Item Recommendation Using Hybrid Method
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.266-270, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.266270
Abstract
Recommender System provides various choices of the user preferences for suggesting the product/service to purchase. Collaborative filtering is one of the techniques in Recommender system used to find reviews and ratings of the users for similar products or users. To improve the performance of the recommendation, methods have been sometimes combined in hybrid recommenders. In this paper, the researcher have proposed an item based recommendation using Hybrid method called Item Recommendation Using Hybrid Method (IRHM), based on collaborative filtering approach that recommends the user for choosing the best item. The aim of the paper is to find the maximum value of precision and recall in hybrid method.
Key-Words / Index Term
Item, Movie, Recommendation System, Hybrid, Collaborative Filtering, IRHM
References
[1] Saurabh Kumar Tiwari, Shailendra Kumar Shrivastava, “An Approach for Recommender System by Combining Collaborative Filtering with User Demographics and Items Genres”, International Journal of Computer Applications, Vol.128, No.13, pp. 16-24, 2015.
[2] Manoj Kumar, D.K. Yadav, Ankur Singh, Vijay Kr. Gupta, “A Movie Recommender System: MOVREC”, International Journal of Computer Applications, Vol.124, No.3, pp.7-11, 2015.
[3] Prerna Agarwal, Richa Verma, Angshul Majumdar , “Indian Regional Movie Dataset for Recommender Systems”, https://arxiv.org/pdf/1801.02203.pdf, arXiv:1801.02203v1 [cs.IR], pp.1-7, 2018.
[4] Badrul Sarwar, George Karypis, Joseph Konstan, John Riedl, “Analysis of recommendation algorithms for e-commerce”, In the Proceedings of the 2nd ACM Conference on Electronic Commerce, Minnesota, USA, pp.158-167, 2000.
[5] R. Suguna, D. Sharmila, “An Efficient Web Recommendation System using Collaborative Filtering and Pattern Discovery Algorithms”, International Journal of Computer Applications, Vol. 70, No.3, pp.37-44, 2013.
[6] Mohamed Koutheair Khribi, Mohamed Jemnil, Olfa Nasraoui, “Automatic Recommendations for E-Learning Personalization based on Web Usage Mining Techniques and Information Retrieval”, Educational Technology and Society, 12(4), pp.30-42, 2009.
[7] Hamidreza Koohi, Kourosh Kiani, “User based Collaborative Filtering using fuzzy C-means”, Science Direct, Measurement 91, pp.134–139, 2016.
[8] Ziming Zeng, “An Intelligent E-Commerce Recommender System Based on Web Mining”, International Journal Business and Management, Vol.4, No.7, pp.10-14, 2009.
[9] Shivani Diwan, Komal Dani, Sahil Desai, ”Dynamic Recommendation System for E-Commerce Users”, International Research Journal of Engineering and Technology, Vol.03, Issue. 05, pp.141-144, 2016.
[10] Amer Al-Badarenah, Jamal Alsakran, “An Automated Recommender System for Course Selection”, International Journal of Advanced Computer Science and Applications, Vol.7, No.3, pp. 166- 173, 2016.
[11] Mohammad Daoud, S.K. Naqvi, Asad Ahmad, “Opinion Observer:Recommendation System on E-Commerce Website”, International Journal of Computer Applications, Vol.105, No.14, pp.37-42, 2014.
[12] Robin Burke, “Hybrid Recommender Systems: Survey and Experiments”, User Modeling and User - Adapted Interaction”, Vol.12, Issue.4, pp. 331-370, 2002.
[13] Senthil Kumar Thangavel, Neetha Susan Thampi, Johnpaul C I, “Performance Analysis of Various Recommendation Algorithms Using Apache Hadoop and Mahout”, International Journal of Scientific & Engineering Research, Vol.4, Issue 12, pp.279-287, 2013.
[14] Suresh K. Gorakala, Michele Usuelli, “Building a Recommendation System with R”, Packt Publishing Ltd, UK, pp. 9-10, 2015.
[15] Michael Hahsler, “Recommenderlab: A Framework for Developing and Testing Recommendation Algorithms”, Southern Methodist University, pp.1-40, 2011.
[16] Mojtaba Salehi, “An effective recommendation based on user behaviour: a hybrid of sequential pattern of user and attributes of product”, International Journal of Business Information Systems, Vol.14, No.4, pp.480-496, 2013.
Citation
M. Munafur Hussaina, R. Parimala, "Item Recommendation Using Hybrid Method," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.266-270, 2018.
Evaluation of Energy Detection at various SNR values and optimal Cooperative Spectrum Sensing
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.271-278, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.271278
Abstract
The world is moving towards a digital generation and more number of users are being added to the wireless technologies. The spectrum availability is being reduced with the increase in number of users. The problem of spectrum scarcity can be addressed by using cognitive radio, a comparatively newer technology. Spectrum sensing is the core part of cognitive radio which helps us in identifying the unused frequencies or part of the spectrum that can be allocated to new users without any disturbance to the ongoing transmission. Energy detection is such a spectrum sensing technique which is simple to implement, and we do not require to have the prior knowledge of the primary user signal. In this paper, we will implement and analyze energy detection with various values of SNR. We will investigate the optimal threshold in cooperative sensing also.
Key-Words / Index Term
Cognitive Radio; Spectrum Sensing; Energy Detection; SNR; Spectrum Access
References
[1] J. Mitola and G. Q. Maguire, “Cognitive radio: making software radios more personal,” IEEE Personal Commun., vol. 6, no. 4, pp. 13–18, Aug.1999.
[2] Haykin, S., "Cognitive radio: brain-empowered wireless communications, "IEEE 1. Sel. Areas Commun., vol. 23, no. 2, pp. 201-220, Feb.2005
[3] D Cabric, SM Mishra, R.W. Brodersen" Implementation issues in spectrum sensing for cognitive radios”, Thirty-Eighth Asilomar Conference on Signals, Systems and Computers 2004
[4] Wei Zhang, Ranjan K. Mallik and Khaled Ben Letaief, "Optimization of Cooperative Spectrum Sensing with Energy Detection in Cognitive Radio Networks", IEEE Transactions on Wireless Communications, Vol. 8, No. 12, December 2009
[5] Ying-Chang Liang, Kwang-Cheng Chen, Geoffrey Ye Li, and Petri Mähönen, " Cognitive Radio Networking and Communications: An Overview ", IEEE Transactions on Vehicular Technology, Vol. 60, No. 7, September 2011
[6] Ala Eldin Omer, "Review of spectrum sensing techniques in Cognitive Radio networks", IEEE International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering, 2015
[7] Lu Lu, Xiangwei Zhou, Uzoma Onunkwo and Geoffrey Ye Li, “Ten years of research in spectrum sensing and sharing in cognitive radio,” EURASIP Journal on Wireless Communications and Networking, 2012
[8] Garima Nautiyal, Rajesh Kumar, “Spectrum Sensing in Cognitive Radio Using Matlab”, International Journal of Engineering and Advanced Technology (IJEAT), Volume-2, Issue-5, June 2013
[9] Tulika Mehta, Naresh Kumar, Surender S Saini, “Comparison of Spectrum Sensing Techniques in Cognitive Radio Networks” IJECT Vol. 4, Issue spl - 3, April - June 2013
Citation
Rohit, V. Sindhu, "Evaluation of Energy Detection at various SNR values and optimal Cooperative Spectrum Sensing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.271-278, 2018.
