{"title":"Hiding Sensitive Information in Surveillance Video without Affecting Nefarious Activity Detection","authors":"Sonali Rout, R. Mohapatra","doi":"10.1109/AISP53593.2022.9760607","DOIUrl":"https://doi.org/10.1109/AISP53593.2022.9760607","url":null,"abstract":"Protection of private and sensitive information is the most alarming issue for security providers in surveillance videos. So to provide privacy as well as to enhance secrecy in surveillance video without affecting its efficiency in detection of violent activities is a challenging task. Here a steganography based algorithm has been proposed which hides private information inside the surveillance video without affecting its accuracy in criminal activity detection. Preprocessing of the surveillance video has been performed using Tunable Q-factor Wavelet Transform (TQWT), secret data has been hidden using Discrete Wavelet Transform (DWT) and after adding payload to the surveillance video, detection of criminal activities has been conducted with maintaining same accuracy as original surveillance video. UCF-crime dataset has been used to validate the proposed framework. Feature extraction is performed and after feature selection it has been trained to Temporal Convolutional Network (TCN) for detection. Performance measure has been compared to the state-of-the-art methods which shows that application of steganography does not affect the detection rate while preserving the perceptual quality of the surveillance video.","PeriodicalId":6793,"journal":{"name":"2022 2nd International Conference on Artificial Intelligence and Signal Processing (AISP)","volume":"162 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2022-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74792465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manishkumar Purohit, Arvind R. Yadav, Roshan Kumar, Manish Kumar, Sandeep Dhariwal, J. Kumar
{"title":"Next-gen traffic rule violation detection using optimum feature extraction techniques on highway and toll tax using Raspberry-pi hardware","authors":"Manishkumar Purohit, Arvind R. Yadav, Roshan Kumar, Manish Kumar, Sandeep Dhariwal, J. Kumar","doi":"10.1109/AISP53593.2022.9760531","DOIUrl":"https://doi.org/10.1109/AISP53593.2022.9760531","url":null,"abstract":"Across the globe, vehicle collision on roads results in the death/disabilities of people. Moreover, it results in substantial monetary burden to the concerened people and other stakeholdes. Generally, the accidents take place due to ignorance while crossing the lane and use of electronic gadgets. Government is spending a lot of money to create awareness and encourage people to follow traffic rules. Over the last two decades, significant reserach has been carrried out in traffic management system. Generally, sensor based methods are utilized to track traffic violations. These methods need appropriate infrastructure. In this work, authors have proposed a machine-vision based method to recognize the traffic rule(s) violators on highways and at toll tax plazas with the help of some important descriptors of the images and classification algorithms. This paper presents a feature extraction based system for lane and traffic rule voiation detection and tracking using low cost Raspberry Pi hardware.The experimental work suggest that, Grab cut and Hough transform techniques performed better on test image dataset to identify vehicle lane on highways. Further, combination of RootSIFT with Flann-index matcher gives superior results (accuracy of 95.3%) as compared to other feature extraction and matchers on the given dataset for detection of traffic rule violation and tracking of vehicles. The average computation time of 0.13s for the obtained results. Further, Haarcascade algorithm was used to detect mobile phone usage while riding vehicle and achieved 91% accuracy on collected datset on Raspberry pi 2(B) hardware and further vehicles detected in traffic rule violation undergoes for license plate detection and challan generation to penalize the on defaulters.","PeriodicalId":6793,"journal":{"name":"2022 2nd International Conference on Artificial Intelligence and Signal Processing (AISP)","volume":"16 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2022-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87079249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Muzammil Parvez, M.Lakshmana Kumar, R. Ravindran, R. Anirudh, Lokam Nithin Bharadwaj, Chella Santhosh, Thondam Sri Ravi Teja, R.G.N Vardhan Reddy
{"title":"Defect Detection Using Fan Chirp Transform using Quadratic Frequency Modulated Thermal Wave Imaging","authors":"M. Muzammil Parvez, M.Lakshmana Kumar, R. Ravindran, R. Anirudh, Lokam Nithin Bharadwaj, Chella Santhosh, Thondam Sri Ravi Teja, R.G.N Vardhan Reddy","doi":"10.1109/AISP53593.2022.9760566","DOIUrl":"https://doi.org/10.1109/AISP53593.2022.9760566","url":null,"abstract":"Lifetime of the material is important in various fields of applications. Aerospace, mosaics, and metallic objects serving in realistic applications in day today life. Materials possessing greater defect have low lifetime when compared with materials having smaller defects. So it’s important to check the detects in order to have a knowledge of material’s lifetime different detection techniques are performed to find subsurface anomalies. In this research investigation a non-contact, and Quadratic Frequency Modulated thermal wave imaging technique (QFMTWI) is used to evaluate the whole field of the material with more reliable information. The recorded thermal response provides the information regarding cracks, voids, irregularities present in the material’s sub-surface. Fan Chirp transform method is adopted. It is a method which matches completely with the chirp rate obtained from the sample to facilitate improved visualization of defects. Fan-Chirp transform method provides a noteworthy defect detection of the