A. Sathya, J. Swetha, K. A. Das, Kuruvachan K. George, C. S. Kumar, J. Aravinth
{"title":"Robust features for spoofing detection","authors":"A. Sathya, J. Swetha, K. A. Das, Kuruvachan K. George, C. S. Kumar, J. Aravinth","doi":"10.1109/ICACCI.2016.7732417","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732417","url":null,"abstract":"It is very important to enhance the robustness of Automatic Speaker Verification (ASV) systems against spoofing attacks. One of the recent research efforts in this direction is to derive features that are robust against spoofed speech. In this work, we experiment with the use of Cosine Normalised Phase-based Cepstral Coefficients (CNPCC) as inputs to a Gaussian Mixture Model (GMM) back-end classifier and compare its results with systems developed using the popular short term cepstral features, Mel-Frequency Cepstral Coefficients (MFCC) and Power Normalised Cepstral Coefficients (PNCC), and show that CNPCC outperforms the other features. We then perform a score level fusion of the system developed using CNPCC with that of the systems using MFCC and PNCC to further enhance the performance. We use known attacks to train and optimise the system and unknown attacks to evaluate and present the results.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127125060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combining temporal interpolation and DCNN for faster recognition of micro-expressions in video sequences","authors":"V. Mayya, R. Pai, M. Pai","doi":"10.1109/ICACCI.2016.7732128","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732128","url":null,"abstract":"Micro-expressions are the hidden human emotions that are short lived and are very hard to detect them in real time conversations. Micro-expressions recognition has proven to be an important behavior source for lie detection during crime interrogation. SMIC and CASME II are the two widely used, spontaneous micro-expressions datasets which are available publicly with baseline results that uses LBP-TOP for feature extraction. Estimation of correct parameters is the key factor for feature extraction using LBP-TOP, which results in long computation time. In this paper, the video sequences are interpolated using temporal interpolation(TIM) and then the facial features are extracted using deep convolutional neural network(DCNN) on CUDA enabled General Purpose Graphics Processing Unit(GPGPU) system. Results show that the proposed combination of DCNN and TIM can achieve better performance than the results published in baseline publications. The feature extraction time is reduced due to the usage of GPU enabled systems.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125334303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of two-tier cellular network using power control and cooperation","authors":"Pragya Swami, M. Mishra, A. Trivedi","doi":"10.1109/ICACCI.2016.7732067","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732067","url":null,"abstract":"Femtocell deployment improves the data rate and indoor coverage of the heterogeneous cellular network (HCN). However, it also increases the cross-tier interference of the system which results in performance degradation of the macro base station (MBS) tier. In this work, a mathematical framework is developed to mitigate the cross-tier interference of MBS tier using a power control scheme (PCS). This PCS works on path loss inversion and location-based power level rule for femto base stations (FBS) to improve the coverage of the MBS tier. Furthermore, a cooperation scheme and association policy are proposed to improve the performance of the FBS tier. Stochastic geometry is considered for deriving the signal to interference and noise ratio (SINR) outage probability, total outage probability, and area spectral efficiency (ASE) for MBS and FBS tiers. The impact of the PCS, proposed cooperation scheme with association policy on outage probability, and ASE are numerically evaluated. Numerical results show that considerable improvement in outage performance of MBS tier is obtained using proposed PCS. Moreover, applying PCS results in degradation of outage performance of FBS tier. This loss in performance can be compensated by using the proposed cooperation scheme and association policy.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126612094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reduce the effect of vignetting on MIMO optical wireless system by reducing BER of channel","authors":"Pallavi Nag, Amit Gupta","doi":"10.1109/ICACCI.2016.7732231","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732231","url":null,"abstract":"Vignetting is the process in which there is darkness at the edges as compared to center of image. Thus the process of vignetting can affect the performance of MIMO optical wireless communication (OWC) systems. The effect of the vignetting on a pixelated system is measured by using spatial OFDM. It is clear that vignetting can leads to the attenuation and ICI in the spatial orthogonal frequency division multiplexing. SACO-OFDM (spatial asymmetrical clipped optical) and SDCO-OFDM (spatial DC-biased clipped optical) are previous techniques which are used to reduce the impact of vignetting on signals. This paper investigates the result of vignetting on pixelated MIMO systems with OFDM. In this work, we reduce the effect of vignetting by reducing BER of channel using MATLAB simulator. After simulation it is proved that the proposed technique shows better accuracy than previous techniques.