{"title":"A review of passive forensic techniques for detection of copy-move attacks on digital videos","authors":"Shashank Sharma, S. Dhavale","doi":"10.1109/ICACCS.2016.7586396","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586396","url":null,"abstract":"In recent times, the ease in availability and usability of digital video editing tools has become a major challenge to video forensic experts, to accurately authenticate any suspected digital video content. Besides, the wide range and rapid advancement in the field of such editing tools and improvements in anti-forensic techniques has enabled any naïve user to edit, alter, and modify any digital video with minimal traces/footprints. Recent surveys in the field of digital video forensics highlight the need of research in this field. The requirement of authenticating the integrity of the contents of digital videos ranges from an individual to organizations, defense and security setups to law enforcement agencies. Further to it, the need to explore newer and more effective Passive (or Blind) video forgery detection approaches is gaining importance day by day. This is attributable to the fact that digital videos are accepted as evidences in most of the countries and real life cases involving tampered digital videos, more often than not, rarely get supplemented by any other reference information besides the suspected video. This paper aims at highlighting the challenges and brings out opportunities in the field of Passive or Blind digital video forensics, focusing on spatio-temporal or copy-move attacks on digital videos, by reviewing the existing literature and research work in this field.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123846843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Diffusing multi-aspects of local and global social trust for personalizing trust enhanced recommender system","authors":"K. Senthilkumar, R. P. Principal, R. Gandhi","doi":"10.1109/ICACCS.2016.7586387","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586387","url":null,"abstract":"Recommender systems are an effective solution to the information overload problem, especially in the World Wide Web where we gather vast information from anonymous people around the world. Trust enhanced recommender system to be promising to overcome the cold-start and sparsity challenges of traditional recommender system as well as improving the accuracy of the recommendations. This arise a research focus about blending of the trust information and trust level prediction to the recommendation framework. From the past decade, numerous researches were done to adapt online social network trust (simply social trust) for many web applications, including e-commerce, P2P networks, multi-agent systems, recommendation systems, and service-oriented computing. Usually, online social trust prediction can be based on two mechanisms to acquire trust value: evaluating trustee on basis of truster/truster's neighbor trust experience information (local trust), otherwise evaluating trustee on the basis of the whole social network trust experience information as reputation (global trust). Here, we leverage social science theories to develop the trust models that enable the study of online social trust evolution. In this paper, we propose a matrix factorization based trust enhanced recommendation system which properly incorporates both local trust and global trust with diffusion of the social trust multi-aspects to improve the quality of recommendations for mitigating the data sparsity and the cold-start issues. Through experiments on the Epinions data set, we show that our model outperforms its standard trust enhanced counterparts with respect to accuracy on recommender systems.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122028915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Aravindhan, R. Shanmugalakshmi, K. Ramya, C. Selvan
{"title":"Certain investigation on web application security: Phishing detection and phishing target discovery","authors":"R. Aravindhan, R. Shanmugalakshmi, K. Ramya, C. Selvan","doi":"10.1109/ICACCS.2016.7586405","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586405","url":null,"abstract":"With the rapid development of web applications, and with the comfort provided by these web applications, internet users utilize this benefits to a great extent that they make almost all their day to day activities such as news paper reading, shopping, electricity bill payment, ticket booking and entertainment with the help of the internet. This phenomenon forces the users of the internet to get connected with the internet for a prolonged time and hence it increases the chances of the users to get caught in the web of phishing - an attack crafted by hackers to steal sensitive information by tempting the users with lucrative offers initially and then redirecting them to a fraudulent website(which the user may not suspect) where they can deceive the user by asking them to submit their credentials(usually users submit their credentials without knowing that these are fake offers created with a sole intention of stealing sensitive information). In spite of the alert and awareness given by the web community in this regard, more and more phishing artist succeed in their attack. Also these phishing artist develop novel attacks such as tab nabbing, website impersonation etc that attracts more and more internet user to be caught in the web of phishing. However many tools and methodologies have been developed to prevent phishing and to alert users orally and visually. But still the success rates of the phishing attack remains high and also the approaches related to phishing detection suffers high false positive and false negative ratio. In this paper various tools and methodologies used to prevent phishing has been analyzed and an efficient mechanism has been proposed to prevent phishing.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115815462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of AMBA compliant SoC design for the application of detection of landmines on FPGA","authors":"Krutika Keche, K. Mankar","doi":"10.1109/ICACCS.2016.7586327","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586327","url":null,"abstract":"Landmines are an enormous problem around the world for both military personnel and civilians. The landmine detection techniques that have been used over the years involves huge devices, proper setting of the devices, complicated processing systems and much more. All this makes it difficult to use the techniques on the actual war field. In this paper we have presented design and simulation of the processing system that can be used for locating landmines during wars. The objective of the paper is to design and simulate processing system which has high speed, high throughput and low complexity. On chip based system uses advanced micro controller bus architecture. Different circuits are designed and all are interfaced with each other using advanced micro controller bus architecture to form a complete system on chip. The system finally can be used to detect landmines. A complete application to detect the location of the land mines on the war fields is designed on a single chip. High speed processing is need of this application. The system on chip is designed and simulated using Xilinx and FPGA board.