Design and implementation of app store optimization tool for an app market
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.279-284, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.279284
Abstract
The process of optimizing mobile apps at a high level in search results of the ASO App Store is that your app is more in search results of the app store, which is more visible to potential customers, translating into more traffic to your app`s page in the increasingly visible App Store. ASO`s aim is to drive more traffic to your app`s page in the app store, so that the locator can perform certain actions: downloading your app. Also, an important aspect of your target customer needs to do in the ASO process. Search apps as well as your potential customers. When you learn more about which keyword is being used, you know the language of your potential customers - an important part of any marketing plan - and you can take your keyword choices. Google Play Store is an Android Market site specifically for the Google App Store. It is automatically pulled from the Google Play website and displays the top chart and new releases of the game. It provides detailed information and reviews of applications with related apps. App store optimization (ASO) app store is a process of improving the visibility of the mobile app (such as iPhone, iPad, Android, Blackberry or Windows Phone Application).
Key-Words / Index Term
ASO,SEO,iOS,Google play, etc
References
1. Craig Weinberg “The complete guide to learn App store Optimization “, VP of Mobile Strategy, 3Q Digital,and Gary Yentin, CEO and Founder, AppPromo
2. Rahul Potharaju, Mizanur Rahman, and Bogdan Carbunar : A Longitudinal Study of Google IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (pp.1-15).
3. Didi Surian, Suranga Seneviratne, Aruna Seneviratne, and Sanjay Chawla : . App Miscategorization Detection: A Case Study on Google Play 10.1109/TKDE.2017.2686851, IEEE Transactions on Knowledge and Data Engineering
4. Roy Deddy Hasiholan Tobing1, Liza Venita Debora Pardede,: Customizable Commerce Mobile Application 2016 3rd International Conference On Computer And Information Sciences (ICCOINS)
5. Ryan Weber, Co-Founder / Chief Product Officer, NativeX : App Store Optimization (ASO) White Paper NativeX Holdings2016
6. Jianye Liu, Jianka Yu, ‘Research On Development Of Android Applications’ in Fourth International Conference on Intelligent System -2011
7. Suhas Holla, Mahima M. Katti, ‘Android Based Mobile Application Development And its Security’ in International Journal of Computer Trend And Technology – 2012
8. Haipeng Cai; Barbara G. Ryder ‘
DroidFax: A Toolkit for Systematic Characterization of AndroidApplications’ 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME)Year: 2017
Citation
Y. C. Kulkarni, Harshad Kale, "Design and implementation of app store optimization tool for an app market," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.279-284, 2018.
Protecting the Users Information in Personalized Recommendation
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.285-290, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.285290
Abstract
As online purchase has growing nowadays, recommendation becomes important field for today. Due to the regard of privacy, user’s unwillingness to expose their private data has become considerable obstacle for the growth of customized recommendation system. So the motive is to safeguard the user’s private data. In this work, it is proposed to formulate the dummy preferences set to protect user’s sensitive subjects. Firstly, a client based structure for user security assurance is introduced, which does not need any modification to existing algorithms, as well as no trade off to the proposal exactness. Then a privacy protection model formulated by the prime requirements such as similarity in the feature distribution and the degree of exposure is put forth. Feature distribution measures the success of dummy preference profile to envelop actual user profile and the degree of exposure measures the favorable result of dummy preferences to envelop sensitive subject. Finally the implementation algorithm is introduced to meet the actual privacy goal. Proposed system also aims to provide the sentiment analysis of the reviews for the products in order to help the people to identify the good products among the huge number of products available.
Key-Words / Index Term
Personalized Recommendation, Individual Privacy, sensitive subjects, Feature Distribution, Dummy Preferences
References
[1] Jieming Zhu, Pinjia He, Zibin Zheng, Michael R. Lyu, “A Privacy-Preserving QoS Prediction Framework for Web Service Recommendation”, 2015 IEEE International Conference on Web Services.
[2] Hwee Hwa PANG, Xuhua DING, Xiaokui XIAO, “Embellishing Text Search Queries to Protect User Privacy”, Proceedings of the VLDB Endowment: 36th International Conference on Very Large Data Bases: Singapore, 13-17 September 2010.
[3] Hwee Hwa PANG, Xiaokui XIAO, Jialie SHEN, “Obfuscating the Topical Intention in Enterprise Text Search”, ICDE 2012: IEEE 28th International Conference on Data Engineering, Arlington Virginia, 1-5 April 2012: Proceedings. 1168-1179.
[4] Feng Zhang, Victor E. Lee, and Ruoming Jin, “k-CoRating: Filling Up Data to Obtain Privacy and Utility”, Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence 2014.
[5] Yilin Shen and Hongxia Jin, “Privacy-Preserving Personalized Recommendation: An Instance-based Approach via Differential Privacy”, 2014 IEEE International Conference on Data Mining.
[6] Zhifeng Luo, Shuhong Chen , Yutian Li, “A Distributed Anonymization Scheme for Privacy-preserving Recommendation Systems”, Supported by University Innovation Research and Training Program of Guangdong Province(1056111033) 2013 IEEE.
[7] Zongda Wu, Guiling Li, et al, ”Covering the sensitive subjects to protect personal privacy in personalized recommendation”, IEEE transaction on serviced computing 2016.
[8] Guandong Xu, ZongdaWu, Guiling Li et al. “Improving contextual advertising matching by using wikipedia thesaurus knowledge”, Knowledge and Information Systems, 2015, 43 (3): 599–631.
[9] Dipasree Pal, Mandar Mitra, Kalyankumar Datta. “Improving query expansion using WordNet”. Journal of the Association for Information Science and Technology, 2014, 65 (12): 2469–2478
[10] S. Zhang, J. Ford and Fillia Makedon, "A privacy-preserving collaborative filtering scheme with two-way communication", Proc. the 7th ACM Conference on Electroinic Commerce, pp. 316-323, 2006.
[11] Liang Hu, Guohang Song, Zhenzhen Xie, and Kuo Zhao, “Personalized Recommendation Algorithm Based on
Preference Features”, Tsinghua science and Technology, Vol. 19, No. 3, 11llpp293-299, June 2014
[12] Yande M, Wakchaure M, Student ME. “Cross-Site Cold-Start Product Recommendation for Social Media and E-Commerce Websites.” International Journal of Engineering Science. 2017 Jul;13751.
[13] Khalid O, Khan M U S, Khan S U et al. ”OmniSuggest: A ubiquitous cloud-based context-aware recommendation system for mobile social networks”. IEEE Transactions on Services Computing, 2014, 7 (3):401414.
[14] Varpe P. “A Preserving Personal Privacy in Personalized Recommendation by protecting the Sensitive Subjects. ”ASIAN JOURNAL FOR CONVERGENCE IN TECHNOLOGY (AJCT)-UGC LISTED. 2018 Apr 15; 4(I).
[15] Shitole MA, Wakchaure MA. “Patient-Centric and Privacy Preserving Clinical Decision Support System Using Naive Bayesian Classification.” 2016, pp. 999-1003
[16] Guandong Xu, ZongdaWu, Guiling Li et al. “Improving contextual advertising matching by using wikipedia thesaurus knowledge”.Knowledge and Information Systems, 2015, 43 (3): 599–631
[17] Wakchaure MM., Survey on Discrimination Prevention in Data-Mining.
