Volume-1 (National Conference on Network Security (NCNS)' 2015)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Present Scenario In Automatic Image Registration Methods |
Country | : | India |
Authors | : | Angel Mariya Paul || K R Joy |
Abstract: Image registration is a crucial step in most of the image processing tasks. Traditional techniques such as area and feature based methods have several limitations. A fully automatic image registration approach which is accurate, fast, and robust is required. This paper discuss on the recent innovative integration methods such as Integrated SMI and Integrated SIFT&MI that will overcome the respective weaknesses of registration accuracy and computational load. The methods have been tested by using several images acquired from different sensors. The experimental results shows that the above methods are highly accurate and more robust than the conventional metrics.
[2] Barbara Zitova, Jan Flusser, Image registration methods: a survey, Image and Vision Computing 21 (2003) 977–1000
[3] X. Dai and S. Khorram, The effects of image misregistration on the accuracy of remotely sensed change detection, IEEE Trans. Geosci. Remote Sen., vol. 36, no. 5, pp. 1566–1577, Sep. 1998.
[4] Maoguo Gong,, Shengmeng Zhao, Licheng Jiao, Dayong Tian, and Shuang Wang, A Novel Coarse-to-Fine Scheme for Automatic Image Registration Based on SIFT and Mutual Information, IEEE Transactions On Geoscience And Remote Sensing, Vol. 52, No. 7, July 2014
[5] K. Mikolajczyk and C. Schmid, A performance evaluation of local descriptors, IEEE Trans. Pattern Anal. Mach. Intell., vol. 27, no. 10, pp. 1615–1630, Oct. 2005.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Security Aspects in 6lowpan Networks: A Study |
Country | : | |
Authors | : | Anitta Vincent || Fincy Francis || Ayyappadas P.S |
Abstract: Internet of Things (IoT) and Wireless Sensor Networks (WSNs) are an important trend in embedded computing which links the physical world to the world of information. Thus it crafts a smart world where all machines intermingle with each other automatically. 6LoWPAN is an IPv6 adaptation layer that labels means to make IP connectivity feasible for firmly resource constrained devices that use low power, lossy communication links such as IEEE 802.15.4. This paper studies 6LoWPAN with regard to its security threats and the counteractions to address these issues.
Keywords: Internet of Things, Wireless sensor networks, IEEE802.15.4, 6LoWPAN, Fragmentation
[2]. S. Park, K. Kim, W. Haddad, S. Chakrabarti, J. Laganier, IPv6 over Low Power WPAN Security Analysis, draft-daniel-6lowpan-security-analysis- 05, Mar. 15, 2011, Expires: Sept. 16, 2011
[3]. J. Arkko, J. Kempf, B. Zill, P. Nikander, Secure Neighbour Discovery (SEND), Request For Comments(RFC): 3971, Mar. 2005
[4]. Y. Xiao, HH. Chen, B. Sun, R. Wang, S. Sethi, MAC Security and Security Overhead Analysis in the IEEE 802.15.4Wireless Sensor Networks, Hindawi Publishing Corporation, EURASIP Journal on Wireless Communications and Networking, May 2006
[5]. R. Thayer, N. Doraswamy, R. Glenn, IP Security Document Roadmap, Request For Comments(RFC): 2411, Nov. 1998
[6]. C. Kaufman ,Internet Key Exchange (IKEv2) Protocol, Request For Comments(RFC): 4306, Dec. 2005
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | EALERT-Enhanced Anonymous Location-based Efficient Routing Protocol |
Country | : | India |
Authors | : | Anjaly Mathai || Deepu S |
Abstract: The nodes of a Mobile Ad Hoc Network cannot be trusted for the correct execution of critical network functions and therefore security in MANETs is an essential component for maintaining data secrecy. At present MANETs do not have perfect security policy, but it is important to establish secure communication between parties in MANETs. So it is necessary to provide anonymities in networks. Previous anonymous routing protocols are unable to provide complete source,destination and route anonymities.
[1]. Y. Zhang,W.Liu,andW. Luo, Anonymous Communications in Mobile Ad Hoc Networks, Proc. IEEE INFOCOM, 2005.
[2]. L. Zhao and H. Shen, ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs, Proc. Int'l Conf. Parallel Processing (ICPP), 2011.
[3]. K.E. Defrawy and G. Tsudik, ALARM: Anonymous Location- Aided Routing in Suspicious MANETs, Proc. IEEE Int'l Conf. Network Protocols (ICNP), 2007.
[4]. J. Kong, X. Hong, and M. Gerla, ANODR: Anonymous on Demand Routing Protocol with Untraceable Routes for Mobile Ad-Hoc Networks, Proc. ACM MobiHoc, pp. 291-302, 2003.
[5]. X. Wu, AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol, IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 335-348, July/Aug. 2005.
