ankit gupta - Academia.edu (original) (raw)

Uploads

Papers by ankit gupta

Research paper thumbnail of English

Research paper thumbnail of A Robust DCT based Digital Image Watermarking using Random Mid-band Coefficient Exchange Scheme for Gray Scale Images

International Journal of Computer Applications, 2014

Various watermarking algorithm has been developed in recent years. The two-dimension DCT and its ... more Various watermarking algorithm has been developed in recent years. The two-dimension DCT and its counterpart Inverse 2-D DCT, are the most complex parts in the DCT-based watermarking systems. In this paper, the watermark to be inserted in the cover image is encrypted through a proposed encryption strategy to enhance the overall security instead of embedding the exact watermark bits. Every unique sequence of four bits is mapped to a unique sequence of length eight. These sequences are generated by a seeded pseudo-random generator. Due to this, size of the bits becomes double but the advantage is that the watermark cannot be detectable through normalized correlation. The encrypted watermark is inserted into the image using proposed randomized discrete cosine transform (DCT) based mid-band coefficients exchange scheme. To extract the original watermark, it is required to decrypt the extracted bits. Mapping with the same pseudo-random sequences is done. The strategy is robust against the blind watermark detection. Different Gray scale images of size (512* 512) have been used in this approach. The proposed method shows better results in terms of PSNR.

Research paper thumbnail of An Image Encryption using Block based Transformation and Bit Rotation Technique

International Journal of Computer Applications, 2014

Along with the rapid increasing growth of computer and network technologies, images are being tra... more Along with the rapid increasing growth of computer and network technologies, images are being transmitted more and more frequently. Security of image is a big issue. Image information is lively and visual, and has been an important means of expressing information of person. There are many encryption algorithm had been available each one having some strength and weakness. In this paper we present an image encryption technique that combines the concept of block based transformation and pixel manipulation. The proposed method consist of two stages 1) In first step we apply block based matrix transformation for pixel position manipulation; 2) In second stage, apply bit rotation technique that change the value of each pixel.

Research paper thumbnail of Movie Recommendations Using Social Networks

This paper explores utilization of information from social networks in making automatic movie rec... more This paper explores utilization of information from social networks in making automatic movie recommendations. Implementations of three different algorithms (SVM, Clustering, and Ranking SVM) are implemented and evaluated. The general approach utilizes a large collection of Facebook profile information as training set in order to generate a list of movie recommendations for a particular user (client). A brief analysis of the importance of specific profile features in making movie recommendations is conducted ...

Research paper thumbnail of English

Research paper thumbnail of A Robust DCT based Digital Image Watermarking using Random Mid-band Coefficient Exchange Scheme for Gray Scale Images

International Journal of Computer Applications, 2014

Various watermarking algorithm has been developed in recent years. The two-dimension DCT and its ... more Various watermarking algorithm has been developed in recent years. The two-dimension DCT and its counterpart Inverse 2-D DCT, are the most complex parts in the DCT-based watermarking systems. In this paper, the watermark to be inserted in the cover image is encrypted through a proposed encryption strategy to enhance the overall security instead of embedding the exact watermark bits. Every unique sequence of four bits is mapped to a unique sequence of length eight. These sequences are generated by a seeded pseudo-random generator. Due to this, size of the bits becomes double but the advantage is that the watermark cannot be detectable through normalized correlation. The encrypted watermark is inserted into the image using proposed randomized discrete cosine transform (DCT) based mid-band coefficients exchange scheme. To extract the original watermark, it is required to decrypt the extracted bits. Mapping with the same pseudo-random sequences is done. The strategy is robust against the blind watermark detection. Different Gray scale images of size (512* 512) have been used in this approach. The proposed method shows better results in terms of PSNR.

Research paper thumbnail of An Image Encryption using Block based Transformation and Bit Rotation Technique

International Journal of Computer Applications, 2014

Along with the rapid increasing growth of computer and network technologies, images are being tra... more Along with the rapid increasing growth of computer and network technologies, images are being transmitted more and more frequently. Security of image is a big issue. Image information is lively and visual, and has been an important means of expressing information of person. There are many encryption algorithm had been available each one having some strength and weakness. In this paper we present an image encryption technique that combines the concept of block based transformation and pixel manipulation. The proposed method consist of two stages 1) In first step we apply block based matrix transformation for pixel position manipulation; 2) In second stage, apply bit rotation technique that change the value of each pixel.

Research paper thumbnail of Movie Recommendations Using Social Networks

This paper explores utilization of information from social networks in making automatic movie rec... more This paper explores utilization of information from social networks in making automatic movie recommendations. Implementations of three different algorithms (SVM, Clustering, and Ranking SVM) are implemented and evaluated. The general approach utilizes a large collection of Facebook profile information as training set in order to generate a list of movie recommendations for a particular user (client). A brief analysis of the importance of specific profile features in making movie recommendations is conducted ...

Log In