A Study on Segmentation of Moving Objects Under Dynamic Conditions
Review Paper | Journal Paper
Vol.4 , Issue.6 , pp.173-179, Jun-2016
Abstract
One of the challenging factor in computer vision is Moving Object Detection under Dynamic condition, dynamic condition involves changes in the background like illumination changes, shadows, slowly moving background and the object, occlusion, noise in the video or image, motion of the camera. In order to overcome the problems of dynamic back ground, and detect the moving object correctly many algorithms have been proposed in the literature survey. In this paper an attempt has been made to study two algorithms for segmenting the moving objects from a video. Firstly the color and motion cues based segmentation is performed. In this method frames are extracted from the video and the motion information is considered and the color information is extracted using the color histogram method. The color and the motion information is combined using Markov Random Field (MRF) to segment the object from the back ground. The second algorithm is based on Spatio-Temporal method of segmentation. In this method spatial and temporal information of the frames are extracted separately. These features are combined to form Information Saliency Map(ISM) and from ISM the foreground is segmented from the back ground. The comparative study is performed on both the algorithms for segmentation. Analysis is performed on these methods and a little variation is found.
Key-Words / Index Term
Image Processing, Segmentation, Histogram, Moving Object Detection, Markov Random Field Information Saliency Map
References
[1] Aurelie Bugeau Patrick Perez, “Detection and segmentation of moving objects in highly dynamic scenes”, Proc IEEE conference on Computer Vision and pattern recognition, pp.1-8,2007.
[2] Andrea Cavallaro and Touradj Ebrahimi , “Accurate Video Object Segmentation Through Change Detection”, Proc. Int. Conf .Signal Processing Institute, vol. 1, pp.445-448, 2002.
[3] Yaakov Tsaig and Amir Averbuch,“Automatic Segmentation of Moving Objects in Video Sequences: A Region Labeling Approach” IEEE Transactions On Circuits And Systems For Video Technology, Vol. 12, No. 7, July 2002.
[4] Rita Cucchiara, Costantino Grana, Massimo Piccardi, and Andrea Prati,“Detecting Moving Objects, Ghosts, and Shadows in Video Streams”IEEE Transactions On Pattern Analysis And Machine Intelligence,Vol. 25, No. 10, pp. 234-245,October 2003.
[5] Gagandeep Kaur“Detection of Moving Objects in Colour based and Graph’s axis Change method” International Journal of Computing & Business Research, pp. 56-65, 2012.
[6] Chang Liua, PongC.Yuena,GuopingQiu, “Object motion detection using information theoretic spatio-temporal saliency ”, published in Elsevier journal, pp.2897-2906 February 2009.
[7] Tao Yang , Stan Z.Li , Quan Pan, Jing Li “Real-Time and Accurate Segmentation of Moving Objects in Dynamic Scene”, published in ACM transactions.
[8] R.Cucchiara, C.Grana, M.Piccardi, A.Prati, “Statistic and Knowledge-based Moving Object Detection in Traffic Scenes”, IEEE Transactions on Intelligent transportation systems, pp. 27-32,2000.
[9] Vijay Mahadevan and Nuno Vasconcelos “Unsupervised Moving Target Detection In Dynamic Scenes”published in the prodeedings of army science conference, pp. 56-65, December 2008.
[10] Bohyung Han, Larry S. Davis, Fellow, “Density-Based Multi-Feature Background Subtraction with Support Vector Machine” IEEE Transactions On Pattern Analysis And Machine Intelligence Vol. 34, No.5, pp.1017-1023, May 2012.
[11] Feng Liu and Michael Gleicher, “Learning color and locality cues for moving object detection and segmentation”. IEEE conference on computer vision and pattern recognition, pp. 320-327,2009.
[12] Amit K Agrawal and Rama Chellappa “Moving object segmentation and dynamic scene reconstruction using two frames”, published in IEEE Transactions on Pattern analysis and Machine Intelligence, Vol. 25, No.7,pp. 918-923, june 2003 .
[13] Yuanlu Xu, Liang Lin “Moving object segmentation by pursuing local spatio-temporal manifolds” IEEE conference on computer vision and pattern recognition, pp. 220-227,April 17, 2013
[14] Ivan Laptev, Serge J. Belongie, Patrick P´erez and Josh Wills, “Periodic Motion Detection and Segmentation via Approximate Sequence Alignment” published in 10th IEEE International Conference on computer vision, Vol. , pp.816-823, 2005.
[15] Jinglan Li,“Moving Objects Segmentation Based on Histogram for Video Surveillance”, published in Modern Applied Science Vol. 3, No. 11, November, 2009.
