IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
A Feasibility Study on Real-Time Gender Recognition
Jacob Joseph, Dr. K A Navas
|
A Survey of Computer Vision based methods for Violent action Representation and Recognition
Febin I P, Jayasree K
|
A Secure Payment Scheme in Multihop Wireless Network Using Shortest Reliable Routing
Ms. Jyothi Padmanabhan, Ms. Navya E K
|
Enhanced Broker-Less Publish/Subscribe System
Monisha P Mohanan, Shanjana C
|
A Comparison of SIFT and SURF Algorithm for the Recognition of an Efficient Iris Biometric System
Sheena S, Sheena Mathew
|
Cost-effective and Secure Data Sharing in MANET
Lincy M, Anju J
|
Encryption with Ordered Bucketization and Dynamic Query Forms
Shameema Thasneem, Pragisha K
|
Enhanced Face Recognition in RGB-D Images
Amrutha Damodaran, Pragisha.K
|
A New Way of Topic Modeling Using MALLET for Current Job Trends
Athira M, Bhavya K, Soorya K, Ajeesh Ramanujan, Anoop V.S
|
Integrating Cloud Computing For Internet of Things Based Intelligent Transport System
Amrutha M
|
Smart App based Shopping Trolley Assisted by RFID
Ameen Abdul Hameed P, Nineesha P
|
Recent Trends in Image Retrieval Techniques for the Big Data Platform: A Survey
O K Girija, M. Sudheep Elayidom
|
Wavelet Based Resolution Enhancement with Noise Reduction Method for Panoramic Dental X-ray Images
Shanida K, Shayini R, Sindhu C S
|
Sec-DiDrip: A Distributed Data Dissemination Protocol with Enhanced Security
Sruthi K, Binoy DM Panicker
|
Retinal blood vessel extraction
Surya G, Pratheesh M Vincent, Shanida K
|
English Text to Malayalam Speech Translation
Deepthy P S
|
Prevention of Dos and DDoS Attack Using Cryptographic Techniques
Soumya Suresh, Kiran V K
|
An Efficient and Secured way of Routing in Hybrid WSN
Aswani Raj N P, Kiran V K
|
Secured Self Destructing Data System Based on Active Storage Framework
Swathi J, Anagha Achuthan
|
A Survey on Quality Enhancing Local Descriptor for Biometric Spoofing Detection Using Various Techniques
Sneha B K, T V Mridula
|
Enhanced Image Security via Cryptography and Sound Steganography
Sukina K, Reshna T
|
Advancements in Machine Translation as a part of Natural Language Processing in Python
Fathimath Shouna Shayyam C A, Pragisha K
|
A Fast and Secure Scheme for Search over Encrypted Data
Malihabi V P, Kiran V K
|
ASMR: Anonymous Secure Multicast Routing
Sudhesh K M, Kiran V K
|
Cloud Security using EHASBE
Vinisha .C, Anju .J
|
A General Decentralized Clustering Using K-Harmonic Means
Shabana AS, Rajesh Kumar PM
|
Threshold Cryptography-based Group Authentication Scheme for the Smart Home Environments
Geetha A V, Rajesh Kumar PM
|
Provable Dynamic Multi Data Copy Possession in Cloud Storage
Sneha Josmi Sam, Vinodu George
|
Multi-Hop Communication for Home Automation with Enhanced Security Using ARM and RTOS
Jithesh Puthenkovilakam
|
Transliteration in Malayalam Using Deep Learning
Shilpa Krishnan, Usha K
|
SecDedup: A Secure Way for Maximizing Space Savings in Cloud Storage
Bushra K.R., Sindhu S
|
Trust Aware Watchdog Mechanism to Detect Selfish Node in MANET
Resmi C. S, Sindhu S
|
Key Aggregate Cryptosystem for Scalable Data Sharing with Policy Based File Assured Deletion for Secure Data Storage in Cloud
Dhanya K K, Sindhu S
|
Authentication to Cloud Using Modified Double Ceasar Cipher
Chanda Raju, Arif Mohammad Abdul, M Kiran Sastry
|
Sentiment Analysis in Malayalam
Thulasi P K
|
An EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION USING DITHERING
Amina Shereen O V, Lijina S S
|
A Survey on Various Techniques for Detection of Diabetic Retinopathy in Retinal Fundus Images
Archana K, Praveen Kumar K
|
Abstract
An Efficient Annotation of SRRS Based on XML
Thushara K P, Varsha Philip
No abstract available.
Abstract
A Feasibility Study on Real-Time Gender Recognition
Jacob Joseph, Dr. K A Navas
Abstract:
The human gender is recognized by an automated system with various unique features of the male and female. Real Time Gender recognition from facial features is a challenging task. In order to overcome this striving situation, the facial features measure is utilized for the gender detection. Various techniques are used for recognizing the gender from facial features. The facial parameters taken for recognition are eye, jaw, eye brows, and lips. The real time gender recognition is necessary for improving the human robot interaction (HRI). Real time gender recognition have wide variety of applications in government, forensic and commercial fields in which reliable personal identification is vital. The performance of gender recognition is also affected by non ideal images such as motion blur, poor contrast and various expressions . This paper is a study and analysis of gender recognition systems which uses various techniques based on facial features and the skeletal features of the human body.
Keywords:
Feature extraction Laplace � Gaussian edge detection, Inter ocular distance, RGB-D camera, Human Robot Interaction (HRI).
