Implementation of Secure Bank Authentication using Visual Cryptography and Image Processing
Research Paper | Journal Paper
Vol.5 , Issue.4 , pp.62-67, Apr-2017
Abstract
With the advent of e-commerce and electronic transactions the need for development of secured systems has grown tremendously. The need for security of information is especially affecting the banking sector. This paper implements an algorithm which proposes an efficient way for decreasing forgery during bank transactions using Visual Cryptography and Image Processing. Visual Cryptography is a generic cryptography technique which takes an image as input for encryption and makes use of human visual system rather than automated computing machines for decryption. Here we use a modified version of Visual Cryptography in which a combination of mechanical process and computation process is used for decryption. Due to the ease of implementation, this technique can be implemented by the people with non-technical background. It encrypts the visual data by dividing it into shares and decrypts the data by stacking some or all shares. Image Processing is used to perform operations on the image. The technique used in this paper works on the signature of the account holder for authentication.
Key-Words / Index Term
Visual Cryptography, Bank Security, Secret image sharing
References
[1] M. Naor, A. Shamir, “Visual Cryptography”, Advances in Cryptography-Eurocrypt, Springer, US, pp.1-12,1994.
[2] B. Srikanth, G. Padmaja, S. Khasim, P.V.S. Lakshmi, A. Haritha, “Secured Bank Authentication using Image Processing and Visual Cryptography”, IJCSIT, Vol. 5, Issue.2, pp.1-6, 2014.
[3] W-Q. Yan, D. Jin, M. S. Kanakanahalli, “Visual Cryptography for Print and Scan Applications”, ISCAS04, Canada, pp.572-575, 2004.
[4] Bernd Borchert, “Segment-Based Visual Cryptography” WSI Press, Germany, pp.1-320, 2007.
[5] C-C. Lin, W-H. Tsai, “Visual cryptography for graylevel images by dithering techniques”, Science Direct, Vol.24, Issue.3, pp.340-358, 2003.
[6] D. Chaudhary, R. Welekar, “Secure Authentication Using Visual Cryptography”, International Journal Of Computer Science and Applications, Vol. 8, No. 1, pp. 1-4, 2015.
[7] N. Anusha, P. SubbaRao, “Visual Cryptography Schemes for Secret Image”, IJERT Vol. 1 Issue 5, pp. 1-9, 2012.
[8] H. Yan, Z. Gan and K. Chen, ”A Cheater Detectable Visual
Cryptography Scheme”, Journal of Shanghai University, vol. 38, no.1, pp.107-110, 2004.
[9] Md. A. Mushtaque, “Comparative Analysis on Different parameters of Encryption Algorithms for Information Security” , International Journal of Computer Sciences and Engineering, Vol. 2, Issue. 4, pp.76-82, 2014.
Citation
B Mehta, T Varshney, YMandloi, J Belel, V Deshmukh, , "Implementation of Secure Bank Authentication using Visual Cryptography and Image Processing," International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.62-67, 2017.
Review Paper on Data Mining and its Techniques and Mahatma Gandhi National Rural Employment Guarantee Act
Review Paper | Journal Paper
Vol.5 , Issue.4 , pp.68-73, Apr-2017
Abstract
Data Mining is a technique that attempts to find useful pattern from substantial volume of data. The paper reviews data mining and its techniques in e- governance. The paper also reviews the influence of the Mahatma Gandhi National Rural Employment Guarantee Act (MGNREGA) on the rural India. The objective of MGNREGA is to provide at least hundred days of job to the rural and tribal population, whose living entirely depends on daily wages. Moreover the paper gives the relative evaluation of numerous data mining methods and algorithms.
Key-Words / Index Term
Data Mining, MGNREGA, Data Mining Techniques
References
[1]. Hardik Gohel, “Looking Back at the Evolution of the Internet”, CSI Communications - Knowledge Digest for IT Community, Vol.38, Issye.6, pp. 23-26, 2015.
[2]. Nikita Jain, Vishal Shrivastava , “Data Mining Techniques: A Survey Paper”, International Journal of Research in Engineering and Technology, Vol.2, Issue.11, pp.2319-1163, 2013.
[3]. AKB. Kote, “role of mahatma gandhi national rural employment guarantee programme inrural –urban migration -a gram panchayat village level study in gulbarga districtof karnataka state”, Journal of Global Economy, Vol.7, Issue.4, pp.275-291, 2011.
[4]. P. Sumithra, VV. Kumari, “Performance Analysis of MGNREG Scheme using Classification”, International Journal of Science and Research, Vol.4 ,Issue.10, pp.223-226, 2015.
