{"title":"Forensic Techniques to Detect Hidden Data in Alternate Data Streams in NTFS","authors":"Rahul Hermon, Upasna Singh, Bhupendra Singh","doi":"10.1109/IBSSC56953.2022.10037507","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037507","url":null,"abstract":"Alternate Data Streams (ADS) have been a feature of the New Technology File System (NTFS) since its introduction in 1993. Alternate Data Streams (ADS) were introduced to address compatibility within the existing Operating Systems. Lately Hackers/Cyber Criminals have used Alternate Data Streams (ADS) as a means for launching Cyber- Attacks. Alternate Data Streams (ADS) allow data hiding, same being difficult to detect without adequate knowledge. In this paper we shall bring out the various Forensic techniques in which hidden data in Alternate Data Streams (ADS) can be detected. Finally, we compared the Forensic techniques to detect data hidden in Alternate Data Streams (ADS) in both Windows 10 and 11 Operating System.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129494516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abhishek Doshi, Abhinav Venkatadri, Sayali Kulkarni, Vedant Athavale, Akhila Jagarlapudi, Shraddha Suratkar, F. Kazi
{"title":"Realtime Deepfake Detection using Video Vision Transformer","authors":"Abhishek Doshi, Abhinav Venkatadri, Sayali Kulkarni, Vedant Athavale, Akhila Jagarlapudi, Shraddha Suratkar, F. Kazi","doi":"10.1109/IBSSC56953.2022.10037344","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037344","url":null,"abstract":"Practically, Deepfake technology has given people access to generate fake videos that look like real content using neural networks, and can further create misconceptions and deceit about the innocuous elements of society. This technology can prove fatal not only to national security but on an international level. Existing methodologies that apply deep learning to automatically extract salient and discriminative features to detect Deepfakes based on typical CNN-LSTM models tend to have their shortcomings. Having said that, we propose a system that extracts Spatio-Temporal features and achieves Real-Time Deepfake detection using Transformers. For the end user, a web application was developed, which with utmost simplicity allows the uploading of a video that will be further authenticated within the application and, at the same time, features the authentication of live meetings.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134642735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Study of CNN Models on the Classification of Dyslexic Handwriting","authors":"Subha Sreekumar, Lijiya A","doi":"10.1109/IBSSC56953.2022.10037428","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037428","url":null,"abstract":"Developmental Dyslexia, one of the learning disabilities is a topic of scientific interest in a variety of disciplines such as psychology, speech and language therapy, data science, etc. While the reason for Dyslexia and its symptoms are still being researched by psychologists, data science is providing ways to intervene and detect them with the aid of technological advancements. Dyslexia is a neurological condition that impairs reading comprehension and has long-lasting impacts. But timely detection and intervention programs can alleviate its effects to a certain extent. This study aims to classify images of handwritten English characters into three classes namely: normal, corrected, and reversed, where normal class refers to normal handwriting, and corrected or reversed constitutes handwriting of children with Dyslexia. The dataset used for the study is available publicly on Kaggle. The building of an efficient CNN (Convolutional Neural Network) model for classifying dyslexic handwriting is the major emphasis of this work. This is accomplished by comparing several CNN models and evaluating how well they detect Dyslexia on the same dataset. The proposed CNN approach has demonstrated a sizable improvement in reliably classifying dyslexic handwritten images.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123658897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of IoT Based Local Weather Station - An Experimental Setup","authors":"Nikuni Tandan, Anup Kanse, Oj Uparkar, Riya Modi, Harish Karnam, Saurabh Mehta, Akshaj Raut, Sonali Bedade","doi":"10.1109/IBSSC56953.2022.10037309","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037309","url":null,"abstract":"In contemporary times it is observed that the climatic and weather conditions have become skeptical and unpredictable. To confound this unreliable nature and variability of weather conditions, we present an experimental setup of loT-based local weather stations. This paper presents the design and implementation details of the experimental setup, ESP8266-based Wi-fi module NodeMCU (12E) is the brain of the prototype. Two sensors are connected to the NodeMCU, namely a temperature and humidity sensor (DHT11), and an Air quality gas sensor (MQ135). Additionally, to display the results, we present VIT Weather Station’ - A local weather station app which can keep people updated regarding the environmental conditions utilizing live data collection and display. The device will monitor the temperature, humidity, and air quality index. This application is supported on Android as well as IOS systems. Local users can also view the monitored data from Twitter for easier convenience.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130227185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computationally efficient image encryption technique based on selective pixel diffusion","authors":"Malik Obaid Ul Islam, S. A. Parah, B. A. Malik","doi":"10.1109/IBSSC56953.2022.10037561","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037561","url":null,"abstract":"Medical images play a vital role in disease diagnosis. When the medical images are communicated through an insecure transmission channel, their chances of being accessed by an unauthorized user increase resulting in the loss of patients' sensitive personal data. Thus, providing security to such image data while transmitting it over an insecure communication network becomes crucial. This work presents a computationally efficient cryptosystem for encrypting medical images. The encryption process consists of multiple phases. In the first phase the control parameters and initial values for the various chaotic maps used, are evaluated. This phase is followed by encryption in which these evaluated values are used to obtain the chaotic sequences for encryption. In the subsequent phases, we make use of a new approach of selective, pixel-dependent diffusion to obtain the cipher image. The effectiveness of our cryptosystem is evaluated using security analysis and execution time analysis. The obtained outcome shows a high-security level compared to already existing state-of-the-art techniques. In addition, the computational complexity of our scheme is very small (0.1sec for encrypting a 256×256 image) making it suitable for real-time smart health applications.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116913667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bed Prakash Das, K. D. Sharma, A. Chatterjee, J. Bera
