ABOUT IMAGE PROCESSING PROJECT 2019 – 2020
Digital Image Processing Deals With Manipulation Of Digital Images Through A Digital Computer. It Is A Subfield Of Signals And Systems But Focus Particularly On Images. DIP Focuses On Developing A Computer System That Is Able To Perform Processing On An Image. The Input Of That System Is A Digital Image And The System Process That Image Using Efficient Algorithms, And Gives An Image As An Output.
SNO | Projects List |
1 | Trust enhanced cryptography role based access control for secure cloud data storage |
2 | Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints |
3 | A Time efficient approach for detecting errors in big sensor data on cloud |
4 | Cost Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds |
5 | Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption |
7 | Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage |
8 | Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud |
9 | PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative |
10 | Enabling Fine-grained Multi-keyword Search Supporting Classified |
11 | A Secure and Dynamic Multi keyword Ranked Search Scheme over Encrypted cloud |
12 | Real-time Twitter sentiment analysis with Stream Analytics |
13 | COMIC Cost Optimization for Internet Content Multihoming |
14 | Discovery of Ranking Fraud for Mobile Apps |
15 | Query Aware Determinization of Uncertain Objects |
16 | RRW – A Robust and Reversible Watermarking Technique for Relational Data |
17 | Combining Multiple Classification Methods for Hyperspectral Data Interpretation |
18 | A Secure Data Hiding Technique in Compressed Video Using a Secret Key |
19 | Steganography Using Reversible Texture Synthesis |
20 | Robust Watermarking Techniques For Color Images |
21 | Authenticated Key Exchange Protocols for Parallel Network File Systems |
22 | Assessment In Wireless Sensor Network Security |
23 | Energy aware Load Balancing and Application Scaling for the Cloud |
24 | Universal Network Coding-Based Opportunistic Routing for Unicast |
25 | Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical |
26 | Friendbook: A Semantic-Based Friend Recommendation System for Social Networks |
27 | Continuous and Transparent User Identity Verification for Secure Internet |
28 | Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System |