2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)最新文献

筛选
英文 中文
Paradigms of Image Compression and Encryption: A Review 图像压缩与加密范式综述
Pratistha Mathur, Anju Yadav, Viveak Kumar Verma, Renuka Purohit
{"title":"Paradigms of Image Compression and Encryption: A Review","authors":"Pratistha Mathur, Anju Yadav, Viveak Kumar Verma, Renuka Purohit","doi":"10.1109/ICCT46177.2019.8969039","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969039","url":null,"abstract":"Image compression is a process of reducing size of an images at the time of transmission and at network level we also need some security mechanism for secure data transmission assurance. To provide data security we need a best encryption method for an image so that it does not affect image quality. The image compression schemes are of two types lossy and lossless or combination of both. The both (lossy and lossless) compression schemes can compress and decompress the image but some time compression made some loss of data so it is lossy otherwise lossless. To provide security as we know perform encryption and decryption process, there are two methods for key generation one is symmetric and other asymmetric. If we use same key for encryption and decryption i.e., known as symmetric system otherwise asymmetric cryptography system.In this paper, a detailed review of different Compression and Encryption schemes like CE, EC, Joint compression and Encryption is given and we also analyzed their result on the basis of different parameter like compression ratio, PSNR, NPCR, UACI etc.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114331169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CDFM-based Secure & Efficient Architecture for Data Management in Cloud Computing 基于cdfm的云计算数据管理安全高效架构
Muskaan Singh, Ravinder Kumar, Inderveer Chana
{"title":"CDFM-based Secure & Efficient Architecture for Data Management in Cloud Computing","authors":"Muskaan Singh, Ravinder Kumar, Inderveer Chana","doi":"10.1109/ICCT46177.2019.8969017","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969017","url":null,"abstract":"Cloud has become a prominent technology of data storage and computation. This allows user and institutions to depend on Cloud providers for storage and computing to offer system as a service. The growing significance of extensive acquisition and adoption of cloud computing have imposed security assurance on cloud. Security assurance provides integrity, confidentiality and reliability of data by performing computation and retrieving in compliance with the cloud providers. The storage, processing and managing of data for complex application becomes cumbersome and burdensome on cloud provider platforms. A management mechanism is required to manage the resources and reduce the complexity for maximizing performance with minimum human intervention. Even handling security threats occurring with varying workloads and failures in cloud environment is entailed. Motivated from this self management mechanism, we proposed a novel Cuckoo-based Data Fragmentation and Metadata (CDFM) secure and efficient approach. It manages the complex data of Translation and retrieves the translated data securely. In this work, cuckoo pools divide the data into different number of fragments and send it to different data pools. Data pools first encrypt the data fragment and assign color code to this encrypted fragment and then prepare indexing according to this color coding. The performance analysis, exhibit higher performance than existing approach for security and data fragmentation in cloud scenario.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125768977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Biometric Voting Machine Based on Fingerprint Scanner and Arduino 基于指纹扫描仪和Arduino的生物识别投票机
Atharva Jamkar, Omkar Kulkarni, A. Salunke, A. Pljonkin
{"title":"Biometric Voting Machine Based on Fingerprint Scanner and Arduino","authors":"Atharva Jamkar, Omkar Kulkarni, A. Salunke, A. Pljonkin","doi":"10.1109/ICCT46177.2019.8969034","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969034","url":null,"abstract":"This paper describes design of Biometric Voting Machine Using Fingerprint Scanner and Arduino for voting in institutes and organizations. Indian constitution empowers its citizen to exercise right to vote. Election decides the future of country, so that the system used for voting should be trustworthy. The conventional system for voting is ballot paper and Electronic voting machine too, has many flaws and trust issues. To eradicate malpractice and defrauding of the above methods of voting, we have designed an advanced system by using arduino and Fingerprint module. In this system, a person has to register a fingerprint ID with the system which will be centrally stored in arduino. In organizations, educational institutes, a co-operative bank, maximum number of votes elect head of organization that holds the office of public interest. For confirmation of voter, the name of the candidate will be displayed on LCD for whom the voter has cast a vote. It has simple hardware design and it is easily accessible. In case user wants to remove any of stored ID then the user need to press DEL key, after pressing DEL key, LED will ask to select ID that is to be deleted. After pressing OK key, the selected ID will be deleted and LCD will display that which ID has been deleted successfully. This system is flexible to use.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131654728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Decoupling Control of Headbox using Particle Swarm Optimisation (PSO) Algorithm 基于粒子群优化算法的机顶盒解耦控制
