{"title":"Combined additive and multiplicative modulo encryption and transformation approach for finger print template security","authors":"C. Balaji, R. Ashoka Rajan, P. Anandha Kumar","doi":"10.1109/ICOAC.2014.7229724","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229724","url":null,"abstract":"This paper investigates the current methods for fingerprint template recognition and database security. This target is mainly decomposed into image preprocessing, minutiae extraction, minutiae matching and template security. This paper proposes a two level transformation and encryption techniques for fingerprint minutiae matching to reduce error rate as well as reduce the computational effort from the existing method. For each sub-task, some classical and up-to-date methods in literature are analyzed. Based on the analysis integrated solutions for fingerprint recognition and template security is developed for demonstration. Demonstration program is coded by OPENCV. For the program some optimization at code implementation level and algorithm level are proposed to increase the result to 95%. These performance enhancements are shown by experiments conducted upon a variety of fingerprint images. Also the experiments illustrate the key issues of fingerprint security that are consistent with what the available literatures say.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125086678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Shape based approach for detecting Musa Species in fruit industry","authors":"M. Senthilarasi, S. M. Roomi, M. Prasanna","doi":"10.1109/ICOAC.2014.7229765","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229765","url":null,"abstract":"Agro export industries generate a substantial amount of revenue to Indian economy. In the fruit industry, various fruits like banana, mango, apple and pomegranate, etc. are transported in the conveyor for a post harvest process like classification, sorting, grading and juice extraction. The manual discrimination of various fruits consumes time and, it can be automated. This research work is intended to build an image processing algorithm that ensures automatic discrimination of banana (Musa Species.) from other fruits like Citrus, Apple, and Pomegranate. The input object is segmented using Background subtraction and threshold method. Morphological operations are performed to obtain the clear contour of the segmented objects. The shape of the banana and non-banana are described by scale and translation invariant signature. Binary SVM with signature feature vectors detect the banana fruit from the non-banana fruit automatically. The accuracy rate is 95%.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"313 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123273734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Rakesh, A. Kannan, S. Muthurajkumar, Pandiyaraju, L. Sairamesh
{"title":"Enhancing the precision of phishing classification accuracy using reduced feature set and boosting algorithm","authors":"R. Rakesh, A. Kannan, S. Muthurajkumar, Pandiyaraju, L. Sairamesh","doi":"10.1109/ICOAC.2014.7229752","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229752","url":null,"abstract":"Web Security is a field of Computer Security that aims to establish various security measures to use against attacks performed over the Internet. Phishing is defined as an activity where confidential information such as personal as well as financial information from the user is obtained by luring the user towards an illegitimate webpage. Illegitimate websites inculcate a variety of features that makes them look as a replica of the legitimate site. Phishers employ such features by means of page content, User Interface (UI), Uniform Resource Locator address (URL)within their illegitimate webpage in order to make them look similar. Many researchers have proposed various solutions, nevertheless, no single solution exist that could facilitate users to counter phishing threats. In this paper, important characteristics that identify illegitimate websites from original sites are discussed and an implementation of C4.5 algorithm is used for classifying illegitimate websites and also aims to improve the performance by combining with boosting algorithms.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125371362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-Naive Bayesian classifier for Farmer Advisory System","authors":"D. Santhosh, V. Pandiyaraju, A. Kannan","doi":"10.1109/ICOAC.2014.7229720","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229720","url":null,"abstract":"Agri-mining is a recent trend that helps the farmer through an Information Technology domain that is needed to improve the crop yield system. In this paper, create an effective classifier. For that purpose, Soybean dataset is used for analysis and is pre-processed for improving the accuracy of the classifier. Then the pre-processed input is given to the Non-Naive classifier which performs classification by using the Error Distribution method in the Kernel space. A new Non-Naive Bayesian algorithm is proposed in this project work which improves the performance of the Naive Bayesian algorithm by using Error Distribution functions. The result is compared with Naive Bayesian algorithm using the performance measures such that the ROC and Confusion Matrix. Then the performance of the proposed model is proved to be better than the Naive Bayesian algorithm.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128263218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Job scheduling using Minimum Variation First algorithm in cloud computing","authors":"Dinesh Komarasamy, V. Muthuswamy","doi":"10.1109/ICOAC.2014.7229708","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229708","url":null,"abstract":"Nowadays, the problems are becoming more complicated due to the development of fields related to science and engineering. Cloud computing plays a major role to figure out these complicated problems. Cloud computing is generally categorized into computation intensive and storage intensive model. Cloud collects congregate myriad number of requests from the user (i.e. treated as batch jobs). Hence, scheduling algorithm plays a major role for effectively scheduling of the jobs to the underlying resources scattered in and around the universe. The resources are linked through high speed network. This paper posits Minimum Variation First algorithm (MVF) for effective scheduling of batch jobs. The difference between the expected execution time on the job and its corresponding deadline is recognized as a necessary parameter for allocating the resource for a job. The involvement of this paper is considered as twofold. First, the deadline based jobs are scheduled using the proposed MVF algorithm that will schedule with uniform and non-uniform deadline based jobs. Second, the jobs are scheduled using improved MVF (iMVF) algorithm for avoiding starvation. The experimental results show the performance of these algorithms (MVF and iMVF algorithm) is better compared to other algorithms using CloudSim.