[5]. Dr.M.Usha Rani, “Analysis on Households Registered/Working through Data Mining Techniques on NREGS (National Rural Employment Guarantee Scheme) Data of Andhra Pradesh”, International Journal of Engineering and Innovative Technology (IJEIT), Vol.2, Issue.2, pp.1-10, 2012.
[6]. T. Smitha, V. Sundaram. , “Comparative Study Of Data Mining Algorithms For High Dimensional Data Analysis”, International Journal of Advances in Engineering & Technology, Vol.2, Issue.4, pp.44-52, 2012.
[7]. Sumit Garg , AK. Sharma, “Comparative Analysis of Data Mining Techniques on Educational Dataset”, International Journal of Computer Applications, Vol.74, No.5, pp.1-7, 2013.
[8]. Dr.M.Usha Rani, “Expenditure Analysis Through Data Mining Techniques on NREGS(National Rural Employment Guarantee Scheme) Data of Andhra Pradesh”, IRACST – Engineering Science and Technology: An International Journal, Vol.2, No. 4, pp.122-129, 2012.
[9]. G. Sugapriyan, S. Prakasam, “Analyzing the Performance of MGNREGA Scheme using Data Mining Technique”, International Journal of Computer Applications, Vol.109, No.9, pp.123-127, 2015.
[10]. Lavannya Varghese, Christina Joseph, Vince Paul, “Survey on Mining Educational Data and Recommending Best Engineering College”, International Journal of Science, Engineering and Computer Technology, Vol.6, Issue.1, 66-69, 2016.
[11]. Moksha Shridhar, Mahesh Parmar, “Survey on Association Rule Mining and Its Application”, International Journal of Computer Science and Engineering, Vol.5, Issue.3,pp.129-135, 2017.
[12]. Mala Bharti, Vineet Richhariya, Mahesh Parmar, “An Implementation of IDS in a Hybrid Approach and KDD CUP Dataset”, International Journal of Research Granthaalayah (IJRG) Indore, Dec-14, Vol. 2, Issue.2, pp. 2-12, 2014
[13]. Mala Bharti, Vineet Richhariya, Mahesh Parmar, “A Survey on Data Mining based Intrusion Detection Systems”, International Journal of Computer Networks and Communications Security, Vol. 2, No.12, pp. 485-490, 2014.
[14]. NA. Shiekh, MA. Mir, “Mahatma Gandhi National Rural Employment Guarantee Act (MGNREGA): A Right Based Initiative towards Poverty Alleviation through Employment Generation", International Journal of Science and Research (IJSR), Vol.5 Issue.1, pp.1344-1348, 2016.
[15]. P. Chakraborty, “Evaluation of National Rural Employment Guarantee Act in Tamil Nadu”, Indian Institute of Technology, Madras, pp.1-29, 2010.
[16]. M. Dey, S.S. Rautaray, "Disease Predication of Cardio- Vascular Diseases, Diabetes and Malignancy in Lungs Based on Data Mining Classification Techniques", International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.82-98, 2014.
[17]. Bhavesh Patankar, Vijay Chavda, “A Comparative Study of Decision Tree, Naïve Bayesian and k-nn Classifiers in Data Mining”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.4, Issue.12, pp.24-31, 2014.
Citation
K. Yadav, M. Parmar, "Review Paper on Data Mining and its Techniques and Mahatma Gandhi National Rural Employment Guarantee Act," International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.68-73, 2017.
The Smart Health Medicare System
Review Paper | Journal Paper
Vol.5 , Issue.4 , pp.74-77, Apr-2017
Abstract
Existing Information System of hospitals mainly focuses on single and separated hospitals. The Smart Health system interconnects multiple hospitals. The project’s aim is to develop a wide range of hospital administration processes. This system helps patients to get their information (medical report, lab report) in every hospital with a user name and password. There is no need to carry all medical copies (medical report & lab report). Patients, lab technicians, doctors and hospitals can make use of this software. Better health is central to human happiness and well-being. It provides progress of economics. The project comprises software for doctors and hospitals and a mobile application running on android for the patients. The patient can get the details of the doctors, appointment times, laboratory tests and the specific medicine about his/her medical situation using the system. It also provides assistance for the doctors to retrieve the previously given prescriptions and results of a patient and directly sends lab requests to lab technicians. The software provides security of data, authentication and avoid duplicate entry of data. The patient can book is/her on-line appointment with a mobile phone application. The system helps to save the time of patients as well as the time of doctors. It also reduces the paper work of receptionists.