[16] Tianzhu Zhang, Si Liu, ChangshengXu , Hanqing Lu “Mining Semantic Context Information for Intelligent Video Surveillance of Traffic Scenes” IEEE Transactions On Industrial Informatics, Vol. 9, No. 1, pp. 149-160,February 2013.
[17] O. Javed, K. Shafique, and M. Shah, “Automated visual surveillance in realistic scenarios,” IEEE Multimedia, vol. 14, no. 1, pp. 30–39, Jan.–Mar. 2007.
[18] R. T. Collins, A. J. Lipton, and T. Kanade, “Introduction to the special section on video surveillance,” IEEE Trans. Pattern Anal. Mach.Intell., vol. 22, no. 8, pp. 745–746, Aug. 2000.
[19] T. Cucinotta, L. Palopoli, L. Abeni, D. Faggioli, and G. Lipari, “On the integration of application level and resource level qos control for real time applications,” IEEE Trans. Ind. Inf., vol. 57, no. 4, pp. 479–491,Nov. 2010.
[20] E. Camponogara, A. de Oliveira, and G. Lima, “Optimization-based dynamic reconfiguration of real-time schedulers with support for stochastic processor consumption,” IEEE Trans. Ind. Inf., vol. 57, no. 4,pp. 594–609, Nov. 2010.
Citation
Kala Chandrashekhar L, Manasa B S, "A Study on Segmentation of Moving Objects Under Dynamic Conditions," International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.173-179, 2016.
Analysis of Classification Technique Algorithms in Data mining- A Review
Review Paper | Journal Paper
Vol.4 , Issue.6 , pp.180-185, Jun-2016
Abstract
Data mining is the one of the most important research area in the field of Computer Science. By using Data mining techniques we can extract the hidden patterns from large amount of data. The Data mining is the process of categorizing valid, novel, potentially useful and understandable patterns in data. Data mining plays a major role in several application areas like business organizations, Educational institutions, Government sectors, Health care industry, scientific and Engineering. In Data mining techniques classification is one of the most important techniques. The classification technique has several algorithms like ID3,C4.5,Navie Bayes etc. In this paper we analyze the different data mining algorithms. By using these algorithms we can classify our data. Classification is used in every field of real life. The data mining classification technique is used to classify each item in a set of data into one of predefined set of classes or groups. The classification technique is used to predict group membership for data instances. In this Data mining the classification technique include several techniques such as Decision tree, Bayesian classification, Classification by Back propagation, Association Rue mining.
Key-Words / Index Term
Data mining, Classification, Decision tree, ID3,C4.5, Bayesian classification, Naive Bayes classification
References
[1] Jiawei Han, Macheline Kamber. "Datamining concepts an Techniques"- Elsevier Publisher-2001,ISBN:978-1-55860-489-6
[2] Pooja sharma,Divakar singh, anju singh "Classification Algorithms on a large continuous Random Dataset using Rapid Miner Tool" -IEEE Sponsored 2nd International Conference on Electronics and Communications System(ICECS 2015).
[3] Ali,M.M,Rajamani,L"Decision Tree induction:Priority classification"International conferance on Advances in engineering,Science and Management, ,pp.668-673, MArch 2012
[4] A.SGalathiya,A.P Ganatra,C.K Bhensdadia "classification with an improved Decision Tree Algorithm"International Journal of computer Applications,vol 46,No.23, ,pp1-6,May 2012
[5] Prashanth G.Shambharkar,M.N doja"Äutomatic classification of movie trailors using Datamining Techniques:a Review.-IEEE International Conference on Computing,Communication and Automation(ICCCA2015).
[6] Suddep D.thepade,Madhura M.Kalbhar"Extended performance Appraise of Bayes,function,Lazy,rule,Tree Data mining classifier in novel Transformed fracional content based image classification"-2015 IEEE International Conference on Pervasive Computing(ICPC).
[7] Asli calis, Ahmet Boyaci-"Datamining application in banking sector with clustering and classification methods".IEEE 2015 International Conference on Industrial engineering and Operations Management.
[8] Dr.S.Vijayarani,M.S Dhayanand.-"Datamining classification algorithms for kidney disease prediction" IJCI vol.4,No.4,August 2015.
[9] Vanajya.S,K.Rameshkumar-"Performance analysis of classification algorithms on Medical diagnoses-A Survey.
[10] Angelo Gargantini, Paolo Vavassori-"Using Decision Trees to aid Algorithm Selection in Combinatorial Interaction Tests Generation"IEEE 8th International conference on Software Testing,Verification and Validation workshops 2015.
[11] George Dimitoglou, "Comparison of the C4.5 and a Naive Bayes classifier for the prediction of Lung Cancer Survivability".
[12] Dr.S.Vijayarani,Mr.S.Dhayanand-"Data Mining Classification Algorithms for Kidney Disease Prediction"IJCI vol.4,No.4,August 2015.