sample.","PeriodicalId":6793,"journal":{"name":"2022 2nd International Conference on Artificial Intelligence and Signal Processing (AISP)","volume":"33 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2022-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86402160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PAPR reduction using a Precoder and Compander combination in a NOMA-OFDM VLC system","authors":"N. Sharan, S. Ghorai, Ajit Kumar","doi":"10.1109/AISP53593.2022.9760659","DOIUrl":"https://doi.org/10.1109/AISP53593.2022.9760659","url":null,"abstract":"The power domain non-orthogonal multiple access (NOMA) protocol is proposed as a viable 5G visible light network solution. Orthogonal frequency division multiplexing access (OFDM) is anticipated to exist in 5G systems due to a number of important characteristics, including multi-path fading tolerance, low latency, and high compatibility with multiple input multiple output (MIMO) systems. The optical OFDM (OOFDM) system based on NOMA is a promising contender for supporting fast packet switching network especially in green indoor mobile networks. The OFDM waveform suffers from high PAPR issues. The high PAPR degrades the BER and also enhances the nonlinearity in an O-OFDM system. This research uses a hybrid technique that combines a precoder and a $mu$-compander to reduce the PAPR of a NOMA-based DC-biased O-OFDM (DCO-OFDM) system. The proposed NOMA DCOOFDM system exhibits a low PAPR of only 4.3 dB. Also, for a reference bit error rate of 10-4, the proposed technique displays an error vector magnitude (EVM) of 13.2 dB.","PeriodicalId":6793,"journal":{"name":"2022 2nd International Conference on Artificial Intelligence and Signal Processing (AISP)","volume":"58 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2022-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78848391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time monitoring system for attendance and attentiveness in virtual classroom environments","authors":"Rishav Jaiswal, Akarsh K. Nair, Jayakrushna Sahoo","doi":"10.1109/AISP53593.2022.9760690","DOIUrl":"https://doi.org/10.1109/AISP53593.2022.9760690","url":null,"abstract":"With the outbreak of the COVID-19 pandemic, classroom environments have been subjected to revolutionary changes via the employment of virtual classrooms and allied technological advancements. The traditional methodologies are proving to be inefficient in such an environment for teaching as well as managerial tasks. Also considering their cumbersome nature, the need for a newer, stronger, and better model is evident. As of now, many Deep Learning techniques have been employed for the purpose, ranging from the usage of standard object detection APIs or even CNNs and their variants. Our study proposes a model based on SVM embedded on top of embedding vectors combined with a Single-shot detector for real-time monitoring of attendance and attentiveness of students in a virtual classroom set up making use of video feed. A small comparative study between the proposed model and dlib, a standard library for the purpose as well is performed. The results show that our model outperforms dlib methodology significantly with high accuracy and performance efficiency. We had done experimentations on the fer2013 dataset particularly for emotion detection and custom datasets in general. Even though the model performs well in our experimentations, the need for a stronger and better dataset is high for evaluating the model and implementing it in real-life scenarios.","PeriodicalId":6793,"journal":{"name":"2022 2nd International Conference on Artificial Intelligence and Signal Processing (AISP)","volume":"33 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2022-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82186078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Based V2I Framework For Accident Prevention","authors":"Hitesh Mohapatra, A. K. Dalai","doi":"10.1109/AISP53593.2022.9760623","DOIUrl":"https://doi.org/10.1109/AISP53593.2022.9760623","url":null,"abstract":"The volcanic growth of the population directly influences the density of vehicles on the road. The rapid growth of vehicles is the primary cause of traffic congestion, pollution, and life-loss through accidents. This paper has presented an IoT-based vehicle to infrastructure (V2I) model for better predictability about road behaviors. This V2I model helps to avoid accidents or collisions at cross-sections of the road. The implementation part of the proposed model has considered the speed of the vehicle and creates an advanced alert mechanism based on the speed. The implementation and validation of the proposed model have been done through the RMATLAB17 simulator. The simulation results are satisfactory and achieve 82.14% of accuracy in generating an alert signal for proper decision-making by the drivers.","PeriodicalId":6793,"journal":{"name":"2022 2nd International Conference on Artificial Intelligence and Signal Processing (AISP)","volume":"64 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2022-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81084435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. K. Dalai, A. K. Jena, B. Ramana, B. Maneesha, Nibedan Panda