A Survey of Computer Vision based methods for Violent action Representation and Recognition
Febin I P, Jayasree K
Abstract:
Action Recognition is an active research area in computer vision and among the action recognition tasks Violent action recognition has high importance as it can be used for safety and security enforcement. Design of Intelligent robots and Intelligent Surveillance systems that can automatically detect violences, Violent video indexing systems etc. are the current trends in computer vision and Artificial Intelligence. This paper surveys the different computer-vision based methods available for representing and recognizing violent actions. Core technology beneath every action or activity recognition system is Feature extraction and classification. Feature extraction is the process of fetching those features which are highly discriminative. In case of Violent activity recognition computer vision provides many such feature extraction methods which we can broadly classify as Local and Global features ,Spatial and temporal features. Current trends in Violent action recognition is based on combination of these local, global spatio-temporal features.
A Secure Payment Scheme in Multihop Wireless Network Using Shortest Reliable Routing
Ms. Jyothi Padmanabhan, Ms. Navya E K
Abstract:
In multi-hop wireless networks, nodes traffic is usually relayed through other nodes to the destination. Multi-hop relaying can enable new applications and enhance the network performance and deployment. Moreover, in developing or rural areas, multi-hop wireless networks can be deployed more readily and at low cost. A secure payment scheme in MWN using SRR is a report-based payment scheme for multihop wireless networks to stimulate node co-operation, regulate packet transmission, and enforce fairness. The nodes submit lightweight payment reports (instead of receipts) to the Trusted Authority to update their credit accounts and store the evidences. The nodes which do not pass or relay others packets are called selfish nodes. But it makes use of neighbor or co-operative nodes to relay its packets. This degrades the network connectivity and fairness. The nodes submit lightweight payment reports (instead of receipts) to the accounting center (AC). The AC can verify the payment by investigating the consistency of the reports, and clear the payment of the fair reports with almost no processing overhead or cryptographic operations. For cheating reports, the evidences are requested to identify and evict the cheating nodes. Then these reports are saved in TP. These reports can be used in future communication to select reliable cheater free route.
Keywords:
Multihop Wireless Network (MWN), Trusted Party (TP), Accounting Centre (AC), Shortest Reliable Routing (SRR).
Abstract:
The basic security mechanism in publish/subscribe system is highly challenging and difficult to achieve due to the loose coupling of publishers and subscribers. This paper presents a novel approach to provide confidentiality and authentication in a broker-less content based publish/subscribe system using identity-based encryption techniques, by adapting pairing-based cryptography and also uses a lightweight encryption scheme, P-Coding, to provide confidentiality in an energy efficient way. This paper also preserves the weak subscription confidentiality in publish/subscribe system. The overall approach provides fine-grained key management and the cost for encryption, decryption and routing is in the order of subscribed attributes. It reduces the energy consumed by data encryption.
Keywords:
Content-based, publish/subscribe, broker-less, identity-based encryption, security.
A Comparison of SIFT and SURF Algorithm for the Recognition of an Efficient Iris Biometric System
Sheena S, Sheena Mathew
Abstract:
The recognition of iris has the potential for high level of accuracy due to its uniqueness and stable feature. In this paper a comparison of SIFT (Scale Invariant Feature Transform) and SURF (Speeded Up Robust Features) algorithm is used to analyse the speed and accuracy of the Iris Recognition system. SIFT and SURF method will extract the local feature points of the iris and then determine the scale invariant key points in the iris image and then express these key points using the local patterns around the key points. The K-nearest neighbour algorithm is used for classification. The experimental result proved that SURF algorithm works faster, efficient and reliable than SIFT.
Keywords:
SIFT, SURF, Feature Extraction, K-nearest neighbour.
Abstract:
Wireless mobile Ad Hoc Networks (MANETs) are gaining popularity in the area of mobile computing. MANETs face security problems because of their unique characteristics like mobility, dynamic topology and lack of central authority and infrastructure support. In traditional networks, deploying a powerful and reliable security scheme such as Public Key Infrastructure (PKI) needs a central authority or trusted third party to ensure fundamental security services including digital certificates, authentication and encryption methods. In the proposed scheme, a secure identity-based anonymous and authentication scheme is proposed for networks without any PKI and a cost-effective light weight encryption scheme for ensuring confidentiality is also proposed.
Keywords:
Authentication, Encryption, MANET, P-coding, Forward security.
Encryption with Ordered Bucketization and Dynamic Query Forms
Shameema Thasneem, Pragisha K
Abstract:
The current problem in Database As a Service (DAS) is how to maximize the efficiency of retrieving encrypted data from remote servers without compromising security. Bucketization is a privacy preserving method for executing SQL queries over encrypted data. In Ordered Bucketization (OB), plaintext-space is divided into p disjoint buckets that are numbered from 1 to p which are based on the order of the ranges that they cover. Here we propose an Encryption with Ordered Bucketization (EOB) to support range query efficiently while preserving high-level of security. How to let non-expert users make use of the relational database is a challenging topic. Traditional predefined query forms are not able to satisfy various queries from users on those databases. Here we also propose a novel database query form interface that is DQF which is able to dynamically generate query forms.
Keywords:
Query form, user interaction, query form generation, bucketization, security.