P. Saini, R. Kumar, P. Juneja
{"title":"Decoupling Control of Headbox using Particle Swarm Optimisation (PSO) Algorithm","authors":"P. Saini, R. Kumar, P. Juneja","doi":"10.1109/ICCT46177.2019.8969044","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969044","url":null,"abstract":"For multivariable systems, loop interaction is a major issue to be addressed. To reduce loop interaction among various loops in a multivariable system, decouplers are designed. Decouplers act as cross controllers for any multivariable systems. The control of such systems using decouplers, is known as decoupling control. The objective of decoupling control is to minimize control loop dealings. This paper presents design and analysis of decoupling control of headbox using PI controller based on Particle Swarm Optimisation (PSO) algorithm. The performance of PSO based PI controller has been compared with PI controller designed using conventional techniques such as IMC, ZN and TL.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125197854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Advancements in Reversible Data Hiding in Encrypted Images Using Public Key Cryptography 使用公钥加密技术在加密图像中隐藏可逆数据的研究进展
A. N. Khan, Mingquan Fan, Asad Malik, M. A. Husain
{"title":"Advancements in Reversible Data Hiding in Encrypted Images Using Public Key Cryptography","authors":"A. N. Khan, Mingquan Fan, Asad Malik, M. A. Husain","doi":"10.1109/ICCT46177.2019.8969030","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969030","url":null,"abstract":"With the evolving needs of cloud-based information exchange, the challenge of a reliable and secure communication channel has also been the center of attention recently. Although cryptography has been a traditional tool for secure communication; yet it also carries a possibility of attacks aimed to gain access to the sensitive information. As an alternative, the use of reversible data hiding (RDH) technique has been proposed. RDH scheme involves concealment of the data in the cover image, both of which are retrieved in a lossless manner at the receiver end. Over an insecure channel in cloud communication, the cover content is encrypted; thus resulting in Reversible Data Hiding in Encrypted Images (RDHEI). RDHEI traditionally uses symmetric key cryptography involving a drawback of key management overhead. Public key cryptography (PKC) offers an alternate and efficient solution for cloud-based environments in which the homomorphic properties of public key are utilized. This paper provides an overview of the recent advancements in research in the context RDHEI based on PKC; discussing several proposed schemes addressing the core challenges of data expansion and complex computations using public key encryption. In addition to this, the shortcomings of the discussed schemes are highlighted along with possible remedies that will also guide new directions for future work.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132874883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Lithological Mapping using Digital Image Processing Techniques on Landsat 8 OLI Remote Sensing Data in Jahajpur, Bhilwara, Rajasthan 基于数字图像处理技术的Landsat 8 OLI遥感数据在印度拉贾斯坦邦贾哈吉普尔的岩性填图
Mahesh Kumar Tripathi, H. Govil, P. Diwan
{"title":"Lithological Mapping using Digital Image Processing Techniques on Landsat 8 OLI Remote Sensing Data in Jahajpur, Bhilwara, Rajasthan","authors":"Mahesh Kumar Tripathi, H. Govil, P. Diwan","doi":"10.1109/ICCT46177.2019.8969043","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969043","url":null,"abstract":"Lithological mapping is important parameters for interpretation, identification and mapping of minerals. Lithological mapping in the study area defines the characteristics of nature of rock types and their association and formation. In this research study Landsat 8 OLI remote sensing data used for lithological mapping of Jahajpur region of Bhilwara super group. The task of lithological mapping completed by analogical and numerical analysis of digital image processing method which involves several digital image processing techniques such as natural band combination, false color composite, principal component analysis, band ratio and minimum noise fraction. The observed result is verified and validated by field survey and published geological survey of India geological map. The observe result have shown complete correlation and similarity with established map.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114347865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
MaplDroid: Malicious Android Application Detection based on Naive Bayes using Multiple MaplDroid:基于多重朴素贝叶斯的恶意Android应用检测
P. Bhat, Kamlesh Dutta, Sukhbir Singh