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114796595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Public audit on dynamic data preserving user identity and data freshness","authors":"K. Swathy, N. Velvizhi","doi":"10.1109/ICOAC.2014.7229741","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229741","url":null,"abstract":"In Cloud, data can be stored and retrieved by data owner and also by several users. The consistency of data which is stored is not ensured properly, because of hardware and software failure and also due to error made by humans. Several mechanisms are available that allows the public verifiers to audit data stored in the cloud with no need of retrieving the whole data from cloud server. Usually public auditing might reveal private and confidential information to public verifiers. In the Existing system public auditing is done and it maintains private identity of users while supporting batch audit, but does not prove data freshness and support traceability. In this proposed system, batch auditing can be done that support dynamic operations by computing signatures that preserves structures and using an index hash table. It also ensures data freshness during public auditing. The future enhancement can be done on ability of group manager revealing the identity of the user in some special situations.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125205308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DSP architecture with folded tree for power constraint devices","authors":"K. Ranjithkumar, T. Anandharajan","doi":"10.1109/ICOAC.2014.7229757","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229757","url":null,"abstract":"Energy consumption in Digital Signal Processing (DSP) application is a vital parameter of consideration. Mostly DSP applications deplete power. Battery constraint is important in many mobiles, processors, and sensor-related devices. The major critical operations in DSP architecture are multiplication and addition. Multiplication process is performed using repetitive addition. Hence, adder is the basic component used in digital signal processor. DSP architecture is proposed with the energy-efficient goal. Traditional carry select adder contains ripple carry adder block is replaced by parallel prefix adder. By replacing that block and introducing folded tree, we can reduce power used by DSP processors. This architecture can be used in all power constrained DSP applications. In the existing system, folded tree is used in architecture to reduce the number of processing elements, and they used carry look-ahead adder to perform the internal processing element operations. In the proposed system, carry look-ahead adder is replaced by LFA and PA to harness the energy depleted in an application (e.g., DSP application). Power consumption is reduced by 12-15% as compared with the existing algorithms using Cyclone III (EP3C16F484C6).","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115769000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modified RPCA with Hessian matrix for object detection in video surveillance on highways","authors":"K. Kiruba, P. Sathiya, P. Anandhakumar","doi":"10.1109/ICOAC.2014.7229719","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229719","url":null,"abstract":"Video surveillance is an active research topic in computer vision research area to detect the abnormal behavior of vehicle and pedestrian on the highways in order to reduce the collision between them. Statistical methods are helpful in identifying the abnormal behavior of vehicle and human in order to avoid the accident on the highways. To build an effective automatic system that should determine the number of pedestrian and vehicles, if there are any, then their distance and speed needs to be calculated. Detecting object and calculating their speed and distance is challenging task because objects are moving fast on highways, and appear at different scales. In this paper, we propose a Modified RPCA with Hessian matrix for vehicle and pedestrian detection. By using an SVM classifier, it will be able to classify the objects in the current frame. Distance is calculated between the vehicle and pedestrian, speed and their locations. If the distance value is below the defined coverage (50 meters) their performance is evaluated and compared between RPCA and Modified RPCA. The modified RPCA is more efficient than RPCA.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"18 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123574729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent stealthy attack on MAODV in mobile ad hoc networks","authors":"A. Pushpa, K. Kathiravan","doi":"10.1109/ICOAC.2014.7229740","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229740","url":null,"abstract":"Nowadays, common interest in an information grows rapidly that evolves, many application areas like share market, e- agribusiness and on-demand services. In these applications, delivering information to multiple receivers at the same time makes multicast communication is the next generation dominated data transmission mechanism in mobile ad hoc networks. In spite of efficient bandwidth utilization, multicast is most vulnerable against various types of internal and Byzantine attacks. Existing Intrusion Detection Systems and attacker prevention techniques act too smart to defend these attacking strategies. Accordingly adversaries also update their attacking strategy intelligently to intervene the successful defending schemes. In our work, we present a novel intelligent internal attack on a tree-based multicast routing protocol in MANET. Intelligent adversary launches it's attacking strategy on MAC layer against collision avoidance mechanism only when it can gain more in an attack's success rate. Our simulation study observes the robustness of MAODV against this internal attacking approach. Multicast session's performance metrics such as PDR, throughput and packets drop ratio are analyzed with the presence of adversaries in the multicast group. We also examine the impact of attacker's location in the multicast tree. We design an analytical model that shows the impact of internal attack on multicast group through empirical study. Analytical results compare with NS2 simulation results that prove the validity of analytical models. This empirical study illustrates the importance of designing smarter internal attacker detection mechanism to protect multicast routing protocols from the above-mentioned intelligent internal attacks.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117236017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vertical handover performance investigation with discrete event system simulation in next generation wireless network","authors":"E. Malathy, V. Muthuswamy","doi":"10.1109/ICOAC.2014.7229714","DOIUrl":"https://doi.org/10.1109/ICOAC.2014.7229714","url":null,"abstract":"Next generation network facilitate mobile users to have service with different network technologies through vertical handover mechanism. The vertical handover service maximization becomes critical in such scenario. Efficient analysis of handover call service yields minimization of call drop probability. Call drop occurrence happens due to delay in service time establishment. This check on delay in service establishment guarantees the Quality of Service fulfillment to the mobile users. This paper brings powerful investigation model for vertical handover performance through Discrete Event System simulation. Discrete event system evaluates strategies of experimental operations of the system for handover calls. The performance analysis is carried to monitor handoff success rate trends in WiFi wireless network for single channel and multi channel scenario.","PeriodicalId":325520,"journal":{"name":"2014 Sixth International Conference on Advanced Computing (ICoAC)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129890505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}