[18] Mankar A, Patil H, Arage C, Gaikwad M. “A Survey on Sentiment Computing for the Opinions Based on the Twitter.” International Journal of Scientific Research in computer Science and, Engineering and information Technology, ISSN : 2456-3307, Volume 3 Issue 1, pp.361-364 , 2018
[19] N.Rajganesh, S.Seetha Devi, J. Keerthana, R.Poovizhi, “A Personalized Job Recommender System Using Hybrid Collaborative Filtering Algorithm”, International Journal of Scientific Research in computer Science and, Engineering and information Technology, ISSN : 2456-3307, Volume 3 Issue 3, pp.192-196 , 2018
Citation
P.B.Varpe, M.A.Wakchaure, "Protecting the Users Information in Personalized Recommendation," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.285-290, 2018.
Implementation of Neuro-Fuzzy and Statistical Technique for Flood Forecasting in Cauvery Basin, India
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.291-298, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.291298
Abstract
Prediction and forecasting has been significant area of study in computer science since last decades. Out of various approaches, soft computing data driven models are very effective for forecasting. Soft Computing Models are usefully applicable when the relationship between the parameters are very complex to understand. India a disaster prone country which requires such major soft computing based data driven models to handle disasters like flood, drought, landslide etc. Flood has a major impact in many parts of India out of which Cauvery, Godavari and Ganges river basins are the mostly affected regions. The paper attempts to forecast floods by modeling river flow in the area of Cauvery river basin of India which has a complicated topography. In this study, the potential of two data driven techniques namely, Adaptive Neuro Fuzzy Inference System (ANFIS) and Gaussian Process Regression (GPR) were used for forecasting floods by predicting river flow in Cauvery river sub-basin of southern India. The techniques were applied on various models constructed from combinations of various antecedent river flow values from two gauging stations and the results were compared for the best fit models of each technique. To get more accurate assessment of results of the models, three standard statistical quantitative performance assessment parameters, the Mean Squared Error (MSE), the coefficient of correlation (R) and the Nash-Sutcliffe coefficient (NS) were used to analyze the performances of the models developed. A complete comparison of the overall performance indices demonstrated that the ANFIS models performed better than GPR models in flood prediction.
Key-Words / Index Term
Adaptive Neuro Fuzzy Inference System (ANFIS), Gaussian Process Regression (GPR), Mean Squared Error (MSE), the coefficient of correlation (R), Nash-Sutcliffe coefficient (NS)
References
[1] M. Aqil, I. Kita, A. Yano, S. Nishiyama, Journal of hydrology 337(1-2), 22, 2007.
[2] Nayak, P. C., K. P. Sudheer, D. M. Rangan, and K. S. Ramasastri. "Short‐term flood forecasting with a Neurofuzzy model." Water Resources Research 41, no. 4, 2005.
[3] Keong, Khoo Chun, Mahfuzah Mustafa, Ahmad Johari Mohammad, Mohd Herwan Sulaiman, and Nor Rul Hasma Abdullah. "Artificial neural network flood prediction for sungai isap residence." In Automatic Control and Intelligent Systems (I2CACIS), IEEE International Conference on, pp. 236-241. IEEE, 2016.
[4] Oh, Hyun-Joo, and Biswajeet Pradhan. "Application of a neuro-fuzzy model to landslide-susceptibility mapping for shallow landslides in a tropical hilly area." Computers & Geosciences 37, no. 9, pp. 1264-1276, 2011.
[5] S.L. Kant, Amal, Pranmohan K. Suman, Brijesh K. Giri, Mukesh K. Tiwari, Chandranath Chatterjee, Purna C. Nayak, and Sawan Kumar. "Comparison of multi-objective evolutionary neural network, adaptive neuro-fuzzy inference system and bootstrap-based neural network for flood forecasting." Neural Computing and Applications 23, no. 1, pp. 231-246, 2013.
[6] Bacanli, Ulker Guner, Mahmut Firat, and Fatih Dikbas. "Adaptive neuro-fuzzy inference system for drought forecasting." Stochastic Environmental Research and Risk Assessment 23, no. 8, pp. 1143-1154, 2009.
[7] Pramanik, Niranjan, and Rabindra Kumar Panda. "Application of neural network and adaptive neuro-fuzzy inference systems for river flow prediction." Hydrological Sciences Journal 54, no. 2, pp. 247-260, 2009.
[8] Firat, Mahmut, and Mahmud Güngör. "Hydrological time‐series modelling using an adaptive neuro‐fuzzy inference system." Hydrological processes 22, no. 13, pp. 2122-2132, 2008.
[9] Shaikh, L, and Sawlani, K. “A Rainfall Prediction Model Using Articial Neural Network” International Journal of Scientific Research in Network Security and Communication Vol. 5, Issue 1, pp. 24 – 28, 2017.
[10] Jaswant Meena, Ashish Mandloi , “Classification of Data Mining Techniques for Weather Prediction”, International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.1, pp.21-24, 2016.
[11] Grbić, Ratko, Dino Kurtagić, and Dražen Slišković. "Stream water temperature prediction based on Gaussian process regression." Expert systems with applications 40, no. 18, pp. 7407-7414, 2013.
[12] Sun, Alexander Y., Dingbao Wang, and Xianli Xu. "Monthly streamflow forecasting using Gaussian process regression." Journal of Hydrology 511, pp. 72-81, 2014.
[13] Pal, Sankar K., and Ashish Ghosh. "Soft computing data mining." pp. 1-3, 2004.
[14] Jang, Jyh-Shing Roger, Chuen-Tsai Sun, and Eiji Mizutani. "Neuro-fuzzy and soft computing; a computational approach to learning and machine intelligence.", 1997.
[15] Rasmussen, Carl Edward, and Christopher KI Williams. "Gaussian processes for machine learning. Number ISBN 0-262-18253-X." 2006.
[16] Bhawan, Sewa, and R. K. Puram. "WATERSHED ATLAS OF INDIA.", 2014.
[17] India-WRIS WebGIS Water Resource Information System of India. Retrieved from http://www.india-wris.nrsc.gov.in/
[18] Kişi, Özgür. "Daily pan evaporation modelling using a neuro-fuzzy computing technique." Journal of hydrology 329, no. 3-4, pp. 636-646, 2006.
[19] Shanker, Murali, Michael Y. Hu, and Ming S. Hung. "Effect of data standardization on neural network training." Omega 24, no. 4, pp. 385-397, 1996.
[20] Shu, C., and T. B. M. J. Ouarda. "Regional flood frequency analysis at ungauged sites using the adaptive neuro-fuzzy inference system." Journal of Hydrology 349, no. 1-2, pp. 31-43, 2008.
Citation
P. Misra, S. Shukla, "Implementation of Neuro-Fuzzy and Statistical Technique for Flood Forecasting in Cauvery Basin, India," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.291-298, 2018.
Enhancing test case reduction by k-means algorithm and elbow method
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.299-303, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.299303
Abstract
Software testing plays an indispensable part in the software development process. A huge number of test cases are required to be tested to improve the quality of the software which is a tedious and time-consuming process. In this paper we aim to minimize the number of test cases by eliminating redundant test cases and thereby assisting us in reducing the time consumed in testing huge number of test cases. We have used the popular data mining k-means algorithm along with an elbow method to reduce the number of test cases required to be tested. Experimental result presents better clustering accuracy and significant elimination of redundant test cases by using the proposed approach.
Key-Words / Index Term
Testing; data mining; test case reduction; test case minimization; test suite reduction; test suite minimization; cluster
References
[1] M. J. Harrold, R. Gupta., & M. L. Soffa, “A methodology for controlling the size of a test suite”, ACM Transactions on Software Engineering and Methodology (TOSEM), Vol. 2, No. 3, pp. 270-285, 1998.