[6]. K.E. Defrawy and G. Tsudik, PRISM: Privacy-Friendly Routing in Suspicious MANETs (and VANETs), Proc. IEEE Int'l Conf. Network Protocols (ICNP), 2008.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | FPGA Implementation of a Digital Atermarking System for Video Authentication |
Country | : | India |
Authors | : | Anju Devassy || Aparna M.S || Shaly Laurence || Sona Davis Chakkoria |
Abstract: Digital video sequences are very susceptible to manipulations and alterations using widely available editing tools. So some authentication techniques are needed in order to maintain authenticity, integrity, and security of digital video content. As a result, digital watermarking (WM), a data hiding technique has been considered as one of the key authentication methods.
[2]. A. D. Gwenael and J. L. Dugelay, "A guide tour of video watermarking," Signal Process. Image Commun., vol. 18, no. 4, pp. 263–282, Apr. 2003.
[3]. A. Piva, F. Bartolini, and M. Barni, "Managing copyright in open networks," IEEE Trans. Internet Comput., vol. 6, no. 3, pp. 18–26, May– Jun. 2002.
[4]. Y. Shoshan, A. Fish, X. Li, G. A. Jullien, and O. Yadid-Pecht, "VLSI watermark implementations and applications," Int. J. Information Technol. Knowl., vol. 2, no. 4 pp. 379–386, Jun. 2008.
[5]. X. Li, Y. Shoshan, A. Fish, G. A. Jullien, and O. Yadid-Pecht, "Hardware implementations of video watermarking," in International Book Series on Information Science and Computing, no. 5. Sofia, Bulgaria: Inst. Inform. Theories Applicat. FOI ITHEA, Jun. 2008, pp. 9–16 ( supplement to the Int. J. Inform. Technol. Knowledge, vol. 2, 2008).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Secure Data Access through Multiuser So-VANET |
Country | : | India |
Authors | : | Anju John || Deepu S |
Abstract: The development and wide utilization of wireless communication system have transformed the human trends by providing the most convenient way of accessing internet whenever wherever its necessity comes. VANET Network supporting Service oriented facilities would have been an revolution in communication era if it could be deployed in real time by the introduction of an Efficient Frame work for So-VANET. Here, proposing a Service oriented media access technique for cluster- based vehicular networks for developing an efficient and uncompromising backbone network which is capable of nullifying the issues related.
[2]. J. Freudiger, M. Raya, M. Feleghhazi, P. Papadimitratos, and J. P. Hubaux, "Mix zones for location privacy in vehicular networks," presented at the Int. Workshop Wireless Netw. Intell. Transp. Syst., Vancouver, BC, Canada, Aug. 2007 LCA-CONF-2007-016
[3]. H. Kido, Y. Yanagisawa, and T. Satoh, "An anonymous communication technique using dummies for location-based services," in Proc. ICPS, Santorini, Greece, Jul. 2005, pp. 88–97.
[4]. C. Lochert, B. Scheuermann, C. Wewetzer, A. Luebke, and M. Mauve, "Data aggregation and roadside unit placement for a VANET traffic information system," in Proc. 5th ACM Int. Workshop VANET, San Francisco, CA, Sep. 2008, pp. 58–65.
[5]. M. Raya and J. P. Hubaux, "The security of vehicular ad hoc networks," in Proc. SASN, Alexandria, VA, Nov. 2005, pp. 11–21.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Network Security Camera System on an M2M Communication Platform |
Country | : | India |
Authors | : | Aparna.M || Jesmy John |
Abstract: Anetwork security camera system is proposed which can be applied to consumer electronic devices to provide visual information for an M2M communications platform. For this system, a network camera processor (NCP) chip and a network security board is considered. The network camera processor consists of a digital camera processor (DCP), a motion JPEG (MJPEG) encoder, an Ethernet controller, an ARM processor and many peripherals. These modules improve the raw images from a CCD image sensor to high quality images, compress the image data size, and transmit them to an M2M communications platform via Internet with no additional hardware. The network security board consists of the board driving the NCP chip and the CCD image sensor board. Its users can observe the scene of a CCD image sensor with no additional hardware on every device, such as a personal computer, a tablet or a mobile phone, transceiving data via Internet.An application framework known as VERTAF, that target at the automatic design of real-time embedded software for ARM-DSP based systems,can be used for automatic code generation of the proposed Network security camera system.
[1]. L. Atzori, A. Iera, G. Morabito, "The internet of things: a survey",Computer Networks 54 (2010) 2787-2805
[2]. K. Matthias, H. Paul, A. Schmidt, " Embedded Interaction-Interacting with the internet of things", IEEE Internet computings (2010)
[3]. M. Chen, "Towards smart city: M2M communications with software agent intelligence", Multimed. Tools Appl.Springer(2012)
[4]. P. Jongsu, H. Seung, L. Y. Surk, "Network security camera system and its application for consumer electronics in ubiquitous environment", Springer science+ Business Media, April 2013.
