{"title":"Novel reversible image secret sharing based on Thien and Lin's scheme using discrete Haar wavelet Transform","authors":"Sudeep D. Thepade, Rupal S. Patil","doi":"10.1109/PERVASIVE.2015.7087037","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087037","url":null,"abstract":"Security has become very important with increasing number of attacks made on digital content in today's internet savvy world. The sharing of information in secret way has become challenging field for exploration. Many image secret sharing schemes are based on the Shamir's secret sharing. Thien and Lin have also proposed the secret sharing based on the Shamir's scheme using polynomial based approach. Major drawback with the Shamir's secret sharing is the computational time. The paper proposes image secret sharing scheme based on Thien and Lin's secret sharing using discrete Haar wavelet transform. Experimentation is carried out on 10 images. Using proposed approach, time and space complexity is reduced to great extent only with minor degradation of regenerated original image. The 62%, 78% and 82% time complexity reduction is observed along with 75%, 93% and 98% space complexity reduction for wavelet transform level 1, level 2 and level 3 respectively of the proposed novel reversible image secret sharing based on Thien and Lin's scheme using discrete Haar wavelet Transform.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129371589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey on Computer Aided Language Learning using automatic accent assessment techniques","authors":"Sneha V. Lohiya, Milind Kamble","doi":"10.1109/PERVASIVE.2015.7087089","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087089","url":null,"abstract":"The automatic identification of prosodic events such as pitch accent in English has long been a topic of interest to speech researchers. Applications like Computer Aided Language Learning (CALL) and Computer Assisted Pronunciation Training (CAPT) applications plays an important role in English Learning. We are discussing the different methods to build automatic accent assessment system in which we can convert non native accent to native one. With the use of these algorithms we can detect the pronunciation mismatches in English learning process.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127269178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient approach to forensic investigation in cloud using VM snapshots","authors":"D. R. Rani, G. Geethakumari","doi":"10.1109/PERVASIVE.2015.7087206","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087206","url":null,"abstract":"Cloud computing has recently emerged as a technology to allow users to access infrastructure, storage, software and deployment environment based on a pay-for-what-they-use model. Traditional digital forensics cannot handle the dynamic and multi-tenant nature of the cloud environment as it has to address various technical, legal, and organizational challenges typical to the cloud systems. The dynamic nature of cloud computing allows abundant opportunities to enable digital investigations in the cloud environment. This paper addresses the challenges of digital forensics in the cloud environment and existing solutions to ease some of the challenges. We propose an efficient approach to forensic investigation in cloud using Virtual Machine (VM) snapshots.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121797237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gaurav Taori, Akash Taole, S. Kothawade, Saurabh Srivastava
{"title":"GPU accelerated video conversion in the cloud","authors":"Gaurav Taori, Akash Taole, S. Kothawade, Saurabh Srivastava","doi":"10.1109/PERVASIVE.2015.7087123","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087123","url":null,"abstract":"Recently, it is being observed that the conversion of video file from one format such as AVI to other format such as MPEG is done in order to make it compatible with different devices such as personal computers, mobile phones and tablets. The basic video conversion application uses CPU to convert the video file from AVI to MPEG and may be limited to an client or a device and also, it takes time to convert videos. The proposed system is going to be developed which will use Graphics Processing Unit to accelerate the video conversion in the cloud. The use of cloud will make the proposed system available for many clients and it will not be limited to a client or the device.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116150567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Natural language interface to database using modified co-occurrence matrix technique","authors":"Anuradha Mohite, Varunakshi Bhojane","doi":"10.1109/PERVASIVE.2015.7087045","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087045","url":null,"abstract":"Today, database is considered as one of the major source of information. Data stored in database can be accessed by using SQL queries. Those who are expert in SQL language can access information from database but non-technical user cannot retrieve data from database such as MySQL and oracle. There is need to provide natural language interface to database for non-technical users. In this paper we have discussed design and implementation of a system using modified word co-occurrence matrix method which will provide access to database using queries in English language.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122407130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review on secure communication protocol for wireless ad hoc network","authors":"A. Ingle, Dr.Sonali Nimbhorkar(Ridhorkar)","doi":"10.1109/PERVASIVE.2015.7087205","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087205","url":null,"abstract":"The exponential growth and development in the wireless communication, Wireless communication technology gains an importance and can be used in extreme condition in very effective way. Wireless ad hoc network is one of effective medium for mobile communication having facility for the sharing of resources and it introduces new services among the user. Thus communication in the mobile network must be secure to protect the data confidentiality. A secure communication protocol is completely self-configured who able to create the network on basis of sharing various services without any large network setup. It uses hybrid symmetric and initial trust between users for exchanging the initial data packets and secret keys which is used for encryption and decryption of incoming and outgoing data packets. The initial authentication is based on the initial key distribution among the network users and re-authentication is made after a new session start to secure the network i.e. dynamic authentication. For security analysis of the system and highlights the features of a secure protocol comparison is made between other ad hoc network protocols.