Key-Words / Index Term
Android Application, online appointment, Software
References
[1] S. Khicha, P. Patil, P. Roy, P. Sinkar, J P Rankhambe, “A Mobile Based Smart Healthcare System”, International Journal Of Engineering And Computer Science, Vol. 6, Issue. 4, pp. 20911-20914, April 2017.
[2] M. Mahdavian, H. Nazarian, M. Mahdavian, N. Wattanapongsakorn, “An Investigation of the Success of Hospital Information Systems Implementation: A Case Study”, 2014 International Computer Science and Engineering Conference (ICSEC), Khon Kaen, Thailand, pp. 329-333, 2014.
[3] C. He, X. Jin, Z. Zhao, T. Xiang , “A Cloud Computing Solution for Hospital Information System”, 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS), China, pp. 517-520, 2010.
[4] Prof. S. B. Choudhari, C. Kusurkar, R. Sonje, P. Mahajan, J. Vaz, “Android Application for Doctor’s Appointment”, International Journal of Innovative Research in Computer and Communication Engineering, Vol.2, Issue.1, pp.26-32, 2014.
[5] B. K. Murthy, P. K. Srivastava, A. S. Cheema, “Implementation Challenges of Hospital Information System in Super Specialty Hospital: A Case Study of PGIMER, Chandigarh” , 2014 IEEE Global Humanitarian Technology Conference-South Asia Satellite (GHTC-SAS), Trivandrum, pp. 77-82 , 2014.
[6] M. Li, S. Yu, Y. Zhen, K. Ren, W. Lou, “Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption”, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, Issue.1, pp. 131-143, 2013.
[7] R.M. Liaqat , A. Athar, N.A. Saqib “Intelligent Agent based System for Monitoring and Control of Hospital Management System”, 2015 2nd International Conference on Information Science and Security (ICISS), South Korea, pp. 978- 982, 2015.
[8] G. Alex, B. Varghese, J.G. Jose, A. Abraham, “A Modern Health Care System Using IoT and Android”, International Journal on Computer Science and Engineering (IJCSE), Vol.8, Issue.4 pp. 117-121, Apr 2016.
Citation
A. Murali, K. Raj, S. Aifa, AS. Nair, C. Vincent, "The Smart Health Medicare System," International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.74-77, 2017.
A Survey on Security and Various Attacks in Wireless Sensor Network
Survey Paper | Journal Paper
Vol.5 , Issue.4 , pp.78-84, Apr-2017
Abstract
Wireless sensor networks (WSN) have a set of algorithms and protocols with self-establishing capabilities. These sensors work with every other to sense some physical phenomenon after which the information gather is processed to get relevant outcomes. These sensor nodes can calculate, sense, and assemble particulars from the atmospheres and based on some neighborhood decision process, they are able to transmit the sensed records to the person. The battery is the main electricity supply in a sensor node and secondary power supply that harvests strength from the atmospheres together with solar panels may be added to the node depending on the appropriateness of the atmospheres where the sensor will be diffuse. Clustering is the technique which performs the grouping of similar nodes and then starts communicating into the clusters. Security can be achieved by encrypting and decrypting the data and make them unable to read that from the malicious users. Cryptography is the useful technique which contains symmetric and asymmetric methods. In this paper we study about WSN and its application or various attacks which exist in the sensor network in the middle of paper we discuss various existing technique and it’s working. Various attacks are performed in this network such as passive and active attacks or insider and outsider attacks. The wirelessly network always required security in the form of data integrity, confidentiality, authenticity and etc.
Key-Words / Index Term
WSN; attacks; security; security issues;
References
[1] NM. Nair, JS. Terence, "Survey On Distributed Data Storage Schemes In Wireless Sensor Networks", Indian Journal of Computer Science and Engineering (IJCSE), Vol.4, No.6, pp.1-6, 2014.
[2] Jennifer Yick, Biswanath Mukherjee, Dipak Ghosal, “Wireless sensor network survey”, Science direct, Vol.52, Issue.12, pp.2292–2330, 2008.
[3] AS. Mandloi, V. Choudhary, "An Efficient Clustering Technique for Deterministically Deployed Wireless Sensor Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.1, pp.6-10, 2013.
[4] Sanchita Gupta, Pooja Saini, "Modified Pairwise Key Pre-distribution Scheme with Deployment Knowledge in Wireless Sensor Network", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.21-23, 2013.
