An Image Encryption Using Chaos Algorithm Based on GLCM and PCA
Research Paper | Journal Paper
Vol.6 , Issue.3 , pp.76-81, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.7681
Abstract
The Image encryption is the technique which can hide the sensitive text data. In the past times, various techniques has been proposed for image encryption which are broadly into wavelet transformation and discrete transformation, In this research paper, novel technique has been proposed which is based on textual feature extraction, selection and encryption. The GLCM algorithm is applied for the textual feature analysis, PCA algorithm is used for feature selection and block wise encryption is applied to generate final stego image. The proposed algorithm is implemented in MATLAB and it has been analyzed that it performs well in terms of PSNR and MSE.
Key-Words / Index Term
Chaos algorithms, GLCM, PCA, stego image
References
[1] A Shamir, “How to Share a Secret”, 1979, Communications of the ACM, vol. 22, no. 11, pp. 612-613
[2] J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic maps”, 1998, Int J Bifurcat Chaos, vol. 8, no. 6, pp. 1259–1284
[3] Jiri Fridrich, “SYMMETRIC CIPHERS BASED ON TWO-DIMENSIONAL CHAOTIC MAPS”, 1998, International Journal of Bifurcation and Chaos, Vol. 8, No. 6, 1259-1284
[4] L. Kocarev, “Chaos-based cryptography: a brief overview”, 2001, IEEE Circ Syst Mag, vol. 1, no 3, pp.6–21
[5] G. Chen, Y. Mao and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps”, 2004, Chaos, Solitons & Fractals; vol. 21, pp. 749–761
[6] M. Naor and A. Shamir, “Visual Cryptography”, 2006, Advances in Cryptography-Eurocrypt, LNCS, vol. 950, pp. 1-12
[7] S. Mohammad, R. Farshchi and I. D. Ebrahimi, “A Novel Encryption Algorithm for Transmitting Secure Data based on Genetic Hyper Chaos Map”, 2011, Proc. of International Conference on Computer Communication and Management, Singapore, vol. 5, pp. 623-627
[8] D. Chattopadhyay, M. K. Mondal and D. Nandi, “Symmetric key chaotic image encryption using circle map”, 2011, Indian Journal of Science and Technology, vol. 4, no. 5, pp. 593-599
[9] Guoji Zhang, Qing Liu, “A novel image encryption method based on total shuffling scheme”, 2011, Optics Communications 284 2775–2780
[10] J. Mohamedmoideen Kader Mastan, G. A. Sathishkumar, K. Bhoopathy Bagan, “A Color Image Encryption Technique Based on a Substitution- Permutation Network”, 2011, Proc of First International Conference ACC Kochi, India, vol.193, no. 3, pp. 524-533
[11] S. V. Sathyanarayana, M. A. Kumar and K. N. Hari Bhat, “Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points”, 2011, International Journal of Network Security, vol.12, no.2, pp.166–179
[12] Y. Wu, J. P. Noonan and S. Agaian, “NPCR and UACI Randomness Tests for Image Encryption”, 2011, Cyber Journals: Multidisciplinary Journals in Science and Technology, April Ed. pp. 31-38
[13] Taneja, N., Raman, B., Gupta, I., “Selective image encryption in fractional wavelet domain”, 2011, Int. J. Electron. Commun., 65, pp. 338–344
[14] Rashmi P., Bharathi R.K., Shruthi Prabhakar, Reshma Banu, Rachana C.R., "Performance Analysis of Self Adaptive Image Encryption Technique", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.44-58, 2017.
[15] R. Afarin and S. Mozaffari, “Image encryption using genetic algorithm”, 2013, Proc. 8th Iranian Conference on Machine Vision and Image Processing
[16] L. Abraham and N. Daniel,”Secure Image Encryption Algorithms: A Review”, 2013, International Journal of Scientific & Technology Research Vol. 2, no. 4, pp. 186-189
[17] M. A. Mokhtar, S. N. Gobran and E. A. El-Badawy, “Colored Image Encryption Algorithm Using DNA Code and Chaos Theory”, 2014, International Conference on Computer and Communication Engineering (ICCCE), pp. 12-15
[18] S. Rohith, K. N. H. Bhat and A. N. Sharma, “Image encryption and decryption using chaotic key sequence generated by sequence of logistic map and sequence of states of Linear Feedback Shift Register”, 2014, International Conference on Advances in Electronics, Computers and Communications (ICAECC)
[19] S. Sowmya and S. V. Sathyanarayana, “Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points over GF(p)”, 2014, International Conference on Contemporary Computing and Informatics (IC3I)
[20] Guosheng Gu, Jie Ling, “A fast image encryption method by using chaotic 3D cat maps”, 2014 Elsevier GmbH. All rights reserved
[21] Venkata Krishna Pavan Kalubandi, Hemanth Vaddi, Vishnu Ramineni, Agilandeeswari Loganathan, “A Novel Image Encryption Algorithm using AES and Visual Cryptography”, 2016 2nd International Conference on Next Generation Computing Technologies (NGCT-2016)
[22] Abul Hasnat, Dibyendu Barman, Satyendra Nath Mandal, “A Novel Image Encryption Algorithm Using Pixel Shuffling and Pixel Intensity Reversal”, 2016, IEEE
[23] Xingyuan Wang, Chuanming Liu, Huili Zhang, “An effective and fast image encryption algorithm based on Chaos and interweaving of ranks”, 2016, Springer Science+Business Media Dordrecht
[24] Wiam Zamrani, Esmail Ahouzi, Angel Lizana, Juan Campus and Maria Josefa Yzuel, “Towards the Growth of Optical Security Systems for Image Encryption by Polarized Light”, 2016, IEEE
Citation
Jyotsna, Anubhooti Papola, "An Image Encryption Using Chaos Algorithm Based on GLCM and PCA," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.76-81, 2018.
Analysis of Communication on Social Media
Research Paper | Journal Paper
Vol.6 , Issue.3 , pp.82-85, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.8285
Abstract
Social media has found its place among all age groups. Nowadays, people find it easier to communicate using Social Media tool rather than talking directly to the other person. The time spent by individuals on social media is also a matter of concern. In our study we analyzed two major factors related to social media, one is the time spent by individual on social media and other one is sentiment analysis of communication. The study is conducted over two age groups over a period of one and half years. The result that youngsters are more involved in social media communication and the sentiment of communication is prominently negative.