[2] T. Y. Chen and M. F. Lau, “A new heuristic for test suite reduction”, Information and Software Technology, Vol. 40, No. 5, pp. 347-354, 1998.
[3] Zhenyu Chen, Baowen Xu, Xiaofang Zhang, and Changhai Nie “A novel approach for test suite reduction based on requirement relation contraction”, In Proceedings of the 2008 ACM symposium on Applied computing (SAC `08). ACM, New York, NY, USA, pp. 390-394, 2008.
[4] H. Zhong, L. Zhang, and H. Mei, “An experimental study of four typical test suite reduction techniques”, Information and Software Technology, Vol. 50, No. 6, pp. 534–546, 2008.
[5] T. Chen and M. Lau, “A simulation study on some heuristics for test suite reduction”, Information and Software Technology, Vol. 40, No. 13, pp. 777–787,1998.
[6] L. Ramesh, “Knowledge Mining of Test Case System”, International Journal on Computer Science and Engineering, Vol. 2, No. 1, pp. 69-73, 2009.
[7] L. Rameesh and G.V. Uma, “An Efficient Reduction Method For Test Cases”, International Journal of Engineering Science and Technology, Vol. 2, No. 11, pp. 6611-6616, 2010.
[8] K. Muthyala, & R. Naidu, “A novel approach to test suite reduction using data mining”, Indian Journal of Computer Science and Engineering, Vol. 2, No. 3, pp. 500-505, 2011.
[9] A. Saifan, “Test case reduction using data mining classifier techniques”, Jouranal of Software, Vol. 11, No. 7, pp. 656-663, 2016.
[10] L. Ramesh, & G. V. Uma, “Reliable Mining of Automatically Generated Test Cases from Software Requirements Specification (SRS)”, International Journal of Computer Science (IJCSI), Vol. 7, No. 3, pp. 87-91, 2010.
[11] R. Chauhan, P. Batra, & S. Chaudhary, “An Efficient Approach for Test Suite Reduction using Density based Clustering Technique”, International Journal of Computer Applications, Vol. 97, No.11, pp. 1-4, 2014.
[12] B. Subashini, D. JeyaMala, “Reduction of Test Cases Using Clustering Technique”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 3, No. 3, pp. 1992-1996, 2014.
[13] L. Ramesh, G. V. Uma, “UML Generated Test Case Mining Using ISA”, International Conference on Machine Learning and Computing, IPCSIT, Vol. 3, pp. 188-192, 2011.
[14] A. K. Upadhyay, A. K. Misra, “Prioritizing Test Suites Using Clustering Approach in Software Testing”, International Journal of Soft Computing and Engineering (IJSCE), Vol. 2, Issue-4, pp. 222-226, 2012.
[15] Marie Fernandes , “Data Mining: A Comparative Study of its Various Techniques and its Process”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.1, pp.19-23, 2017.
[16] R.S. Walse, G.D. Kurundkar, P. U. Bhalchandra, “A Review: Design and Development of Novel Techniques for Clustering and Classification of Data”, International Journal of Scientific Research in Computer Science and Engineering, Vol.06, Issue.01, pp.19-22, 2018.
[17] T. M. Kodinariya, P. R. Makwana, “Review on determining number of Cluster in K-Means Clustering”, International Journal of Advance Research in Computer Science and Management Studies, Vol. 1, No. 6, pp. 90-95, 2013.
[18] L. C. Briand, Y. Labiche and Z. Bawar, “Using Machine Learning to Refine Black-Box Test Specifications and Test Suites”, 2008 The Eighth International Conference on Quality Software, Oxford, pp. 135-144, 2008.
[19] I. H. Witten and E. Frank, “Data Mining: Practical Machine Learning Tools and Techniques”, Morgan Kaufmann Publisher, San Francisco, 2005.
Citation
A. Pandey, A. K. Malviya, "Enhancing test case reduction by k-means algorithm and elbow method," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.299-303, 2018.
Novel Image Watermarking On Geometric Attacks
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.304-309, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.304309
Abstract
The data which involves sound, image and video was kept in numeral system. Audiovisual data is digital form propositions several benefits and different abilities for normal user. Likely the most common used potential of digital media is the untroubled copy without degradation of the medium. Watermark have numerical environment, combination documents and it will copied, altered, distorted, and dispersed precise simply. For that, it is necessary to improve the structure for patent safety, defense against duplication, and validation of documents. Hence, digital watermarking is best solution for providing more security to client/server. In open communication channel during the transaction process. Now, in some existing methods only provide security against some normal attacks like Gaussian attack, jpeg attack, salt and pepper attack, etc. But it is not against RST invariant attacks. RST invariant Watermarking approach using DWT-SVD into block manner with Pseudo Zernike moment, Surf feature and Affine transform give batter recovery on watermark image after geometric attacks.
Key-Words / Index Term
Data hiding; Block DWT-SVD; PZM; SURF; Affine transform, Geometric attacks
References
[1] Akshya Kumar Gupta and Mehul S Raval “A Robust and Secure Watermarking Scheme Based On Singular Values Replacement” Vol. 37, Part 4, Pp. 425–440. Indian Academy Of Sciences lAugust 2012.
[2] Ali Benoraira, Khier Benmahammed and Noureddine Boucenna “Blind Image Watermarking Technique Based On Differential Embedding In DWT And DCT Domains”, Springer, 2015.
[3] Aparna J R and Sonal Ayyappan “Comparison of Digital Watermarking Techniques” International Conference for Convergence of Technology - 2014
[4] Bharat Singh, Dr. V.S. Dhaka and Ravi Saharan “Blind Detection Attack Resistant Image Watermarking”, IEEE, 2014
[5] Boland F.M., Ruanaidh J.J.K., Dautzenberg C., "Watermarking digital images for copyright protection", Proc. IEE Int. Conf. on Image Processing and Its Applications, Edinburgh, U.K., pp. 326-330, July 1995.
[6] Chu W.C., “DCT-based image watermarking using subsampling”, IEEE Transactions on Multimedia, vol. 5, no. 1, pp. 34-38, June 2005.
[7] Chun-Hsiang Huang and Ja-Ling Wu “Attacking Visible Watermarking Schemes” IEEE Transactions On Multimedia, Vol. 6, No. 1, February, 2004
[8] Chunlin Song, Sud Sudirman, Madjid Merabti and David Llewellyn-Jones, “Analysis of Digital Image Watermark Attacks,” Consumer Communications and Networking Conference (CCNC), 2010, 7th IEEE.
[9] Cox I.J., Kilian J., Leighton T., Shamoon T., "A secure, robust watermark for multimedia”, Workshop on Information Hiding, Newton Institute, Univ. of Cambridge, May 1996.
[10] Cox I.J., Kilian J., Leighton T., Shamoon T., “Secure spread spectrum watermarking for multimedia”, IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673-1687, 1997.
[11] Cox I.J., Matt L. et al., “Watermarking applications and their properties”, Proc. Int. Conf. on Information Technology, Las Vegas, pp. 6-10, 2000.
[12] Cox I.J., Miller M., "A review of watermarking and the importance of perceptual modeling", Proc. SPIE Electronic Imaging `97, Storage and Retrieval for Image and Video Databases V, San Jose, CA, vol. 3016, pp. 92-99, Feb. 1997.