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":" 41","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120832135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reduction of SFD bits of WiFi OFDM frame using wobbulation echo signal and barker code","authors":"Rita C. Nilawar, D. Bhalerao","doi":"10.1109/PERVASIVE.2015.7087095","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087095","url":null,"abstract":"The physical layer frame structure of WiFi OFDM is consisting of different fields such as preamble, SFD, length, PSDU. Basically here, an attempt is made for mapping the WiFi OFDM with zigbee which is completed field wise and to reduce the number of bits of WiFi OFDM frame as per the zigbee frame structure. This can be done on the basis of implementing the WiFi OFDM in zigbee without changing the physical layer frame structure of zigbee. But as known, standards can not change for this purpose; the try is made by reducing the number of bits required for start of frame delimiter (SFD) in WiFi as per the necessity of zigbee. Due to which the space for WiFi implementation is produced. The purpose behind this is the range and power of WiFi is to be applied in zigbee and increased data rate. In future, with respect to this the entire frame of WiFi OFDM can be executed in zigbee. In this paper, two techniques are proposed barker code technique and wobbulation technique. These techniques are evaluated and their performances are compared with presence of these two symbols and without the symbols in WiFi frame structure.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116441519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"XML Duplicate Detection with Improved network pruning algorithm","authors":"V. Borate, Sudipta Giri","doi":"10.1109/PERVASIVE.2015.7087007","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087007","url":null,"abstract":"Duplicate Detection is critical task of any database of any organization. Duplicates are nothing but the same real time entities or objects are presented in the form of different structure and in the different formats. We can find out the duplicates in relational data, in complex data and hierarchical data like XML. There are lots of works already presented in the past for finding the duplicates in the relational data. But nowadays there is more focus on finding duplicates in the XML data. Because of XML is very popular for data storing and extensively used for data exchange between the organizations. Here we have done an extensive literature survey on this topic and proposed a duplicate detection method that incorporates some of the existing paper's ideas and some of our original ideas. In addition to improving the efficiency and effectiveness, we also checks for its typographical errors when comparing the two XML elements. To test the correctness of Improved network pruning method, we are comparing it with existing duplicate detection system, and giving more focus on how we get higher precision and recall values in the various datasets we would used.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114927298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rajendra A. Patta, Anuraj R. Kurup, Sandip M. Walunj
{"title":"Enhancing speed of SQL database operations using GPU","authors":"Rajendra A. Patta, Anuraj R. Kurup, Sandip M. Walunj","doi":"10.1109/PERVASIVE.2015.7087144","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087144","url":null,"abstract":"Graphic Processing Unit (GPU), has proved to be an efficient co-processor in the field of conventional computations. Dramatic acceleration has been achieved in the earlier work on different database operations on GPUs which were not part of conventional database languages like SQL. While GPUs were designed for geometric primitive's visualization, it can also be used to execute database operations efficiently by using inherent pipelining and parallelism, multi-threaded architecture, vector processing functionality of GPUs along with Single Instruction and Multiple Data (SIMD) capabilities to evaluate semi-linear queries based on attributes. The efforts required by database administrators to learn languages like CUDA or change modules in order to provide aid to libraries which are not present in SQL is reduced. This research work focuses mainly on developing a system to enhance the execution speed of SELECT queries and how effective it would it be in comparison to traditional methods. This work intends to provide a clear portrayal of how GPU hardware can be used for query execution in the area of relational databases in future. The algorithms were implemented on databases consisting of nearly a million records with the aid of a programmable GPU. The existing results suggests that using GPU as a co-processor can significantly improve execution of database operations over optimized CPU-based implementation.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"259 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133575167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recent advances in content based video copy detection","authors":"S. Shinde, G. Chiddarwar","doi":"10.1109/PERVASIVE.2015.7087093","DOIUrl":"https://doi.org/10.1109/PERVASIVE.2015.7087093","url":null,"abstract":"With the immense number of videos being uploaded to the video sharing sites, issue of copyright infringement arises with uploading of illicit copies or transformed versions of original video. Thus safeguarding copyright of digital media has become matter of concern. To address this concern, it is obliged to have a video copy detection system which is sufficiently robust to detect these transformed videos with ability to pinpoint location of copied segments. This paper outlines recent advancement in content based video copy detection, mainly focusing on different visual features employed by video copy detection systems. Finally we evaluate performance of existing video copy detection systems.","PeriodicalId":442000,"journal":{"name":"2015 International Conference on Pervasive Computing (ICPC)","volume":"10 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116962115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}