Key-Words / Index Term
Sentiment analysis, whatsapp, behaviour pattern, social media, web 2.0
References
[1] Emma Haddia, Xiaohui Liua, Yong Shib, The Role of Text Pre-processing in Sentiment Analysis,Proceedia Computer Science, Vol 17, pp 26-32, 2013.
[2] M. Sakthivel, G. Hema, Sentiment Analysis Based Approaches for Understanding User Context in Web Content. International Journal of Computer Science and Mobile Computing, Vol 2, Issue 7, pp 231-239, 2013.
[3] Bouhnik, D., & Deshen, M., WhatsApp goes to school: Mobile instant messaging between teachers and students, Journal of Information Technology Education: Research, Vol 13,Issue1, 217-231, 2014.
[4] Richard ShambareTshwane , The adoption of WhatsApp: Breaking the vicious cycle of technological poverty in South Africa , Journal of Economics and Behavioral Studies, Vol. 9, No. 5,October 2017, pp. 6-17.
[5] Johnson Yeboah, George Dominic Ewur Johnson Yeboah, The Impact of Whatsapp Messenger Usage on Students Performance in Tertiary Institutions in Ghana, Journal of Education and Practice, Vol 5, Issue 6, pp 157-163, 2014.
[6] K.C.Khatib, T.D. Kamble, B.R. Chendake, G.N. Sonavane, Social Media Mining for Sentiment Analysis, International Research Journal of Engineering and Technologu, Vol 3, Issue 4, pp 373-376, 2016
[7] Shital S. Dabhade and Prof. Sonal S. Honale, International Journal of Advance Research in Computer Science and Management Studies, Volume 3, Issue 5, May 2015, pp. 123-129S.
[8] Siddhi Patni , Avinash Wadhe, Review Paper on Sentiment Analysis is Big Challemge, International Journal of Advance Research in Computer Science and Management Studies, Vol 02, Issue 2, pp 147-153, 2014.
Citation
N Narwal, "Analysis of Communication on Social Media," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.82-85, 2018.
Design of CPW-Fed Circularly-Polarized Antenna with Cross Tuning Stub for WLAN/ISM Band Applications
Research Paper | Journal Paper
Vol.6 , Issue.3 , pp.86-89, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.8689
Abstract
A CPW-fed circularly polarized cross tuning stub antenna is presented. Proposed antenna with cross tuning stub has successfully been designed for WLAN (2.4/5.2/5.8 GHz) and ISM (2.4/5.8GHz) bands for frequency range 2.40-2.48/5.15-5.35/5.725-5.82 GHz and 2.40-2.48/5.72-5.78 GHz respectively. The physical dimension of proposed antenna is 50mm (length) ×50mm (width)× 0.88mm(thickness) and printed on a FR-4 substrate(Ɛr = 4.4). The CPW feed is designed for 50 Ωimpedance. The proposed antenna has characterized by measuring the return loss of less than -10 dB, VSWR< 2 dB. The gain of proposed antenna from 3 dB to 5 dB is attained in the desired band with good radiation pattern characteristics and suitable axial ratio of less than 3 dB in prescribed band of operation. This antenna is designed by modifying the rectangular tuning stub to cross tuning stub. The antenna parameters like gain, return loss and bandwidth is improvised to acceptable limit with reasonable radiation pattern by using CST V.17 simulator.
Key-Words / Index Term
Circular Polarization (CP), Coplanar Waveguides (CPW), Wireless Local Area Network (WLAN), Industrial, Scientific and Medical(ISM), Voltage Standing Wave Ratio (VSWR), Axial Ratio (AR)
References
[1] Jen-Yea Jan, Chien-Yuan Pan, Kuo-Yung Chiu, and Hua-Ming Chen, “Broadband CPW-Fed Circularly-Polarized Slot Antenna,”IEEE Transaction on Antenna and propagation, Vol. 61, No. 3, pp. 1418-1422, March 2013
[2] B. T. P. Madhav, H. Khan, S. K.Kotamraju, “Circularly polarized slotted aperture antenna with coplanar waveguide fed for broadband applications,”Journal of Engineering Science and Technology Vol. 11, No. 2,pp. 267 -277, 2016
[3] Sandeep Kumar Singh, S. Mukhopadhyay, and R. L. Yadava, “Triple band U-capping slotted microstrip patch antenna using DGS for wireless applications,” International Journal of Microwaves Applications, Vol. 5, No.2, pp. 15 – 18, April 2016.
[4] S. Fu, S. Fang, Z. Wang, and X. Li, “Broadband circularly polarized slot antenna array fed by asymmetric CPW for L-band application,”IEEE Antennas Wireless Propag. Lett., vol. 8, pp. 1014–1016, 2009.
[5] J. Y. Sze, J. C. Wang, and C. C. Chang, “Axial-ratio bandwidth enhancement of asymmetric CPW-fed circularly-polarised square slot antenna,” Electron. Lett, vol. 44, no. 18, pp. 1048–1049, Aug. 2008.
[6] Sandeep Kumar Singh, S. Mukhopadhyay, and R. L. Yadava,, Rahul singh “Miniaturized Dual-Band CPW-Fed Broadband Slot Antenna with Cross Tuning Stub for Wireless Communication Application ,” International Journal of Microwaves Applications, Vol. 6, No.3, pp. 30 – 34, June 2017
[7] S. H. Yeung, K. F. Man, and W. S. Chan, “A bandwidth improved circular polarized slot antenna using a slot composed of multiple circular sectors,” IEEE Trans. Antennas Propag., Vol. 59, no. 8, pp. 3065–3070, Aug. 2011.
[8] J. Y. Sze, K. L. Wong, and C. C. Huang, “Coplanar waveguide-fed square slot antenna for broadband circularly polarized radiation,” IEEE Trans. Antennas Propag., Vol. 51, no. 8, pp. 2141–2144, Aug. 2003
[9] Q. X. Chu and S. Du, “A CPW-fed broadband circularly polarized square slot antenna,” Microw. Opt. Technol. Lett., vol. 52, no. 2, pp. 409–412, Feb. 2010.
