{"title":"Advances in digital image steganography","authors":"Rupali Jain, Jayshree Boaddh","doi":"10.1109/ICICCS.2016.7542298","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542298","url":null,"abstract":"The growing risk of cyber security needs to be urgently addressed as data is one of the most important assets to be taken care of during transmission over the internet. Data security generally means protecting data from intruders and unauthorized users or the persons other than the communicating parties. This not only provides high security but also prevent data from modification. To improve the security features in case of data transfers over the internet, the techniques that have been known till now are like Cryptography, Steganography. Where Cryptography is defined as the method to conceal information by encrypting plaintexts to cipher texts and later transmitting it to the intended recipient using an unknown key, on the other hand Steganography provides or say extends security further to a high level by hiding the cipher text into text, image or other formats. Watermarking and fingerprinting are the other two technologies used parallel with steganography in the field of data hiding. Watermarking is the practice of imperceptibly altering work to embed a secret message, concerned with the protection of intellectual property, while unique marks are embedded in the cover object that are received by different people in fingerprinting. In this paper, we are presenting some views in the development of image steganography, the particular field is selected because of its good capability to hide data without easily discoverable by the human visual system.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115688260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Structured P2P overlay networks for multimedia traffic","authors":"A. Gupta, Mohanjeet Singh","doi":"10.1109/ICICCS.2016.7542315","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542315","url":null,"abstract":"The emerging growth of multimedia content delivery through Internet made the Peer to Peer Network most popular. However, transmission of the content to another peer needs a great attention in terms of selection best peer that can offer the overall quality of service. In this paper, structured P2P overlay Networks for Multimedia or Real Traffic is proposed. Based on the round trip time (RTT), the peers are arranged in a hierarchical manner in different overlays. The peers are structured using MinHeap algorithm. The peer with lowest RTT is considered as the best peer and represents the root of the tree. The sender peers are organized in such a way that it can reach the receiver with minimal time. The management of sender peer is done to avoid any kind of overload in the network based on the structured MinHeap tree. The receiver computes the energy efficiency and bandwidth for the transmission of video through best path.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126429269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of Unit and Data flow testing in object-oriented and aspect-oriented programming","authors":"Alaknanda Chandra, Abhishek Singhal","doi":"10.1109/ICICCS.2016.7542313","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542313","url":null,"abstract":"Software Testing is an evaluation mechanism that signifies the importance of software quality assurance, which will evaluate a particular system to check if it will satisfy all the requirements specified by the user. One cannot underestimate the importance of software testing. The wider perceptibility of software systems and the cost, which is related to the software failure are driving factors for efficient planning through testing. In this paper, we elaborate on the Unit testing and Data flow testing techniques applied on Object-oriented Programming and Aspect-oriented Programming. Moreover a tabular contrast of both the techniques is presented representing the differences between both the techniques.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129520671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring disaster recovery parameters in an enterprise application","authors":"Viral Gupta, P. K. Kapur, Deepak Kumar","doi":"10.1109/ICICCS.2016.7542345","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542345","url":null,"abstract":"Business Continuity Planning entails the policies and procedures that ensures the continuity of the business in an enterprise in case of an unplanned outage. Disaster Recovery is a subset of Business Continuity Planning and it focusses on the continuity of Information Technology systems. Disaster Recovery Planning process involves detailed study of business processes, risk analysis, determination of disaster recovery objectives, formulation and testing of disaster recovery strategy. There are numerous parameters that influence the disaster recovery strategy. The subject of Disaster Recovery is paramount important to the business organizations. There has been no study available in the literature that could provide a detailed list of parameters across various phases of Disaster Recovery planning process that influence the Disaster Recovery Strategy. In this study, a literature survey has been conducted followed by interviews of the industry experts from an enterprise application to explore various parameters. Total eighteen parameters were identified that influence overall Disaster Recovery Strategy. Out of these eighteen parameters, four parameters are found to be new as they were not mentioned in the existing literature.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126057564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing and optimizing cloud-based antivirus paradigm","authors":"Aditya Agrawal, Karan Wahie","doi":"10.1109/ICICCS.2016.7542349","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542349","url":null,"abstract":"This disquisition introduces, analyzes and summarizes the liaison, of the advent of cloud computing and antivirus solutions, which is the Holy Grail of malware detection since the turn of the century. This work structures itself around an introduction to cloud computing, followed by a brief overview of the antivirus models, and then subtly manifests a pellucid and concise model of an `in-the-cloud' malware detection solution. It further brings into view the multitudes of limitations and vulnerabilities posed by the cloud based antivirus solutions, which upon resolution can render a much bolstered and efficient form of malware detection. In accordance with the related works, this work expatiates on a compilation of limitations and reviews the cloud-based antivirus paradigm. The above studied cognizance is used to propound novel solutions to the existing schema, which involves the utilization of cloud computing for buttressing the robustness of `in-the-cloud' antivirus solutions and also brings to the fore a grave vulnerability which can possibly spell disaster for the antivirus solution vendors.