Abstract:
Face recognition is one of the challenging areas in Image Processing, especially in unconstrained environments. The challenges arise due to the variations in face pose, expressions, illuminations, occlusions etc. This paper introduces a novel enhanced face recognition algorithm using RGB-D images. The 3D face recognition algorithms are developed to achieve higher accuracy. While it is challenging to use specialized 3D sensors due to their high cost. RGB-D images can be captured by low-cost sensors such as Kinect. The performance and applicability of existing face recognition algorithms is bound by the information content or cost implications. This existing paper uses a RISE algorithm that utilizes the depth information along with RGB images. This algorithm uses a combination of entropy, visual saliency, and depth information of the images with HOG for feature extraction, identification and random decision forest for classification. The proposed algorithm using DCT with DPA instead of RISE algorithm. The DCT is applied to the entire image to obtain the DCT coefficients, and then only some of the coefficients are selected to construct feature vectors and the DPA method is used to select the coefficients with the highest discriminant power. Finally, the recognition step is executed using a SVM classifier. Further, the ADM algorithm is proposed to extract and match geometric attributes. Geometric facial attributes is extracted from the depth image and face recognition is performed by fusing both of these. Here ADM is then combined with the DCT with DPA for identification.
Keywords:
Face recognition, saliency, entropy, RGB-D, Kinect, Discrete Cosine Transform, and Discriminant Power Analysis.
A New Way of Topic Modeling Using MALLET for Current Job Trends
Athira M, Bhavya K, Soorya K, Ajeesh Ramanujan, Anoop V.S
Abstract:
Topic modeling is the process of extracting topics from texts. A topic can be viewed as a collection or cluster of words that occur together and frequently. Latent Dirichlet Allocation(LDA), a statistical topic model is used to extract topics from the collected corpus which is a collection of job related data from LinkedIn. LDA is an unsupervised machine learning approach. We analyzed the interrelationship between topics and represented it graphically. The recent job trends in the industry can be interpreted easily using this representation.
Keywords:
Topics, Topic Modeling, MALLET, Latent Dirichlet Allocation(LDA), Gephi.
Integrating Cloud Computing For Internet of Things Based Intelligent Transport System
Amrutha M
Abstract:
This report deals with incorporating Internet of Things (IoT) with Intelligent Transport System (ITS) to bring a composite interconnected system that allows gathering and deploying information like an instant message system. There are several systems that allow us to know about highways and its conditions. One such system is waze. However waze requires a great amount of memory and phone hardware resources. In this paper, I present a new way of monitoring taking advantage of an internets approach in order to co-operate with the ITS. Here we use IoT platforms like cloud computing in order to create an ITS application that provides traffic information about highway through common instant message application.
Keywords:
Internet of Things, IoT, Intelligent Transport System, ITS, Cloud computing, traffic monitoring, instant message.
Abstract:
In the recent years there has been enormous leap in online shopping technology but little has changed in the offline sector. We can still find people waiting for their turn at the billing counter of departmental stores. Many concepts has been put forward to employ RFID based shopping trolley, where in the shopper can just drop the items into the trolley which will be detected by the RFID reader and the data will be displayed on small screen in the trolley. Once done, shopper can check out quickly. But it has lots of limitations. The proposed system will use an APP on shopper's smart phones which will constantly communicate with the store�s main database and the trolley will communicate to the database over WIFI using ESP-8266 module, also there will be an array of IR LEDs along aisle which helps detect the relative location of the trolley. The main system sends all information to phone app. This approach will also help promoting the concept of PRE-SHOPPING. Using the App provided, the customer can see all the items in the store from his home and make a rough list. Upon entering the store, he can just pull out a trolley, scan the QR code in the trolley using the app and the app will communicate with main system and link the trolley. The main system pulls out the pre-shopping list of the shopper and also keeps track on trolley's movement and alert the shopper when he pass across the item which is in the list.
Keywords:
Smart phone, ESP-8266 wifi module, Radio frequency identification (RFID), App, Infrared (IR), Microcontroller, Database, Shopping Trolley, cart.
Recent Trends in Image Retrieval Techniques for the Big Data Platform: A Survey
O K Girija, M. Sudheep Elayidom
Abstract:
As the tremendous growth in the volume of images as well as the widespread application in multiple fields, the requirement for development of image retrieval techniques have enhanced. The ability to handle very large amounts of image data is important for image analysis and retrieval applications. Image Retrieval is an interesting and rapidly growing developing methodology in all fields. It is an effective and well organized approach for retrieving the image. Digital explosion of image databases over internet pose a challenge to retrieve images that are relevant to user query, efficiently and accurately. It becomes increasingly important to develop new CBIR(Content Based Image Retrieval) techniques that are effective and scalable for real time processing of very large image collections. Content based image retrieval system based on Hadoop, proposed a solution for a large database of images which provides secure, efficient and effective search and retrieve the similar images of Query image from the database. In this paper we provide an overview of the fundamental theories and emerging techniques for Image Retrieval, different types of image retrieval and Hadoop framework, as well as several extended work in these areas.
Keywords:
Image retrieval, Image features, Extraction, Hadoop frame work, Feature extraction.
Wavelet Based Resolution Enhancement with Noise Reduction Method for Panoramic Dental X-ray Images
Shanida K, Shayini R, Sindhu C S
Abstract:
The Panoramic Dental X-ray images are important tool for a thorough dental examination. But they may contain noise and have low resolution. Therefore de-noising and resolution enhancement are very important factors in any subjective evaluation of the quality of images. A wavelet based enhancement technique along with a denoising approach is introduced in this paper. The input image after Median filtering is decomposed into different sub-band images by means of Discrete Wavelet Transform (DWT). Stationary Wavelet Transform (SWT) is also introduced as an intermediate stage. Then the high frequency sub-bands of both DWT and SWT are added together. Then these high frequency sub-bands as well as the input image are interpolated. A new enhanced image is obtained by using inverse DWT (IDWT). A comparison of this technique can be done with different wavelet functions including db9, Bior 3.5 and Haar. Performance evaluation can be done by means of MSE calculation. Also a comparison of the proposed method with two conventional image resolution enhancement techniques in terms of PSNR calculation can be done. The whole work has been done on the MATLAB.