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"324 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115453826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature selection for novel fingerprint dynamics biometric technique based on PCA","authors":"Ishan Bhardwaj, N. Londhe, S. Kopparapu","doi":"10.1109/ICACCI.2016.7732297","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732297","url":null,"abstract":"Fingerprint dynamics is a recently introduced behavioral biometric technique based on the time derived parameters from multi instance finger scan actions. Various related features can be extracted from recorded time stamps. However, not all of them contribute in improvement of classification accuracy and may result in high dimensionality of the data. High dimensionality leads to higher computation cost for calculating the features, and low classification rate. Thus it is crucial to select the best features for efficient system performance. Principal Component Analysis (PCA) is a popular technique for dimensionality reduction and has been applied to a wide number of applications. However conventional PCA based methods have a disadvantage of using all the features for transforming to lower dimensional space. In this paper, we follow a method based on PCA, which selects the most dominating features subset out of the feature pool at hand, without transforming the original features. The performance of selected features is assessed using various classification paradigms. The result ascertain successful selection of dominant feature subsets of fingerprint dynamics using PCA.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115509326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A segmented-mean feature extraction method for glove-based system to enhance physiotherapy for accurate and speedy recuperation of limbs","authors":"A. Samraj, K. Rajendran, R. Palaniappan","doi":"10.1109/ICACCI.2016.7732342","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732342","url":null,"abstract":"It is always desirable to have an accurate system that allows fast recovery of patients undergoing physiotherapy in terms of integrated health and cost benefits. The caregivers and medical personnel too gain a lot of expertise through the innovations involved in treatment methodology. This system proposed here was developed successfully with a straightforward Segmented-Mean feature construction method that enables its portability to suit smart biomedical devices. In this work, four different exercises were completed by four different subjects in two sessions and the feedback system was generated from every single trial performance via a visual display in a smart phone. The accuracy of the system's output depends on the precise representation of two important things namely, correct gesture and timings. These two parameters have to be captured from the signals that are generated by the hand glove during the manual physiotherapy as guided by the experts during the teaching (i.e. training) phase. Any deviation from the model should also be captured and reflected in the feedback to align the physio-movements towards perfection to minimise adverse effects. So the feature has to be constructed with complete representation and obviously, as fast as possible. The proposed Segmented-Mean method calculates the mean of data that arrives from the significant electrodes periodically, thus preserving the performance of the subject and is found suitable in estimating the enactment of exercises and required deviations (if any), accurately and as appropriate. The proposed Segmented-Mean method helps the construction of features easily than other conventional methods by reducing the computational complexity and therefore, the response time. Hence, shifting the importance to actual physiotherapy monitoring with an accurate system that works on simple feature construction made feasible.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116459750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A random forest approach for rating-based recommender system","authors":"A. Ajesh, Jayashree Nair, P. S. Jijin","doi":"10.1109/ICACCI.2016.7732225","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732225","url":null,"abstract":"Recommender system has emerged as an integral part of the online shopping sites as it promotes sales. It recommends intuitive products based on users preference which solves the issue of information overload. Recommender system constitutes information filtering mechanism which filters vast amount of data. Algorithms such as SVD, KNN, Softmax Regression has already been used in the past to form recommendations. In this paper we propose a system which uses clustering and random forest as multilevel strategies to predict recommendations based on users ratings while targeting users mind-set and current trends. The result has been evaluated with the help of RMSE (Root Mean Square Error). Feasible performance has been achieved.