[5] N. Meenaksi, P. Rodrigues, "Tsunami Detection and forewarning system using Wireless Sensor Network - a Survey", International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.76-79, 2014.
[6] Chanchal Yadav, SS. Hegde, NC. Anjana, Sandeep Kumar, “Security Techniques in Wireless Sensor Networks : A Survey”, International Journal of Advanced Research in Computer and Communication Engineering, Vol.4, Issue.4, pp.289-295, 2015.
[7] Jaydip Sen, “A Survey on Wireless Sensor Network Security”, International Journal of Communication Networks and Information Security, Vol.1, No.2, pp.1-16, 2009.
[8] Xiaoliang Menga, Xiaochuan Shia, Zi Wangb, Shuang Wua, Chenglin Lia, “A grid-based reliable routing protocol for wireless sensor networks with randomly distributed clusters”,elsevier, Vol.51, NO.11, pp.47–61, 2016.
[9] Hacene fouchal, javier biesa, elena romero, alvaro araujo, octavio nieto taladrez, “a security scheme for wireless sensor networks”, 2016 IEEE Global Communications Conference (GLOBECOM), Washington, pp.1-5,2016.
[10] Gagandeep Kaur, Deepali, Rekha Kalra,“Improvement and analys security of WSN from passive attack”, 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, pp.420-425, 2016.
[11] Janusz Furtak, Zbigniew Zieliński, Jan Chudzikiewicz, “Security techniques for the WSN link layer within military IoT”, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, pp.233-238, 2016
[12] Mauricio Tellez, Samy El-Tawab, M. Hossain Heydari, “IoT security attacks using reverse engineering methods on WSN applications”, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, pp.182-187, 2016.
[13] pooja m. shukre, divya chirayil, “enhancement in didrip protocol to securely disseminate data in wireless sensor network sign in or purchase”, 2016 International Conference on Communication and Electronics Systems (ICCES), Coimbatore, pp.1-4, 2016.
[14] MU Aftab, Omair Ashraf, Muhammad Irfan, Muhammad Majid, Amna Nisar, MA. Habib, “A Review Study of Wireless Sensor Networks and Its Security”, Communication Network, Vol.7, No.4 , pp.172-179, 2015.
[15] Biji Nair, C. Mala,“Analysis of ECC for application specific WSN security”, 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Madurai, pp.1-6, 2015.
Citation
P. Sengar, N. Bhardwaj, "A Survey on Security and Various Attacks in Wireless Sensor Network," International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.78-84, 2017.
Location Based Attendance Tracking Using Mobile Devices
Review Paper | Journal Paper
Vol.5 , Issue.4 , pp.85-87, Apr-2017
Abstract
This paper focuses on the automation of the mundane process of attendance tracking using the location determination capabilities of a modern day smartphone. The idea is to use the Global Positioning System (GPS), Wireless Fidelity (Wi-Fi) and Network signals to determine the location of the mobile device with the desired accuracy. We then determine a suitable threshold to determine a radius from the fixed location (the place of work perhaps), within which if the device is present, the bearer of the device is considered to be present at work. The aim of this system is to automate the archaic and mundane process of recording attendance without the necessity of any additional hardware requirements other than a smartphone. Attendance recording has come across a handful of make-overs up until now, and the most successful system seems to be the Radio-Frequency Identification (RFID) based access control cards which need to be held in front of a reader at the place of work. This system relies on the additional hardware requirement of the RFID enabled card and a reader, dependencies which, we aim to eliminate.this paper focuses on the automation of the mundane process of attendance tracking using the location determination capabilities of a modern day smartphone. The idea is to use the Global Positioning System (GPS), Wireless Fidelity (Wi-Fi) and Network signals to determine the location of the mobile device with the desired accuracy. We then assign a suitable threshold to calculate a radius from the fixed location (the place of work perhaps), within which if the device is present, the bearer of the device is considered to be present at work.
Key-Words / Index Term
Attendance, Mobile Device, Efficiency, Global Positioning System
References
[1] A.A. Kumbhar, K.S. Wanjara, D.H. Trivedi, A.U. Khairatkar, D.Sharma, “Automated Attendance Monitoring System using Android Platform”, International Journal of Current Engineering and Technology, Vol. 4, No. 2, pp.1096-1099, 2014.
[2] S. Sultana, A. Enayet, I.J. Mouri, “A Smart, Location Based Time And Attendance Tracking System Using Android Application”, International Journal of Computer Science Engineering and Information Technology (IJCSEIT), Vol.5, No. 1, pp. 1-5, 2015.