Keywords:
Bior3.5, db9, De-noising, Discrete wavelet transform, Enhancement, Haar, IDWT, MSE, PSNR, Stationary wavelet transform.
Sec-DiDrip: A Distributed Data Dissemination Protocol with Enhanced Security
Sruthi K, Binoy DM Panicker
Abstract:
A Wireless sensor network (WSN) is a network together with sensor nodes that connected through wireless media. After the deployment of a WSN some common variables such as sensing interval, data sending interval or small programs stored in each node of the network may need to be updated or changed. Since sensor nodes are distributed in ad hoc fashion manual updating is not always possible. So we use data dissemination protocols to alter the sensor configuration parameters. Two main drawbacks are suffered by existing data discovery and dissemination protocols. First, they are based on the centralized approach; in this approach only base station can disseminate data items. Such an approach suffers from single point of failure. Second, most protocols assume that working environment is safe, so attackers can easily harm network. In Wireless Sensor Network, the security and confidentiality of data is very important. This paper proposes a secure and distributed data dissemination protocol named Sec-DiDrip. It allows multiple authorized network users to directly disseminate data items to the sensor nodes. Sec-Drip enhances ensures the confidentiality of disseminated data hence enhances security.
Keywords:
Wireless Sensor Network; Security; Data Dissemination; Confidentiality: Data Encryption.
Abstract:
Image segmentation is the process of partitioning a digital image into multiple segments (sets of pixels). Segmentation refers to the operation of partitioning an image into component parts, or into separate objects. Segmentation subdivides an image into its constituent regions or objects. The level to which the subdivision is carried depends on the problem being solved. The goal of segmentation is to simplify or change the representation of an image into something that is more meaningful and easier to analyze. The objective of Segmentation is to partition an image into regions. This paper proposes a novel method for retinal blood vessel segmentation. In this paper an automated method for blood vessel segmentation is used. Simple morphological parameters are used for retinal blood vessel segmentation. Retinal image segmentation helps to analysis retinal blood vessel damages due to various causes. Hence the extraction of retinal blood vessel is an important task. Segmentation can be effectively implemented using morphological operators. This paper emphasis on vessel extraction using morphological approaches. Vessel extraction is the first procedure in detection of damaged vessels. This approach is implemented using MATLAB.
Keywords:
Image segmentation, Morphological processing, Retinal imaging, blood vessel segmentation.
Abstract:
Natural Language Processing (NLP) is a field of software engineering, counterfeit consciousness and computational semantics which were worried with collaborations in the middle of PCs and human languages. Machine interpretation is a standout amongst the most essential uses of Natural Language Processing. This is the one of the vital technique that helps people from different places to understand an unknown language without the help of a human translator .The language to be translated is the Source Language (SL) and the language to which source language translated is Target Dialect (TL). While translating, the syntactic structure and semantics structure of both source and target language ought to be considered. Although there has been a ton of works distributed for widespread languages like English, works in language like Malayalam is similarly less. One of the most rising research area is in NLP and machine translation, which is from English to Malayalam. In this field this paper is centering upon the speech translation into Malayalam. It has an assortment of uses in the spaces like magazines,books,film reviews,etc.The approach included in this procedure is as follows. Here we propose a technique for the translation of English sentences to Malayalam and afterward into speech. This machine translation is done by rule based method and statistical method combined. The core process in this translation is mediated by bilingual dictionaries and rules for converting source language structures into the target language structures. The rules that are to be used in this approach are prepared based on the Parts Of Speech (POS) tags and dependency information that are obtained from the parser. There are mainly 2 types of rules are used here, one is transfer link rule and the other is morphological rules. In this method, for generating target structure, transfer link rules are used .Morphological rules used here are for assigning morphological features. The bilingual dictionary used here is an English, Malayalam bilingual dictionary. By this approach, a given English sentence can be translated to its Malayalam equivalent. And finally statistical method is used to reduce the error in the translation. Thus the first phase is completed, and in the next phase the translation of Malayalam text to speech is done, which is the main area on which this paper is focusing on. Hence it is concluded that speech translation is a very important area to be considered in Malayalam Language. Smart sermonis is a translator which convert English text to Malayalam speech. It provide a short but a comprehensive overview of Text-To-Speech synthesis by highlighting its digital signal processing component.
Keywords:
Component, TTS, HMM Synthesis, Phoneme, Prosody, Concatenation Synthesis.
