Novel Technique for Detection of Wormhole Attack in MANET
Review Paper | Journal Paper
Vol.6 , Issue.11 , pp.464-468, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.464468
Abstract
The wireless nature of communication makes mobile ad hoc networks unreliable vulnerable to any attack with intent to steal the data can do so by deploying malicious nodes in the network. Normally the routing protocols are designed to find shortest path length is determined using hop count as metric. Out of many attacks the wormhole attack is pretty dangerous one as it is launched using two pairs of malicious nodes with create a tunnel by skipping few nodes in between source and destination node. The existing scheme considers the wormhole attacks when there are no intermediate nodes present between destinations. This technique is suitable for scenarios where the path length between source and destination is two hops only .this scheme cannot be used for networks with layer hops between source and destination node. In this research work, the novel scheme is proposed which detect and isolation malicious nodes from the MANETs. The malicious nodes are responsible to trigger wormhole attack in MANET. The proposed technique is implemented in NS2 and simulation results shows that proposed technique performs well as compared to other techniques.
Key-Words / Index Term
Wormhole, Delay per hop, Malicious, MANETs
References
[1]. M Moharlalpriya and I Krishnamurthi. “Modified DSR protocol for detection and removal of selective black hole attack in MANET”, Comput. Electr. Eng., volume 40, issue 55, pp-530-538. 2014.
[2]. VK Sagtani, and SKumar, “Modern Approach to Enhance Routing Recitation in MANET”. International Journal of Emerging Technology and Advanced Engineering, volume 4, issue 7, pp.265-270, 2014.
[3]. Y. Hu, A Perrig and D. Johnson, “Wormhole Attacks in Wireless Networks”, IEEE Journal on selected areas in communication, Vol. 24, No. 2, pp- 823-836, 2006.
[4]. AC.Yao, "Protocol for Secure Computations," in proceedings of the 23rd annual IEEE symposium on foundation of computer science, volume 5, issue 14, pages 160-164, 1982.
[5]. D. K. Mishra, M. Chandwani, "Extended Protocol for Secure Multiparty Computation using Ambiguous Identity," WSEAS Transaction on Computer Research, Vol. 2, issue 2, pp- 264-275, 2007.
[6]. C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu, "Tools for Privacy-Preserving Distributed Data Mining," J. SIGKDD Explorations, Newsletter, VolA, No.2, ACM Press, pages 28-34, 2002.
[7]. R. Sheikh, B. Kumar and D. K. Mishra, "PrivacyPreserving k-Secure Sum Protocol," in International Journal of Computer Science and Information Security, Vol.6 No.2, pages 184-188,, 2009.
[8]. Sayan Majumder, Prof. Dr. Debika Bhattacharyya, “Mitigating Wormhole Attack in MANET Using Absolute Deviation Statistical Approach”, 2018, IEEE
[9]. Roshani Verma, PROF. Roopesh Sharma, Upendra Singh, “New Approach through Detection and Prevention of Wormhole Attack in MANET”, International Conference on Electronics, Communication and Aerospace Technology ICECA 2017
[10]. Pratik Gite, “Link Stability Prediction for Mobile Ad-hoc Network Route Stability”, International Conference on Inventive Systems and Control, 2017
[11]. Kavitha T, Muthaiah R, “ INSTANT ROUTE MIGRATION DURING LINK FAILURE IN MANETS”, International Journal of Mechanical Engineering and Technology (IJMET) Volume 8, Issue 8, August 2017
[12]. Sunil Kumar Jangir, Naveen Hemrajani, “A Comprehensive Review On Detection Of Wormhole Attack In MANET”, 2016, IEEE
[13]. H.Ghayvat, S.Pandya, S.Shah, S.C.Mukhopadhyay, M.H.Yap, K.H.Wandra, “Advanced AODV Approach For Efficient Detection And Mitigation Of WORMHOLE Attack IN MANET”, 2016 Tenth International Conference on Sensing Technology
[14]. Chitra Gupta, Priya Pathak, “Movement Based or Neighbor Based Tehnique For Preventing Wormhole Attack in MANET”, 2016 Symposium on Colossal Data Analysis and Networking (CDAN)
Citation
Sukhwinder Singh, Rajnish Kansal, "Novel Technique for Detection of Wormhole Attack in MANET," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.464-468, 2018.