[3] S. Rao, K.J. Satoai, “An Attendance Monitoring System Using Biometrics Authentication”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.3, Issue 4, pp. 379-383, 2013.
[4] N. Sharma, B.M. Kumar, A. Patil, A. Kale, N. Lambe, “Attendance Tracking System Using Wi-Fi”, International Journal of Engineering and Technical Research (IJETR),Vol.3, No. 4, pp. 324-328, 2015.
[5] R. Meier, “Professional Android 4 Application Development”, Wrox Publication, John Wiley & Sons, India, pp. 100-250, 2012.
[6] P. Padmavathy, C. Balakrishnan, “Smart Tracking of Human Location And Events Based On WPS Using Android Technology”, International Journal of Computer Sciences and Engineering (IJCSE), Vol. 2, No. 1, pp. 30-34, 2014.
Citation
A. Sharma, V.B. Jain, "Location Based Attendance Tracking Using Mobile Devices," International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.85-87, 2017.
Read2Me: A Cloud- based Reading Aid for the Visually Impaired
Research Paper | Journal Paper
Vol.5 , Issue.4 , pp.88-92, Apr-2017
Abstract
Reading is essential in our daily life. For the visually-impaired segment of the population, the inability to read has a substantive negative impact on their quality of life. Printed text (books, magazines, menus, labels, etc.) still represents a sizable portion of the information this group needs to have unrestricted access to. Hence, developing methods by which text can be retrieved and read out loud to the blind is critical. We use the computational power of resources made available by cloud computing providers for real-time image processing. There are many techniques which are used for navigating the visually challenged people, navigation in real time traffic is the main problem. The extracted text of various fonts and sizes then can be recognized individually and then combined in a word giving its output as audio using Text-to-speech using the SAPI libraries.
Key-Words / Index Term
SONAR,GPS,Navigation,Light Sensing,Pulse Sensing,Cloud,Assistive text reading,Binerization,OCR,Text-to-speech,Mobile cloud computing,pedistrial signal
References
[1] Y. Kanamaru, H. Suzuki, K. Asahi, A. Watanabe, “Proposal for a wireless sensor network visualization system using location estimation technology”, 2014 Seventh International Conference on Mobile Computing and Ubiquitous Networking (ICMU), Singapore, 2014, pp. 111-116.
[2] JR. Pleis, M. Lethbridge-Çejku, “Summary health statistics for U.S.adult :National Health Interview Survey”, National Center for Health Statistics, USA, pp.1-145, 2006.
[3] A. Helal, M. Mokhtari, B. Aldulrazak, “The Engineering Handbook of Smart Technology for Aging, Disability and Independence”, John Wiley & Sons, Hoboken, PP.1-480, 2008.
[4] R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems”, ACM Communication, vol. 21, no. 2, pp. 120-126, 1978.
[5] Amutha B, Ponnavaiko M, “virtual eye the blind child navigation model using wireless sensor, International Journal of Information Acquisition”, Vol.7, Issue.4, PP.88-92, 2010.
[6] Bharat Bhargava, Pelin Angin, Lian Duan ,” A Mobile-Cloud Pedestrian Crossing Guide for the Blind”, project report of Purdue University, USA, PP.1-48, 2011.
[7] SG. Sagar , GF. Khan, V. Nagaonkar, “A Wireless Navigation System For the Visually Impaired”, Capstone Research Project Interdisciplinary Telecom Program University of Colorado, Boulder, pp.1-10, 2015.
[8] A.S. Naik, S.M. Metagar, P.D Hasalkar, “A Survey on Secure Crypto-Biometric system using blind authentication technique”, International Journal of Computer Sciences and engineering,, Vol.2, Issue.5, pp.93-97, 2014 .
[9] H. Yoshiaki, S. Yusuke, S. Yuriko, Y. Kenji, “Development of the navigation system for the visually impaired by using white cane”, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society, New York, pp. 4893-4896, 2006.
[10] Yogesh Badhe, Hafij Balbatti, Neelkanth Kaladagi , Kranti Kumar, “IRIS Recognition and Authentication System for Enhancing Data Security” , International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.1-5, 2014.
[11] A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp.4-20, Jan. 2004.
[12] C. Fontaine and F. Galand, “A survey of homomorphic encryption for nonspecialists,” EURASIP, vol. 1, no.2, pp. 1-15, 2007.