[13] Dong Zheng, Yan Liu, and Jiying Zhao “A Survey Of RST Invariant Image Watermarking Algorithms” IEEE, CCECE/CCGEI, Ottawa, May, 2006
[14] Dr.M.A.Dorairangaswamy and B.Padhmavathi “An Effective Blind Watermarking Scheme For Protecting Rightful Ownership Of Digital Images”, IEEE, 2009
[15] Hailiang Shi, Nan Wang, Zihui Wen, Yue Wang, Huiping Zhao, Yanmin Yang “An RST Invariant Image Watermarking Scheme Using DWT-SVD” IEEE, 2012
[16] Hanjalic A., Langelaar G.C., Roosmalen P.V., Biemond J., Lagendijk R.L., “Image and Video Databases: Restoration, Watermarking and Retrieval”, Advances in Image Communications, vol. 8, New York, Elsevier Science, 2000.
[17] Hartung F., Girod B., "Digital watermarking of raw and compressed video", Proc. SPIE 2952: Digital Compression Technologies and Systems for Video Communication, pp. 205-213, Oct. 1996.
[18] Herbert Bay, Andreas Ess, Tinne Tuytelaars, Luc Van Gool, “Speeded-Up Robust Features” (SURF), Elsevier, 2007
[19] Hernández J.R., Amado M., Gonzalez F.P., "DCT-Domain watermarking techniques for still images: Detector performance analysis and a new structure", IEEE Transactions of Image Processing, vol. 9, pp. 55-68, Jan. 2000.
[20] Johnson N., Katezenbeisser S., “A Survey of Steganographic Techniques”, Eds. Northwood, MA:Artec House, 43, 1999.
[21] Keta Raval and Sameena Zafar “Digital Watermarking With Copyright Authentication For Image Communication” International Conference On Intelligent Systems And Signal Processing (ISSP) 2013
[22] Langelaar G., Setyawan I., Lagendijk R.L., “Watermarking Digital Image and Video Data”, IEEE Signal Processing Magazine, vol. 17, pp. 20-43, Sep. 2000.
[23] Lin Gao, Tiegang Gao, Guorui Sheng, and Shun Zhang “Robust Medical Image Watermarking Scheme With Rotation Correction”, Springer 2014
[24] Md. Maklachur Rahman “A DWT, DCT And SVD Based Watermarking Technique To Protect The Image Piracy” International Journal Of Managing Public Sector Information And Communication Technologies (Ijmpict) Vol. 4, No. 2, June 2013
[25] Munesh Chandra, Shikha Pandel and Rama Chaudharl “Digital Watermarking Technique For Protecting Digital Images”, IEEE, 2010
[26] Piva A., Barni M., Bartolini F., Cappellini V., "DCT-based watermark recovering without resorting to the uncorrupted original image", Proc. IEEE Int. Conf. on Image Processing, ICIP 97, Santa Barbara, CA, pp. 520-527, Oct. 1997.
[27] Podilchuk C., Zeng W., "Perceptual watermarking of still images", Proc. IEEE 1st Workshop on Multimedia Signal Processing, Princeton, NJ, pp. 363-368, June 23- 25, 1997.
[28] Podilchuk C., Zeng W., “Image-Adaptive Watermarking Using Visual Models”, IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 525-539, May 1998.
[29] Potdar et al., “A survey of digital image watermarking techniques”, Proc. 3rd IEEE Int. Conf. on Industrial Informatics, Frontier Technologies for the Future of Industry and Business, pp. 709-716, Perth, WA, Aug. 2005.
[30] Prabhishek Singh, Aayush Agarwal, Jyoti Gupta “Image Watermark Attacks: Classification & Implementation, IJECT Vol. 4, Issue 2, April - June 2013
[31] Priyanka Singh, Raman and Mishra “Region of Interest Based Robust Watermarking Scheme Exploiting the Homogeneity Analysis” IEEE 2016
[32] Ruanaidh J.J.K.O., Dowling W.J., Boland F.M., "Watermarking digital images for copyright protection", Proc. IEE Vision, Image, and Signal Processing, vol. 143, no. 4, pp. 250-256, Aug. 1996.
[33] Sheshang D. Degadwala & Dr. Sanjay Gaur “4-Share VCS Based Image Watermarking for Dual RST Attacks”,Springer, ICCVBIC, 2017.
[34] Sheshang D. Degadwala & Dr. Sanjay Gaur “A study of privacy preserving system based on progressive VCS and RST attacks”, International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC),IEEE, 2016.
[35] Sheshang D. Degadwala & Dr. Sanjay Gaur “An Efficient Image Watermarking for Combination of RST Attacks”, International Journal of Computer Applications (0975 – 8887) Volume 170 – No.5, July 2017.
[36] Sheshang D. Degadwala & Dr. Sanjay Gaur “An Efficient Privacy Preserving System Using VCS, Block DWT-SVD and Modified Zernike Moment on RST Attacks”, ICAAMMA, IEEE, 2017.
[37] Sheshang D. Degadwala & Dr. Sanjay Gaur “An Efficient Privacy Preserving System Based on RST Attacks on Color Image”, Springer, ICFITT, 2017.
[38] Sheshang D. Degadwala & Dr. Sanjay Gaur “An Efficient Watermarking Scheme Based on NonSymmetric Rotation Angles Attacks”, International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 21 (2017) pp. 10611-10616.
[39] Sheshang D. Degadwala & Dr. Sanjay Gaur “Privacy Preserving System Using Pseudo Zernike Moment with SURF & Affine Transformation on RST Attacks”,Vol. 15 No. 4 April International Journal of Computer Science and Information Security, 2017.
[40] Sheshang D. Degadwala & Dr. Sanjay Gaur “Two Way Privacy Preserving System using Combine Approach: QR-code & VCS” International Conference on Innovations in Power and Advanced Computing Technologies(I-PACT),IEEE,2017.
[41] Sheshang D. Degadwala, Dr. Sanjay Chaudhary and Dr. Sanjay Gaur “An Efficient ROI Based Medical Image Watermarking on Non-Symmetric Rotation Attacks”, IJSRSET, 2017.
[42] Sy C. Nguyen, Kha H. Ha And Hoang M. Nguyen “An Improved Image Watermarking Scheme Using Selective Curvelet Scales” International Conference On Advanced Technologies For Communications (ATC) 2015
[43] Tao B., Dickinson B., "Adaptive watermarking in the DCT domain", IEEE Int. Conf. on Acoustics, Speech and Signal Processing, pp. 20-46, Apr.1997.
[44] VikasSaxena “Collusion Attack Resistant Watermarking Scheme For Images Using DCT”, IEEE 2014
[45] Watson A.B., “DCT Quantization Matrices Visually Optimized for Individual Images”, Proc. Human Vision, Visual Processing, and Digital Display IV, Bellingham, WA, SPIE, pp. 202-216, Feb. 1992.
[46] Wolfgang R.B., Podilchuk C.I., Delp E.J., "Perceptual watermarks for digital images and video", Proc. IEEE, vol. 87, pp. 1108-1126, July 1999.
[47] Xiao W., Ji Z., Zhang J., Wu W., "A watermarking algorithm based on chaotic encryption", Proc. IEEE Region 10 Conf. on Computers, Communications, Control and Power Engineering TENCON, vol. 1, pp. 545-548, Oct. 2002.
[48] Yuh-Rau Wang, Wei-Hung Lin And Ling Yang, “A Loseless Watermarking using Visual Cryptography Authentication,” IEEE International Conference on Machine Learning and Cybernetics, Tianjin, 2013
Citation
S.D. Degadwala, A.D. Mahajan, D.J. Vyas, "Novel Image Watermarking On Geometric Attacks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.304-309, 2018.