[10] T. N. Chang, “Wideband circularly polarised antenna using two linked annular slots,” Electron. Lett., vol. 47, no. 13, pp. 737–739, Jun. 2011
[11] J. Pourahmadazar and S. Mohammadi, “Compact circularly-polarised slot antenna for UWB applications,” Electron. Lett., vol. 47, no. 15, pp. 837–838, Jul. 2011.
[12] J. Y. Jan and C. Y. Hsiang, “Wideband CPW-fed slot antenna for DCS, PCS, 3G and bluetooth bands,” IEE Electron. Lett., vol. 42, pp. 1377–1378, Nov. 2006.
Citation
Sandeep Kr Singh, Rajendra Singh, Himanshu Parashar, Vepakomma Kavya, "Design of CPW-Fed Circularly-Polarized Antenna with Cross Tuning Stub for WLAN/ISM Band Applications," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.86-89, 2018.
Evaluation of QoS Metrics in Ad-Hoc Wireless Sensor Networks using Zigbee
Research Paper | Journal Paper
Vol.6 , Issue.3 , pp.90-94, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.9094
Abstract
Ad-hoc wireless sensor Networks (AWSN) has become a worldwide thought for the investigators and researchers for last few years. Ad-hoc networks are acts as decentralized type networks therefore it is used for a large number of applications like sensing, computing and processing techniques. In this paper we have used Zigbee application to make wireless connection with other devices. However some issues are associated with usage of ZigBee based Ad-hoc Wireless Sensor Networks including reduction in lifetime of nodes and Quality of services. Sensor nodes works on battery power and it is limited for each node; hence Zigbee based data routing and transferring to the base station are very important. In this paper, design network model has been evaluated by using various parametric factors including average End to End Delay, Throughput, Jitter and Total Packets Received with the help of AODV and DSR Routing Protocols. Latest version of Qualnet simulator has been used in this paper for simulation.
Key-Words / Index Term
Dynamic Manet on Demand (DYMO), Quality of services (QOS), Route Request (RREQ), Route Reply (RREP) packet
References
[1]. M. Chandane, SG Bhirud, SV Bonde, “Performance Analysis of IEEE 802.15.4” International Journal of Computer Applications, Vol. 40, No.5, pp 23-29, 2012.
[2]. V Saxenal, D Rastogi, R Kumar, “Challenge in Route Discovery Process of Dynamically Arranged Multitier Protocol in Wireless Network” 5th International Conference on System Modeling & Advancement in Research Trends. , IEEE Conference ID: 39669, pp 183-185, 2016.
[3]. MK Singh, SN Thakur, “Comparison of DSDV, DSR and ZRP Routing Protocols in MANETs. International Journal of Computer Applications” ISSN 0975 – 8887, Volume 108 – No. 13, pp 10-12, 2014.
[4]. JJD Gifty JJD, K Sumathi, “ZigBee Wireless Sensor Network Simulation with Various Topologies” Online International Conference on Green Engineering and Technologies (IC-GET), 978-1-5090-4556-3/16/$31.00 ©2016 IEEE, 2016.
[5]. P. Charan, T. Usmani, R. Paulus, S.H. Saeed, “Performance Evaluation of AODV Protocol for Energy Consumption and QoS in IEEE 802.15.4 Based Wireless Sensor Network Using QualNet Simulator” Wireless Sensor Network, 8, http://dx.doi.org/10.4236/wsn.2016.88014, pp 166-175, 2016.
[6]. A. Narmada, P.S. Rao, “Comparison of Routing Protocols for Zigbee WPANs Performance” International journal of computer science issues (IJCSI), vol 8, ISSN: 1694-0814, pp. 394-402, 2011.
[7]. A. Goyal, S. Vijay, D.K. Jhariya, “Simulation and Performance Analysis of Routing Protocols in Wireless Sensor Network using Qualnet” International Journal of Computer Applications (0975 – 8887) vol 52-NO 2; pp. 47-50, 2011.
[8]. Ishita Chakraborty, Prodipto Das, "Data Fusion in Wireless Sensor Network-A Survey", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.6, pp.9-15, 2017.
[9]. G. Singh, S. K. Dhanda, “Performance Analysis of Security Schemes in Wireless Sensor Network” International Journal of Advanced Research in Computer and Communication Engineering, ISSN: 2278-1021, Vol. 2, No 8, pp. 3217-3223, 2013.
[10]. D. Verma, A. kaur, “Performance comparison of QoS based routing protocols MBRR, REAR and SPEED for wireless sensor networks” International Journal of Research in Engineering and Technology (IJRET), Volume: 02, Issue: 09, ISSN: 2319-1163, pp. 272-278, 2013.
[11]. S. K. Kurmi, N.K. Saluja, S. Patel, “Performance Analysis of Quality of Service Evaluation in IEEE 802.15.4 Wireless Sensor Networks” International Journal of Engineering Sciences & Research Technology, ISSN: 2277-9655, pp 3516-3522, 2013.
[12]. S. Vhatkar, J. Rana, M. Atique, “Performance Evaluation and QoS Analysis of EEPB and PDCH Routing Protocols in Wireless Sensor Networks” IOSR Journal of Computer Engineering (IOSR-JCE), e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. IV (Sep. – Oct. 2015), PP 101-109, 2015.
[13]. S. Muthuramalingam, V.V. Ananth, M.S. Kumar, “AN ENERGY-CONSERVING TOPOLOGY MAINTENANCE ALGORITHM IN MANETS” 3rd International Conference on Eco-friendly Computing and Communication Systems, 2014.
[14]. S.K. Guha, P.Y. Nabhiraj, T.K. Bhaumik, C. Mallik, “Design and implementation of an IEEE 802.15.4 / Zigbee based Star Network for data Acquisition and Monitoring. Proceedings of PCaPAC2012, Kolkata, India, ISBN 978-3-95450-124-3, pp 160-162 , 2012.
[15]. B. Fan, ”Analysis on the Security Architecture of ZigBee Based on IEEE 802.15.4” IEEE 13th International Symposium on Autonomous Decentralized Systems, DOI 10.1109/ISADS.2017.23, pp 241-246, 2017.
Citation
K. Mor, S. Kumar, "Evaluation of QoS Metrics in Ad-Hoc Wireless Sensor Networks using Zigbee," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.90-94, 2018.
