{"title":"ICSECV: An efficient approach of video encryption","authors":"Saumya Batham, Virendra Kumar Yadav, Amitav Mallik","doi":"10.1109/IC3.2014.6897211","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897211","url":null,"abstract":"Encryption for the compressed video stream has attracted the attention of many researchers within past few years. Due to exponential growth of digital multimedia contents over the network, their secure transmission over the network is a serious concern. Security and performance are two main peculiarities of any digital multimedia encryption algorithm. This paper presents an indexed chaotic sequence based selective encryption of compressed video (ICSECV) which exploits the characteristics of compressed video. ICSECV selectively encrypts the compressed Intra coded frames and predictively coded frames from each Group of picture (GoP). This method of encryption is quite efficient since it provides the real time encryption of digital multimedia contents. ICSECV uses indexed based chaotic sequence for encrypting the selected frames which do not leaks any information and provide desirable amount of security.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122019816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fat time optimization protocol in cellular networks","authors":"Shiven Chawla, Sakshi Agarwal","doi":"10.1109/IC3.2014.6897150","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897150","url":null,"abstract":"As the widespread of cellular networks is broadening, the volumes of end-users also keep on increasing exponentially. Amongst the primeval issues, the concern of providing high throughput along with a decent fairness, surfaces with the ever expanding reign of cellular networks. The present-day algorithms such as Max-Rate, Round-Robin and Proportional-Fair algorithm are getting cast-out in the sprint for providing a dependable solution to this problem in effect with such vast volume of users. We have developed a scheduling algorithm for the receiving stations based upon the fat-time scheduling criteria. The algorithm aims at providing fairness and an increased throughput between mobile stations (having constantly changing channel conditions) by exponentially decreasing or increasing the differential factor of the rate of transmission of data under consistent condition of no noise, or Doppler shift, reflection, diffraction or scattering.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116215292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dhyanendra S. Rathore, D. Bordoloi, E. Pilli, M. C. Govil
{"title":"LevelSync: A hierarchical time synchronization mechanism for wireless sensor networks","authors":"Dhyanendra S. Rathore, D. Bordoloi, E. Pilli, M. C. Govil","doi":"10.1109/IC3.2014.6897186","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897186","url":null,"abstract":"Time synchronization in wireless sensor networks is a critical requirement for distributed and collaborative processing among the nodes. This paper presents a coarse grained hierarchical time synchronization scheme `LevelSync' which synchronizes nodes in a sensor network with regards to their distance from the sink or master node. A hierarchical tree is dynamically constructed during the synchronization with master node acting as the root. The master node initiates and controls the synchronization phase and is responsible for normalizing the virtual time with the corresponding UTC. Each node is assigned a level and maintains a virtual clock which runs at a frequency different than that of its physical clock. Virtual clocks run at a fixed frequency calculated by the root or reference nodes hence are free from the drifts. LevelSync decreases the number of messages required for the synchronization and the resynchronization periods. We evaluate the performance and energy efficiency of the LevelSync through simulation and compare with existing time synchronization protocols. LevelSync is computationally light, energy efficient and achieves long lasting synchronizations.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116231445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis of “a biometric-based user authentication scheme for heterogeneous wireless sensor networks”","authors":"M. Sarvabhatla, M. Giri, C. Vorugunti","doi":"10.1109/IC3.2014.6897192","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897192","url":null,"abstract":"With the advancement of Internet of Things (IoT) technology and rapid growth of WSN applications, provides an opportunity to connect WSN to IoT, which results in the secure sensor data can be accessible via in secure Internet. The integration of WSN and IoT effects lots of security challenges and requires strict user authentication mechanism. Quite a few isolated user verification or authentication schemes using the password, the biometrics and the smart card have been proposed in the literature. In 2013, A.K Das et al. designed a biometric-based remote user verification scheme using smart card for heterogeneous wireless sensor networks. A.K Das et al insisted that their scheme is secure against several known cryptographic attacks. Unfortunately, in this manuscript we will show that their scheme fails to resist replay attack, user impersonation attack, failure to accomplish mutual authentication and failure to provide data privacy.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122271449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantification of non-functional requirements","authors":"Kiran Khatter, A. Kalia","doi":"10.1109/IC3.2014.6897177","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897177","url":null,"abstract":"Requirements Analysis is considered as the most important phase for the development of quality software because errors caused by poor and inadequate requirement analysis are likely to creep in design and implementation phase. These errors are observed as time-consuming and most expensive to repair. Thus, Requirement Analysis is the phase, which determines the success or failure of a software project. Poor requirement analysis increases the cost of development by 70-85%, which requires reworking on all phases of software project. It is observed that non-functional properties are often ignored while focusing on the functionality of the software. Many software systems have failed because of negligence of non-functional requirements. Therefore, it is necessary to measure the satisfaction level of non-functional requirement during software development process.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131712667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leveraging frequency and diversity based ensemble selection to consensus clustering","authors":"Arko Banerjee","doi":"10.1109/IC3.2014.6897160","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897160","url":null,"abstract":"Consensus clustering, also called aggregation of clustering (or partitions) is a method that desires to improve the robustness and quality in clustering of a dataset by optimally reconciling the results of different clusterings of the same dataset generated in different ways. This paper proposes a novel way of arriving at a consensus clustering by an ensemble selection strategy. The method avoids considering the entire ensemble and judiciously select few clusterings in the ensemble without compromising on the quality of the consensus. It begins with sorting the ensemble by prioritizing clusterings based on diversity and frequency. It is observed that considering jointly the diversity and frequency helps in identifying few representative partitions that have high potentiality to form qualitatively better consensus than that of the entire ensemble. Finally a greedy strategy is used to select the clusterings in an iterative consensus generation technique that ensures the internal quality of clustering to be monotonically non-decreasing. Empirical results show that the consensus clustering obtained by the proposed algorithm gives better clustering accuracy for many datasets.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132412394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Akhilesh K. Sharma, Kamaljit I. Lakhtaria, A. Panwar, S. Vishwakarma
