Learn More
In this paper, a perceptual encryption algorithm is proposed. The perceptual feature requires that the quality of visual data be partially degraded by encryption. This algorithm selectively encrypts fixed-length code words in video input with three control factors. It provides useful features, viz. strict-size preservation, on-the-fly encryption and(More)
—This work represents hardware implementation of Lempel Ziv algorithm for lossless image compression. In this paper, hardware-based encoder and decoder have been used. In the proposed system Altera DE-I Board have been used for implementation of an image compression algorithm. The architecture of compression and decompression algorithm design has been(More)
Even though speech recognition is a broad subject, the commercial and personal use implementations are rare. Although some promising solutions are available for speech synthesis and recognition, most of them are tuned to English. The acoustic and language model for these systems are for English language. Most of them require a lot of configuration before(More)
In last few years human identification is very crucial area in security. Biometric recognition is the best solution over this. This consist of two types biometric systems: namely uni-biometric and multi-biometric systems. In the last eras uni-biotric systems are used for humanoid identification and security purpose. Now days the trends towards(More)
  • 1