2022 IEEE Bombay Section Signature Conference (IBSSC)最新文献

筛选
英文 中文
Forensic Techniques to Detect Hidden Data in Alternate Data Streams in NTFS 检测NTFS中备用数据流中隐藏数据的取证技术
2022 IEEE Bombay Section Signature Conference (IBSSC) Pub Date : 2022-12-08 DOI: 10.1109/IBSSC56953.2022.10037507
Rahul Hermon, Upasna Singh, Bhupendra Singh
{"title":"Forensic Techniques to Detect Hidden Data in Alternate Data Streams in NTFS","authors":"Rahul Hermon, Upasna Singh, Bhupendra Singh","doi":"10.1109/IBSSC56953.2022.10037507","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037507","url":null,"abstract":"Alternate Data Streams (ADS) have been a feature of the New Technology File System (NTFS) since its introduction in 1993. Alternate Data Streams (ADS) were introduced to address compatibility within the existing Operating Systems. Lately Hackers/Cyber Criminals have used Alternate Data Streams (ADS) as a means for launching Cyber- Attacks. Alternate Data Streams (ADS) allow data hiding, same being difficult to detect without adequate knowledge. In this paper we shall bring out the various Forensic techniques in which hidden data in Alternate Data Streams (ADS) can be detected. Finally, we compared the Forensic techniques to detect data hidden in Alternate Data Streams (ADS) in both Windows 10 and 11 Operating System.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129494516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Realtime Deepfake Detection using Video Vision Transformer 使用视频视觉变压器的实时深度伪造检测
2022 IEEE Bombay Section Signature Conference (IBSSC) Pub Date : 2022-12-08 DOI: 10.1109/IBSSC56953.2022.10037344
Abhishek Doshi, Abhinav Venkatadri, Sayali Kulkarni, Vedant Athavale, Akhila Jagarlapudi, Shraddha Suratkar, F. Kazi
{"title":"Realtime Deepfake Detection using Video Vision Transformer","authors":"Abhishek Doshi, Abhinav Venkatadri, Sayali Kulkarni, Vedant Athavale, Akhila Jagarlapudi, Shraddha Suratkar, F. Kazi","doi":"10.1109/IBSSC56953.2022.10037344","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037344","url":null,"abstract":"Practically, Deepfake technology has given people access to generate fake videos that look like real content using neural networks, and can further create misconceptions and deceit about the innocuous elements of society. This technology can prove fatal not only to national security but on an international level. Existing methodologies that apply deep learning to automatically extract salient and discriminative features to detect Deepfakes based on typical CNN-LSTM models tend to have their shortcomings. Having said that, we propose a system that extracts Spatio-Temporal features and achieves Real-Time Deepfake detection using Transformers. For the end user, a web application was developed, which with utmost simplicity allows the uploading of a video that will be further authenticated within the application and, at the same time, features the authentication of live meetings.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134642735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Study of CNN Models on the Classification of Dyslexic Handwriting CNN模型对阅读困难笔迹分类的比较研究
2022 IEEE Bombay Section Signature Conference (IBSSC) Pub Date : 2022-12-08 DOI: 10.1109/IBSSC56953.2022.10037428
Subha Sreekumar, Lijiya A
{"title":"Comparative Study of CNN Models on the Classification of Dyslexic Handwriting","authors":"Subha Sreekumar, Lijiya A","doi":"10.1109/IBSSC56953.2022.10037428","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037428","url":null,"abstract":"Developmental Dyslexia, one of the learning disabilities is a topic of scientific interest in a variety of disciplines such as psychology, speech and language therapy, data science, etc. While the reason for Dyslexia and its symptoms are still being researched by psychologists, data science is providing ways to intervene and detect them with the aid of technological advancements. Dyslexia is a neurological condition that impairs reading comprehension and has long-lasting impacts. But timely detection and intervention programs can alleviate its effects to a certain extent. This study aims to classify images of handwritten English characters into three classes namely: normal, corrected, and reversed, where normal class refers to normal handwriting, and corrected or reversed constitutes handwriting of children with Dyslexia. The dataset used for the study is available publicly on Kaggle. The building of an efficient CNN (Convolutional Neural Network) model for classifying dyslexic handwriting is the major emphasis of this work. This is accomplished by comparing several CNN models and evaluating how well they detect Dyslexia on the same dataset. The proposed CNN approach has demonstrated a sizable improvement in reliably classifying dyslexic handwritten images.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123658897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of IoT Based Local Weather Station - An Experimental Setup 基于物联网的本地气象站的设计与实现——一个实验装置
2022 IEEE Bombay Section Signature Conference (IBSSC) Pub Date : 2022-12-08 DOI: 10.1109/IBSSC56953.2022.10037309
Nikuni Tandan, Anup Kanse, Oj Uparkar, Riya Modi, Harish Karnam, Saurabh Mehta, Akshaj Raut, Sonali Bedade