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116620325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chief guest & session chairs","authors":"R. Venkatesan","doi":"10.1109/icaccs.2016.7586304","DOIUrl":"https://doi.org/10.1109/icaccs.2016.7586304","url":null,"abstract":"","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129410936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secured Service Provider selection methods in Cloud","authors":"R. Devi, R. Dhivya, R. Shanmugalakshmi","doi":"10.1109/ICACCS.2016.7586334","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586334","url":null,"abstract":"Cloud computing is an important trend and experienced exponential growth over the last few years. Almost sixty percent of current small-to-medium businesses (SMB) use cloud services. The growth is only expected to increase over the next few years. However, the control of data over the cloud is less for the customers. Hence we lack in trust management which is near about two percentages of the total services provided. Prefer a cloud service provider among numerous vendors based on qualitative and quantitative manner is a challenge for the cloud customer. This paper on the theme of brief examine in existing models which are used for cloud service provider selection in cloud environment and we analysed the criteria which can be improved to provide the best selection.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128567604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental results of structurally modified high power ultra broadband phased array antenna for extending the operating frequency range and improving the VSWR","authors":"C. Viswanadham, P. Rao","doi":"10.1109/ICACCS.2016.7586354","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586354","url":null,"abstract":"Phased array antennas find many applications in modern electronic systems like radars, satellite communications, trackers, jammers etc. Jammers normally use high power antennas and in military applications, the jammer antennas are mission critical and need to operate continuously over long periods and transmit high power RF signals in a particular direction to provide effective jamming on the threat fire control radars, supporting the missiles. Many types of antennas mounted on rotary platforms were in use for jamming applications over few decades, but steering of the radiation beams electronically with very less reaction time with phased array antennas, fed with a dynamic phase shift network (DPSN) came into existence over past few years, provides highly directive beams for effective jamming. The radiated powers are in the order of few hundreds of power (approx. 300 Watts of CW), generated by TWTs, over wide frequency coverage with BWR >3. In such applications, the ports of the phased array antenna elements are simultaneously fed with high power UWB TWT amplifiers. In this type of applications where high power transmissions are involved, VSWR is an important parameter, which determines the amount of the transmitting power and controls the temperature at the feed point due to heating and many times poor VSWR, damages the feed connector and high cost UWB TWTs. A research has been carried out to improve the VSWR of an eight element 8-18 GHz phased array antenna and improved the VSWR over the extended frequency range of 6-18 GHz, without changing the dimensions of the array. Many conventional methods like dielectric loading, stub matching, etc., [1] were experimented, though little improvement is observed in VSWR performance in certain frequency bands of 8-18 GHz, but could not achieved the required VSWR over 6-18 GHz frequency range. Therefore structural modifications to the aperture of the array have been studied and many experiments have been carried out to evolve mechanism for improving the VSWR over entire frequency range. The experiments were successful and VSWR results were satisfactory over 6-18 GHz. These experiments and the measured results are presented in this paper and the authors would like to promote these methods for any type of aperture antennas.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117036512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of impact on rotor angle stability of DFIG wind turbines employing STATCOM","authors":"T. Tamilarasi, M. Elango","doi":"10.1109/ICACCS.2016.7586392","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586392","url":null,"abstract":"Due to rapid increase in population and industrial growth power demand occurs. Non conventional energy resource, especially wind energy is used to generate the power at low cost. Doubly Fed Induction Generator (DFIG) is used to generate the power which has the capability to generate or absorb the reactive power to or from the grid during grid fault. The objective is to analyze the impact on small signal and transient stability of DFIG wind turbines by Power System stabilizer. High penetration of DFIG wind turbines creates the stability problem in power system due to fluctuations in voltage and frequency which reduces the efficiency and power quality of the system. The generation of power from wind energy causes damage to the system. Power qualities, impact of low power factor, poor grid stability are the issues related with grid interconnection. In proposed method, Static Compensator (STATCOM) controls the voltage, reactive power, power factor. It also reduces the line current, power losses and maximizes the power transfer capability. The MATLAB/SIMULINK software is used to analyze the impact on rotor angle stability of DFIG wind turbines employing STATCOM will be used as Grid Side Converter(GSC) of DFIG wind turbines to provide reactive power compensation and to enhance stability of the power system.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116053258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on classification techniques for text mining","authors":"S. Brindha, K. Prabha, S. Sukumaran","doi":"10.1109/ICACCS.2016.7586371","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586371","url":null,"abstract":"The development of the World Wide Web it is no longer feasible for a user can understand all the data coming from classify into categories. The expansion of information and power automatic classification of data and textual data gains increasingly and give high performance. In this paper five important text classifications are described Naive Bayesian, K-Nearest Neighbour, Support Vector Machine, Decision Tree and Regression. Which are categorized the text data into pre define class. The target of the paper is to study different classification techniques and finding the classification accuracy for different datasets. An efficient and effective text documents into mutually exclusive categories.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134578750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on duplicate record detection in real world data","authors":"Dhivyabharathi G V, S. Kumaresan","doi":"10.1109/ICACCS.2016.7586397","DOIUrl":"https://doi.org/10.1109/ICACCS.2016.7586397","url":null,"abstract":"Duplicate can be defined as Same entities have two or more representations in the database. The process of finding the multiple representations of same real world entities is called duplicate detection. Detection of duplicates should be fast in large and small datasets. The duplicate detection methods should find the duplicates in shorter time and at the same time quality of the data set should be maintained. In this paper, we present a thorough analysis of literature survey on adaptive and progressive duplicate detection techniques.","PeriodicalId":176803,"journal":{"name":"2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131331801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}