Prevention of Dos and DDoS Attack Using Cryptographic Techniques
Soumya Suresh, Kiran V K
Abstract:
Network Security is a specialized field in computer science that involves securing a network infrastructure. Denial-of-service (DoS) and distributed DoS (DDoS) are the major threats to cyber-security. In computing, a denial-of-service (DoS) attack is an attempt to make network resource unavailable to its intended users. DDos is short for Distributed Denial of Service. DDoS is a type of DOS attack where multiple systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack. To prevent the Denial-of-service and distributed DoS attack a client puzzle method is implemented. In order to prevent further attack in network and to enhance the security the request that is provided by the client and the file sent by the server to client is in encrypted form. One drawback of existing system is if the attacker identifies the port, he can intrude or interfere in the communication and flood DOS attack and can hack communicating data. The methodology used is explained as follows. First the client has to solve a puzzle generated by the server. Then the client checks the latency of the file that has to be accessed from server database. The client can test the latency of the server by inputting the corresponding server IP address, number of packets, and the length of data in bytes. After processing the latency checking parameters, ping statistics of the server and the approximate round trip time will be displayed in the result. The client then encrypts the request and sends the request to server. AES Algorithm is used to perform the encryption and decryption. The server upon receiving the request has to decrypt the request using the client port number and IP address. The server sends the requested file by encrypting the file. Finally the client receives the file, decrypts the content and read it. Thus it can be concluded that more reliable communication can be performed between server and clients and active communications remains unaffected even in the presence of DDoS attacks. This scheme is mainly used for military applications.
Keywords:
Denial of service (Dos) Attack, Distributed Denial of service (DDos) attack, Software Puzzle, AES algorithm.
An Efficient and Secured way of Routing in Hybrid WSN
Aswani Raj N P, Kiran V K
Abstract:
In networking, routing is very important in day today life. The hybrid wireless network that combine combines a mobile ad-hoc network and an infrastructure network. An efficient and reliable data routing is important for high throughput. Existing routing schemes have the drawback of both infrastructure routing and mobile ad-hoc routing which include high overhead in route discovery and maintenance and the congestion. Although current reputation systems help increase routing reliability, but they are not sufficiently effective and efficient because they rely on local information exchanges between nodes to evaluate node reputation. In this paper co-ordinately develop an efficient routing algorithm and effective approach for reliable routing. To handle this challenge, here presents a peer-to-peer (P2P)-based Market-guided Distributed Routing mechanism (MDR). It takes advantage of wide base stations to analyze efficient data routing, and effective reputation management and trading market management for reliable data routing. The packets from a source node are transmitted to nearby base stations directly or indirectly, and then they are transmitted to the near destination base station then to the destination. The base stations form a P2P structure for the collection of reputation and querying to avoid local information exchanges between the nodes. Also P2P structure used for managing the service transactions between nodes for that it uses the trading market. By using the single-relay transmission feature, base stations can monitor the actual transmitted packets of relay nodes to more accurately and efficiently. Then evaluate their reputations and execute trading market management. Also detect falsely reported reputation information. Then further propose market-based policies to strengthen cooperation incentives for high throughput. Simulation results show that MDR outperforms the traditional hybrid routing schemes and reputation systems in achieving high throughput.
Keywords:
Hybrid wireless networks, routing, reputation systems, trading market model.
Secured Self Destructing Data System Based on Active Storage Framework
Swathi J, Anagha Achuthan
Abstract:
Self-destructing data mainly aims at protecting the user data's privacy. Personal data stored in the Cloud may contain account numbers, passwords, notes, and other important information. These data are cached, copied, and archived by Cloud Service Providers, often without users authorization and control. All the data and their copies become destructed or unreadable after a user-specified time, without any user intervention. In addition, the decryption key is destructed after the user-specified time. In this paper, we present SeDas, a system that meets this challenge through a novel integration of symmetric key techniques with active storage techniques by successfully deleting even if the server goes down. Compared to the system without self-destructing data mechanism, throughput for uploading and downloading with the proposed SeDas acceptably decreases by less than 72%, while latency for upload/download operations with self-destructing data mechanism increases by less than 60%.
Keywords:
Active storage, Cloud computing, Self destruction data system.
A Survey on Quality Enhancing Local Descriptor for Biometric Spoofing Detection Using Various Techniques
Sneha B K, T V Mridula
Abstract:
Biometric systems are available at present are more often used for identification and verification in various security applications. Face, Fingerprint, Iris are the biometric traits, frequently used in the present authentication system, its features offer simplicity of use and reliability. Biometric features are unique in nature, so this type of method can be used to avoid typical problem of systems based on use of password which can be forgotten or stolen.To keep a good level of security, spoofing detection tools are preferably implemented as software modules. The research in this field is very active with extracting the features of local descriptor based on the analysis of micro-textural features like Local Binary Pattern (LBP).The term biometric is becoming highly important in security world. The recent year researches are aim to increase the accuracy and quality of the livenesss detection. Finger print system can be possible to fool by reproducing the biometric pattern on simple moulds made of materials such as silicone, clay or gelatine. Iris-based systems can be fooled with sophisticated 3D masks.To enhance the accuracy and quality of biometric systems, many works has been conducted in the liv-ness detection. LBP, CoA-LBP, LPQ, WLD local descriptor and distortion method are used for the recognition works and these extracted components and templates are the processed to build the discriminative features used to linear kernel SVM classifier.
Keywords:
Specular reflection, Image blurriness, Image Chromaticity, Color diversity, Image Distortion Analysis.
Enhanced Image Security via Cryptography and Sound Steganography
Sukina K, Reshna T
Abstract:
Images are one of the important type of multimedia which are largely used in the area of computer vision, graphics, medical systems, databases etc. Image transmission is required when the source and destination are situated at a distance. The transmission of image through the network faces a lot of attacks and security problems. Hence a secure image transmission technique is necessary today. Mosaic image is a steganography technique for secure image transmission. But encryption and audio conversion can add the security aspect of the image to be sent. Hence the encrypted mosaic image as an audio will be sent through the network for the secure image transmission. The combined use of cryptography and sound steganography provides an enhancement for image security.
Keywords:
Encryption, Mosaic Image, Advanced Encryption Standard.