A Review: Shape Based Image Retrieval
Review Paper | Journal Paper
Vol.6 , Issue.3 , pp.95-104, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.95104
Abstract
Most of the research advancements are motivated by market forces or changing customer demands. The demand for effective image retrieval system has been increasing due to massive expansion in volume of digital images on World Wide Web. The necessity to explore huge amount of online multimedia has become a prime reason for boosting development of efficient content based image retrieval algorithms. This paper mainly concentrates on low-level visual features of digital images especially shape features which have been able to reduce the semantic gap between human visual perception and retrieval system`s ability to extract distinct features from image for effective similarity matching. A comprehensive review of recent advancements in shape based image retrieval is presented here, considering different shape features employed by different content based image retrieval systems as focus of study. An outcome of this study is leveraged as a comparative analysis based various computational parameters. This can pose challenges for the researchers and gives directions for future enhancements.
Key-Words / Index Term
Content-based image retrieval, Review, Semantic gap, Shape features, Shape matching, Shape representation
References
[1]. www.techcrunch.com/2015/05/27/the-mary-meeker-internet-trends-2015-report
[2]. Datta, Ritendra, et al. "Image retrieval: Ideas, influences, and trends of the new age." ACM Computing Surveys (CSUR), 2008.
[3]. Kokare Manesh, B. N. Chatterji, and P. K. Biswas. "A survey on current content based image retrieval methods." IETE Journal of Research, 2002, pp 261-271.
[4]. Singhai, Nidhi, and Shishir K. Shandilya. "A survey on: content based image retrieval systems." International Journal of Computer Applications, 2010 pp: 22-26.
[5]. Zhang, Dengsheng, and Guojun Lu. "A comparative study on shape retrieval using Fourier descriptors with different shape signatures." Proc. International Conference on Intelligent Multimedia and Distance Education (ICIMADE01). 2001.
[6]. Zhang, Dengsheng, and Guojun Lu. "A comparative study of three region shape descriptors." DICTA. 2002.
[7]. Zhang, Dengsheng, and Guojun Lu. "Evaluation of MPEG-7 shape descriptors against other shape descriptors." Multimedia Systems,2003, pp:15-30.
[8]. Zhang, Dengsheng, and Guojun Lu. "Evaluation of similarity measurement for image retrieval." Neural Networks and Signal Processing, 2003. Proceedings of the 2003 International Conference on. Vol. 2. IEEE, 2003.
[9]. Zhang, Dengsheng, and Guojun Lu. "Review of shape representation and description techniques." Pattern recognition, 2004. pp: 1-19.
[10]. Shahabi, Cyrus, and Maytham Safar. "An experimental study of alternative shape-based image retrieval techniques." Multimedia Tools and Applications, 2007, pp: 29-48.
[11]. Amanatiadis, A., et al. "Evaluation of shape descriptors for shape-based image retrieval." Image Processing, IET 5.5 2011, pp: 493-499.
[12]. Selvarajah, S., and S. Kodituwakku. "Performance evaluation of shape analysis techniques." ARPN J Syst Softw 1 2010, pp: 12-18.
[13]. Yang, Mingqiang, Kidiyo Kpalma, and Joseph Ronsin. "A survey of shape feature extraction techniques." Pattern recognition, 2008, pp: 43-90.
[14]. Zhang, Gang, et al. "Shape feature extraction using Fourier descriptors with brightness in content-based medical image retrieval." Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP`08 International Conference on. IEEE, 2008.
[15]. Wu, Fengbo, et al. "Image retrieval using ellipse shape feature with particle swarm optimization" Multimedia Technology (ICMT), 2010 International Conference on. 2010.
[16]. Tiagrajah, V. J., and AAS Muhammad Razeen. "An enhanced shape descriptor based on radial distances." Signal and Image Processing Applications (ICSIPA), 2011 IEEE International Conference on. IEEE, 2011.
[17]. Eini, Sonya, Abdollah Chalechale, and Elham Akbari. "A new Fourier shape descriptor using smallest rectangle distance." Computer and Knowledge Engineering (ICCKE), 2012 2nd International eConference on. IEEE, 2012.
[18]. Eini, Sonya, and Abdolah Chalechale. "Four Side Distance: A New Fourier Shape Signature." arXiv preprint arXiv:1302.5894, 2013.
[19]. Zhang, Gang, et al. "Modified Fourier descriptor for shape feature extraction." Journal of Central South University, 2012, pp: 488-495.
[20]. Sokic, Emir, and Samim Konjicija. "Novel fourier descriptor based on complex coordinates shape signature." Content-Based Multimedia Indexing (CBMI), 2014 12th International Workshop on. IEEE, 2014.
[21]. Kunttu, Iivari, et al. "Multiscale Fourier descriptors for defect image retrieval."Pattern Recognition Letters , 2006, pp: 123-132.
[22]. Bartolini, Ilaria, Paolo Ciaccia, and Marco Patella. "Warp: Accurate retrieval of shapes using phase of fourier descriptors and time warping distance." Pattern Analysis and Machine Intelligence, IEEE Transactions on 2005, pp: 142-147.
[23]. Jian, Muwei, and Liang Xu. "Trademark image retrieval using wavelet-based shape features." Intelligent Information Technology Application Workshops, 2008. IITAW`08. International Symposium on. IEEE, 2008.
[24]. Ekombo, P. Lionel Evina, et al. "Application of affine invariant fourier descriptor to shape based image retrieval." International Journal of Computer Science and Network Security, 2009, pp: 240-247.
[25]. Shu, Xin, and Xiao-Jun Wu. "A novel contour descriptor for 2D shape matching and its application to image retrieval." Image and vision Computing, 2011, pp: 286-294.
[26]. Zeng, Jie-xian, Yong-gang Zhao, and Xiang Fu. "A Novel Shape Representation and Retrieval Algorithm: Distance Autocorrelogram." Journal of Software, 2010, pp: 1022-1029.
[27]. Zhang, C., and V. Prinet. "Shape Matching Using the Included Angle Histogram of Vectors." Pattern Recognition (CCPR), 2010 Chinese Conference on. IEEE, 2010.
[28]. Zhou, Li, and Xinhua Jiang. "Shape signature based on Homotopic deformation." Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on. Vol. 1. IEEE, 2010.
