IT Projects

Expression Identification Using Image Processing

Download Project Document/Synopsis There can be number of expression to explore emotions. Here we proposed a system where emotions can be analyzed and studied about emotions based on expression recognition technology. We will be working on images. Images are prone to noise so we will be using image preprocessing methodology to remove noise from image …

Expression Identification Using Image Processing Read More »

Dental Caries Detection System

Download Project Document/Synopsis Dental disease can be detected using image processing. Image contains noise and other environment interferences. Here we proposed a method to detect dental caries from image. Images can be analyzed manually but may prone to error and time consuming. Diagnosis of dental diseases is conventionally carried out with the help of radiographic …

Dental Caries Detection System Read More »

Data Duplication Removal Using File Checksum

Download Project Document/Synopsis Data duplication technology usually identifies redundant data quickly and correctly by using file checksum technique. A checksum can determine whether there is redundant data. However, there are the presences of false positives. In order to avoid false positives, we need to compare a new chunk with chunks of data that have been …

Data Duplication Removal Using File Checksum Read More »

High Security Encryption Using AES & Visual Cryptography

Download Project Document/Synopsis A novel and highly secure encryption methodology using a combination of AES and visual crypto. With the ever increasing human dependency on The Internet for performing various activities such as banking, shopping or transferring money, there equally exists a need for safe and secure transactions. This need a system that automatically translates …

High Security Encryption Using AES & Visual Cryptography Read More »

A New Hybrid Technique For Data Encryption

Download Project Document/Synopsis Data encryption has been widely applied in many data processing areas. Various encryption algorithms have been developed for processing text documents, images, video, etc. If we are able to collaborate the advantages of the different existing encryption methods, then a new hybrid encryption method can be developed which offers better security and …

A New Hybrid Technique For Data Encryption Read More »