T. Premkoumar, M. Rashmi, A. Suresh, Divya R. Warrier
{"title":"Optimal voltage balancing method for reduced switching power losses in stacked multicell converters","authors":"T. Premkoumar, M. Rashmi, A. Suresh, Divya R. Warrier","doi":"10.1109/ICICES.2017.8070780","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070780","url":null,"abstract":"This paper proposes a voltage balancing method for reduced switching power losses in stacked multicell converters (SMCs) based on optimal switching of power MOSFETs. In order to reduce the switching transitions of the power devices, only optimal transitions between consecutive voltage levels are used in the proposed method. By switching the power devices in the optimal manner most of the switching losses are reduced efficiently so that the overall performance of the proposed multilevel converter has been improved significantly. The proposed system has been simulated in MatLab 2015a and the simulation results show that the proposed system outperforms the system which uses non optimal switching.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123363879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Video steganography based on embedding the video using PCF technique","authors":"K. Rajalakshmi, K. Mahesh","doi":"10.1109/ICICES.2017.8070726","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070726","url":null,"abstract":"Video steganography is considered as a method of hiding information and secret communication of the most significant problems occurred on the secure the data transmission in the electronic era. The main purpose of this paper is to important for the efficient data transfer of the data and to maintain the secrecy of the data that is to be transmitted. From the past time to present time security of confidential information is always an important issue. In this paper, a novel technique is proposed to conceal the existence of the message so that it becomes tricky for attacker to notice it. This paper deals with video steganography algorithms to hide video file within another video using Patch wise Code Formation techniques. This technique provides robustness, better video quality and authentication ability. The performance of the process is measured in terms of the compression ratio using the metrics such as PSNR, MSE, CR and BPP.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125359149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Chakaravarthi, P. Visu, B. Balu, V. Vineshwaran, M. Yakeshraj
{"title":"Web service registration and routing system and inter web proxy service model prevents the message alteration attacks, man-in-the middle attacks","authors":"S. Chakaravarthi, P. Visu, B. Balu, V. Vineshwaran, M. Yakeshraj","doi":"10.1109/ICICES.2017.8070759","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070759","url":null,"abstract":"In this paper, an architectural framework for Web Service Security System that secures Web services effectively from message alteration attacks, Man-in-the Middle (MIM) attacks and Denial of Service (DoS) attacks has been proposed and implemented. This proposed system provides intelligent mechanisms for effective detection and preventions of message alteration attacks at message level, man-in-the middle attacks at transport level and denial of service attacks at application level. For this purpose, new approaches have been proposed for intelligent identification of the services requested by the user to the service provider. Moreover, new agents called requester agent and provider agent have been deployed for effective communication between the service requester and the service provider. An encryption mechanism and digital signature generation is incorporated to secure the Simple Object Access Protocol (SOAP) message over communication between the client and the server. The new approach proposed in this research work called Web Service Registration and Routing System and Inter Proxy Web Service that effectively prevents the message alteration attacks, Man-in-the Middle attacks and other types of attacks in order to secure Web service at message level. Also, new agents are such as requester agent and provider agent have been deployed at the client and server side respectively. These two agents are responsible for effective monitoring and controlling of various messages and attacks at the message level. In addition to this, a security token is created for each user request to verify the validity of the service provider and service requester for effective and secured communication. This system also provides a new approach for the intelligent prevention of Man-in-the Middle attack and Denial of Service attack in Web services.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128997512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on image restoration using hybrid channel based on firefly algorithm","authors":"B. B. Csam, F. G. Tharika, K. I. Luxci, N. Kumar","doi":"10.1109/ICICES.2017.8070727","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070727","url":null,"abstract":"In the diagnostic medical images, the critical component is to lessen the Gaussian noise, which is found in the medical images and make better picture quality. In many cases, the speckle noise corrupts the fine subtle elements and edge definitions of the images. so it ought to be filtered. In this paper, a computed aided diagnostic system for finding the amiable and threatening liver tumours from computed tomography images is presented. This paper proposes the distinctive hybrid techniques for evacuation of mixed type of noise from the images and the image restoration is achieved by the firefly algorithm. Noise arise due to different variables like bit error rate, malfunctioning of camera sensor cells, dead pixels etc. The Hybrid filter can expel mixed type of noise. The quality of the enhanced image is measured by means of the Root mean square error(RMSE), Peak signal to noise ratio(PSNR).","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130005667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Road and off road terrain classification for autonomous ground vehicle","authors":"T. Selvathai, Jayashree Varadhan, S. Ramesh","doi":"10.1109/ICICES.2017.8070724","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070724","url":null,"abstract":"The ongoing development of Autonomous Ground Vehicle technologies necessitates for classification of terrain as road and off road to identify the drivable path and optimal velocity for traversal of the vehicle. Terrain consists of different texture types, classification of terrain into different classes is a difficult and challenging task. In this paper the feature set extraction and classification approaches are explored, and a novel vision based method for classification of terrain as two classes {road and off road} is presented. The proposed feature extraction process utilizes both color and texture distributions and is combined with a trained multi-layer feed forward neural network based supervised classifier to categorize the terrain. The algorithm is trained and tested on video data obtained from front looking cameras mounted on a vehicle and it is observed that an optimal performance of 93% correct classification is achieved using the proposed methods.