Advancements in Machine Translation as a part of Natural Language Processing in Python
Fathimath Shouna Shayyam C A, Pragisha K
Abstract:
Machine translation is the process of translating text from one natural language to other using computers. It is one of the widely researched tasks and is a sub field of Natural Language Processing (NLP). Manual translations are always time consuming and expensive. The use of machine translators enables quick and easy creation of content with a reduced manual effort. The process requires extreme intelligence and experience like a human being that a machine usually lacks. Many translators are currently available for various languages. The challenge here is in making the translator which is more efficient so that it works as spontaneously and as easily and as correctly as possible like a human. Various techniques and languages can be used to achieve this as we can see in some existing systems. But usage of python language to achieve such efficiency is discussed here with appropriate research results and examples. The day have come where we would be able to perform machine translation in python, within our favourite NLP toolkit, Natural Language Tool Kit (NLTK). The paper is based on the Python programming language together with an open source library called the Natural Language Toolkit (NLTK)
Keywords:
Natural Language Processing, Machine Translation, Statistical Machine Translation, Moses, Python, NLTK, etc.
A Fast and Secure Scheme for Search over Encrypted Data
Malihabi V P, Kiran V K
Abstract:
Searchable encryption provides encryption and search at the same time. The current semantically secure searchable schemes provide search time linear with the total number of ciphertexts. This makes it less acceptable for large databases. Hence new techniques are adopted providing some hidden relations among the ciphertexts to improve the search efficiency. The search trapdoor finds out the first matching keyword and through hidden relations all the related ones could be found out. The search complexity now depends on the number of ciphertexts containing the queried keyword than on the total number of ciphertexts.
Keywords:
public key-searchable encryption, Identity Based Encryption, Identity Based Key Encapsulation mechanism, Semantic security.
Abstract:
Dynamic topology of MANETs make very challenging issue for providing anonymity. There have been many anonymous routing protocols available for providing anonymity and location privacy. Such as AASR satisfy the requirement but packet delay is higher. Multicast routing is essential for ad hoc applications when they operating as groups, privacy preservation is a critical issue in such scenarios. In this paper, we propose an Anonymous Secure Multicast Routing (ASMR) for manet. In this approach, the route request (RREQ) packets are authenticated by a group signature, to protect against active attacks without showing the node identities and for reducing the overhead of packet delay, trust based routing is used there by less trusted nodes are given lesser number of self encrypted parts of a message. This makes it very difficult for malicious nodes to attain the minimum information to break through the encryption strategy. Our protocol extends anonymous routing from unicast communication to multicast and also provides additional security properties.
Keywords:
Anonymous routing, Multicasting, Header selection, mobile ad hoc networks (MANETs).
Abstract:
Cloud computing has emerged as one of the most influential paradigm in the IT industry in recent years. Since this new computing technology requires users to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data .Several schemes employing attribute based encryption(ABE) have been proposed for access control of out sourced data in cloud computing; however most of them suffer from inflexibility in implementing complex access control policies. In order to realize scalable flexible and fine grained access control of outsourced data in cloud computing,proposed the use of Hierarchical Attribute Set Based Encryption (HASBE)by extending cipher text policy Attribute Set Based Encryption(ASBE) with a hierarchical structure of users .The proposed scheme not only achieves scalability due to its hierarchical structure, but also inherits flexibility and fine grained access control in supporting compound attributes of ASBE. In addition HASBE employs multiple value assignments for access expiration time to deal with user revocation more efficiently than existing schemes. The proposed scheme shows that it is efficient and flexible in dealing with access control for outsourced data in cloud computing with comprehensive experiments. One major problem of existing HASBE schemes is bulky, linearly increasing cipher text. In the CP-ABE schemes used, the size of a cipher text proliferates linearly with respect to the number of included attributes. In this paper, propose a novel PP-CP-ABE construction, named Privacy Preserving Constant-size Cipher text Policy Attribute Based Encryption (PP-CP-ABE), which enforces hidden access policies with wildcards and incurs constant-size conjunctive headers, regardless of the number of attributes. Based on this PP-CP-ABE, provide a new construction named as Privacy Preserving Attribute Based Broadcast Encryption (PP-AB-BE). Compared with existing CP-ABE constructions, PP-CP-ABE significantly reduces the ciphertext size from linear to constant and supports expressive access policies. Thus, PP-CP-ABE can be used in many communication constrained environments.
Keywords:
Attribute-based encryption (ABE), privacy-preserving, ciphertext-policy, constant cipher text length, broadcast encryption.
A General Decentralized Clustering Using K-Harmonic Means
Shabana AS, Rajesh Kumar PM
Abstract:
In peer-to-peer systems, large amounts of data are distributed among multiple sources. Analysis of this data and identifying clusters is a difficult task due to processing, storage, and transmission costs. In this paper, GD Cluster, a general fully decentralized clustering method, which has an ability of clustering dynamic and distributed data sets. Nodes continuously working through decentralized gossip-based communication to maintain summarized views of the data set. Distributed data mining focuses on the adaptation of data-mining algorithms for distributed computing environments. In this paper, we propose a GD Cluster, a general fully decentralized clustering method using K-Harmonic means algorithm, which is having the ability of clustering dynamic and distributed datasets. K-Harmonic Means is essentially insensitive to the initialization of the centers, so that its performance does not depend on the initialization of centers.
Keywords:
Distributed systems, clustering, dynamic system, partition-based clustering, density-based clustering.