An Algorithm for Test Case Reduction in Regression Testing
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.310-315, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.310315
Abstract
Testing is one of the most critical and time consuming phase in development of a software and when it comes to regression testing in which compatibility is checked of the previous code with the updated one. It definitely increases the size of test case and budget so, to decrease the number of test cases in regression testing this paper presents a QBGA (Queen Bee Genetic Algorithm) technique for test case reduction and also increases the coveragence that would makes a software more efficient. When it is in contrast with the existing GA algorithm, the number of test cases is found to be reduced and covered area is enhanced and results are found to be better.
Key-Words / Index Term
Regression Testing, Test Case Reduction, Coveragence
References
[1] Khan, S. U. R., Lee, S. P., Javaid, N., & Abdul, W. (2018). “A Systematic Review on Test Suite Reduction”: Approaches, Experiment’s Quality Evaluation, and Guidelines. IEEE Access, 6, 11816-11841.
[2] de Souza, D. M., Oliveira, B. H., Maldonado, J. C., Souza, S. R., & Barbosa, E. F. (2014, October). “Towards the use of an automatic assessment system in the teaching of software testing.” In Frontiers in Education Conference (FIE), 2014 IEEE(pp. 1-8). IEEE.
[3] Velmurugan, P., & Mahapatra, R. P. (2016, July). “Effective testcase retaining using branch coverage technique.” In Applied and Theoretical Computing and Communication Technology (iCATccT), 2016 2nd International Conference on(pp. 504-508). IEEE.
[4] Lawanna, A. (2017, October). “Extended regression test model for test suite reduction.” In Consumer Electronics (GCCE), 2017 IEEE 6th Global Conference on (pp. 1-5). IEEE.
[5] Jyoti, K. S. (2014). A Comparative Study of Five Regression Testing Techniques: A Survey. International Journal of Scientific & Technology Research, 3(8).
[6] Yamu, A., Cingiz, M. ., Biricik, G., & Kalpsz, O. (2017, June). “Solving test suite reduction problem using greedy and genetic algorithms.” In Electronics, Computers and Artificial Intelligence (ECAI), 2017 9th International Conference on (pp. 1-5). IEEE.
[7] Sharma, N., & Purohit, G. N. (2014, December). “Test case prioritization techniques “an empirical study”. In High Performance Computing and Applications (ICHPCA), 2014 International Conference on (pp. 1-6). IEEE.
[8] Ansari, A. S., Devadkar, K. K., & Gharpure, P. (2013, December). “Optimization of test suite-test case in regression test.”In Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on (pp. 1-4). IEEE
[9] Lawanna, A. (2017, October). “Extended regression test model for test suite reduction.” In Consumer Electronics (GCCE), 2017 IEEE 6th Global Conference on (pp. 1-5). IEEE.
[10] Nagar, R., Kumar, A., Kumar, S., & Baghel, A. S. (2014, September).“Implementing test case selection and reduction techniques using meta-heuristics.”In Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference- (pp. 837-842). IEEE.
[11] Hui, Z. (2016, June). “Fault Localization Method Generated by Regression Test Cases on the Basis of Genetic Immune Algorithm.”In Computer Software and Applications Conference (COMPSAC), 2016 IEEE 40th Annual (Vol. 2, pp. 46-51). IEEE.
[12] You, L., & Lu, Y. (2012, May).”A genetic algorithm for the time-aware regression testing reduction problem.”
In Natural Computation (ICNC), 2012 Eighth International Conference on(pp. 596-599). IEEE.
[13] Hui, Z. (2016, June). “Fault Localization Method Generated by Regression Test Cases on the Basis of Genetic Immune Algorithm.”In Computer Software and Applications Conference (COMPSAC), 2016 IEEE 40th Annual (Vol. 2, pp. 46-51). IEEE.
[14] Mohapatra, S. K., & Prasad, S. (2014, March). “Minimizing test cases to reduce the cost of regression testing.” In Computing for Sustainable Global Development (INDIACom), 2014 International Conference on (pp. 505-509). IEEE.
[15] Indumathi, C. P., & Madhumathi, S. (2017, May).”Cost aware test suite reduction algorithm for regression testing.”In Trends in Electronics and Informatics (ICEI), 2017 International Conference on (pp. 869-874). IEEE.
[16] Hui, Z. (2016, June). “Fault Localization Method Generated by Regression Test Cases on the Basis of Genetic Immune Algorithm.”In Computer Software and Applications Conference (COMPSAC), 2016 IEEE 40th Annual (Vol. 2, pp. 46-51). IEEE.
[17] Rosero, R. H., Gómez, O. S., & Rodríguez, G. (2017). “Regression Testing of Database Applications Under an Incremental Software Development Setting.”IEEE Access, 5, 18419-18428
[18] Liu, P. (2014, June). “An efficient reduction approach to test suite. In Software Engineering,”Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2014 15th IEEE/ACIS International Conference on (pp. 1-5). IEEE.
[19] Alagöz, I., Herpel, T., & German, R. (2017, March).”A Selection Method for Black Box Regression Testing with a Statistically Defined Quality Level.”In Software Testing, Verification and Validation (ICST), 2017 IEEE International Conference on (pp. 114-125). IEEE.
[20] Muzammal, M. (2016, December).”Test-Suite Prioritisation by Application Navigation Tree Mining.”In Frontiers of Information Technology (FIT), 2016 International Conference on (pp. 205-210). IEEE.
[21] Haider, A. A., Nadeem, A., & Akram, S. (2016, December).’Safe regression test suite optimization: A review.”In Open Source Systems & Technologies (ICOSST), 2016 International Conference on (pp. 7-12). IEEE.
[22] Liu, P. (2014, June).”An efficient reduction approach to test suite. In Software Engineering,”Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2014 15th IEEE/ACIS International Conference on (pp. 1-5). IEEE.
[23] Campos, J., & Abreu, R. (2013, April).”Encoding test requirements as constraints for test suite minimization.” In Information Technology: New Generations (ITNG), 2013 Tenth International Conference on (pp. 317-322). IEEE.
[24] Salehie, M., Li, S., Tahvildari, L., Dara, R., Li, S., & Moore, M. (2011, March).”Prioritizing requirements-based regression test cases: A goal-driven practice.”In Software Maintenance and Reengineering (CSMR), 2011 15th European Conference on(pp. 329-332). IEEE.
[25] Gonzalez-Sanchez, A., Abreu, R., Gross, H. G., & van Gemund, A. J. (2011, November).”Prioritizing tests for fault localization through ambiguity group reduction.”In Proceedings of the 2011 26th IEEE/ACM International Conference on Automated Software Engineering (pp. 83-92). IEEE Computer Society.RE, 2016 IEEE 27th International Symposium on (pp. 47-58) IEEE.
[26] Bhuyar, P. R., & Gawande, A. D. (2015). Analysis using Non- Functional Static Testing Framework.
[27] Sahoo, R. K., Mohapatra, D. P., & Patra, M. R. (2016). A Firefly Algorithm Based Approach for Automated Generation and Optimization of Test Cases. International Journal of Computer Sciences and Engineering, 4(8), 54-58.
Citation
Arzu, S. Singh, "An Algorithm for Test Case Reduction in Regression Testing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.310-315, 2018.