Assessment of Understandability Index Using Design Metrics
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.469-471, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.469471
Abstract
Estimation is a fundamental piece of any developing discipline. Measuring the quality parameters of the software engineering will reveal great fits of knowledge about the design. It will likewise help experts and practioners to select the best hit of elective structures that addresses their issues. This work makes ready for analysts to begin exploring approaches to quantify understand ability. Estimation of quality properties is basic for this sub-field of software designing. This article quantifies the understand ability of software at design stage, a few factors that influence them.
Key-Words / Index Term
Index Terms Software Quality, Object Oriented Design Characteristics, and understandability
References
[1]. K. K. Aggarwal, Y. Singh, and J.K. Chhabra, “A Fuzzy Model for Measurement of Software Understand ability”, International Symposium on Performance Evaluation of Computer & Telecommunication Systems, Montreal, Canada (2003).
[2]. W.N.Lo Bruce, S. Haifeng, “A Preliminary Testability Model for Object-Oriented Software”, in Proceeding of International Conference on Software Engineering, Education, Practice, pp 330- 337, IEEE (1998).
[3]. K. S. Rani, “Open Source Software: A Prominent Requirement of Information Technology” International Journal of Scientific Research in Network Security and Communication (ISSN: 2321-3256), ol.6 , Issue.2, pp.24-29, Apr-2018
[4]. D. Gallin, Software Quality Assurance from Theory to Implementation. Edinburgh Gate: Pearson Education, 2004.
[5]. J. Ramos, Ricardo; Piveta, Eduardo K; Castro, Jaelson; Moreira, Ana; Guerreiro, Pedro; Pimenta, Marcelo S; Price, R. Tom; Araujo, “Improving the Quality of Requirements with Refactoring,” in Simposio Brasileiro de Qualidade de Software, 2009.
[6]. P.Jayaraju and V. Prakash “Web Based Interface Implementation”, International Journal of Scientific Research in Computer Sciences and Engineering (ISSN: 2320-7639), Vol.3, Issue 5, pp.6-11, Sep2015.
[7]. Mohammad Zunnun Khan, M.Akheela Khanam, M. H. K. (2016). Software Testability in Requirement Phase: A Review. International Journal of Advanced Research in Computer and Communication Engineering, 5(4), 1031- 1035. DOI 10.17148/IJARCCE.2016.54252.
[8]. M. Jureczko and L. Madeyski, “Towards identifying software project clusters with regard to defect prediction”, IEEE, 2010.
[9]. Mohd Nazir et. al. “A Metrics Based Model for Understandability Quantification”, Journal Of Computing, Volume 2, Issue 4, April 2010, Issn 2151-9617.
[10]. A. Mishra, D. Agarwal and M.H. Khan, “Confidentiality Estimation Model: Fault Perspective” International Journal of Advanced Research in Computer Science (IJARCS), Volume 8 Issue. 4, June 2017
[11]. Dr. Brijesh Kumar Bhardwaj, “Understand ability Estimation Model: Requirement Stage” International Journal for Research in Engineering Application & Management (IJREAM), Volume 4 Issue 6, Sep 2018.
Citation
Brijesh Kumar Bhardwaj, "Assessment of Understandability Index Using Design Metrics," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.469-471, 2018.
Thrash Deplorer System Using IoT Through Web Application
Survey Paper | Journal Paper
Vol.6 , Issue.11 , pp.472-475, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.472475
Abstract
Today’s generation has a great need of cleanliness and health plays an important role in their life so that our surroundings must be clean. This can be achieved through this paper and in this paper it mainly deals about the overfilling of garbage bins in our society. The bin status can be observed by the municipal officer in his office and knowing continuous monitoring of the bin status through the web application using IoT. The filling of the bins can be determined by two methods one is by weight and the other is the level. This can reduce the manual monitoring and continuous keen observation on the bin can be prevented .In this paper mainly deals about the sensors like weight and ultrasonic sensors, a node Microcontroller Unit (MCU) and an IoT platform which acts as an interface with the hardware part and the software part in which the application is present. The hardware part can be connected on the Arduino in which all the sensors can be interfaced along with NodeMicroControllerUnit (MCU).
Key-Words / Index Term
NodeMCU, IoT, Arduino, weight and ultrasonic sensors
References
[1]. Dr. LakhimiGogoi,”Municipal solid waste disposal: a case study in Guwahati city to mitigate the manmade disaster”, IOSR Journal of Humanities and Social Science (IOSR-JHSS) Volume 9, Issue 3(Mar. Apr. 2013), PP 55 60 e ISSN:22790837, p-ISSN: 2279-0845.