{"title":"PSO Adaptive Fading Memory Kalman Filter Based State Estimation of Indoor Thermal Model with Unknown Inputs","authors":"Bed Prakash Das, K. D. Sharma, A. Chatterjee, J. Bera","doi":"10.1109/IBSSC56953.2022.10037453","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037453","url":null,"abstract":"An adaptive filtering approach is proposed in this paper to address the thermal state estimation methodology along with the model parameters jointly for an indoor thermodynamic resistance capacitance model with uncertain stochastic heating inputs. The adaptive dynamics of the state of the model is combined with a particle swarm optimization (PSO) based metaheuristic approach to feed the knowledge of measurement noise statistics and the initial estimation error covariance along with forgetting factor for implementation of fading memory Kalman filter (FMKF). This study has been carried out with the variation of uncertain influential input information to enhance the estimation efficiency with the proposed PSO adaptive FMKF (PSO-AdFMKF) strategy for a real life the test thermodynamic environment scenario inside the building space. Potential observations demonstrate that the proposed estimation algorithm performs encouragingly, with a satisfactory improvement of estimation performance in terms of evaluating error metrics.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125745114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Antennas in Airborne Applications","authors":"A. Shaikh, M. Joshi","doi":"10.1109/IBSSC56953.2022.10037463","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037463","url":null,"abstract":"This paper gives an overview of various types of antennas used in airborne applications such as delivery using UAVs, defence, disaster management. Antenna characteristics are very sensitive and must be used before implementing in airborne applications. Because of different nature of aerial body on which antennas are mounted, different antenna positions will result in variations in the radiation pattern. In recent studies, researcher considers antenna positioning with respect to azimuth and elevation angles. Effect of aerial body on antenna, its signal strength and radiation pattern is observable. Cross polarization discrimination occurs due to polarization mixing of communicating channels.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121122632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep-3DConvNet: A Network to Detect Abnormal Activities at Megastores","authors":"Mohd. Aquib Ansari, D. Singh","doi":"10.1109/IBSSC56953.2022.10037326","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037326","url":null,"abstract":"These days, there has been a rapid increase in cases of abnormal human behavior at megastores/shops, where people commit theft by stealing, consuming, or unwrapping packets when no one is seeing and then leaving the place without paying. Such unusual actions cause huge losses in business. Therefore, there is an urgent need to attract the research community's attention to detect abnormal events at megastores. To address this issue, we have designed an advanced three-dimensional convolutional neural architecture to identify abnormal activities at megastores. The proposed network is 15 layers deep, takes a video stream of resolution 120× 120 as input, and produces classification results as output. It extracts fine-tuned as well as general details from the video feed using small and large-sized 3D convolutional filters and categorizes them into respective classes. The proposed architecture is trained and tested on a synthesized action dataset that consists of human actions distributed into five classes: normal, stealing, eating, drinking, and damaging acts. Experimental results show that our model outperforms other state-of-the-art approaches with an accuracy of 88.88%.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121527475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approach to detect abusive content incorporating Word2Vec and Multilayer Perceptron","authors":"S. Ghosal, Amit Jain, D. Tayal","doi":"10.1109/IBSSC56953.2022.10037274","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037274","url":null,"abstract":"With the rapid growth of social media text, millions of negative comments are flowing on social webs and social networking sites. Abusive content is harmful to people and societies that can provoke various criminal offenses like hate crimes. Hate speech is also a form of abusive content. An automatic and improved detection system for hate speech can help to reduce this problem. Implicit abusive content requires contextual semantic and syntactical analysis. We propose a novel abusive text detection model with the word2vec model and compositional vector model to analyze text more semantically and syntactically. The proposed model considers the English language dataset for abusive text. The abusive content detection model exhibits achievable performance compare to various deep learning and machine learning classifiers. Among all models, Multilayer Perceptron classifier achieves 86% accuracy compared to other models.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121985403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Statistical and Sentiment Analysis On Investment Pattern of Indians","authors":"Shruti Jain, Jash Jain, Garima Merani, Jash Patel","doi":"10.1109/IBSSC56953.2022.10037493","DOIUrl":"https://doi.org/10.1109/IBSSC56953.2022.10037493","url":null,"abstract":"Investments and the knowledge surrounding them have started to pick up the pace in India. As more and more people learn about it and experiment, opinions have begun to formulate around it. In this paper, we conducted a survey to get the idea of people's perspectives with regards to their knowledge on Investment and the different types of Investments people are making. The major purpose of this study is to analyze the survey responses and draw conclusions using data analysis techniques. We performed Sentiment Analysis on the survey participants to identify why people invest, why some do not invest, and what people think about NFT's and Crypto. With this paper, we hope to have a clearer idea on the Investment and Stocks pattern of Indians.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132305532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}