used. The main aim of visual cryptography is to preserve the privacy of image captcha by decomposing the original image captcha into two shares that are stored in separate database servers such that the original image captcha can be revealed only when both are simultaneously available; the individual sheet of images do not reveal the identity of the original picture captcha which was generated previously. Once the unique picture captcha is discovered to the user then that picture captcha can be used as a password for detecting phishing.

Research paper thumbnail of Design & Implementation Interface for Electrical or Electronics Lab Simulator

Research paper thumbnail of A Survey on Textual Graphical Password Scheme

Information and computer security has large numbers of combinations of passwords for the authenti... more Information and computer security has large numbers of combinations of passwords for the authentication process, but in which alphanumeric username and passwords has too much drawbacks. To reduce all this vulnerabilities of traditional methods, textual graphical password scheme using color combinations have been developed for the possible alternative solution to old one traditional system. The textual password authentication is not secure and has high failure rate compare to the others because shoulder surfing is too much easy for textual based password. To overcome these, the primary design without any extra complexity into the authentication process is improved. With this textual graphical scheme using color, user can efficiently and securely login to the system without worrying of shoulder surfing attack.

Research paper thumbnail of Line Analyzer Techniques for Teeth Using Edge-Based Method and Gray-Based Method

2014 Fourth International Conference on Communication Systems and Network Technologies, 2014

As every field is going to be advance in and each field use an upcoming technology, the oral medi... more As every field is going to be advance in and each field use an upcoming technology, the oral medicine are also updating the instrument for measuring the dimension of teeth for proper alignment at proper place, there are many instrument which are used to calculate the parameters of teeth for line analyzer, but the calculated value considered was not in point fraction which had lead to improper data as after teeth preparation, filler was used to align and fit the teeth at proper position. But with use of HD micro-camera the image will be taken which will go under various calculating measure for finding the proper fraction value.

Research paper thumbnail of Textual Graphical Password Scheme against Shoulder Surfing Attack

International Journal of Engineering and Computer Science, 2015

Schemes like conventional password schemes such as textual password scheme, graphical scheme are ... more Schemes like conventional password schemes such as textual password scheme, graphical scheme are commonly used for authentication. But these schemes are vulnerable to dictionary attack, shoulder surfing attack, accidental login. Hence the text-based shoulder surfing resistant graphical password schemes have been proposed. These existing schemes are not secure and efficient enough and have high failure rate. The text-based shoulder surfing resistant graphical password scheme is improved by using colors. In addition one time password is also used. So it has become more secure. User can easily login to the system. Unauthorized user cannot get the password easily. Hence this scheme provide protection against the shoulder surfing.