{"title":"Supervised Machine Learning Approaches for Medical Data Classification","authors":"A. K. Dalai, A. K. Jena, B. Ramana, B. Maneesha, Nibedan Panda","doi":"10.1109/AISP53593.2022.9760688","DOIUrl":"https://doi.org/10.1109/AISP53593.2022.9760688","url":null,"abstract":"Recently there is an emergent curiosity among researchers to apply machine learning algorithms over diversified real world complications to get simpler outcome. The notion behind this briefing is to represent the basic machine learning algorithms and its applicability in current research. Broadly machine learning algorithms falls to the category of either supervised or unsupervised learning technique. In this paper we have discussed supervised machine learning techniques with its simplicity to apply over various problem areas and simultaneously the challenges for such algorithms. Furthermore SVM and Random Forest (RF) are utilised learn, categorise, and compare cancer, liver, diabetes, iris, and heart data in this study. For all considered data sets, the results of SVM and RF are compared. The results are properly analysed in order to develop better prediction learning techniques.","PeriodicalId":6793,"journal":{"name":"2022 2nd International Conference on Artificial Intelligence and Signal Processing (AISP)","volume":"29 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2022-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86902061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Simple Miniaturized Flower Patch Antenna using Meander Lines for X & K Bands","authors":"Puja Acharya, J. Kumar, Vineet Dahiya","doi":"10.1109/AISP53593.2022.9760557","DOIUrl":"https://doi.org/10.1109/AISP53593.2022.9760557","url":null,"abstract":"This paper proposes an Ultra-Wide Band antenna with multiple bands for satellite and radar communications. A miniaturized meander antenna is proposed, and its design is presented and simulated. The design incorporates a flower type patch antenna and a half planar ground surface using metamaterial. The antenna has a substrate size of 20mm x 20mm with a total thickness of 1.588 mm. By using FR4 epoxy as substrate, antenna resonates at 10.77GHz and 19.00GHz. This paper addresses a simple design methodology for the multiband microstrip patch antenna by using meander lines. This paper also shows the effects on the use of meander lines on the patch antenna. The antenna, so designed suggests a unique structure in which slot is used to propagates multiband frequencies. In this technique, a rectangular MPA is designed, then circular slot is imposed on top of the radiating patch. The results such as return loss, surface charge density, radiation pattern is obtained and discussed. The antenna is simulated on HFSS and results like gain, VSWR, radiation efficiency and radiation pattern are investigated.","PeriodicalId":6793,"journal":{"name":"2022 2nd International Conference on Artificial Intelligence and Signal Processing (AISP)","volume":"13 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2022-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81549228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Secret Data Sharing through Coverless Steganography","authors":"Sourabh Debnath, R. Mohapatra","doi":"10.1109/AISP53593.2022.9760680","DOIUrl":"https://doi.org/10.1109/AISP53593.2022.9760680","url":null,"abstract":"The basic fundamental of steganography is to conceal the confidential data in designated cover media which will carry the secret message in such a way that no one can suspect it. With the increase in multimedia content over the net, the probability of information being theft is increased. To make confidential communication secure, people choose different data hiding techniques. Recently, steganography has gained popularity in information hiding. Information hiding is a subject that manages the concealing of classified data from attackers and hackers. Though the secret messages are not visible to human eyes but can be noticeable under statistical representation of cover media. The coverless hiding technique doesn’t modify the cover object. However, the cover object is used to transfer confidential data. A mapping relationship is created among cover objects and confidential data by following the characteristics of cover media. The term “coverless” is without any modification in the cover image the confidential data can be sent. The prime advantage of using a coverless approach is, it cannot be detected under steganalysis as no embedding is performed in cover media. This technique has drawn more attention in the data hiding field. Currently, it has been observed that most of the research work in coverless hiding approaches selected text and image as cover media. A very few researchers have considered video as cover media in coverless approach which has plentiful contents and provides the opportunity to explore.","PeriodicalId":6793,"journal":{"name":"2022 2nd International Conference on Artificial Intelligence and Signal Processing (AISP)","volume":"20 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2022-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73965373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Crack identification from concrete structure images using deep transfer learning","authors":"Amena Qadri Syed, J. Jothi, K. Anusree","doi":"10.1109/AISP53593.2022.9760670","DOIUrl":"https://doi.org/10.1109/AISP53593.2022.9760670","url":null,"abstract":"Early crack identification of civil structures is an essential task to prolong the life of the structures and to promise public safety. This research aims to develop an automated crack identification system using deep learning models and the SDNET2018 dataset. Image augmentation is applied to overcome the effect of unbalanced data. Deep pre-trained models like VGG16, InceptionV3, ResNet-50, ResNet-101 and ResNet-152 are trained and tested using the cracked and uncracked images of decks and pavements from the dataset. The experimental results show that the classification models obtained using transfer learning on the cracked and non-cracked pavement and deck image dataset have accuracy values of 70.59%, 60.31%71.93%, 75.40%, and 74.77% for VGG-16, Inception V3, ResNet-50, ResNet-101, and Resnet-152 pretrained models respectively.","PeriodicalId":6793,"journal":{"name":"2022 2nd International Conference on Artificial Intelligence and Signal Processing (AISP)","volume":"7 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2022-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72972780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}