Citation
RA. Thomas, R. Ramanan, RA. Roy, S. Elisabath, "Read2Me: A Cloud- based Reading Aid for the Visually Impaired," International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.88-92, 2017.
Improving Source Code Encryption using Proposed Cipher Logic
Research Paper | Journal Paper
Vol.5 , Issue.4 , pp.93-96, Apr-2017
Abstract
Web page is loaded into web browser to run the required output according to Document Object Model. Web page contents source based on applied technology like language support, platform required and versions used. Indirectly, data can be anything but it is always in the form of 0 and 1. In this paper, proposed cipher logic is applied to the bits data directly due to which it become universal supportive. Five levels proposed cipher logic has been added to the encryption process. Same logic is required to decrypt the encrypted data without which original data cannot be retrieved.
Key-Words / Index Term
Cipher policy, Document Object Model (DOM), source code, internet languages, web browser
References
[1] J. Bethencourt, A. Sahai, B. Waters, "Ciphertext-Policy Attribute-Based Encryption", 2007 IEEE Symposium on Security and Privacy (SP `07), Berkeley, pp. 321-334, 2007.
[2] SU. Rasal, ST. Shelar, VS. Rasal, “Securing Internet Banking Using Multiple Attributes Scheme And OTP”, The IIOAB Journal, Vol.7, Issue.10, pp.26-30, 2016.
[3] VS Rasal, SU Rasal, ST Shelar, “Enhancing Privacy And Security Through Mediator Using DCP-ABE With OTP”, The IIOAB Journal, Vol.7, Issue.1, pp.277-283, 2016.
[4] S. Rasal, S. Relan, K. Saxena, “OTP Processing using UABE & DABE with Session management”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.6, Issue.5, pp.57-59, 2016.
[5] VT. Mulik, K. Saritha, SU. Rasal, “Privacy Preserving Through Mediator in Decentralized Ciphertext policy Attribute Based Encryption”, IJRET: International Journal of Research in Engineering and Technology, Vol.5, Issue.6, pp. 535-540, 2016.
[6] PJ. Lynch, S. Horton, “Web style guide”, New Haven: Yale University Press, US, pp.79-177, 2016.
[7] Matthias Hertel, Yehuda Katz, Jon Gunderson, Lori Hylan-Cho, Prasanna Bale, MN. Hoyt, “Successful Deployment of Ajax and OpenAjax”, Open AJax alliance, Vol.1, Issue.1, pp.1-6, 2015.
[8] S. Rasal, M. Matta, K. Saxena, “OTP system with third party trusted authority as a mediator”, International Journal Of Engineering And Computer Science, Vol.5, Issue.5, pp.16566-16568, 2016.
[9] R. Sanders, “The Pareto principle: its use and abuse”, Journal of Services Marketing, Vol.1, Issue.2, pp.37-40, 1987.
[10] I. Manotas, L. Pollock, J. Clause, “SEEDS: a software engineer`s energy-optimization decision support framework”, In Proceedings of the 36th International Conference on Software Engineering, New York, pp.503-514, 2014.
Citation
SU. Rasal, R. Redhu, VS. Rasal, ST. Shelar, "Improving Source Code Encryption using Proposed Cipher Logic," International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.93-96, 2017.
STORYTIME - A Story Narrating App For Children
Review Paper | Journal Paper
Vol.5 , Issue.4 , pp.97-100, Apr-2017
Abstract
Audiobooks and Digital eBooks are another way for us to take literature anywhere we want to go, enabling us to tune in to any story anytime we want to. They have become extremely popular recently but they lack emotions in their voice which makes them quite monotonous and tedious. In this paper we present a solution as a mobile application to make reading enjoyable for children. The android application reads the stories aloud with the help of text-to-speech API’s along with the insertion of semantic sounds depending on the rules of natural language processing. The stories are read along with appearance of background images to give it a pleasant visual effect. Our application is implemented using Stanford CoreNLP libraries in Java and Text-to-Speech API’s, which will strengthen the interest of reading in children and make it more fascinating.
Key-Words / Index Term
Natural Language Processing, Stanford CoreNLP, Java, Text-to-Speech API’s, POS Tagger, Basic Dependencies
References
[1] C.D. Manning, M. Surdeanu, J. Bauer, J. Finkel, S.J. Bethard, D. McClosky, “The Stanford CoreNLP Natural Language Processing Toolkit”, In the Proceedings of 52nd Annual Meeting of the Association for Computational Linguistics: System Demonstrations, USA, pp.55-60, 2014.