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116300587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel zone based routing protocol for detection of replicas in static wireless sensor networks","authors":"N. Usha, E. Anita","doi":"10.1109/ICICES.2017.8070790","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070790","url":null,"abstract":"As sensor nodes in a wireless network are tiny, very small, low-cost and deployed in an unattended environment, they are easily prone to many kinds of serious attacks. One such attack is Node Replication attack, where the attacker creates multiple clones /replicas of the legitimate node and deploys them at various paths in the network. As these replicas behave exactly like legitimate node, it is very difficult to detect them in the network. The presence of replicas mainly aims at disrupting the services of the network, thereby decreasing the performance of the same. Many research works have been carried out to detect the replicas in the network, but still each of the mechanisms have some push-backs. This paper mainly analyses the use of a Zone based routing protocol(ZRP) for Clone detection and how effectively routing can be done even in the presence of a clone in the network. Also it discusses how the performance of the network can be maintained even in the presence of the clone in the network.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115784407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proficient key management scheme for multicast groups using group key agreement and broadcast encryption","authors":"E. Abirami, T. Padmavathy","doi":"10.1109/ICICES.2017.8070789","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070789","url":null,"abstract":"Key Management techniques are exercised to distribute and update keys such that illegitimate parties cannot ingress group communications. Key management, however can exhibit information about the stream of group association, such as group size and the number of joining and leaving users. This is a threat to applications with confidential group membership information. This project proposes a new key management paradigm which a combination of traditional broadcast encryption and group key agreement which never reveals the group dynamic information to outsiders and achieves both forward secrecy and backward secrecy. It provides a secure key management model not only with public and private key but also two more keys called group key and session key. It is distributed to multiple user overtime. It also overcomes the limitation of quantum point to point key sharing. It offers reliability and convenience of use, as well as to introduce a secure and efficient key management technique for any quantum cryptography network in real time.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128204461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MRKFE: Designing cascaded map reduce algorithm for key frame extraction","authors":"Praveen Deshmane","doi":"10.1109/ICICES.2017.8070719","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070719","url":null,"abstract":"Key frame extraction is a technique used to compute measure of dissimilarity between successive frames in order to identify unique frames from a collection of video frames and thereby, eliminates redundant frames. It is widely used in image processing, video surveillance, cyber forensic, video browsing, and video indexing and retrieval applications. Though the state-of-the art computer vision algorithms provide efficient solutions for extraction of key frames, but often demands very high computational power as it involves computing very high dimensional image features. On the other hand, with the widespread use of Big Data and IOT applications, the storage, management and accessing of large volume, high velocity and variety of video data is increasing at exponential rates. Therefore, in order to address this problem we propose optimization of key frame extraction algorithms on Apache Hadoop distributed framework. As the process of extracting key-frames involves simultaneous execution of image processing tasks, the Hadoop framework divides and distributes these tasks to multiple nodes of the cluster. The MapReduce programming model has been redefined to perform the tasks of identifying key frames by color histogram difference between successive frames. The proposed optimized Hadoop's MapReduce algorithm has been tested on a data set of 1000 news videos each having approximately a length of 10 minutes. A performance speed up of 7 has been achieved by varying the size of the cluster from 1 node to 10 nodes.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133691358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Sudha, L. Sudha, K. Aruna, V. Sureka, K. Jayanthi
{"title":"Leer detection with webcam in a desktop environment","authors":"P. Sudha, L. Sudha, K. Aruna, V. Sureka, K. Jayanthi","doi":"10.1109/ICICES.2017.8070785","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070785","url":null,"abstract":"This cardboard addresses the eye exhausting tracking botheration machine a reduced and included satisfactory web camera in a desktop domain, as against to tedious tracking procedures acute specific hardware, e.g., ambivalent high-resolution camera and self-contradicting on fire sources, as capable as a cumbersome plan handle. In the proposed strategy, we native hint the creature confront in a continuous video plan to extract the eye districts. At that point, we amalgamate intensity activity and curve spine to affirmation the iris centermost and propel the piecewise eye twist indicator to discover the eye corner. We acknowledge a sinusoidal model to mimic the 3-D curve shape.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131253035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data restoration for android mobile","authors":"H. S. Sterlin, P. Balaji, A. Edwin","doi":"10.1109/ICICES.2017.8070762","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070762","url":null,"abstract":"In Modern Technological days, we are accidentally deleted some data, photos and videos on our mobile phone. When the data is deleted we cannot retrieve the data back. The only recover the problem is to restore your data from the back up or installed Mobile data recovery software. The mobile phone has a delete option in it which will delete the data permanently.since the mobile is not like computer which have a large memory and a recycle bin option. The mobile phone have only less space or we need a external storage to store our data. The Data Restoration process will give the user to delete the data from the mobile and the data will be stored in cloud storage. When the user want to restore the data from cloud the restore option will be given to view and restore the deleted data.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127427070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}