[13] Monika Gandhi,Dr.shailendra Narayan Singh-"Pediction in heart Disease Using Techniques of Data mining"1st International Conference on futuristic trend in Computational analysis and Knowledge Management 2015.
Citation
S. Nagaparameshwara Chary, B.Ram, "Analysis of Classification Technique Algorithms in Data mining- A Review," International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.180-185, 2016.
Cloud Powered Deep Learning-Emerging Trends
Review Paper | Journal Paper
Vol.4 , Issue.6 , pp.186-190, Jun-2016
Abstract
Cloud Computing is making inroads into other areas of research. Advanced research area like Deep Learning is now not limited to just huge organizations. Cloud Computing is making it easy for even small researchers to have a go at Deep Learning. One needs to just harness the unlimited Computing power the Cloud offers. This paper presents a review of Deep Learning, opportunities & Challenges of Deep Learning .The paper also throws light on the role of Cloud Computing in Deep Learning.
Key-Words / Index Term
Deep Learning, Machine Learning, Cloud Computing, Deep Clouds
References
[1] G Hinton, S Osindero and Y The “A fast learning algorithm for deep belief nets”, Neural Computation, vol. 18, pp. 1527-1554, 2006.
[2] Y Bengio “Learning deep architectures for AI”, Foundations and Trends in Machine Learning, Vol. 2, No. 1, 2009, pp. 1- 127.
[3] Y Bengio, N Boulanger, and R Pascanu. “Advances in optimizing recurrent networks,” Proc. ICASSP, 2013.
[4] Y Bengio, A Courville and P Vincent,“Representation learning: A review and new perspectives,” IEEE Trans. PAMI, 2013a.
[5] Li Deng, “A Tutorial Survey of Architectures, Algorithms, and Applications for Deep Learning” ,APSIPA-Transactions on Signal and Information Processing, 2012.
[6] L Deng, D Yu and J Platt “Scalable stacking and learning for building deep architectures”, Proc. of International Conference on Acoustics, Speech and Signal Processing , 2012a.
[7] Peter Mell and Timothy Grance, “The NIST Definition of Cloud Computing”, SP 800-145, September 2011.
[8] J. Srinivas, K. Venkata Subba Reddy and Dr. A. A. Moiz Qyser, “Cloud Computing Basics” , International Journal of Advanced Research in Computer and Communication Research, ISSN: 2278-1021, pp 343-347, Vol 1, Issue 5, July 2012.
[9] Fang Liu, Jin Tong, Jian Mao, Robert Bohn, John Messina, Lee Badger and Dawn Leaf “NIST Cloud Computing Reference Architecture”, Special Publication 500-292.
[10] Y Bengio, “Learning deep architectures for AI,” in Foundations and Trends in Machine Learning, Vol. 2, No. 1, pp. 1- 127, 2009.
[11] Li Deng, Xiaodong He, Jianfeng Gao, “Deep stacking networks for information retrieval”, IEEE International conference on Acoustics speech and signal processing, 2013.
[12] Isra Masood, Ankur Bhardwaj and Pushpneel Verma, "Barriers Faced In Cloud Computing Adoption", International Journal of Computer Sciences and Engineering, Volume-04, Issue-04, Page No (82-85), Apr -2016, E-ISSN: 2347-2693
[13] Zachary Chase Lipton, “Cloud Machine Learning Wars: Amazon vs IBM Watson Vs Microsoft Azure”, UC SD.
[14] George Lawton, “Google Brings Deep Learning to the Cloud”, IEEE INTELLIGENT SYSTEMS September/October 2012 .
[15] B. Kwolek, “Face detection using convolution neural networks and Gabor filters”, in Lecture Notes in Computer Science, vol. 3696. 2005, p. 551
Citation
Srinivas Jagirdar, K. Venkata Subba Reddy and Ahmed Abdul Moiz Qyser, "Cloud Powered Deep Learning-Emerging Trends," International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.186-190, 2016.
A Review of Authenticated Key Exchange Protocol Using Random Key Selection with Minimum Space Complexity
Review Paper | Journal Paper
Vol.4 , Issue.6 , pp.191-196, Jun-2016
Abstract
For the past decades, an extensive variety of cryptographic protocols have been suggested to resolve secure communication problems even in the occurrence of challenger. The assortment of this work varies from developing fundamental security primitives providing confidentiality and authenticity to solving more difficult, application-specific problems. With rapid developments in perimeters and potential of communications and information broadcasts, there is a rising require of authentication protocol. However, when these protocols are deployed in practice, a significant challenge is to ensure not just security but also privacy throughout these protocols’s lifetime. As computer-based devices are more extensively used and the Internet is more globally accessible, new types of applications and new types of privacy threats are being introduced to password privacy in the context of authenticated key exchange (AKE). Especially, we show that AKE protocols provably meeting the existing formal definitions do not accomplish the anticipated level of password privacy when organized in the real world.