[2] W. Hu, T. Chen, Q. Shi, X. Lou, “Smartphone Software Development Course Design Based on Android”, In the Proceedings of the 10th IEEE International Conference on Computer and Information Technology (CIT 2010), China, pp.2180-2184,2010
[3] F. Hill, A. Bordes, S. Chopra, J. Weston, “The Goldilocks Principle: Reading Children’s Books With Explicit Memory Representations” , Published as a conference paper at ICLR 2016, NY, pp.1-13,2016.
[4] J. Dodge, A. Gane, X. Zhang, A. Bordes, S. Chopra, A. Miller, A. Szlam, J. Weston, “Evaluating Prerequisite Qualities For Learning End-To-End Dialog Systems”, Published as a conference paper at ICLR 2016, NY, pp.1-15,2016.
[5] A. Budholia, R. Mehta, M. Godhrawala, Z. Shaikh, “Mobile Field Service Engineer Application”, International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp. 100-104, 2016
Citation
L. Dsa, N. Jaiswal, T. Chitodkar, Z. Shaikh, "STORYTIME - A Story Narrating App For Children," International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.97-100, 2017.
Intelligent Video Surveillance System for Banks
Research Paper | Journal Paper
Vol.5 , Issue.4 , pp.101-104, Apr-2017
Abstract
The paper proposes an Intelligent Video Based Surveillance System for motion detection in bank locker rooms. The system basically concern on the use of automatic motion detection technique using webcams for locker security. The system captures action triggered by motion as it happens. When an intrusion occurs the system will instantly send email notification with the image captured straight off to the security officer. The alert mechanism promptly triggers an audio clip alarm once motion is detected, and this facilitates the prevention of any sort of security breach at that instant.
Key-Words / Index Term
Frame Comparison , Email Notification
References
[1] NS, Abinaya. S. Malathi, “Smart Video Surveillance System and Alert with Image Capturing using Android Smart Phones”, International Conference on Circuit Power and Computing Technologies, Nagercoil, pp. 1714-1722 India, 2014.
[2] Nikhil Singh, Praveen Kumar, Priya Akhoury, Rohit Kumar, M. Ramasubramanian, “Motion Detection Application Using Web Camera”, In Proceedings of the National Conference on Architecture, Software systems and Green computing (NCASG), India, pp.75-77, India,
[3] Akshada Deshmukh, Harshalata Wadaskar, Leena Zade, Neha Dhakate, Preetee Karmore, “Webcam Based Intelligent Surveillance System”, International Journal Of Engineering And Science Vol.2, Issue.8 , pp. 38-42, 2013.
[4] Michal Zablocki, Katarzyna Gosciewska, Dariusz Frejlichowski, Radoslaw Hofman, “Intelligent video surveillance systems for public spaces –a survey”, Journal of Theoretical and Applied Computer Science, Vol. 8, No. 4, pp. 13-27, 2014.
[5] Aswini. R, Nandhini. G, S.S.G. Krishnan, “Motion Detection Using Cauchy Distribution And Sending Image Over Android Smart Phone Using Gcm Alert”, International Journal Of Engineering And Computer Science, Vol.3, Issue.3 , pp. 5143-5147, 2014.
[6] S. Ramesh, Soundarya Hariharan, Shruti Arora, “Monitoring and Controlling of Bank Security System”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, Issue.10, 2012.
[7] Nishu Singla, “Motion Detection Based on Frame Difference Method”, International Journal of Information & Computation Technology, Vol.4, No.15, pp. 1559-1565, 2014.
[8] A.C. Saindane, P.S. Patil, “An Efficient Human Recognition Using Background Subtraction and Bounding Box Technique for Surveillance Systems” International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.72-77, 2016
Citation
N. Vijayan, MP. Thomas, LA. Abraham, E. Issac, S. Ubaid, "Intelligent Video Surveillance System for Banks," International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.101-104, 2017.
Provenance Based Assurance Model for Delay Tolerant Network
Research Paper | Journal Paper
Vol.5 , Issue.4 , pp.105-110, Apr-2017
Abstract
Use of End to End connectivity in todays network connectivity is not secure due to its delay and disconnection. This problem can be avoided by the Provenance-based Assurance model proposed in this paper. This model first assures that a node is trustworthy and to whom the data will be sent. It evaluates trust by the information added by the message carrier as indirect clue when message is forwarding. So the problem of disconnection and delay can reduce by this strategy. This model first splits the file into packets then these packets will be encrypted by using DES algorithm with the secret key which is given by sender. After this we will cluster the nodes and send the packets to receiver’s end. Receiver will receive the packets and decrypt it using the same secret key which sender use for encryption. After decrypting it, receiver will get the original file content. This proposed system ensures high level of security with low communicational cost and high performance.