[5]. P. A. Hsiung, S. W. Lin, C. S. Lin, "Real time embedded software design for mobile and ubiquitous systems", Springer science+ Business Media (2008)
[6]. N. Nakano, R. Nishimura, H. Sai, A. Nishizawa, H. Komatsu, "Digital still camera system for megapixel CCD" IEEE Trans Consum Electron 44(3):581–586
[7]. H. Kim, J. Kim, S. Hwang, I. Park, C. Kyung, "Digital signal processor with efficient RGB interpolation and histogram accumulation", IEEE Trans Consum Electron 44(4):1389–1395
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Wireless Sensor Network Security in Military Application using Unmanned Vehicle |
Country | : | India |
Authors | : | Arun Madhu || A. Sreekumar |
Abstract: Wireless Sensor Network is widely used in Military Applications like Tracking the enemy movements and force protection. Security is the major concern and very difficult to achieve due to the unattended nature, limited memory, and limited power of network. This paper is mainly intended to describe the implementation of the secure unmanned Vehicle Navigation system controlled by wireless sensor network. We used a cluster based approach to prevent the various types of attacks in military field. We propose armed and sealed mote to prevent the physical attacks. In order to avoid a single key compromise lead to the entire network compromise we have proposed a modified version of LEAP for key management. The vehicle navigation was implemented using a toy car controlled by a micaz mote inside it.
[2]. Guoqiang Mao, Barýs¸ Fidan and Brian D.O. Anderson. Wireless Sensor Network Localization Techniques. In 2003.
[3]. N. B. Priyantha, H. Balakrishnan, E. Demaine, and S. Teller, "Anchorfree distributed localization in sensor networks," in ACM 2003.
[4]. S. Capkun, M. Hamdi, and J.-P. Hubauz, "Gps-free positioning in mobile ad hoc networks," in Hawai International Conference on System Sciences, 2001.
[5]. Connelly, R. Rigidity. In Handbook of Convex Geometry, vol. A. North-Holland, Amsterdam, 1993, pp. 223–271.
[6]. Crippen, G., And Havel, T. Distance Geometry and Molecular Conformation. John Wiley & Sons, 1988.
[7]. Doherty, L., Pister, K., And Ghaoui, L. Convex position estimation in wireless sensor networks. In Proc. IEEE INFOCOM (April 2001).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design and Implementation of Modified Viterbi Decoder for a Wi-Fi Receiver |
Country | : | India |
Authors | : | Ayana John || Dhanya Winson || Divya George |
Abstract: Wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. The convolutional codes are decoded using the algorithm that found in many universal applications like 802.11 wireless LANs. Viterbi Decoders are employed in digital wireless communication systems to decode the convolution codes which are used for error correction. The most popular communications decoding algorithm, the Viterbi Algorithm (VA), requires an exponential increase in hardware complexity to achieve greater decode accuracy.
2012
[2]. FPGA based design and implementation of modified Viterbi Decoder for a Wi-Fi receiever,proceeding of 2013 IEEE
Conference on Information and Communication Technology
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Survey of Symmetric Cryptographic Algorithms |
Country | : | India |
Authors | : | Ayyappadas ps || Anurose Devassy || Sherin C George || Anju Devassy |
Abstract: The significance and the value of exchanged data over the Internet or other media types are increasing, the search for the best way out to offer the necessary protection against the data thieves' attacks. Encryption algorithms play a most important role in information security systems. Technologies such as CPU and memory are increasing and so is their need for power, but battery technology is increasing at a much slower rate, forming a "battery gap". It means that it is a considerable matter to choose the energy- and a memory-efficient cryptographic algorithm suitable for WSNs.
[1]. D. D. Hwang, P. Schaumont, K. Tiri, and I. Verbauwhede, "Securing embedded systems," IEEE Securiyt and Privacy, vol. 4, no.2, pp. 40-49, 2006.
[2]. V. Tiwari, S. Malik, A. Wolfe, "Power Analysis of Embedded Software: A First Step towards Software Power Minimization," IEEE/ACM International Conference on Computer-Aided Design, pp. 384-390, 2004.
[3]. V. Tiwari, M. Lee, "Power Analysis of A 32-bit Embedded Microcontroller," In Proceedings of Asia and South Pacific Design Automation Conference, pp. 141-148, 1995.