[29]. Pedrosa, Glauco Vitor, C. Barcelos, and Marcos Aurélio Batista. "An image retrieval system using shape salience points." Circuits and Systems (ISCAS), 2011 IEEE International Symposium on. IEEE, 2011.
[30]. Zhang, Tiejun, et al. "Local Invariant Shape Feature for Cartoon Image Retrieval." Robot, Vision and Signal Processing (RVSP), 2013 Second International Conference on. IEEE, 2013.
[31]. Alajlan, Naif, et al. "Shape retrieval using triangle-area representation and dynamic space warping." Pattern Recognition, 2007, pp: 1911-1920.
[32]. El Rube, Ibrahim, et al. "Efficient multiscale shape-based representation and retrieval." Image Analysis and Recognition. Springer Berlin Heidelberg, 2005, pp: 415-422.
[33]. Sajjanhar, Atul, Guojun Lu, and Dengsheng Zhang. "Angular Histograms for Shape Retrieval." Computers and Their Applications. 2004.
[34]. Chalechale, Abdolah, Alfred Mertins, and G. Naghdy. "Edge image description using angular radial partitioning." IEE Proceedings-Vision, Image and Signal Processing, 2004, pp: 93-101.
[35]. Torres, R. da S., and Alexandre X. Falcao. "Contour salience descriptors for effective image retrieval and analysis." Image and Vision Computing, 2007, pp: 3-13.
[36]. Amanatiadis, A., et al. "A comparative study of invariant descriptors for shape retrieval." Imaging Systems and Techniques, 2009. IST`09. IEEE International Workshop on. IEEE, 2009.
[37]. Zhang, Dengsheng, and Guojun Lu. "Shape-based image retrieval using generic Fourier descriptor." Signal Processing: Image Communication, 2002, pp: 825-848.
[38]. Li, Shan, Moon-Chuen Lee, and Chi-Man Pun. "Complex Zernike moments features for shape-based image retrieval." Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on 2009, pp: 227-237.
[39]. Rao, Ch, S. Srinivas Kumar, and B. Chandra Mohan. "Content based image retrieval using exact legendre moments and support vector machine." arXiv preprint arXiv, 2010.
[40]. Hosny, Khalid M. "Exact Legendre moment computation for gray level images."Pattern Recognition, 2007, pp: 3597-3605.
[41]. Belloulata, Kamel, et al. "Region based image retrieval using Shape-Adaptive DCT." Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on. IEEE, 2014.
[42]. Zhang, Dengsheng, and Melissa Chen Yi Lim. "An efficient and robust technique for region based shape representation and retrieval." Computer and Information Science, 2007. ICIS 2007. 6th IEEE/ACIS International Conference on. IEEE, 2007.
[43]. Sajjanhar, Atul, Guojun Lu, and Dengsheng Zhang. "Spherical harmonics descriptor for 2D-image retrieval." Multimedia and Expo, 2005. ICME 2005. IEEE International Conference on. IEEE, 2005.
[44]. Wu, Yanyan, and Yiquan Wu. "Shape-based image retrieval using combining global and local shape features." Image and Signal Processing, 2009. CISP`09. 2nd International Congress on. IEEE, 2009.
[45]. Wei, Chia-Hung, et al. "Trademark image retrieval using synthetic features for describing global shape and interior structure." Pattern Recognition , 2009, pp: 386-394.
[46]. Do, Yen, et al. "Image retrieval using wavelet transform and shape decomposition." Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication. ACM, 2013.
[47]. Ahmad, Jamil, Zahoor Jan, and Shoaib Muhammad Khan. "A fusion of labeled-grid shape descriptors with weighted ranking algorithm for shapes recognition.", 2014.
[48]. Sajjanhar, Atul, et al. "A composite descriptor for shape retrieval." Computer and Information Science, 2007. ICIS 2007. 6th IEEE/ACIS International Conference on. IEEE, 2007.
[49]. Zhang, Dengsheng, and Guojun Lu. "A comparative study of curvature scale space and Fourier descriptors for shape-based image retrieval." Journal of Visual Communication and Image Representation 2003, pp: 39-57.
[50]. Mohd. Aquib Ansari, Diksha Kurchaniya, Manish Dixit, Punit Kumar Johari, “An Effective Approach to an Image Retrieval using SVM Classifier”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.62-72, 2017.
Citation
G.G. Chiddarwar, S.PhaniKumar, "A Review: Shape Based Image Retrieval," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.95-104, 2018.
Efficient VM Allocation to Enhance Performance in Virtualized Cloud Environment
Research Paper | Journal Paper
Vol.6 , Issue.3 , pp.105-110, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.105110
Abstract
Cloud computing being one of the most progressive fields in computer science, there is a constant need of bringing about changes and advancements in the issues affecting the cloud computing applications. Such issues affecting the cloud computing applications include energy efficiency, improper utilization of resources, security and many more. so still found research gap in current technology like time, load distribution, balancing etc. So using proposed model Our work focuses on real time data cloud balancing, speed and data distribution etc. and also consider the enhancing the performance parameter of cloud computing applications. These barriers concern various levels such as virtualization, performance modeling, deployment, and monitoring of applications on virtualized IT resources. Finally, we analyze the effect of load balancing frequency, problem size, and computational granularity on the performance and scalability of our techniques.
Key-Words / Index Term
Cloud computing, Performance, Virtualization Component
References
[1]Gupta, Abhishek, et al. "Improving hpc application performance in cloud through dynamic load balancing." Cluster, Cloud and Grid Computing (CCGrid), 2013 13th IEEE/ACM International Symposium on. IEEE, 2013..
[2]El Kafhali, Said, and Khaled Salah. "Performance analysis of multi-core VMs hosting cloud SaaS applications." Computer Standards & Interfaces 55 (2018): 126-135.
[3]Frey, Stefan, C. Reich, and C. Lüthje. "Key performance indicators for cloud computing SLAs." The Fifth International Conference on Emerging Network Intelligence, EMERGING. 2013.
[4]Calheiros, Rodrigo N., Rajiv Ranjan, and RajkumarBuyya. "Virtual machine provisioning based on analytical performance and QoS in cloud computing environments." Parallel processing (ICPP), 2011 international conference on. IEEE, 2011.
