acm - an acm publication

Anindya Jyoti Pal Collection

  • An approach for conducting enterprise resource planning assessment

    The failure to plan will lead to results that fall short of expectations. The same thing can be said of companies and their search for a new Enterprise Resource Planning (ERP) system. All companies undertake the search for a new system because they believe there is an opportunity to improve the organization, either by improving the revenue, decreasing costs or both.

    But far too often, companies undertake this effort without having a plan on how to select a new ERP system. They fall victim selecting the product with the best sales presentation or the best cost proposal. There is not quantitative evidence that this new system will actually achieve the goals of improving the revenue or decreasing the cost.

    So put an evaluation plan in place. No two plans will be the same but all should have the same basic concepts.

    ...
  • Secure delivery of handwritten signature
    A number of researchers have proposed using digital marks to provide ownership (watermarking) identification for the property. One way of data hiding is digital signature, copyright label or digital watermark that completely characterizes the person who applies it and, therefore, marks it as being his property. Digital Watermarking is the process that embeds data called a watermark into an object such that watermark can be detected and extracted later to make an assertion about the object. Watermarking is either "visible" or "invisible". Although visible and invisible are visual terms watermarking is not limited to images, it can also be used to protect other types of multimedia object. Our research work is on watermarking techniques in particular.Many of these proposed techniques share three specific weaknesses: complexity of copy detection, vulnerability to mark removal after revelation for ownership verification, and mark integrity issues due to partial mark removal. This paper presents a method for watermarking Handwritten Signature that achieves robustness by responding to these three weaknesses. The key techniques involve using secure functions to generate and embed image marks that is more detectable, verifiable, and secure than existing protection and detection techniques. ...