Threshold Cryptography-based Group Authentication Scheme for the Smart Home Environments
Geetha A V, Rajesh Kumar PM
Abstract:
The rapid increase of current wireless communications and information technologies have been altering human�s lifestyle and social interactions; the next achievement is the smart home environments or spaces. A smart home consists of low capacity devices and wireless networks, and therefore, all working together as a secure system that needs an adequate level of security. Here a lightweight and secure session key establishment scheme for smart home environments is introduced. To establish trust among the network, every sensor and control unit uses a short authentication token and establishes a secure session key. This scheme provides important security attributes including prevention of various popular attacks, such as denial-of-service and eavesdropping attacks. In this smart home environment only the outside devices can be authenticated. To establish group authentication of devices in smart home new scheme is introduced that is threshold cryptography based group authentication. Secure, and efficient group authentication scheme is used that authenticates a group of devices at once. Here presents novel Threshold Cryptography-based Group Authentication scheme for the smart homes which verifies authenticity of all the devices taking part in the group communication. The proposed scheme is implemented for WIFI environment.
Keywords:
Public key Searchable Encryption, Semantic Security, Public key Encryption ,Keyword Search, security, Authentication, Threshold cryptography.
Provable Dynamic Multi Data Copy Possession in Cloud Storage
Sneha Josmi Sam, Vinodu George
Abstract:
Many individuals and organizations are seeking to reduce the maintenance cost and the burden of large local data storage. So outsourcing of data to remote Cloud Service Providers (CSPs) increased drastically. Customers can rent the CSPs storage infrastructure to store and retrieve unlimited amount of data by paying money. Higher level of scalability, availability, and durability are achieved by replicating data on multiple servers across multiple data centers. More the copies are requested to store in the cloud more fees have to be paid. Since more fees are paid customers needs to ensure whether requested copies are stored with most recent modification. In existing methods a Provable Multi Copy Dynamic Data Possession (PMDDP) scheme is used. It gives evidence to the customers that the CSP is not cheating them by storing fewer copies. It supports outsourcing of dynamic data. It supports modification, insertion and deletion of data stored in the cloud. Even though possession of multiple copies of data can be proved, user cannot ensure whether the data is stored in different servers or locations. In this proposed system, user can ensure that multiple data copies are stored in different locations.
Keywords:
Cloud computing, Cloud Service Provider, Data owner, dynamic environment.
Multi-Hop Communication for Home Automation with Enhanced Security Using ARM and RTOS
Jithesh Puthenkovilakam
Abstract:
This paper deals with the design of home automation system through multi-hop wireless communication using ARM. The multi-hop communication means the nodes within the network can able to communicate with the help of two or more nodes, which are acting as the relay nodes, between the source and destination node. In the computer program the user can create actions what should happen with devices connected to the destination node in the network. The end devices such as monitoring equipment using sensor, industrial motor, power transmission equipment, network equipment for routing and data transmission, automotive robot can be connected to the destination node depend on real time application and automation. This real time control and monitoring is achieved using uC/OS-II based ARM system with minimum power consumption and highly enhanced secure avoidance of malicious attack.
Keywords:
OLSR based multi-hop communication with enhanced secure avoidance of malicious attack.
Abstract:
Transliteration: The process of transcription from one language to another is an inevitable part of Machine Translation. It is concerned about Out-of-Vocabulary words or Named Entities and Proper Nouns which requires its phoneme or sound preservation across the language. It can be done in a supervised or unsupervised way. But there is no good method which does this in Malayalam language. Deep Learning is an emerging stream which can be used in the implementation of the same. This paper throws light into such a method which is used to implement Machine Transliteration in Malayalam using Deep Learning using unsupervised training method.
Keywords:
Transliteration, Unsupervised Learning, Deep Learning, Deep Belief Nets (DBN), Restricted Boltzmann Machine (RBM).
SecDedup: A Secure Way for Maximizing Space Savings in Cloud Storage
Bushra K.R., Sindhu S
Abstract:
Security and privacy are important concerns for the public cloud environments. One of the critical challenges of cloud storage services is the increasing volume of data. This burdens the cloud storage which is not infinitely large. A widely used method as a solution for this is, data deduplication which saves storage space and upload bandwidth. The commonly used technique for deduplication is convergent encryption. The notion of authorized data deduplication is not so popular in the cloud environment. Hybrid architecture is used here to provide authorized data deduplication. Further, this method is enhanced by providing block-level deduplication.
Keywords:
Deduplication, Hybrid Cloud, Merkle-Hash tree, Proof of Ownership.
Trust Aware Watchdog Mechanism to Detect Selfish Node in MANET
Resmi C. S, Sindhu S
Abstract:
MANET nodes rely on network cooperation schemes to properly work. Node cooperation is important since there is no fixed infrastructure and central authority in MANET. There is the possibility of existence of nodes refuse to cooperate by not forwarding data in order to save its own energy and resources. Presence of selfish node degrades network performance by increasing packet dropping. Collaborative watchdog introduces an efficient approach to reduce the detection time of selfish nodes based on contact dissemination. If one node has previously detected a selfish node using its watchdog it can spread this information to other nodes when a contact occurs. This method does not consider presence of malicious node and detection function to be implemented in every pair of nodes. In this paper, we propose a new framework which uses a trust based scheme and watchdog to detect selfish node.Also alert model is implemented in which node which are not ready to cooperate can send warning messages to adjacent nodes. Trust relationship must be set up between every pair of nodes. Packet forwarding ratio and energy is used to maintain trust between nodes. Watchdog functions are implemented in trusted node only. It reduces the overhead of implementing watchdog in every node.