[5] Anand, Ankit, J. Lakshmi, and S. K. Nandy. "Virtual machine placement optimization supporting performance SLAs." Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on. Vol. 1. IEEE, 2013.
[6] B.Magensh Kumar “Vibrant resource allocation algorithem using virtual machine in cloud survey “2013.
[7] Anitha H M, P. Jayarekha , "Security Challenges of Virtualization in Cloud Environment", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.1, pp.37-43, 2018
Citation
P.D. Pariyani,H.B. Patel, B. Shrimali, "Efficient VM Allocation to Enhance Performance in Virtualized Cloud Environment," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.105-110, 2018.
A Simulation based study on Network Architecture Using Inter-VLAN Routing and Secure Campus Area Network (CAN)
Research Paper | Journal Paper
Vol.6 , Issue.3 , pp.111-121, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.111121
Abstract
Today development of computer and information technology, computer and network have been very popular. At the same time, security is important to secure the data, especially in campus environment. A campus network faces, many challenges such as IP address allocation, network failure, detecting rogue system user and determining slowing network etc., This research is mainly targeted towards campus networks which deliver the required security and best performance. To reduce the maximum wastage of IP address space using VLSM technique. A network is divided into different subnets. This technique will improve the security and traffic isolation. To improve the network speed on campus area network using etherchannel technique. This technique increases the network speed and redundant path between two devices. To multiple smaller broadcast domain using VLAN. To Communicate different VLAN using Inter-VLAN technique. This technique is implemented using multilayer switch. To secure and control a network traffic using VLAN Access Control List (VACL). Secured network protects an institution from security attacks associated with network. A campus network has a number of uses, such as education, research, learning, supervision, e-library, result publishing and association with the external users. Network security prevents the campus network from different types of threats and attack. The system can efficiently control and handle the reliable operation of the campus network.
Key-Words / Index Term
Etherchannel, VLSM, VLAN , Inter-VLAN, VACL
References
[1] Cisco Networking Academy “CCNA 3 and 4 Companion Guide”, Pearson Education,2003
[2] W. A. Arbaugh, J. R. Davin, “Security for virtual private intranets,” Computer, vol. 31 (9), pp. 48-55, 1998.
[3] P. Vicrt-Blanc-Primet, J. Zeng, “Traffic isolation and network resource sharing for performance control in grids,” utonomic and Autonomous Systems and International Conference on Networking and Services, 2005.
[4] L. S. Putledge, L. J. Hoffman, “A survey of issues in computer network security,” Computers and Security, vol. 5 (4), pp. 296-308, 1986.
[5] G. Rapp, “Survey of the computer and network security issues from evalutation criteria to open systems,” Proceedings of the Conference on the Challenge of Networking: Connecting Equipment, Humans, Instituitions, 1993.
[6] R. Venkatesmaran, “Virtual private networks,” IEEE Potetials, vol. 20, pp. 11-15, 2001.
[7] M. A. Ruiz-Sanchez, E. W. Biersack, W. Dabbous, “Survey and taxonomy of IP address lookup algorithms,” IEEE Network, vol 15 (2), pp. 8-23, 2001
[8] V. Grout, “Towards an optimal routing strategy,” Proceedings of IADIS WWW/Internet, 2003.
[9] C. L. Hedrick, “RFC1058: Routing information protocol,” Internet RFCs,1988.
[10] “InterVLAN Routing – Routing between VLAN Networks” Available:http://www.firewall.cx/networking- topics/vlan-networks/222-intervlan-routing.html.
[11] Milan Yu and Jennifer Rexford, Princeton University,Xin Sun and Sanjay Rao, Purdue University, Nick Feamster, Georgia institute of Technology. “A survey of Virtual LAN Usage in Campus Networks” IEEE Paper in IEEE Communications Magazine July, Volume: 49, Issue: 7 pp. 98-103
[12] K. Okayama , “A Method of Dynamic Interconnection of VLANs for Large Scale VLAN Environment”, IEEE, ISBN: 4-88552-216-1, page.427 - 432
[13] Cisco Press,”CCNA Exploration Course Booklet: LAN Switching and Wireless, Version 4.0” Cisco networking Academy.
[14] Allan Johnson, “LAN Switching and Wireless: CCNA Exploration Labs and Study Guide” Cisco Press,ISBN: 1587132028,2008.
[15] Somasundaram.S , Chandran.M. "Discovery of Geo-Locations by Tracing IP Address Using VLSM Technique". International Journal of P2P Network Trends and Technology (IJPTT)”.V11:1-4 Sep 2014. ISSN: 2249-2615. www.ijpttjournal.org. Published by Seventh Sense Research Group.
[16] Somasundaram.S, Chandran.M. "A Simulation Based Study on Inter-VLAN Routing" International Journal of Computer Sciences and Engineering (JCSE)”. Volume 4 Issue 7, Page 24 -29, July 2016. ISSN: 2347-2693
[17] Cisco, “Configure InterVLAN Routing on Layer 3 Switches”, 2016, [Online]. Available:http://www.cisco.com /c/en/us/support/docs/lan-switching/inter-vlan-routing/ 41860 -howto-L3-intervlanrouting.pdf
[18] Cisco,” Configuring InterVLAN Routing with Catalyst 3750/3560/3550 Series Switches“, 2014 [Online]. Available: http://www.cisco.com/c/en/us/ support/docs/lan-switching/inter-vlan-routing/41260-189.pdf
[19] Rajiv O. Verma, S.S. Shriramwar “Effective VTP Model for Enterprise VLAN Security” 2013 International Conference on Communication Systems and Network Technologies
[20] Cisco, “Understanding vlan trunk protocol (vtp),” 2007. [Online].Available:http://www.cisco.com/application/pdf /paws /10558/21.pdf
[21] Cisco, “Troubleshooting vlan trunk protocol (vtp),” 2007.[Online].Available:http://www.cisco.com/application/pdf/paws/98155/tshoot-vlan.pdf
[22] Sharada Ramani and R. M. Goudar,”Improved Bandwidth Aggregation using Available Lower Bandwidth Links”, International Journal of Computer Sciences and Engineering, Volume-4, Issue-6, ISSN: 2347-2693, 2016
[23] Rajiv O. Verma, "Effective Remote Management for Inter-VLAN Routing Networks" International Journal of Application or Innovation in Engineering & Management (IJAIEM), ISSN 2319 - 4847,2013.