{"title":"Design and Implementation of IoT Based Local Weather Station - An Experimental Setup","authors":"Nikuni Tandan, Anup Kanse, Oj Uparkar, Riya Modi, Harish Karnam, Saurabh Mehta, Akshaj Raut, Sonali Bedade","doi":"10.1109/IBSSC56953.2022.10037309","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037309","url":null,"abstract":"In contemporary times it is observed that the climatic and weather conditions have become skeptical and unpredictable. To confound this unreliable nature and variability of weather conditions, we present an experimental setup of loT-based local weather stations. This paper presents the design and implementation details of the experimental setup, ESP8266-based Wi-fi module NodeMCU (12E) is the brain of the prototype. Two sensors are connected to the NodeMCU, namely a temperature and humidity sensor (DHT11), and an Air quality gas sensor (MQ135). Additionally, to display the results, we present VIT Weather Station’ - A local weather station app which can keep people updated regarding the environmental conditions utilizing live data collection and display. The device will monitor the temperature, humidity, and air quality index. This application is supported on Android as well as IOS systems. Local users can also view the monitored data from Twitter for easier convenience.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130227185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computationally efficient image encryption technique based on selective pixel diffusion 基于选择性像素扩散的高效计算图像加密技术
2022 IEEE Bombay Section Signature Conference (IBSSC) Pub Date : 2022-12-08 DOI: 10.1109/IBSSC56953.2022.10037561
Malik Obaid Ul Islam, S. A. Parah, B. A. Malik
{"title":"Computationally efficient image encryption technique based on selective pixel diffusion","authors":"Malik Obaid Ul Islam, S. A. Parah, B. A. Malik","doi":"10.1109/IBSSC56953.2022.10037561","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037561","url":null,"abstract":"Medical images play a vital role in disease diagnosis. When the medical images are communicated through an insecure transmission channel, their chances of being accessed by an unauthorized user increase resulting in the loss of patients' sensitive personal data. Thus, providing security to such image data while transmitting it over an insecure communication network becomes crucial. This work presents a computationally efficient cryptosystem for encrypting medical images. The encryption process consists of multiple phases. In the first phase the control parameters and initial values for the various chaotic maps used, are evaluated. This phase is followed by encryption in which these evaluated values are used to obtain the chaotic sequences for encryption. In the subsequent phases, we make use of a new approach of selective, pixel-dependent diffusion to obtain the cipher image. The effectiveness of our cryptosystem is evaluated using security analysis and execution time analysis. The obtained outcome shows a high-security level compared to already existing state-of-the-art techniques. In addition, the computational complexity of our scheme is very small (0.1sec for encrypting a 256×256 image) making it suitable for real-time smart health applications.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116913667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PSO Adaptive Fading Memory Kalman Filter Based State Estimation of Indoor Thermal Model with Unknown Inputs 基于PSO自适应衰落记忆卡尔曼滤波的未知输入室内热模型状态估计
2022 IEEE Bombay Section Signature Conference (IBSSC) Pub Date : 2022-12-08 DOI: 10.1109/IBSSC56953.2022.10037453
Bed Prakash Das, K. D. Sharma, A. Chatterjee, J. Bera
{"title":"PSO Adaptive Fading Memory Kalman Filter Based State Estimation of Indoor Thermal Model with Unknown Inputs","authors":"Bed Prakash Das, K. D. Sharma, A. Chatterjee, J. Bera","doi":"10.1109/IBSSC56953.2022.10037453","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037453","url":null,"abstract":"An adaptive filtering approach is proposed in this paper to address the thermal state estimation methodology along with the model parameters jointly for an indoor thermodynamic resistance capacitance model with uncertain stochastic heating inputs. The adaptive dynamics of the state of the model is combined with a particle swarm optimization (PSO) based metaheuristic approach to feed the knowledge of measurement noise statistics and the initial estimation error covariance along with forgetting factor for implementation of fading memory Kalman filter (FMKF). This study has been carried out with the variation of uncertain influential input information to enhance the estimation efficiency with the proposed PSO adaptive FMKF (PSO-AdFMKF) strategy for a real life the test thermodynamic environment scenario inside the building space. Potential observations demonstrate that the proposed estimation algorithm performs encouragingly, with a satisfactory improvement of estimation performance in terms of evaluating error metrics.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125745114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Antennas in Airborne Applications 航空应用中的天线
2022 IEEE Bombay Section Signature Conference (IBSSC) Pub Date : 2022-12-08 DOI: 10.1109/IBSSC56953.2022.10037463
A. Shaikh, M. Joshi