[4]. A. Muttreja, A. Raghunathan, S. Ravi, N. Jha, "Automated Energy/Performance Macromodeling of Embedded Software," In Proceedings of the 41st Annual Design Automation Conference, vol. 26, no.3, pp. 99-102, 2004.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Pros and Cons of Cryptography, Steganography and Perturbation techniques |
Country | : | India |
Authors | : | Haripriya Rout || Brojo Kishore Mishra |
Abstract: Cryptology was as significant as weapons during the World War II and the Cold War. There were lots of studies to develop robust crypto-systems and to use them in communications. These studies have continued up to now. Today some of those crypto-systems called as "classical crypto-systems" are improved and still being used. Mostly we can secure our data in three ways first one is cryptography where content of the message is kept secret by encoding it, secondly Steganography where the message is embedded in another medium, third perturbation technique which performs some operation on actual data so that its actual meaning is not obvious/disclosed.Here we have a comparative study on cryptography, steganography and perturbation technique with pros and cons of each.
[1]. Muhalim Mohamed Amin et al., "Information hiding using Steganography", 2003.
[2]. C. Cachin, "An Information-Theoretic Model for Steganography", in proceeding 2nd Information Hiding Workshop, vol. 1525, pp. 306-318, 1998.
[3]. D. Artz, "Digital Steganography: Hiding Data within Data", IEEE Internet Computing, pp. 75-80, May-Jun 2001.
[4]. E.T. Lin and E.J. Delp, "A Review of Data Hiding in Digital Images," in Proceedings of the Image Processing, Image Quality, Image Capture Systems Conference, PICS '99, Ed., Apr. 1999, pp. 274--278.
[5]. F.A.P Peticolas, R.J. Anderson and M.G. Kuhn, "Information Hiding – A Survey", in proceeding of IEEE, pp. 1062-1078, July 1999.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Biometric Online Signature Verification |
Country | : | India |
Authors | : | Fincy Francis || Aparna M.S || Anitta Vincent |
Abstract: Person identification can be done precisely by Biometrical method, where physiological or behavioral characteristics are used for this purpose. Handwritten signature is a behavioral trait it can be used for person identification accurately. There are two types of identification modes either online or offline mode. Which depends upon the signature acquisition method. In offline acquisition method the shape of the signature is used for authenticating signer. While in online signature verification uses dynamic characters that is dynamic time dependent of the signature to authenticate the signer.
[1] Mariano López-García, Rafael Ramos-Lara, Oscar Miguel-Hurtado, and Enrique Cantó-Navarro,
Embedded System for Biometric Online Signature Verification , IEEE Transactions On Industrial Informatics, Vol. 10, No. 1, February 2014.
[2] Napa Sae-Bae and Nasir Memon,Online Signature Verification on Mobile Devices, IEEE Transactions
On Information Forensics And Security, Vol. 9, No. 6, June 2014
[3] Bao ly van, sonia garcia-salicetti, and bernadette dorizzi, On using the viterbi path along with HMM likelihood information for online signature verification, IEEE transactions on systems, man,and cybernetics part b: cybernetics, VOL. 37, no. 5, october 2007
[4] Cheng-lin liu, stefan jaeger, and masaki nakagawa, Online recognition of chinese characters: the state-of-the-art, IEEE Transactions on pattern analysis and machine intelligence, VOL. 26, no. 2, february 2004
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Ultrasonographic Cancer Identification |
Country | : | India |
Authors | : | Greeshma S L || Suresh K S |
Abstract: Ultra sonography is a simple and cost effective scanning method which uses harmless sound waves of more than 30MHz frequency. This paper discuses a scientific way to identify oral cancer and to analyze the possibility of developing plaque which causes brain stroke. This is done with the help of Audio video and Image processing of ultra sound images of carotid artery which is a blood vessel that supplies pure blood to the different parts of our head. Here the MATLAB processing tools are used for analysis. Although it is not a confirmation method, the low cost, accuracy and simple and harmless nature of scanning makes it more dependable for early identification of oral cancer and better treatment.
[1]. Christos P. Loizou, Ultrasound Image Analysis Of The Carotid Artery, A Thesis, School Of Computing And Information Systems, Kingston University London, UK September, 2005
[2]. Yaqing Chen ,Evaluation of Carotid Artery Stiffness in Obese Children Using Ultrasound Radiofrequency Data Technology, Journal of Ultrasound in Medicine, 32(1), 2013, 105-113
[3]. Kai E. Thomenius, Standard Handbook Of Biomedical Engineering And Design,( Mcgraw-Hill, 2004)
[4]. Manual Of Diagnostic Ultrasound, Volume 1 Second Edition, World Health Organization 2011
[5]. William R. Hendee And E. Russell Ritenour, Medical Imaging Physics ( Wiley-Liss, 4th ed, 2002)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Stegnography Approach in Frequency and Spatial Domain for Secure Communication |
Country | : | India |
Authors | : | Jesmy John || Aparna M || Dhanya Winson |
Abstract: most recently, significant attention has been given to issues surrounding digital multimedia. With the digital multimedia being transmitted via the Internet, some area have become more important, including copyright protection, modification, multimedia broadcast security, interception, forgery, etc. With the quick development of information and communication technology, transmitting data by the Internet is very capable and convenient. However, it is very dangerous to transmit private information through the Internet without any security. Protecting information while transmitting over the internet has become a very significant issue. A variety of techniques have been proposed to deal with this problem. Nowadays, data hiding techniques are increasingly common for Internet privacy,
[2]. X. Zhang and S.Wang, "Steganography using multiple-base notational system and human vision sensitivity," IEEE Signal Process. Lett., vol. 12, no. 1, pp. 67–70, Jan. 2005.