{"title":"MaplDroid: Malicious Android Application Detection based on Naive Bayes using Multiple","authors":"P. Bhat, Kamlesh Dutta, Sukhbir Singh","doi":"10.1109/ICCT46177.2019.8969041","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969041","url":null,"abstract":"Android is currently the most popular operating system for mobile devices in the market. Android device is being used by every other person for everyday life activities and it has become a centre for storing personal information. Because of these reasons it attracts many hackers, who develop malicious software for attacking the platform; thus a technique that can effectively prevent the system from malware attacks is required. In this paper, an malware detection technique, MaplDroid has been proposed for detecting malware applications on Android platform. The proposed technique statically analyses the application files using features which are extracted from the manifest file. A supervised learning model based on Naive Bayes is used to classify the application as benign or malicious. MaplDroid achieved Recall score 99.12% and F1 score 83.45%.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130026614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Scene Understanding: A Survey to See the World at a Single Glance 场景理解:一瞥世界的调查
Prajakta Pawar, V. Devendran
{"title":"Scene Understanding: A Survey to See the World at a Single Glance","authors":"Prajakta Pawar, V. Devendran","doi":"10.1109/ICCT46177.2019.8969051","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969051","url":null,"abstract":"Humans are extremely proficient at visually perceiving natural scenes and understanding high level scene structures. In recent times, scene understanding is a challenging and most important problem in computer vision. Images are visual, however the visual information can be with various features like shape, edges, texture and color. The main objective behind object detection is to identify what are all objects present in an image and where they all located. Understanding a scene integrates meaningful information at multiple levels to extract semantic relationships and patterns. The interaction between various objects is most intuitive and natural to human being. As compared with object recognition, scene understanding identify the target of objects and also the distribution of targets in a scene. Scene understanding have a significant impact in computer vision to perceive, analyze, and interpret the visual scenes which leads to new research areas. In this paper, we review the scene understanding concept including feature extraction, classification and scene recognition and related datasets. At last, we have concluded some challenges of object detection remain unsolved and can be scope for further research work.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128818871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Blockchain-Based Smart Contract for E-Bidding System 基于区块链的电子招标系统智能合约
P. Manimaran, R. Dhanalakshmi
{"title":"Blockchain-Based Smart Contract for E-Bidding System","authors":"P. Manimaran, R. Dhanalakshmi","doi":"10.1109/ICCT46177.2019.8969042","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969042","url":null,"abstract":"Electronic bidding systems have become widespread since the advent of the internet and mobile phones. In the Electronic bidding systems, the seller will sell an item and many buyers will bid for that item and the highest bidder will get the item. One of the main issue with this E-Bidding system is the introduction of third-party mainly a company or set of companies which will develop and host either the website or smartphone application. The Buyers and the Sellers have to trust this company because all the bidding process will be handled by the company. The company can manipulate the bidding process if it wants. So to avoid the trust issues blockchain based electronic bidding system is introduced in this paper. In this model, there is no need for third party. Smart Contract will handle all the bidding transactions. Since blockchains are known for its integrity this system makes sure that the integrity of the bidding process is preserved.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125920002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
NLP chatbot for Discharge Summaries 用于出院总结的NLP聊天机器人
Harsh Lal, Priyanshu Lal
{"title":"NLP chatbot for Discharge Summaries","authors":"Harsh Lal, Priyanshu Lal","doi":"10.1109/ICCT46177.2019.8969045","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969045","url":null,"abstract":"One of the most important goals in health-care is improving the quality of health and service rendered by healthcare industry. There has been a growing demand for ease of access to health-care, and this necessitates the development of health-care technology with Human Computer Interaction(HCI) design in mind. HCI usage can help both patients and healthcare providers as well [3]. With a wealth of information available to patients and providers, it can be difficult to find relevant information in a timely manner, especially for providers with busy schedules and patients with limited health literacy. We propose a Human Computer Interaction system that can answer patientś question and help improve the quality of health-care services provided to an individual. We make use of Natural Language Processing, Machine Learning and Big Data technologies to provide a feasible deploy-able solution. for the same.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116272876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信