[24] LI Xingyu, Jiang Tingting, "Design and implementation of the Campus Network Monitoring System" IEEE Workshop on Electronics, Computer and Applications, 2014.
[25] M.R. Sabir , M.S. Mian , K. Sattar and M.A. Fahiem, "IP Address Space Management using Aggregated Fixed Length Subnet Masking", IEEE Network.
[26] “Cisco Packet Tracer 6.0.1 Tool” Cisco Networking Academy
Citation
S. Somasundaram, M. Chandran, "A Simulation based study on Network Architecture Using Inter-VLAN Routing and Secure Campus Area Network (CAN)," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.111-121, 2018.
Comparison of various Activation Functions: A Deep Learning Approach
Research Paper | Journal Paper
Vol.6 , Issue.3 , pp.122-126, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.122126
Abstract
A branch of machine learning that attempts to model high-level abstractions in data through algorithms by the use of multiple processing layers with complex structures and nonlinear transformations is known as Deep Learning. In this paper, we present the results of testing neural networks architectures through tensorflow for various activation functions of machine learning algorithms. It was demonstrated on MNIST database of handwritten digits in single-threaded mode that blind selection of these parameters can hugely increase the runtime without the significant increase of precision. Here, we try out different activation functions in a Convolutional Neural Network on the MNIST database and provide as results the change in loss values during training and the final prediction accuracy for all of the functions used. These results create an impactful analysis for optimization and training loss reduction strategy in image recognition problems and provide useful conclusions regarding the use of these activation functions.
Key-Words / Index Term
CNN (Convolution Neural Network), activation functions and MNIST(Modified National Institute of Standards and Technology) dataset
References
[1] Srinivas Jagirdar, K. Venkata Subba Reddy, Dr. Ahmed Abdul Moiz Qyser, “Cloud Powered Deep Learning-Emerging Trends”, International Journal of Computer Sciences and Engineering (IJCSE), Vol-4, Issue-6, 2016
[2] N. Gordienko, S. Stirenko, Yu. Kochura, O. Alienin, M. Novotarskiy, Yu. Gordienko, A. Rojbi (2017), “Deep Learning for Fatigue Estimation on the Basis of Multimodal Human-Machine Interactions”, XXIX IUPAP Conference on Computational Physics (CCP2017) (Paris, France).
[3] S. Hamotskyi, A. Rojbi, S. Stirenko, and Yu. Gordienk(2017), “Automatize Generation of Alphabets of Symbols for Multimodal HumanComputer Interfaces”, Proc. of Federated Conference on Computer Science and Information Systems, Prague (FedCSIS-2017) (Prague,Czech Republic).
[4] Zhang, Cha and Ma, Yunqian. “EnsembleMachine Learning” volume 1. Springer, 2012.
[5] Zhou, Zhi-Hua, Wu, Jianxin, and Tang,Wei. “Ensembling neural networks: many could be better than all.” Artificial Intelligence, 137(1-2):239–263, 2002.
[6] Srivastava, Rupesh K, Greff, Klaus, and Schmidhuber, J¨urgen. “Training very deep networks”. In Advances in Neural Information Processing Systems, pp. 2377–2385, 2015.
[7] Gulcehre, Caglar, Moczulski, Marcin, Denil, Misha, and Bengio, Yoshua. “Noisy activation functions”. In International Conference on Machine Learning, pp. 3059–3068,2016a.
Citation
Mohammed Ibrahim Khan, Akansha Singh, Anand Handa, "Comparison of various Activation Functions: A Deep Learning Approach," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.122-126, 2018.
Solving idioms with the help of emoji’s based captcha for security system
Research Paper | Journal Paper
Vol.6 , Issue.3 , pp.127-132, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.127132
Abstract
CAPTCHA methods used to separate amongst humans and bots programs. Captcha ask the user to play some task which is simple for humans to complete but troublesome for bots to finish. In this way Captcha go about as a defensive plan to avoid bots, in accessing the touchy data of sites and mishandle their online services. Bots behavior like humans and perform malicious action such as gathering e-mail addresses for spamming, blocking bulk number of tickets for an event. Use of existing chaptach technique annoyance for the users. CAPTCHA system should user friendly or enjoyable for users. In this paper we focused on the human power of understanding the humar or fun. Proposed the new CAPTCHA method that is emoji’s based CAPTCHA for identifying idioms. This new method is enjoyable or having fun for users as well as Emoji’s based Captcha is a technique to provide enhanced security for the web applications.
Key-Words / Index Term
CAPTCHA,Entertainment , Emoji’s, Idioms, Humer
References
[1] S. Murugavalli, S.A.K. Jainulabudeen, S.Kumar, Anuradha, “Enhancing Security Against Hard AI Problems in User Authentication Using Captcha as Graphical Passwords”, Journal of Global Research in Computer Science, Vol. 7, No. 5, 2016.
[2] M. Alsaleh, M. Mannan, and P. C. van Oorschot,“Revisiting defenses against large-scale online password guessing attacks,” IEEE Trans. Dependable Secure Comput., vol. 9, no. 1, pp. 128–141, 2012.
[3] M. Chaturvedi, A. Taneja,” Advanced Gaming CAPTCHA for Better Security Concern”, International Journal of Computer Sciences and Engineering, Vol. 6, Issue 1, 2018.
[4] J. Kani, M. Nishigaki,” Gamified CAPTCHA” Springer-Verlag Berlin Heidelberg adfa, pp. 1, 2011.
[5] V.P. Singh et al, “Survey of Different Types of CAPTCHA”, International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014.
[6] K.V. Reddy, D.S.R. Krishna, D.C.J. Reddy, “Captcha and Its Techniques for Providing Security in Web and Applications”, International Journal of Research, Vol. 2, Issue 8, 2015.
[7] H.A. Dandapat, A.S.Chandel, G.S. Tandelh, ”CAPTCHA- to Enhance the Security in WWW”, International Journal of Latest Trends in Engineering and Technology Vol. 5, Issue 1, 2015.