[3]. H. Noda, J. Spaulding, M. N. Shirazi, and E. Kawaguchi, "Application of bit-plane decomposition steganography to jpeg 2000 encoded images," IEEE Signal Process. Lett., vol. 9, no. 12, pp. 410–413, Dec. 2002.
[4]. D.-C. Wu and W.-H. Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recognit. Lett., vol. 24, pp. 1613–1626, 2003.
[5]. R. Chandramouli, M. Kharrazi, and N. Memon, "Image steganography and steganalysis: Concepts and practice," in Proc. Int. Workshop Digital Watermarking 2003, 2004, vol. 2939
[6]. Hsiu-Lien Yeha, Shu-Tsai Gueb, Piyu Tsaib, Wei-Kuan Shiha, "Wavelet bit-plane based data hiding for compressed images", Int. J. Electron. Commun. 67 (2013) 808– 815, Publisher:Elsevier
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Enhancing the Lifetime and Improving the Security of the Smart Mines |
Country | : | India |
Authors | : | Meera G S || Kavitha Karun A |
Abstract: Mostof the WSN applications are designed to overcome the limitations pertaining to the sensor nodes. To enhance the life of the network, the power of the sensor nodes needs to be recharged as required. The paper proposes an inductive recharging to enhance the life of smart mines by exploring the area of the network using multiple mobile nodes. We propose a role-based exploration technique to explore the area for recharging mobile nodes. To enhance the MAC level security, against jamming attack caused by interference of other signals, we adopt frequency hopping MAC protocol which is achieved by time-synchronizing all the smart mines deployed. Keywords -WSN, Frequency hopping, Inductive recharging, Area exploration
1]. D. G. Jennifer Yick, Biswanath Mukherjee, "Wireless sensor network survey," Computer Networks, vol. 52, no. 12, pp. 2292 – 2330, 2008.
[2]. Seth, Bharat Udai, and Krishna M. Sivalingam. "Wireless sensor node based smart mine design." Communication Systems and Networks (COMSNETS), 2012 Fourth International Conference on. IEEE, 2012.
[3]. D. Massaguer, C.-L. Fok, N. Venkatasubramanian, G.-C. Roman, and C. Lu, "Exploring sensor networks using mobile agents," in Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, pp. 323–325, ACM, 2006
[4]. U. Javed, "Frequency hopping in wireless sensor networks, " M.Sc. Thesis, Helsinki University of Technology., March 2009.
[5]. M. Dias, R. Zlot, N. Kalra, and A. Stentz, "Market-based multirobot coordination: A survey and analysis," Proceedings of the IEEE, vol. 94, pp. 1257–1270, July 2006
[6]. J. de Hoog, S. Cameron, and A. Visser, "Role-based autonomous multi-robot exploration," in Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns, 2009. COMPUTATIONWORLD '09. Computation World:, pp. 482–487, Nov 2009.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A New Semi Passive RFID Communication System for Indoor Localization |
Country | : | India |
Authors | : | Padmam Gopinath Kaimal || Shally Lawrence || Ayyapadas P.S |
Abstract: A standard UHF RFID system for accurate indoor localization of object is presented . The system is of a passive tags of known locations as reference points, RFID reader, and a new semi-passive tags as STs. The STs detect and decode backscatter signals from RFID tags that are in their proximity and can communicate with the reader using backscatter modulation. Object tagged with a ST, can be accurately located from the information acquired by the reader from the ST. The performance of the localization system was studied.. Results show that the tagged object can be localized with high accuracy.The cost and power consumption of ST can be reduced by using the microcontroller instead of FPGA.
[1]. Akshay Athalye, Vladimir Savi´c, Miodrag Boli´c, and Petar M. Djuri´c ,Novel Semi-Passive RFID System for Indoor Localization ,IEEE SENSORS JOURNAL, VOL. 13, NO. 2, February2013.
[2]. Boli´c, and P. M. Djuri´c A. Athalye, V. Savi´c, "A radio frequency identification system for accurate indoor localization," in Proc. IEEE Int. Conf. Acoust., Speech Signal Process., May 2011,
[3]. Deva Seetharam, Richard Fletcher ,Battery-Powered RFID, Cambridge, MA 02141,Cambridge.