Keywords:
selfish node, reputation, trust, mobile ad hoc networks (MANETs).
Key Aggregate Cryptosystem for Scalable Data Sharing with Policy Based File Assured Deletion for Secure Data Storage in Cloud
Dhanya K K, Sindhu S
Abstract:
Data sharing is an important functionality in cloud storage. Cloud computing technology is widely used so that the data can be outsourced on cloud can be accessed easily. But the user has no control over the outsourced data. A new public key encryption method is based on aggregate key is discuss here. Instead of sending large no of decryption keys, Sender can release a constant size aggregate key that can send via e-mail securely. In policy-based file assured deletion scheme that reliably deletes files with regard to revoked file access policies. The encrypted files can be securely deleted and remain permanently inaccessible after a predefined duration. The main idea is that a file is encrypted with a data key, and this data key is further encrypted with a control key that is maintained by a separate key manager service. The control key is time-based, meaning that it will be completely removed by the key manager, when an expiration time is reached. Without the control key, the data key and hence the data file remain encrypted and are deemed to be inaccessible. Thus, the main security property of file assured deletion is that even if a cloud provider does not remove expired file copies from its storage, those files remain encrypted and unrecoverable.
Keywords:
Virtual machine, Key aggregate encryption, ciphertext , Attribute based Encryption, Aggregate key.
Authentication to Cloud Using Modified Double Ceasar Cipher
Chanda Raju, Arif Mohammad Abdul, M Kiran Sastry
Abstract:
Cloud computing, is a technology that provides dynamic and scalable resources for computing as pay per use through internet. In cloud identifying an appropriate user is a challenging task for the service provider, but basing on the unique identification methods like password, smartcard and many other different authentication techniques, a user can be identified. Even though many authentication schemes are introduced in past but they failed with various drawbacks. This paper is to introduce an authentication scheme using Modified Double ceasar cipher encryption technique in which the password is encrypted using a key that is kept secret and is tough to guess. Our encryption technique is secured from the attacks like guessing or brute force attack. The proposed system uses a Modified Double ceasar cipher encryption technique which uses the English alphabets to create password and a key to encrypt basing on the value of its character by performing addition a cipher key is generated and stored in the waveform. The proposed scheme has an interesting feature of storing and representing the password in waveforms using Manchester encoding [7], which makes the system more effective in avoiding some attacks like guessing attack and tampering the password. The work clearly specifies the different authentication schemes used so far.
Keywords:
Double ceasar cipher, Encryption, Decryption, Authentication, waveform.
Abstract:
The most emerging area in NLP now a days is Sentiment Analysis (SA) which is a cognitive process in which the user�s feelings and emotions are extracted. It has a variety of applications. It can be used to analyze whether the product review is positive or negative, based on tweets how people respond to adds, bloggers attitude about president changed since election, identifying child suitability of videos based on comments. Although there has been a lot of works published for universal languages like English, works on dialectal languages like Malayalam is comparatively less. But importance of Malayalam is increasing on social medias and shopping sites. This shows the scope of the topic. Another weak point of existing system is that the task done till today is only coarse grained in Malayalam considering only just classification of negative and positive polarity without considering the aspect on which the user is commenting. Such a fine grained task is also considered here most commonly known as Aspect based sentiment analysis. It can contribute to other fields like data mining and web mining.
Keywords:
Sentiment Analysis, Aspect-Based Sentiment Analysis, Senti-Wordnet, Polarity, POS tagging.
An EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION USING DITHERING
Amina Shereen O V, Lijina S S
Abstract:
Visual Cryptography is secret sharing scheme which uses images distributed as shares such that when they are superimposed, the hidden secret image is revealed. In extended visual cryptography (EVC), the shares are constructed to contain meaningful cover images. Here, we propose a technique called dithering to block replacement methods of EVC, in order to improve the quality of recovered secret image. The size of share image and recovered image is same as that of original secret image. The resulting scheme also maintains perfect security by applying random number generation to the secret image.
Keywords:
Extended Visual Cryptography, halftone images, Dithering, Pixel expansion
A Survey on Various Techniques for Detection of Diabetic Retinopathy in Retinal Fundus Images
Archana K, Praveen Kumar K
Abstract:
Diabetic Retinopathy refers to the retinal disease that occurs in Diabetic Mellitus Patients. It happens when the pancreas produces very little or no insulin. The blood vessels in retina will get blocked or grow without order in different directions. It can lead to vision loss over a period of time, if left untreated. Early detection of Diabetic Retinopathy (DR) is essential to treat DR effectively. The number of people suffering from Diabetics increased significantly over the last years. The traditional screening programs at an opticians Clinic is highly time consuming and the screening facilities available are less compared to the large population of Diabetic Patients in India( around 35 million).So the need for an effective computer based screening program arises, which can detect DR even in earlier stages. Various image processing techniques have been developed so far for the detection of DR. In this paper, a study of various DR detection methods and their comparisons are performed. The techniques can be broadly classified into optic disk segmentation, blood vessel detection, exudates detection and Microaneurysm (MA) detection methods. Different methods used are based on the feature to be extracted for DR detection. The image processing techniques are useful in identifying the location, size and severity grade of micro aneurysms and exudates in the retinal images. This survey gives an insight into the various prevailing methods for DR detection in retinal fundus images.
Keywords:
Diabetic Retinopathy, Microaneurysm, Image processing, retinal fundus images.