A. Dalvi, Apoorva Jain, Smit Moradiya, Riddhisha Nirmal, Jay Sanghavi, Irfan A. Siddavatam
{"title":"Securing Neural Networks Using Homomorphic Encryption","authors":"A. Dalvi, Apoorva Jain, Smit Moradiya, Riddhisha Nirmal, Jay Sanghavi, Irfan A. Siddavatam","doi":"10.1109/CONIT51480.2021.9498376","DOIUrl":"https://doi.org/10.1109/CONIT51480.2021.9498376","url":null,"abstract":"Neural networks are becoming increasingly popular within the modern world, and they are often implemented without much consideration of their potential flaws, which makes them vulnerable and are easily being hacked by hackers. One of such vulnerabilities, namely, a backdoor attack is studied in this paper. A backdoor attacked neural network involves inducing unique misclassification rules or patterns as triggers in the neural network such that, upon encountering the trigger, the neural network will only predict the output based upon the misclassification rules, giving the attacker control over the output of the neural network. To prevent such a vulnerability, we propose to employ homomorphic encryption as a solution. Homomorphic Encrypted Data has a special property where certain operations can be performed on encrypted data to in-turn directly perform the operations on the plain-text data itself, without the need of any special mechanism. This ability of homomorphic encryption can be used in conjunction with the vulnerable neural network, to revoke the control of the attacker from the neural network. Thereby, in this paper, we will be securing a vulnerable neural network from backdoor attack using homomorphic encryption.","PeriodicalId":426131,"journal":{"name":"2021 International Conference on Intelligent Technologies (CONIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127749203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Query-By-Object Based Video Synopsis","authors":"Shweta S Kakodra, C. Sujatha, P. Desai","doi":"10.1109/CONIT51480.2021.9498311","DOIUrl":"https://doi.org/10.1109/CONIT51480.2021.9498311","url":null,"abstract":"In this paper, we propose a framework for query-by-object(s) based video synopsis. Video Synopsis aims to create a summary of video by retaining the important activities/events present in the input video. We propose creating a shorter video by selecting salient frames based on the important objects present in the video. We train the Yolov3 model with surveillance videos for object detection. Select the frames as salient based on the importance of objects present in a frame and generate the video synopsis with the salient frames. We demonstrate the proposed method on the Summe and TV Sum dataset and own dataset captured from the surveillance camera. We obtain the average F1 score as 93% and average accuracy as 94%. And also show that proposed method gives better results as compared to VASNET model.","PeriodicalId":426131,"journal":{"name":"2021 International Conference on Intelligent Technologies (CONIT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126248298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Logistic and Tent Map Encrypted Image Steganography in Transformation Domain using DWT-LSB Technique","authors":"B. S. Shashikiran, K. Shaila, K. Venugopal","doi":"10.1109/CONIT51480.2021.9498497","DOIUrl":"https://doi.org/10.1109/CONIT51480.2021.9498497","url":null,"abstract":"The data confidentiality in an image is predominant in digital-world and outstretching the importance. Steganography and Cryptography are generally used for securing information. The security level is enhanced by encrypting the secret image using dual chaotic system models to generate random encryption sequences using Logistic and Tent map in proposed algorithm. The encrypted image is inserted into another image in transformation domain using DWT-LSB steganography techniques. Proposed method is robust and providing high information security with a good SSIM and PSNR for encryption process and embedding process respectively.","PeriodicalId":426131,"journal":{"name":"2021 International Conference on Intelligent Technologies (CONIT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122261597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model Predictive Control of a Three Phase Four Leg LC Filtered Inverter: Reduction of Manufacturing Cost and Simplification of Working Processes","authors":"MD Nazmul Hasan, Aninda Dey Arpon","doi":"10.1109/CONIT51480.2021.9498444","DOIUrl":"https://doi.org/10.1109/CONIT51480.2021.9498444","url":null,"abstract":"A four-leg inverter is generally used to give power to three-phase loads at various conditions like balanced, unbalanced, light loads, heavy loads, etc., and also under the condition of source. Again a four-leg inverter gives three independent voltages with an extra neutral leg. An LC filter is used to make the output more precise and accurate for making the inverter compatible to connect with the grid system. Normally a traditional LC