[4]. A. H. Sayed, A. Tarighat, and N. Khajehnouri, Network-based wireless location: Challenges faced in developing techniques for accurate wireless location information, IEEE Signal Process.
[5]. Majed Rostamian , Localization and Proximity Detection in the Internet of Things Based on an Augmented UHF RFID System, University of Ottawa, 2014
[6]. JiaqingWu, Three-Dimensional Indoor RFID Localization System, University of Nebraska.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Capturing Ephemeral Evidence Using Live Forensics |
Country | : | India |
Authors | : | Ms. Pooja Gupta |
Abstract: Live forensics is a sprouting branch of digital forensics that performs the forensics analysis on active system; Active systems are normally running systems. Live forensics provides accurate and consistent data for investigation compared to incomplete data provided by traditional digital forensics process. But Live forensics still need to be tested thoroughly before the law enforcement discipline will adopt them. Therefore, in this paper, we perform the comparison of traditional forensics and live forensics. We have also highlighted the main objectives, benefits and challenges faced by live forensics.
[1]. Grobler, C.P. ; Acad. for Inf. Technol., Univ. of Johannesburg, Johannesburg, South Africa ; Louwrens, C.P. ; von Solms, S.H." A Multi-component View of Digital Forensics.
[2]. J. J. Murphey, "Forensic readiness‟," 2007. [Online]. Available: www.dexisive.com/wp-content/.../06/Forensic-Readiness.pdf.
[3]. Jones, R. 2007. Safer Live Forensic Acquisition. University of Kent at Canterbury, Available from: http://www.cs.kent.ac.uk/pubs/ug/2007/co620-projects/forensic/report.pdf
[4]. Zatyko, K. (2007). Defining Digital Forensics, Forensic Magazine.
[5]. Grobler, M(2010), "Digital Forensics Standards: International progress,‟ Proceedings of the South African Information Security Multi-conference(SAISMC 2010).
[6]. ForToo: Forensic Tools Against Illegal Use of the Internet HOME/2010/ISEC/AG/INT/002 www.fortoo-project.eu.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Survey on Different Techniques of Threshold Cryptography |
Country | : | India |
Authors | : | Ravleen Kaur || Pragya Kashmira || Kanak Meena || Dr. A.K.Mohapatra |
Abstract: Threshold cryptography protects information by distributing the key among several servers instead of giving it to just a single server. Hence, in order to decrypt a message, a single server's key wouldn't work. Generally, a threshold number of servers' keys are required to co-operate for decryption to be performed. Threshold cryptography has, thus, been proved to be an effective technique for key distribution and decryption. In our paper, we discuss various techniques to implement threshold cryptography effectively in real life scenarios.
[1] A. Shamir. How to share a secret. Commun. ACM, 22, pp. 612-613, November 1979.
[2] Y. Desmedt. Society and group oriented cryptography : a new concept. In C. Pomerance, editor, Advances in Cryptology, Proc. of Crypto '87), pp. 120-127. Springer-Verlag, 1988. Santa Barbara, California, U.S.A., August 16-20.
[3] P. Feldman., A practical scheme for non-interactive variable secret sharing, 28th Annual Symposium on Foundations of Computer Science, pp. 427437. IEEE Computer Society, 1987.
[4] B. Chor, S. Goldwasser, S. Micali and B. Awerbuch, Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults, FOCS85, pp. 383-395.
[5] T. P. Pedersen. A threshold cryptosystem without a trusted party (extended abstract) in D. W. Davies, editor, Advances in Cryptology EUROCRYPT '91, volume 547, pages 522-526. Springer-Verlag, 1991.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Adaptive Bit Flipping Technique In Colour Images |
Country | : | India |
Authors | : | ShaniMol. A |
Abstract: In this paper an adaptive steganographic method using bit flipping technique based on some complexity values of the cover image pixels is proposed. Here a bit position in the image for embedding the payload is selected by analysing each pixel whether it is located in smooth or dark area of the image based on the complexity measure calculated using neighboring pixels .Unlike other spatial domain technique this proposed algorithm uses more bit positions other than LSB to embed the message. To increase the perceptibility of the image the proposed algorithm uses only the blue component of the pixels. Before embedding, the image is compressed and the message is encrypted. The proposed method claims a better capacity and a higher security.