{"title":"An Analytical approach based on self organized maps (SOM) in Indian classical music raga clustering","authors":"Akhilesh K. Sharma, Kamaljit I. Lakhtaria, A. Panwar, S. Vishwakarma","doi":"10.1109/IC3.2014.6897215","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897215","url":null,"abstract":"This paper is mainly focusing the aspects regarding the Self organized maps in the recognition of the Ragas and the strategy behind the Digital signal processing for the raga recognition and clustering of the same. Paper mainly describes all the features extraction mechanism for the SOM input and we devised an algorithm for creating the clusters of the raga based on their PCP (pitch class profiles) and the onsets detected. Our strategy is very promising that its providing better clusters of the raga patterns and the raga segments are very much clearly be distinguished from the other ragas, as we compared them with the formation of the key attributes. The Indian classical music history is very old and the need for identifying the music based on the raga onsets is very much helping for the music professionals and domestic users for identifying and detecting the raga types and using the same without the help or availability of any experts nearby. Thus our strategy is very promising in nature for the novice users and practitioners as well as home users. The very early learners would also find it very interesting and supportive after due course of frequent uses of it. At last we provided the future possibilities for the enhancements.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115128374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of various resampling techniques on IRS imagery","authors":"Shardha Porwal, S. Katiyar","doi":"10.1109/IC3.2014.6897222","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897222","url":null,"abstract":"Resampling is used to calculate pixel values when one raster grid is fitted to another. High-resolution remote sensing satellite images contain more information in the discrete samples and after resampling process, it is desirable that the reconstructed image should maintain the same sharpness as the original image. Although several techniques are available, but it is essential to determine the best one for maintaining the sharpness and the pixel break at higher magnification level for photographic and digital display of high resolution satellite images. To preserve image quality, the interpolating function used for the resampling should be an ideal low-pass filter. In order to determine the best interpolation function, different resampling functions, namely Nearest Neighbor (NN), Bilinear (BL), Cubic Convolution ( α = 0 ), High-resolution Cubic Spline with Edge Enhancement ( α = -1 ), High-resolution Cubic Spline ( α = -0.5 ), Cubic Spline ( α = -2 ), Cubic Spline ( α = -.3/4), Cubic B-spline, Catmull-Rom Cubic, Quadratic Interpolation and Approximating Quadratic B-Spline have been analyzed on different spatial resolution Indian Remote Sensing (IRS) satellite images (LISS-III, LISS-IV and CARTOSAT-1). Performance of the above resampling methods has been evaluated by Visual interpretation, Digital Number Percentage (DN %) Analysis as well as other parameters likes Entropy and Image Noise Index (INI), MSE and PSNR. Investigation results have shown that with the change in the image processing operation, spatial resolution and evaluation parameter, the performance of resampling method changes, thereby emphasizing the need to judiciously select the resampling method.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125190813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anti-forensics techniques: An analytical review","authors":"Anup Jain, Gurpal Singh Chhabra","doi":"10.1109/IC3.2014.6897209","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897209","url":null,"abstract":"The rapid growth and development in technology has made computer as a weapon which can cause great loss if used with wrong intentions. Computer forensics aims at collecting, and analyzing evidences from the seized devices in such ways so that they are admissible in court of law. Anti-forensics, on the other hand, is collection of tricks and techniques that are used and applied with clear aim of forestalling the forensic investigation. Crime and crime prevention go hand in hand. Once a crime surfaces, then a defense is developed, then a new crime counters the new defense. Hence along with continuous developments in forensics, a thorough study and knowledge of developments in anti-forensics is equally important. This paper focuses on understanding different techniques that can be used for anti-forensic purposes with help of open source tools.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128377468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Grasp mapping for Dexterous Robot Hand: A hybrid approach","authors":"Ritwik Chattaraj, B. Bepari, S. Bhaumik","doi":"10.1109/IC3.2014.6897180","DOIUrl":"https://doi.org/10.1109/IC3.2014.6897180","url":null,"abstract":"During past two decades many efforts have been made by different researchers in developing robotic grippers. Some of these grippers are robust and used for handling large objects. On the contrary, certain grippers are adroit enough even to handle biological cells. Wide varieties of grippers are now-a-days available featuring different kinematic ability, dexterity, mode of actuation, usage of sensors, maximum weight carrying capabilities and many more attributes. But they all accord to a single issue, i.e. inspiration. Essentially the goal of developing grippers focuses mainly on the manipulation ability of the human hand. Subsequently the designs have continuously become more and more complicated, which in turn have increased the programming complexity to keep abreast with the advances. Cognition in the field of robotics refers to sensing, generation and interpretation. To inculcate kinesthetic cognition to a robot hand unequivocally implies mapping. In this paper a hybrid methodology based on the existing grasp mapping algorithm has been proposed to increase the efficacy of the robotic hand.","PeriodicalId":444918,"journal":{"name":"2014 Seventh International Conference on Contemporary Computing (IC3)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126410032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}