Proposed Algorithm for Secured Transaction using 3-Tier Architecture
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.316-321, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.316321
Abstract
A Greater demands for fast and accurate user identification and authentication in electronic transaction increases day by day. Continuous development of technology, Security involvements are also increasing. ATM helps in a transaction of money any time & anywhere, faces the threat of attack, fraud, theft, etc., thus to deal with high security which provides safety to consumers, Authentication plays an important role. A new system approach for enhancing security and privacy in biometric applications like face detection, IRIS scan, fingerprint, voice, signature, etc. In this biometric system card-less operation done by biometric technology for operating ATMs. Proposed model provide high security in authentication which protects from illegal transactions. By this user required to authenticate him/her self with biometric identification and personal identification number. This proposed system is designed for illiterate, semi-literate and literate people. System decreases complexity with authentication as “you as Security” with high security. It reduces the problem of an excess number of plastic cards & saves environmental pollution. It saves time, cost, effort compared with a card-based system.
Key-Words / Index Term
Automatic Teller Machine, Biometric, Fingerprint, IRIS, Personal Identification Number, Smartcards
References
[1]. Sonakshi Bhagat et al, “ATM Security using Iris Recognition Technology and RFID”, International Journal of Engineering Science and Computing, Vol.7, No.5, pp.11486-11488, May, 2017
[2]. Mr C Raghavendra et al, “High protection human IRIS authentication in new ATM terminal design using biometrics mechanism”, Journal of Global Research in Computer Science, Vol-3, No.11, pp.16-20, November, 2012
[3]. P. Nagarajan, Dr. Ramesh S M, “IRIS Recognition Based Authentication System In ATM”, International journal for trends in engineering & technology, Vol-5, No.1, pp.126-131, May, 2015
[4]. Mr. Mahesh A. Patil et al, “ATM Transaction Using Biometric Fingerprint Technology”, International Journal of Electronics, Communication & Soft Computing Science and Engineering, Vol-2, No.6, pp.22-27
[5]. Ashish M. Jaiswal, Mahip Bartere, “Enhancing ATM security using fingerprint and GSM technology”, International Journal of Computer Science and Mobile Computing, Vol-3, No.4, pp.28-32, April, 2014
[6]. Prof. Selina Oko, Jane Oruh, “Enhanced ATM security system using biometrics”, International Journal of Computer Science Issues, Vol-9, No.5, pp.352-357, September, 2012
[7]. Namit Gupta, Anu Sharma, “Review of biometric technologies used for ATM security”, International Journal of Engineering and Innovative Technology, Vol-3, No.2, pp.460-465, August, 2013
[8]. R. Maheshwri et al, “Security ATM With Help Of Biometric Security”, International Journal of Electronics and Communication Engineering, pp.47-51, March, 2017
[9]. Moses Okechukwu Onyesolu, Ignatius majestry ezeani, “ATM Security Using Fingerprint Biometric Identifer: An Investigative Study”, International Journal of Advanced Computer Science and Applications, Vol-3, No.4, pp.68-72, 2012
[10]. N. Geetanjali, K.Thamaraiselvi, “Enhancing the Security of Biometrics in ATM”, International Journal of Scientific & Engineering Research, Vol-4, No.4, pp.1192-1198, April, 2013
[11]. Parvinder S. Sandhu et al, “Biometric Methods and Implementation of Algorithms”, International Journal of Computer and Information Engineering, Vol-3, No.4, pp.1033-1038, 2009
[12]. Ayushi Mathur, Mr. Rupal Gupta, “Analysis of Algorithms used in Biometric using Fingerprint Authentication for 3D Authentication System”, International Conference on Advanced Computing, pp.398-403, 2016
[13]. Abinandhan Chandrasekaran, Dr.Bhavani Thuraisingham, “Fingerprint Matching Algorithm Based on Tree Comparison using Ratios of Relational Distances”, International Conference on Availability, Reliability and Security, April, 2007
[14]. I. G. Damousis, S. Argyropoulos, “Four Machine Learning Algorithms for Biometrics Fusion: A Comparative Study”, Applied Computational Intelligence and Soft Computing, 2011
[15]. Roaya Salhalden A. Abdalrahman et. al., “A cascaded voice biometric system”, Procedia Computer Science, pp.1223–1228, 2018
[16]. Mithun Dutta et. al., “ATM Transaction Security Using Fingerprint Recognition”, American Journal of Engineering Research, Vol-6, No.8, pp.41-45, 2017
[17]. Nisha Bhanushali et. al., “Fingerprint based ATM system”, Journal for Research, Vol-2, No.12, pp.31-34, February, 2017
[18]. Sneha Ramrakhyani et. al, “Fingerprint Based ATM System: Survey”, International Journal of Innovative Research in Science, Engineering and Technology, Vol-6, No.11, pp.21515-21520, November, 2017
[19]. Paschal A. Ochang and Paulinus O. Ofem, “An Enhanced Automated Teller Machine Security Prototype using Fingerprint Biometric Authentication”, International Journal of Advanced Networking and Applications, Vol-8, No.4, pp-3110-3117, 2017
[20]. Reshma Begum et. al., “Security of ATM System Using Biometric and OTP”, International Journal of Innovative Research in Computer and Communication Engineering, Vol-5, No.4, pp.72-77, June, 2017
[21]. Aneesh Chandran et. al., “ATM for Visually Challenged People”, International Research Journal of Engineering and Technology, Vol-4, No.3, pp.370-375, March, 2017
[22]. Ankit Singla and Neetu Jain, “Fraud Reduction in ATM Machines using Voice Recognition- A Review”, International Journal of Innovative Research in Science, Engineering and Technology, Vol-6, No.5, pp.7525-7530, May, 2017
[23]. Fahreddin Sadikoglu and Selin Uzelaltinbulat, “Biometric Retina Identification Based on Neural Network”, Procedia Computer Science, Vol-102, pp.26-33, 2016
[24]. Reshmi K.C. et. al., “A Novel Approach to Brain Biometric User Recognition”, Procedia Technology, pp.240-247, 2016
[25]. Nana Kwame Gyamfi et. al., “Enhancing the Security Features of Automated Teller Machines (ATMs): A Ghanaian Perspective”, International Journal of Applied Science and Technology, Vol-6, No.1, pp.102-111, February, 2016
[26]. Ceren Tarkmen and Alper Deayerli, “Transformation of Consumption Perceptions: A Survey on Innovative Trends in Banking”, Procedia - Social and Behavioral Sciences, Vol-195, pp.376-382, July, 2015
[27]. Firas S. Assaad and Gursel Serpen, “Transformation based Score Fusion Algorithm for Multi-modal Biometric User Authentication through Ensemble Classification”, Procedia Computer Science, Vol-61, pp.410-415, 2015
[28]. Mohsin Karovaliya et. al., “Enhanced security for ATM machine with OTP and Facial recognition features”, Procedia Computer Science, pp.390-396, 2015
[29]. Michael Mireku Kwakye et. al., “Adoption of Biometric Fingerprint Identification as an Accessible, Secured form of ATM Transaction Authentication”, International Journal of Advanced Computer Science and Applications, Vol-6, No.10, pp.263-265, 2015
[30]. Rathishala Rajendran et. al., “ATM Security using Fingerprint Authentication and OTP”, International Journal of Current Engineering and Technology, Vol-5, No.2, pp.1157-1159, April, 2015
[31]. Zameer Afshan, Pawan Kumar Chaurasia, “A Review on Crypto-Currency”, International Journal Of Computer Science and Mobile Application, Vol-6, pp.95-100, 2018
[32]. V.K. Jain , N. Tripathi, “Speech Features Analysis and Biometric Person Identification in Multilingual Environment”, International Journal of Scientific Research in Network Security and Communication, Vol-6 , No.1 , pp.7-11, Feb, 2018
[33]. Namrata Ghuse et. al., “An Improved Approch For Fraud Detection In Health Insurance Using Data Mining Techniques”, International Journal of Scientific Research in Network Security and Communication, Vol-5, No.5, pp.28-32, June, 2017
[34]. Savitha G. et. al., “Selective Small Reconstruction Error Based LDRC Multimodal Biometric Authentication”, International Journal of Scientific Research in Computer Science and Engineering, Vol-6, No.1, pp.1-10, Feb, 2018
[35]. Oluwabunmi Ayankemi ONI, “A Framework for Verifying the Authenticity of Banknote on the Automated Teller Machine (ATM) Using Possibilistic C-Means Algorithm”, International Journal of Scientific Research in Computer Science and Engineering, Vol-6, No.2, pp.57-63, April, 2018
Citation
Priya Sharma, Pawan Kumar Chaurasia, "Proposed Algorithm for Secured Transaction using 3-Tier Architecture," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.316-321, 2018.