[1] Saeed Ahmed Sohag, Dr. Md. Kabirul Islam, Md. Baharul Islam A Novel Approach for Image Steganography Using Dynamic Substitution and Secret Key [American Journal of Engineering Research (AJER) e-ISSN : 2320-0847 p-ISSN : 2320-0936 Volume-02, Issue-09, pp-118-126 www.ajer.org ] [2] Prof. Akhil Khare, Meenu Kumari, J Pallavi Khare , Efficient Algorithm For Digital Images Steganography [3] Gandharba Swain Saroj Kumar Lenka ,Steganography using two sided, three sided, and four sided side match methods Received: 13 May 2012 / Accepted: 17 April 2013 / Published online: 7 May 2013 [4] Mehdi Hussain and Mureed Hussain , Survey of Image Steganography Techniques Shaheed Zulfiqar Ali Bhutto Institute of Science & Technology, (SZABIST), Islamabad, Pakistan. [5] Vajiheh Sabeti & Shadrokh Samavi & Shahram Shirani , An adaptive LSB matching steganography based on octonary complexity measure , Published online: 12 January 2012
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Cryptographic Key Generation from Finger Vein;A Study |
Country | : | India |
Authors | : | Sharon Davis || Ayana John || Padmam Kaimal |
Abstract: Biometrics in conjuction with cryptography forms a new progressive technology. Using biometric datas such as finger vein,face recognition,iris recognition and finger print for security purposes has become increasingly accepted.The use of biometric data in cryptography is a new, budding and capable area of research. One of the most important problems related with bio-cryptography is creation of a constant encryption key. This paper suggests the method of generation of cryptographic key from finger vein pattern. It is based on the established finger vein image pre-processing methods and a new algorithm.
[1]. C. Tilborg (Ed). Encyclopedia of Cryptography and Security. Springer, 2005
[2]. Handbook of Information andCommunication Security, P. Stavroulakis,M. Stamp (Eds.), Springer, 2010
Theses:
[3]. U. Uludag, "Secure biometric systems,"Ph.D. dissertation, Michigan StateUniversity,http://biometrics.cse.msu.edu/Publications/Thesis/UmutUludag_SecureBSecureBio_PhD06.pdf, 2006.
Proceedings Papers:
[4]. Venckauskas, N. Jusas, I. Mikuckiene, S.Maciulevicius, "Generation of the secret encryption key using the signature of the embedded system", Information technology and control, T. 41, nr. 4, pp. 368–375, 2012.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Discovery and Verification of Neighbor Positions in MANETs using Extended NPV Protocol |
Country | : | India |
Authors | : | Sherimol Hameed || Deepu S |
Abstract: MANET is an autonomous collection of mobile nodes that communicated over relatively bandwidth constrained wireless links.In such communication these networks are highly vulnerable to internal and external attacks due to the presence of adversarial nodes.In this research work, we first analyze the problems that may arise from falsified position data. Then inorder to lessen these problems we propose a detection mechanism that are capable of recognizing nodes cheating about their location. In contrast to other position verification approaches our solution does not rely on special hardware. It involves verification of nodes position by different tests and thereby widely prevents attacks using position cheating and communication is achieved through the successful nodes in the case of proactive enviornment.The results show that our proposed system improves the network security and performance.
[1] Padmavathi K,Jaganraj L "A Study on Secure Spontaneous Ad Hoc Network Protocol for Neighbor Position Verification" Oct 2013 [2] T. Leinmuller, C. Maiho¨ fer, E. Schoch, and F. Kargl,"Improved Security in Geographic Ad Hoc Routing through Autonomous Position Verification," Proc. ACM Third Int'l Workshop Vehicular Ad Hoc Networks (VANET), Sept. 2006. [3] P. Papadimitratos and A. Jovanovic, "GNSS-Based Positioning: Attacks and Countermeasures," Proc. IEEE Military Comm. Conf. (MILCOM), Nov. 2008. [4] Marco Fiore, Claudio Ettore Casetti,Carla-Fabiana Chiasserini, Senior Member, Panagiotis Papadimitratos, "Discovery and Verification of NeighborPositions in Mobile Ad Hoc Networks"Feb 2013
[5] Tim Leinm¨uller, Elmar Schoch, Frank Kargl "Position Verification Approaches for Vehicular Ad Hoc Networks"2008
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Power Management in WSN using M-SPIN and SPIN Protocol |
Country | : | India |
Authors | : | Sherin C George || Aparna M.S || Divya George |
Abstract: Power management is an major issue in wireless sensor networks (WSNs) because wireless sensor nodes are normally battery powered, and the systematic use of the available battery power becomes an important concern specially for those applications where the system is likely to function for lengthy periods[13][11]. This requirement for energy efficient operation of a WSN has given rise to the development of novel protocols in Data link layer of the communication layer. This paper presents the proposal of a energy efficient routing protocol called SPIN and M-SPIN and also discusses about the disadvantages of the protocols which was used before M-SPIN and SPIN protocol.
[[1] Zeenat Rehena,Sarbani Roy,Nandini Mukherjee ,"A modified spin for wireless sensor networks",IEEE paper,2011.