filtered inverter using finite set model predictive control needs both inductor current and capacitor voltage measurement. That makes the inverter bulkier and rises the manufacturing cost. So, in this paper, we have formulated a sensor-less technique for the four-leg LC filtered inverter with a resistive load only which eliminates the current sensors of the system and thus reduces the manufacturing cost of the inverter and simplifies its working process.","PeriodicalId":426131,"journal":{"name":"2021 International Conference on Intelligent Technologies (CONIT)","volume":"6 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131945778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Development of Hybrid Feature Selection Method for Classification","authors":"M. Sreedevi, G. Manasa, Idupulapati Apurva","doi":"10.1109/CONIT51480.2021.9498548","DOIUrl":"https://doi.org/10.1109/CONIT51480.2021.9498548","url":null,"abstract":"To enhance the capability of the learning model in this research paper we have developed a hybrid feature selection method. To defeat the curse of dimensionality, to speed up the classification process, and to get more accurate results a hybrid feature selection model is developed which is a combination of multiple filter methods and a wrapper method. In this model, we employed two sets of Filter Methods-Basic filter methods, a correlation filter method and two Statistical & Ranking filter methods (ANOVA and ROC-AUC) to generate two different subsets of important features, and a Wrapper method (Recursive Feature Elimination with Cross-Validation) is applied on the combined subset to generate a final subset of important features for better prediction results. Five machine learning algorithms-Logistic Regression (LR), Decision Tree, Random Forest (RF), Support Vector Machine (SVM), and K-Nearest Neighbour are used to evaluate the classification accuracy. The proposed hybrid method is applied over four low and four microarray datasets. Outputs are compared to find out which algorithm works best with the proposed model as the results diverge with the machine learning algorithm. Precision, Sensitivity, and Specificity are calculated for each outcome and they demonstrate that the suggested method improved the accuracy of the algorithms.","PeriodicalId":426131,"journal":{"name":"2021 International Conference on Intelligent Technologies (CONIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130020199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md Eyasin Rahman, Md Rahat Azad, Md. Touhidul Islam, Md. J. Uddin, Jobayer Inbe Azad
{"title":"Design & Implementation of Vertical Surface Climbing Cleaner Robot","authors":"Md Eyasin Rahman, Md Rahat Azad, Md. Touhidul Islam, Md. J. Uddin, Jobayer Inbe Azad","doi":"10.1109/CONIT51480.2021.9498276","DOIUrl":"https://doi.org/10.1109/CONIT51480.2021.9498276","url":null,"abstract":"This paper presents a vertical surface climbing robot for cleaning of dust from high rise building. Usually, people clean their wall of outer surface of building by human. Often it becomes risky and costly also. A portable robot having the ability to climb on vertical surface has been expected for a long time. To protect human’s life we designed a prototype of vertical surface climbing robot for cleaning and other multipurpose operation. Some combination of technology has been shown such as smart wireless control with all direction moving capability. Four Dc motors are used to move the robot and one Dc motor is used to rotate the cleaning brush. There is one Electric Ducted fan (EDF) which helps the robot to stick to the surface against gravitational force. An Arduino uno is used as a controller for different There is a Bluetooth modular which has been used to connect with smart phone and take command from user. Four motor helps it to move in up, down, right and left direction by the according commands given by smart phone. The full robot is power by using DC battery and AC to DC converted adapter combined. To observe the outcome of the project, we analyzed the performance of the robot by climbing in different surfaces with different nature. The climbing and stick to the surface differ because of grip. Griping is an important issue for this robot. Most of the surface except glass its performance satisfied us.","PeriodicalId":426131,"journal":{"name":"2021 International Conference on Intelligent Technologies (CONIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130089581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method for Nearby Product Marketing using Wi-Fi Aware Technology","authors":"Dhaval Prajapati","doi":"10.1109/CONIT51480.2021.9498283","DOIUrl":"https://doi.org/10.1109/CONIT51480.2021.9498283","url":null,"abstract":"There are various methods of business product advertisement like newspapers, television, posters, or ads on blogs. However, in these methods, we are targeting the audience using different metadata. In this paper, we