SINCE 2004

  • 0

      0 Item in Bag


      Your Shopping bag is empty

      CHECKOUT
  • Notice

    • ALL COMPUTER, ELECTRONICS AND MECHANICAL COURSES AVAILABLE…. PROJECT GUIDANCE SINCE 2004. FOR FURTHER DETAILS CALL 9443117328

    Projects > COMPUTER > 2020 > > INFORMATION FORENSICS AND SECURITY

    Categories

    COMPUTER

    SL.NO CODE TITLE Domain LANGUAGE
    1 HSC20D064 A Verifiable Semantic Searching Scheme by Optimal Matching Over Encrypted Data in Public Cloud INFORMATION FORENSICS AND SECURITY ASP.NET
    2 HSC20D065 An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning INFORMATION FORENSICS AND SECURITY C#.NET
    3 HSC20D066 Dense Registration and Mosaicking of Fingerprints by Training an End-to-End Network INFORMATION FORENSICS AND SECURITY C#.NET
    4 HSC20D067 Fine-Grained Facial Expression Recognition in the Wild INFORMATION FORENSICS AND SECURITY C#.NET
    5 HSC20D068 Fingerprint Spoof Detector Generalization INFORMATION FORENSICS AND SECURITY C#.NET
    6 HSC20D069 Minimizing Embedding Impact for H.264 Steganography by Progressive Trellis Coding INFORMATION FORENSICS AND SECURITY C#.NET
    7 HSC20D070 Periocular-Assisted Multi-Feature Collaboration for Dynamic Iris Recognition INFORMATION FORENSICS AND SECURITY C#.NET
    8 HSC20D072 Robust Iris Presentation Attack Detection Fusing 2D and 3D Information INFORMATION FORENSICS AND SECURITY C#.NET
    9 HSC20D073 Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids INFORMATION FORENSICS AND SECURITY C#.NET
    10 HSC20D074 Soft Semantic Representation for Cross-Domain Face Recognition INFORMATION FORENSICS AND SECURITY C#.NET
    11 HSC20D075 Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks INFORMATION FORENSICS AND SECURITY C#.NET
    12 HSC20D076 TDOA Source-Localization Technique Robust to Time-Synchronization Attacks INFORMATION FORENSICS AND SECURITY C#.NET
    13 HSC20J049 A Verifiable Semantic Searching Scheme by Optimal Matching Over Encrypted Data in Public Cloud INFORMATION FORENSICS AND SECURITY JAVA
    14 HSC20J050 An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning INFORMATION FORENSICS AND SECURITY JAVA
    15 HSC20J051 Dense Registration and Mosaicking of Fingerprints by Training an End-to-End Network INFORMATION FORENSICS AND SECURITY JAVA
    16 HSC20J052 Fine-Grained Facial Expression Recognition in the Wild INFORMATION FORENSICS AND SECURITY JAVA
    17 HSC20J053 Fingerprint Spoof Detector Generalization INFORMATION FORENSICS AND SECURITY JAVA
    18 HSC20J054 Minimizing Embedding Impact for H.264 Steganography by Progressive Trellis Coding INFORMATION FORENSICS AND SECURITY JAVA
    19 HSC20J055 Periocular-Assisted Multi-Feature Collaboration for Dynamic Iris Recognition INFORMATION FORENSICS AND SECURITY JAVA
    20 HSC20J056 Privacy-Aware Time-Series Data Sharing With Deep Reinforcement Learning INFORMATION FORENSICS AND SECURITY JAVA
    21 HSC20J057 Robust Iris Presentation Attack Detection Fusing 2D and 3D Information INFORMATION FORENSICS AND SECURITY JAVA
    22 HSC20J058 Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids INFORMATION FORENSICS AND SECURITY JAVA
    23 HSC20J059 Soft Semantic Representation for Cross-Domain Face Recognition INFORMATION FORENSICS AND SECURITY JAVA
    24 HSC20J060 Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks INFORMATION FORENSICS AND SECURITY JAVA
    25 HSC20J061 TDOA Source-Localization Technique Robust to Time-Synchronization Attacks INFORMATION FORENSICS AND SECURITY JAVA