[2] Geetika Dhand,Dr.S.S.Tyagi,"Survey on data-centric protocols of wsn", International Journal Of Application Or Innovation In Engineering & Management (IJAIEM), Volume 2, Issue 2, February 2013
[3] Amitoj Kaur, Gursimrat Singh, Jagroop Kaur," Spin: A Data Centric Protocol For Wireless Sensor Networks", International
[4] Journal Of Engineering Research & Technology (IJERT),Vol. 2 Issue 3, March – 2013
[5] Ali Elkateeb,"Soft-core processor design for sensor networks nodes", International Journal Of Computer Networks & Communications (IJCNC) Vol.3, No.4, July 2011
[6] Ali El Kateeb, Aiyappa Ramesh, and L. Azzawi," Wireless sensor nodes processor architecture and design", ieee paper, 2008
[7] Geetu,Sonia Juneja,"Performance Analysis Of SPIN and LEACH Routing Protocol in WSN, International Journal Of Computational Engineering Research (IJCER) Vol. 2 Issue. 5 ,September 2012
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Analysis of LSB insertion algorithm for through Digital Steganography |
Country | : | India |
Authors | : | Dr. Shipra Jain |
Abstract: Image processing in the field of electrical engineering is defined as any form of signal processing for which the input taken is in the form of an image such as photographs or frames of video; the output of image processing can be either an image or some of the parameters related to that image. Most of image-processing techniques involve treats the image as a two-dimensional signal and applies various standard signal-processing techniques to it.
[1] Katzenbeisser, S. and Petitcolas, F(1999).: Information hiding techniques for steganography and digital watermarking. Artech House Books [2] C. Rey and J.L. Dugelay(2002). A survey of watermarking algorithms for image authentication.EURASIP Journal on Applied Signal Processing, 6:613–621. [3] N. Provos and P. Honeyman, "Hide and Seek: An introduction to Steganography," IEEE Security & Privacy Journal 2003. [4] Frank Hartung, Martin Kutter(July 1999), "Multimedia Watermarking Techniques", Proceedings of The IEEE, Vol. 87, No. 7, pp. 1085 – 1103 [5] Edin Muharemagic and Borko Furht ―A Survey of watermarking techniques and applications 2001.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Survey On Wavelet Domain Watermarking |
Country | : | India |
Authors | : | Sreedevi P || Shobha Elizabeth Rajan |
Abstract: Digital watermarking is a technique considered in different areas where private and secure data transmission is a concern. Watermarking is the process of hiding information into any digital content for enhancing additional security to visual data. The objective of embedding information by digital watermarking can be either one or more of copyright protection, data authentication, identification of illegal copies and illegal changes made in the data. Transform domain techniques are better in robustness, imperceptibility and recoverability of cover and embedded information, than spatial domain techniques. Wavelet transforms have outperformed DFT and DCT in all branches of image processing. This paper gives an analysis of different types of DWT based watermarking techniques.
[1]. Vidyasagar M. Potdar, Song Han, Elizabeth Chang," A Survey of Digital Image Watermarking Techniques", 3rd International Conference on Industrial Informatics (INDIN),2005.
[2]. Mauro Barni, Franco Bartolini, and Alessandro Piva, " Improved Wavelet-Based Digital Watermarking Through Pixel-Wise Masking ", IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 10, NO. 5, MAY 2001.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Fpga Implementation of Low Complexity Test Circuits Using Shift Registers |
Country | : | India |
Authors | : | Mohammed Yasir || Shameer.S |
Abstract: Functional broadside tests are two-pattern scan based tests that avoid over testing by ensuring that a circuit traverses only reachable states during the functional clock cycles of a test. On-chip test generation has the advantage that it reduces test data volume and facilitates at-speed test application. This paper shows that on-chip generation of functional broadside tests can be done using a simple and fixed hardware structure. With the proposed on-chip test generation method, the circuit is used for generating reachable states during test application. Because of the high device counts and limited input/output access that characterize VLSI circuits, conventional testing approaches are often ineffective and insufficient for VLSI circuits. Built-in self-test (BIST) is a commonly used design technique that allows a circuit to test itself. BIST has gained popularity as an effective solution over circuit test cost; test quality and test reuse problems. So here we are presenting an implementation of a tester circuit using Verilog and then implementation using FPGA.
[1]. I. Pomeranz and S. M. Reddy, "Generation of functional broadside tests for transition faults," IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 25, no. 10, pp. 2207–2218, Oct. 2006. [2]. M. Syalet al., "Astudy of implication based pseudo functional testing," inProc. Int. Test Conf., 2006, pp. 1–10. [3]. H. Lee, I. Pomeranz, and S. M. Reddy, "On complete functional broadside tests for transition faults," IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., pp. 583–587, 2008. [4]. Y.-C. Lin, F. Lu, and K.-T. Cheng, "Pseudofunctional testing," IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., pp. 1535– 1546, 2006 [5]. I. Pomeranz and S. M. Reddy, "Primary input vectors to avoid in random test sequences for synchronous sequential circuits," IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., pp. 193–197, 2008.