will discuss a method for targeting a nearby audience using new - aware technology and providing a communication channel between buyer and seller. Wi-fi aware, also known as neighbor awareness network (nan) is a low power discovery mechanism that runs over wi-fi. System architecture, its benefits, and comparison with other existing methods are also explained.","PeriodicalId":426131,"journal":{"name":"2021 International Conference on Intelligent Technologies (CONIT)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134344027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Music Emotion Recognition in Assamese Songs using MFCC Features and MLP Classifier","authors":"Jumpi Dutta, D. Chanda","doi":"10.1109/CONIT51480.2021.9498345","DOIUrl":"https://doi.org/10.1109/CONIT51480.2021.9498345","url":null,"abstract":"Music Emotion Recognition (MER) is one of the fastest growing research topics and important subfield of Music Information Retrieval (MIR) system that has grown in recent years to improve Human Machine Interaction (HMI). A tremendous research is being done on high-resourced languages like English, whereas very less work has been performed in music emotion recognition on Assamese (a regional language from North-Eastern India) songs. This paper attempts to perform a novel and simple solution to the problem of emotion recognition in Assamese songs. We used a newly created Database of Assamese songs ASDB consisting of 80 samples using eight well known Assamese singers. The performance of MER with MFCC and chroma features has been analyzed in this work. Multi-Layer Perceptron (MLP) Classifier is used for emotion recognition. By analyzing the results, it is found that MFCC can give better MER accuracy of 93.75% than the chroma features with the input audio sample of length 4 seconds.","PeriodicalId":426131,"journal":{"name":"2021 International Conference on Intelligent Technologies (CONIT)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132568065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Pseudo Random Bit Generator Using Modified Dual-Coupled Linear Congruential Generator","authors":"N. Akhila, C. Kumari, K. Swathi, T. Padma, N. Rao","doi":"10.1109/CONIT51480.2021.9498354","DOIUrl":"https://doi.org/10.1109/CONIT51480.2021.9498354","url":null,"abstract":"Pseudo Random Bit Generator (PRBG) is a key element to protect the data in various cryptography applications during transmission. To prove more secure among different previous pseudo random bit generator methods like Linear Feedback Shift Register (LFSR), Linear Congruential Generator (LCG), coupled LCG (CLCG), and Dual Coupled LCG (dual-CLCG) the modified Dual coupled LCG (MDCLCG) is implemented. This method used is to generate a pseudo random bit with less area occupation and with single clock delay. In this paper three different ways of adder topologies ripple carry adder (RCA), carry skip adder (CSKA) and carry increment adder (CIA) are implemented in the place of modulo carry save adder to analyze the area, power and speed performance of the modified Dual Coupled LCG design using Verilog-HDL and prototyped on FPGA device Spartan3E XC3S500E.","PeriodicalId":426131,"journal":{"name":"2021 International Conference on Intelligent Technologies (CONIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132749398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Robust Support Vector Machine Based Auto-Encoder for DoS Attacks Identification in Computer Networks","authors":"Shridhar Allagi, R. Rachh, B. Anami","doi":"10.1109/CONIT51480.2021.9498284","DOIUrl":"https://doi.org/10.1109/CONIT51480.2021.9498284","url":null,"abstract":"An unprecedented upsurge in the number of cyberattacks and threats is the corollary of ubiquitous internet connectivity. Among a variety of threats and attacks, Denial of Service (DoS) attacks are crucial and conventional mechanisms currently being used for detection/ identification of these attacks are not adequate. The use of real-time and robust mechanisms is the way to handle this. Machine learning-based techniques have been extensively used for this in the recent past. In this paper, a robust mechanism using Support Vector Machine Based Auto-Encoder is proposed for identifying DoS attacks. The proposed technique is tested on the CICIDS dataset and has given 99.32 % accuracy for DoS attacks. To study the effect of the number of features on the performance of the technique, a discriminant component analysis is deployed for feature reduction and independent experiments, namely SVM with 25 features, SVM with 30 features, SVM with 35 features, and PCA-SVM with 25 features, are conducted. From the experiments, it is observed that AE-SVM has performed better than others.","PeriodicalId":426131,"journal":{"name":"2021 International Conference on Intelligent Technologies (CONIT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134497028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}