Key-Words / Index Term
Delay Tolerant Network, End to End Connectivity, Provenance-based Assurance Model, Disconnection, DES Algorithm, Cluster
References
[1] Cho, Jin-Hee, Ray Chen, “PROVEST: Provenance-based Trust Model for Delay Tolerant Networks”, IEEE Transactions on Dependable and Secure Computing, Vol. PP, Issue.99, pp. 1-1, 2016.
[2] B. MALATHY , S.ROSY ROBILDA, “Secure and Reliable ESTAR with Alert Protocols for Heterogeneous Multihop Wireless Network”, International Conference on Emerging Engineering Trends and Science, Vol. 26, Issue.4, pp. 1140-1153, 2016.
[3] M.Arshiya Shajareen, S. Vasundra, "Trust and Security Management Protocol for Delay Tolerant Networks Using Information Centric Network Architecture (ICNA)”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.6-11, 2015.
[4] P. McDaniel, “Data provenance and security”, IEEE Security and Privacy, Vol. 9, Issue.2, pp. 83–85, 2011.
[5] Reinier-Jan DeLange, “Provenance Aware Sensor Networks for Real-time Data Analysis”, Master thesis from University of Twente, Netherlands pp.1-220, 2010.
[6] T. Spyropoulos, R. Rais, T. Turletti, K. Obraczka, A. Vasilakos, “Routing for disruption tolerant networks: taxonomy and design”, Wireless Networks, Vol. 16, No. 8, pp. 2349–2370, 2010.
[7] Aldeco-Pérez, Rocío, Luc Moreau. "Securing provenance-based audits”, In International Provenance and Annotation Workshop, Berlin Heidelberg, pp. 148-164, 2010.
[8] R. Hasan, R. Sion, M. Winslett, “The case of the fake picasso: preventing history forgery with secure provenance”, in Proceedings of the 7th Conference on File and Storage Technologies, Berkeley, pp. 1–14, 2009.
[9] L. Moreau, J. Freire, J. Futrelle, R. McGrath, J. Myers, P. Paulson, “The open provenance model: an overview”, in International Provenance and Annotation Workshop, Utah, pp. 323-326, 2008.
[10] Zhou, Runfang, Kai Hwang, “Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing”, IEEE Transactions on Parallel and Distributed Systems, Vol. 18, Issue. 4, pp. 460 - 473 2007.
[11] J. Golbeck, “Combining provenance with trust in social networks for semantic web content filtering”, Provenance and Annotation of Data, USA, pp. 101-108, 2006.
[12] Yeo, Jihwang, David Kotz, Tristan Henderson, “CRAWDAD: a Community Resource for Archiving Wireless Data at Dartmouth”, ACM SIGCOMM Computer Communication Review, Vol. 4, Issue.4, pp.12-14, 2005.
[13] A. Lindgren, O. Doria, “Probabilistic routing in intermittently connected networks”, ACM SIGMOBILE mobile computing and communications review, Vol.7, Issue.3, pp.19-20, 2003.
[14] Li. Xiong,, L. Liu, “Peertrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities”, IEEE transactions on Knowledge and Data Engineering, Vol. 16, Issue. 7, pp. 843-857, 2004.
[15] AA. Selcuk, Ersin Uzun, PM. Resat, “A Reputation-Based Trust Management System for P2P Networks”,. IEEE International Symposium on Cluster Computing and the Grid, USA, pp. 251-258. IEEE, 2004.
[16] J. Golbeck, JA. Hendler, “Reputation Network Analysis for Email Filtering”, Conference on Email and Anti-Spam (CEAS), USA, pp.1-14, 2004.
[17] R. Ismail, “The beta reputation system”, in Bled Electronic Commerce Conference, Slovenia, pp.1-14, 2002.
[18] P. Buneman, S. Khanna, W. Tan, “Why and where: A characterization of data provenance”, in Proceedings of International Conference on Database Theory, Springer-Verlag, pp. 316–330, 2001.
[19] O. Pourgalehdari, M. Salari, "A Review on Data Aggregation Protocols in Wireless Networks", International Journal of Computer Sciences and Engineering, Vol.5, Issue.3, pp.50-56, 2017.
Citation
K. Soni, Prabadevi. B, "Provenance Based Assurance Model for Delay Tolerant Network," International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.105-110, 2017.