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128989256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Morphological approach for detection of protein spots from 2D-gel image","authors":"B. Sahoo, R. Rout, M. Sah","doi":"10.1109/ICICCS.2016.7542325","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542325","url":null,"abstract":"The present paper on detection of Protein spots from 2D gel image used several morphological operators. Protein spots are associated mostly with those regions whose intensity is least in 2D gel images. As maximum protein spots are in round shape, a disk shape structuring element is used for identification. More number of protein spots is presents in complex region of 2D gel image. For detecting more number of protein spots from 2D gel image, radius of structuring elements are taken care up in this paper.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123644725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Narendra Kumar, Nidhi Kharkwal, Rashi Kohli, S. Choudhary
{"title":"Ethical aspects and future of artificial intelligence","authors":"Narendra Kumar, Nidhi Kharkwal, Rashi Kohli, S. Choudhary","doi":"10.1109/ICICCS.2016.7542339","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542339","url":null,"abstract":"Artificial Intelligence is the intelligence shown by machines or software. Artificial intelligence includes reasoning, natural processing language and even various algorithms are used to put the intelligence in the system. In this paper we investigate motivations and expectations for the development of Machine Intelligence. This paper also presents the role of ethics in developing artificial intelligence. In this paper we have compared the new emerging AI scope with the old technologies in various fields and its advantages to the society.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132881834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposed symmetric key cryptography algorithm for data security","authors":"A. Anand, A. Raj, Rashi Kohli, Vimal Bibhu","doi":"10.1109/ICICCS.2016.7542294","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542294","url":null,"abstract":"In the race towards the pinnacle of evolution and development, few things have come out on top and become the crucial weapon or path towards success. Information is one such thing. With the increased importance & plausible struggles over the accumulation of information to secure dominance & success, the concept of Information Security has emerged. Information Security is the process of protecting the information from unauthorized access and/or damage or misuse. Cryptography techniques are used for the purpose of making the exchange of information secure and confidential. It converts the sensitive information into a form which can't be understood by the unintended individuals. In this paper, we have tried to come up with a new algorithm which can be put to use for cryptographic purposes. The proposed algorithm is simple yet robust and will prove hard to crack unless one is not familiar with its inner workings.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127658324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multimodal biometrics for improvised security","authors":"Garima Arora, P. Pavani, Rashi Kohli, Vimal Bibhu","doi":"10.1109/ICICCS.2016.7542312","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542312","url":null,"abstract":"Biometrics simply means to recognise a person based on his behavioural or physiological characteristics. With this, we can establish an individual on the basis of “who the person is”, rather than “what does he possess” or “what he remembers”. With the increase in security requirements and increase in forging of data, a single fold or unimodal biometric verification is not of much accuracy. Hence, there is a revolutionary implementation of combination of more than one biometric data which is called multimodal biometrics. In our research paper we would be going for a 4-fold security system where we will use fusion of facial recognition, retina pattern, and finger print pattern along with the personal password which would be recognised using keystroke dynamics. This will reduce the probability of false accept rate & false reject rate by a great percentage.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114336392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review of possibilities and solutions of cyber attacks in smart grids","authors":"S. Yadav, S. Kumar, Smita Sharma, Akanksha Singh","doi":"10.1109/ICICCS.2016.7542359","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542359","url":null,"abstract":"The conventional power grid is now maturing to smart grid that incorporates a heterogeneous amalgam of operating measures like smart appliances, meters, renewable energy resources. Smart grid merges the conventional electrical power grid with ICT. Electric convenience can now realize three sets of amendments: framework upgrade, digital inclusion; the ethos of smart grid; and business process transformation, that make capital out of investments in smart technology. With this amalgam both the service providers and users get benefitted with numerous advantages like improved efficiency and availability, better control, benchmarking and managing user requirements. Smart grid technology also infers re-engineering of the conventional framework. A smart grid is a complex network which comes with many security issues and threats. This paper highlights the security issues associated with smart grid network. We enlighten the challenges faced and the drawbacks in existing security solutions.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114618697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}