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116546415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptographic turbo code for image transmission over mobile networks","authors":"V. Sawant, A. Bhise","doi":"10.1109/ICACCI.2016.7732151","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732151","url":null,"abstract":"Mobile communication has become an essential part of our daily life for accessing and sharing data over internet in addition to voice communication. Mobile communication channel is an open network and hence maintaining the confidentiality and reliability of the data has always been an area of concern. Reliability of data against channel noise can be ensured by various error correcting codes. Turbo Code (TC) is an excellent channel encoder with near Shannon limit error correction performance. However, TC does not guarantee the security of the transmitted image against intruders on the wireless channel. Proposed Cryptographic Turbo Code (CTC) is a modification of the existing TC to provide encryption and error correction as a single entity. Encryption of data is achieved by the proposed Elliptic Curve Cryptographic Interleaver (ECCI) of CTC. The ECCI is an asymmetric private key interleaver which shuffles the input bit sequence based on the Elliptic Curve (EC) arithmetic and a private key. Shuffling the bits also reduces its correlation and improves the error correction performance of the code. The CTC ensures the secrecy of the shared private keys over an insecure wireless channel by Elliptic Curve Diffie-Hellman Key Exchange (ECDHKE). This makes the CTC robust against cryptographic attacks. The qualitative and quantitative performance analysis of the proposed code is evaluated to validate its effectiveness for image transmission over a mobile network in contrast to other state-of-art methods. Simulation results illustrate a similar coding gain, Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE) for images retrieved by the proposed CTC, encrypted TC and TC for authorized users. Additionally, it ensures security of the data from unauthorized users as compared to TC. Investigation results also depict the strength of CTC against Brute Force, known plaintext, chosen plaintext and cipher text attacks.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122384651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient English to Hindi machine translation system using hybrid mechanism","authors":"Jayashree Nair, K. Krishnan, R. Deetha","doi":"10.1109/ICACCI.2016.7732363","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732363","url":null,"abstract":"India is a multilingual country; different states have different territorial languages but not all Indians are polyglots. There are 18 constitutional languages and ten prominent scripts. The majority of the Indians, especially the remote villagers, do not understand, read or write English, therefore implementing an efficient language translator is needed. Machine translation systems, that translate text form one language to another, will enhance the knowledgeable society of Indians without any language barrier. English, being a universal language and Hindi, the language used by the majority of Indians, we propose an English to Hindi machine translation system design based on declension rules. This paper also describes the different approaches of Machine Translation.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122469310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aravind C. Ajayan, P. Poornachandran, Manu R. Krishnan, Soumajit Pal
{"title":"Hiper-ping: Data plane based high performance packet generation bypassing kernel on ×86 based commodity systems","authors":"Aravind C. Ajayan, P. Poornachandran, Manu R. Krishnan, Soumajit Pal","doi":"10.1109/ICACCI.2016.7732091","DOIUrl":"https://doi.org/10.1109/ICACCI.2016.7732091","url":null,"abstract":"Numbers of commodity hardware available today are capable of saturating Gigabit Ethernet networks. The key today is to identify the fact that the hardware is not the bottleneck when it comes to generating traffic workloads at high rates. There are not many reliable tools out in the market which could help in evaluating the security and performance of high speed networking devices using the commodity hardware. To address the problem of higher packet processing efficiency of commodity servers we have developed a tool called “Hiper-Ping”. We run Hiper-Ping on top of x86 based commodity hardware and highlight its performance for security auditing and testing of firewalls and networks. Hiper-Ping shows superior performance in terms of both the achieved throughput and the bitrate values, under all possible values of frame length. Using Hiper-Ping we were able to achieve a speed of 1.488 Million minimum sized packets per second on a commodity server equipped with a single Gigabit Ethernet interface.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122614037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}