Key-Words / Index Term
Authenticated Key exchanges (AKE), Authentication, AMEA, minimum space complexity, Symmetric Key, attacks
References
[1] Ding Y, Horster P. Undetectable on-line password guessing attacks. ACM Operat Syst Rev V29 (4), pp.77-86, 1995.
[2] S Lucks, Open key exchange: how to defeat dictionary attacks without encrypting public keys. Proc of Security Protocol Workshop (Springer, Heidelberg, 1997) 1361, pp. 79–90 LNCS
[3] P MacKenzie, S Patel, R Swaminathan, Password-authenticated key exchange based on RSA (Springer, Heidelberg, 2000) 1976, pp. 599–613 SIACRYPT 2000, LNCS
[4] MX Zhang, New approaches to password authenticated key exchange based on RSA (Springer, Heidelberg, 2004) 3329, pp. 230–244 ASIACRYPT 2004, LNCS
[5] S Park, J Nam, S Kim, D Won, Efficient password-authenticated key exchange based on RSA (Springer, Heidelberg, 2007) 4377, pp. 309–323 CT-RSA 2007, LNCS
[6] Chen TH, Lee WB. A new method for using hash functions to solve remote user authentication, Comput Electr Eng, v34 (1), pp.53-62, 2008.
[7] Yeh HT, Sun HM. Password authenticated key exchange protocols among diverse network domains, Comput Electr Eng, v31(3) pp.175-189, 2005.
[8] O. Blazy, D. Pointcheval, and D. Vergnaud. Round-Optimal privacy-preserving protocols with smooth projective hash functions. In TCC'12, pages 94-111. Springer-Verlag, 2012.
[9] J. Camenisch, N. Casati, T. Gross, and V. Shoup. Credential authenticated identification and key exchange. In CRYPTO'10, pages 255{276. Springer-Verlag, 2010.
[10] A. O. Freier, P. Karlton, and P. C. Kocher, The SSL Protocol Version 3.0. INTERNET-DRAFT, Nov. 1996. Available at http://www.netscape.com/eng/ssl3/draft302.txt.
[11] T. Dierks and C. Allen, “The TLS Protocol Version 1.0. IETF RFC 2246, Jan. 1999.
[12] M. Bellare and P. Rogaway, “Provably secure session key distribution the three party cases," in Proc. 27th ACM Symp. On Theory of Computing, (Las Vegas), pp. 57{66, ACM, 1995.
[13] A. Aziz and W. Diffie, “Privacy and authentication for wireless local area networks," IEEE Personal Communications, vol. 1, no. 1, pp. 25-31, 1994.
[14] S. Bellovin and M. Merritt, “Encrypted key exchange: password-based protocols secure against dictionary attacks," IEEE Computer Society Symposium on Research in Security and Privacy, pp. 72-84, May 1992.
[15] W. Diffie and M. E. Hellman, “New directions in cryptography," IEEE Trans. Inform. Theory, vol. IT-22, pp. 644-654, Nov 1976.
[16] Chun-Li Lin, Hung-Min Sun, and Tzonelih Hwang. Three-party encrypted key exchange: attacks and a solution. SIGOPS Oper. Syst. Rev., 34(4):12–20, 2000.
[17] Chun-Li Lin, Hung-Min Sun, M. Steiner, and T. Hwang. Three-party encrypted key exchange without server public-keys. IEEE Communications Letters, 5(12):497–499, Dec 2001.
[18] Shuhua Wu, Kefei Chen, and Yuefei Zhu, “Enhancements of a Three-Party Password-Based Authenticated Key Exchange Protocol” The International Arab Journal of Information Technology, Vol. 10, No. 3, May 2013.
[19] Maryam Saeed, Ali Mackvandi, Mansour Naddafiun, Hamid reza Karimnejad, “An Enhanced password authenticated key exchange protocol without server public keys” 978-1-4673-4828-7/122012.
[20] Detection of Javascript Vulnerability At Client Agent”, International Journal of Scientific & Technology Research Volume 1, Issue 7, August 2012.
[21] Saket Gupta,Saurabh Jain,Rachana Mishra,” Automated Process of Server and Client Environment with attack alert based on DES”, 2014 Fourth International Conference on Communication Systems and NetworkTechnologies,2014.
Citation
Stuti Nathaniel, Syed Imran Ali, Sujeet Singh, "A Review of Authenticated Key Exchange Protocol Using Random Key Selection with Minimum Space Complexity," International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.191-196, 2016.