High Capacity PVD Steganography Using Back Propagation Artificial Neural Network
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.322-330, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.322330
Abstract
To represent the image on a screen, several bits is used. Image compression a technique which is used to reduce the number of bits used for representation. Image compression helps in reducing the size of the image which results in less storage space and less cost of the transmission. The image is as compressed as the quality of the image is retained. In this paper, the image is compressed first and then the secret message is hidden in it using Tri-way Pixel Value Difference method. A neural network algorithm called Back Propagation Neural Network Algorithm is used for image compression. The benefit of using back propagation algorithm for using image compression is the vast increase in performance of the system as well as less convergence time for neural network training which not only maintain the quality of the image but also reduce the overall size of the image. This neural network method for image compression has shown a very promising result in image compression. After compression of the image, the secret message is embedded using Tri-way pixel Value Difference method which not only provides imperceptible stego image but also enlarges the capacity of the hidden secret information.
Key-Words / Index Term
Artificial Neural Network, Steganography, Image Compression, Back Propagation Algorithm, Pixel-Value Differencing, Data Hiding
References
[1] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, “Information Hiding - a Survey,” Proceedings of the IEEE, Vol. 87, pp. 1062–1078, 1999.
[2] W. Bender, D. Gruhl, N. Morimoto, A. Lu, “Techniques for data hiding,” IBM Systems Journal Vol. 35 (3–4), pp. 313–336, 1996.
[3] Y. K. Lee, L. H. Chen, “High capacity image steganographic model,” IEE Proceedings on Vision, Image and Signal Processing, Vol. 147, No.3, pp. 288-294, 2000.
[4] R.-Z. Wang, C.-F. Lin, and J.-C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, Vol. 34, pp. 671–683, 2001.
[5] C.-C. Chang, J.-Y. Hsiao, C.-S. Chan, “Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy,” Pattern Recognition ,Vol. 36, Issue 7, pp. 1583-1595, 2003.
[6] C.-K. Chan, L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition Vol. 37, Issue 3, pp. 469-474, 2004.
[7] W.-N. Lie, and L.-C. Chang, “Data hiding in images with adaptive numbers of least significant bits based on the human visual system,” IEEE International Conference on Image Processing, Vol. 1, pp. 286–290, 1999.
[8] D.-C. Wu, and W.-H. Tsai, “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, Vol. 24, pp. 1613–1626, 2003.
[9] H.-C. Wu, N.-I. Wu, C.-S. Tsai, and M.-S. Hwang, “Image steganographic scheme based on pixel-value differencing and LSB replacement methods,” IEE Proceedings on Vision, Image and Signal Processing, Vol. 152, No. 5, pp. 611-615, 2005.
[10] S.-L. Li, K.-C. Leung, L.-M. Cheng, and C.-K. Chan,“Data Hiding in Images by Adaptive LSB Substitution Based on the Pixel-Value Differencing,” First International Conference on Innovative Computing, Information and Control (ICICIC`06), Vol. 3, pp. 58-61, 2006.
[11] S. Voloshynovskiy, S. Pereira, T. Pun, J. J. Eggers, and J. K. Su, “Attacks on digital watermarks: classification, estimation based attacks, and benchmarks,” IEEE Communications Magazine, Vol. 39, Issue 8, 118-126, 2001.
[12] J. Fridrich, M. Goljan, and R. Du, “Detecting LSB steganography in color, and gray-scale images,” IEEE multimedia, Vol. 8, Issue 4, pp. 22-28, 2001.
[13] Ko-Chin Changa, Chien-Ping Changa, Ping S. Huangb, and Te-Ming Tua, “A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing,” Journal Of Multimedia, Vol. 3, NO. 2, 2008.
[14] Abbas Razavi, Rutie Adar, Isaac Shenberg, Rafi Retter and Rami Friedlander “VLSI implementation of an image compression algorithm with a new bit rate control capability,” Zoran Corporation, 1705 Wyatt Drive, Santa Clara, CA 95054.This paper was published in IEEE international conference ,vol. 5, pp.669-672, 1992.
[15] Ronald A .DeVore, Bjorn Jawerth, and Bradley J.Lucier. “Image compression through wavelet transforms coding,” Ieee Transactions on Information Theory, Vol. 38. No .2, 1992.
[16] David Jeff Jackson and Sidney Jwl Hannah “Comparative analysis of image compression technique” Department of Electrical Engineering ,The University of Alabama, Tuscaloosa, AL 35487.This paper appears in system theory 1993,proceeding SSSST’93, twenty fifth edition southeastern symposium, pp. 513-517, 1993.
[17] P.Moravie, H.Essafi, C. Lambertt-Nebout and J-L. Basill. “Real time image compression using SIMD architecture” Centre Spatial de Toulouse 18 Avenue Edouard Belin BP 1421. This paper appears in computer architecture for machine perception, 274-279, 1995.
[18] JJiang “Neural network technology for image compression,” Bolton Institute, UK. This paper appears in broadcasting convection, pp.250-257, 1995.
[19] Michael T. Kurdziel. “Image compression and transmission for HF radio system”. Harrish corporation RF communication division Rochester, NY. This paper appears in MILLCON, vol 2 on pp.1281-1285, 2002.
[20] Aaron T. Deever and Sheila S. “Lossless image compression with projection based and adaptive reversible integer wavelet transform”. This paper appears in IEEE transactions of image processing, vol 12, 2003.
[21] Jian Li, Caixin Sun. “Partial discharge image recognition influced by fractal image compression ,” Department of High Voltage and Insulation Technology, College of Electrical Engineering, Chongqing University. China. This paper appears in Dielectric and electrical insulation, IEEE transactions, vol 15, pp. 496-504, 2008.
[22] Guan-Nan Hu, Chen-Chung Liu, Kai-Wen Chuang, Shyr-Shen Yu, Ta-Shan Tsui, “General Regression Neural Network utilized for color transformation between images on RGB color space,” Proceedings of international conference on machine learning and cybernatics, pp. 1793 – 1799, 2011.
Citation
Jyoti Pandey, Kamaldeep Joshi, Mohit Jangra, Tanu Garg, Sangeeta, Parth kaushik, "High Capacity PVD Steganography Using Back Propagation Artificial Neural Network," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.322-330, 2018.