{"title":"Antennas in Airborne Applications","authors":"A. Shaikh, M. Joshi","doi":"10.1109/IBSSC56953.2022.10037463","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037463","url":null,"abstract":"This paper gives an overview of various types of antennas used in airborne applications such as delivery using UAVs, defence, disaster management. Antenna characteristics are very sensitive and must be used before implementing in airborne applications. Because of different nature of aerial body on which antennas are mounted, different antenna positions will result in variations in the radiation pattern. In recent studies, researcher considers antenna positioning with respect to azimuth and elevation angles. Effect of aerial body on antenna, its signal strength and radiation pattern is observable. Cross polarization discrimination occurs due to polarization mixing of communicating channels.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121122632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep-3DConvNet: A Network to Detect Abnormal Activities at Megastores Deep-3DConvNet:一种检测大型商店异常活动的网络
2022 IEEE Bombay Section Signature Conference (IBSSC) Pub Date : 2022-12-08 DOI: 10.1109/IBSSC56953.2022.10037326
Mohd. Aquib Ansari, D. Singh
{"title":"Deep-3DConvNet: A Network to Detect Abnormal Activities at Megastores","authors":"Mohd. Aquib Ansari, D. Singh","doi":"10.1109/IBSSC56953.2022.10037326","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037326","url":null,"abstract":"These days, there has been a rapid increase in cases of abnormal human behavior at megastores/shops, where people commit theft by stealing, consuming, or unwrapping packets when no one is seeing and then leaving the place without paying. Such unusual actions cause huge losses in business. Therefore, there is an urgent need to attract the research community's attention to detect abnormal events at megastores. To address this issue, we have designed an advanced three-dimensional convolutional neural architecture to identify abnormal activities at megastores. The proposed network is 15 layers deep, takes a video stream of resolution 120× 120 as input, and produces classification results as output. It extracts fine-tuned as well as general details from the video feed using small and large-sized 3D convolutional filters and categorizes them into respective classes. The proposed architecture is trained and tested on a synthesized action dataset that consists of human actions distributed into five classes: normal, stealing, eating, drinking, and damaging acts. Experimental results show that our model outperforms other state-of-the-art approaches with an accuracy of 88.88%.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121527475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An approach to detect abusive content incorporating Word2Vec and Multilayer Perceptron 结合Word2Vec和多层感知机的滥用内容检测方法
2022 IEEE Bombay Section Signature Conference (IBSSC) Pub Date : 2022-12-08 DOI: 10.1109/IBSSC56953.2022.10037274
S. Ghosal, Amit Jain, D. Tayal
{"title":"An approach to detect abusive content incorporating Word2Vec and Multilayer Perceptron","authors":"S. Ghosal, Amit Jain, D. Tayal","doi":"10.1109/IBSSC56953.2022.10037274","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037274","url":null,"abstract":"With the rapid growth of social media text, millions of negative comments are flowing on social webs and social networking sites. Abusive content is harmful to people and societies that can provoke various criminal offenses like hate crimes. Hate speech is also a form of abusive content. An automatic and improved detection system for hate speech can help to reduce this problem. Implicit abusive content requires contextual semantic and syntactical analysis. We propose a novel abusive text detection model with the word2vec model and compositional vector model to analyze text more semantically and syntactically. The proposed model considers the English language dataset for abusive text. The abusive content detection model exhibits achievable performance compare to various deep learning and machine learning classifiers. Among all models, Multilayer Perceptron classifier achieves 86% accuracy compared to other models.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121985403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Statistical and Sentiment Analysis On Investment Pattern of Indians 印度人投资模式的统计与情绪分析
2022 IEEE Bombay Section Signature Conference (IBSSC) Pub Date : 2022-12-08 DOI: 10.1109/IBSSC56953.2022.10037493
Shruti Jain, Jash Jain, Garima Merani, Jash Patel
{"title":"Statistical and Sentiment Analysis On Investment Pattern of Indians","authors":"Shruti Jain, Jash Jain, Garima Merani, Jash Patel","doi":"10.1109/IBSSC56953.2022.10037493","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037493","url":null,"abstract":"Investments and the knowledge surrounding them have started to pick up the pace in India. As more and more people learn about it and experiment, opinions have begun to formulate around it. In this paper, we conducted a survey to get the idea of people's perspectives with regards to their knowledge on Investment and the different types of Investments people are making. The major purpose of this study is to analyze the survey responses and draw conclusions using data analysis techniques. We performed Sentiment Analysis on the survey participants to identify why people invest, why some do not invest, and what people think about NFT's and Crypto. With this paper, we hope to have a clearer idea on the Investment and Stocks pattern of Indians.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132305532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信