[8] T. Yamamoto, T. Suzuki, M. Nishigaki, “A Proposal of Four-panel cartoon CAPTCHA: The Concept”, In 2010 IEEE 13th International Conference on Network-Based Information Systems, 2010.
[9] K. Chellapilla, K. Larson, P. Y. Simard, M. Czerwinski,“Computers beat Humans at Single Character Recognition in Readingbased Human Interaction Proofs (HIPs)”, In Proceedings of the 2005 2ndConference on Email and Anti-Spam, 2005.
[10] J. Yan, A. S. E. Ahmad, “Breaking Visual CAPTCHAs with NaïvePattern Recognition Algorithms,” In Proceedings of the 2007 Computer Security Applications Conference, pp.279–291, 2007.
[11] J. Elson, J. R. Douceur, J. Howell and J. Saul, “Asirra: a CAPTCHA thatexploits interest-aligned manual image categorization”, In Proceedingsof the 2007 ACM CSS, pp.366–374, 2007.
[12] E. Bursztein,M. Martin, J. Mitchell,” Text-based CAPTCHA strengths and weaknesses”, In the Proceedings of the 18th ACM conference on computer and communications security, Chicago, Illinois, USA ,pp. 125-138, 2011.
[13] M.H. Shirali-Shahreza, M. Shirali-Shahreza,“Multilingual CAPTCHA”, In proceedings of the 2007 ICCC 2007 IEEE International Conference on Computational Cybernetics (ICCC 2007) Gammarth, Tunisiali, pp 136, 2007.
[14] A. Rusu, V. Govindaraju, “Handwritten CAPTCHA: using the difference in the abilities of humans and machines in reading handwritten words”, in Proceedings of the 9th Int’l Workshop onFrontiers in Handwriting Recognition, 2004.
[15] M. Shirali-Shahreza, S. Shirali-Shahreza, “Dynamic CAPTCHA”, In Proceedings of the 2008 International Symposium on Communicationsand Information Technologies (ISCIT 2008), Vientiane, Lao, pp. 436-440, 2008.
[16] W.B. Lee, C.W. Fan, K. Ho, C.R. Dow, "A CAPTCHA with Tips Related to Alphabets Upper or Lower Case", In Seventh International Conference on Broadband,Communication, Wireless Computing and Applications, 2012.
[17] S.Thangavelu, T.Purusothaman, G.Gowrison,” Emoji Captcha: A secured Picture Character approach against OCR Attacks”, International Journal of Computer Science and Information Technology & Security, Vol.7, Issue1, 2017.
Citation
Parul Jadon, Darpan Anand, Jayash Sharma, "Solving idioms with the help of emoji’s based captcha for security system," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.127-132, 2018.
Camera Mouse -An Application for Disable Person
Research Paper | Journal Paper
Vol.6 , Issue.3 , pp.133-137, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.133137
Abstract
In this paper, we present a face recognition based human-computer interaction (HCI) system using a single video camera for Disable person to control mouse position, Different from the conventional communication methods between users and machines. We combine head pose, to control the position of mouse. We can identify the position of the eyes and mouth, and use the facial centre to estimate the pose of the head. We have used to two know algorithms; The First one is based on the computation of a set of geometrical features such as nose width and length, mouth position, chin shape & the second one is based on almost-grey-level template matching using Haar Classifier algorithms available in EmguCV open Source .NET wrapper in C# Technology.
Key-Words / Index Term
Face recognition, Image processing, template matching, EmguCV, Haar Cascade
References
[1] Roberto Brunelli and Thomason Poggio. “Face Recognition:Features versus Templates”,IEEE Transactions on Pattern Analysis and Machine Intelligence,Vol.15,No.10,Ocstober 1993.
[2] Saad Ahmed Sirohey, “Humen Face Segmentation and Identification”,Computer Vision Laboratory Center For Automation Research University of Maryland College Park,MD 20742-3275,November 1993.
[3] Henry A. Rowley, Shumeet Baluja and Takeo Kanade,“Rotation Invariant Neural Network-Based Face Detection”,IEEE Conference on Computer Vision and Pattern Recognition,pp. 38-44, 1998.
[4] Hojoon park, “A Method for Controlling Mouse Movement using a Real-Time Camera”, Department of Computer Science, Brow University,Providence , RI, USA,hojoo@cs.brown.edu, January 2008.
[5] Qing Chen,Nicolas D. Georganas, “Hand Gesture Recognition Using Haar-Like Features and a Stochastic Context-Free Grammar”,Fellow,IEEE, and Emil M. Petriu,Fellow,IEEE,August 2008.
[6] Archana S.Ghotkar and Gajanan K. Kharate, “Hand Segmentation Techniques to Hand Gesture Recognition for Natural Human Computer Interaction”,Department of Computer Engineering pune Institude of Computer Technology University of pune,pune 411 043,India, May 2013.
[7] Takeshi Mita Toshimitsu Kaneko Osamu Hori “Joint Haar-like Features for Face Detection” Multimedia Laboratory, Corporate Research & Development Center, Toshiba Corporation 1 Komukai Toshiba-cho,Saiwai-ku,Kawasaki-shi, Kanagawa 212-8582, Japan.
[8] K. K. Sung and T. Poggio. Example-based learning for view-based human face detection. IEEE Trans. on PAMI, 20(1):39–51, 1998.
[9] H. A. Rowley, S. Baluja, and T. Kanade. Neural networkbased face detection. IEEE Trans. on PAMI, 20(1):23–38, 1998..
[10] E. Osuna, R. Freund, and F. Girosi. Training support vector machines: an application to face detection. Proc. of CVPR, pages 130–136, 1997.
[11] B. Heisele, T. Poggio, and M. Pontil. Face detection in still gray images. A.I. Memo, (1687), 2000.
[12] C. P. Papageorgiou, M. Oren, and T. Poggio. A general framework for object detection. Proc. of ICCV, pages 555– 562, 1998.
[13] Devendra Singh , Dheeraj Agrawal .“Human Face Detection by using Skin Color Segmentation, Face Features and Regions Properties” International Journal of Computer Applications (0975 – 8887) Volume 38– No.9, January 2012 .
Citation
P.C. Anjankar, S.A. Waigaonkar, P.D. Patle, J.D. Patil, "Camera Mouse -An Application for Disable Person," International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.133-137, 2018.