[2]. Saha, H. N., Auddy, S., Pal, S., Kumar, S., Pandey, S., Singh, R, Saha, S. (2017). Waste management using Internet of Things (IoT). 2017 8th Annual Industrial Automation and Electromechanical EngineeringConference(IEMECON).doi:10.1109/ieme con.2017.8079623
[3]. Kumar, N. S.Vuayalakshmi, B.Prarthana, R. J., & Shankar, A. (2016). “IOT based smart garbage alert system using Arduino UNO”. 2016 IEEE Region 10 Conference (TENCON). doi: 10.1109 /tencon. 2016. 7848162 .
[4]. Sunil Raj Thota, S. Neelima, K. V. N. Lalitha Pruthvi, K. Mounika, M. Pravallika , Mrs. N. Sowmya, Asst. Proof “Smart Trash Can Monitoring System usingIoT-Creating Solutions for Smart Cities “International Research Journal of Engineering and Technology(IRJET)e-ISSN: 2395-0056p-ISSN: 2395-0072Volume: 05 Issue: 03 | Mar-2018
[5]. Akshatha.Y1,TasbihaAafreen.G,NandiPriyaBai.M.L , Jyothi.M , Anitha.R”. IoT Based Garbage and Street Light Monitoring System” International Journal of Engineering Science and Computing, May 2017 Volume 7 Issue No.5
Citation
K. Lalith Kishore, P. Jaswanth, S.B.T. Abhyuday, Y. Jayasairam, "Thrash Deplorer System Using IoT Through Web Application," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.472-475, 2018.
Providing the Resources by using scheduling algorithm in Cloud Computing
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.476-481, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.476481
Abstract
Cloud computing is an environment for providing different services on the premise of demand and the need. It can able to build the virtualization, distributed computing to assist the cost-efficient usage method to adequate the resources with the usage of resource scalability, computing resources and on-demand resources. It can manage the user requests and also make available the resources by implementing the new virtual machines. The virtual machine can qualify for assigning the resources premises on the availability of resources. Cloud computing assists to load balancing and avoid the delay in running of the job. Based on the characteristics of the job new virtual machines are implemented. This paper can deal with the assigning of resources to the job based on its requirement and also consider the priorities of the job. Here we distinguish the various types of leases with their corresponding priorities. According to that priority, the execution can be processed. The main aim of this work is to delay the low priority job (consists high deadline of the job) and schedule the high priority job (having a low deadline of the job) and dynamically allocates VM resources to the user job within the deadline.
Key-Words / Index Term
CloudSim, Virtual machines, SLA
References
[1] Zhao M, Figueiredo RJ. Experimental study of virtual migration in support of reservation of cluster resource of the 3rd Inter. Workshop on virtualization Tech Distributed Computing. ACM: Barcelona, 2007. pp. 5
[2] Saraswathi AT, Kalaashri. Y.RA, Dr. S. Padmavathi. “Dynamic resource allocation scheme in cloud computing”. Procedia computer science 47b (2015). Pages: 30-36.
[3] Kumar, N, Saxena,S. “A preferred based resource allocation in cloud computing systems”. In Proceedings of computer sci. 57, 104-111, 2015.
[4] R. Grewal, P. Patreiya, “A rule-based approach for effective resource provisioning in hybrid cloud environment”, in advances in intelligent Systems and computing, vol. 203, Springer ,berlin Heidelberg, pp. 41-57, 2013.
[5] Ye Hu, JohnyWong , Gabriel Iszalai , Marlin Litoiu, “resource provisioning for cloud computing” Proceedings of the 2009 conference of the center for advanced studies on collaborative Research, November 02-05, 2009, Ontario, Canada.
[6] Priya Gupta, MakrandSamavatsar, Upendra Singh“ Cloud computing through dynamic resource allocation scheme”.International conference on electronics, communication and aerospace technology ICECA 2017.
[7] Sotomayor B, Montero RS, Llorente IM, ” Foster I.Resource leasing and the art of suspending virtual machines ”. In Proc. of the 11th IEEE Inter Conference on High Performance Computing and Communications, USA, 2009. Pages: 59-68.
[8] Chunlin Li, La Yuan Li. “Optimal resource provisioning for cloud computing”. The Journal of Super computing, 2012. Vol. 62, Issue pp. 989-1022,
[9] Amini Salehi M, Javadi B and Buyya R. “Resource Provisioning based on Preempting Virtual Machines in Distributed Systems”. The Journal of Concurrency and Computation: Practice and Experience, 2013. Vol. 26, No. 2. Pages: 412-433.
[10] http://Haizea.cs.uchicago.edu/
[11] Bolze R, Cappello F, Caron E, Daydé M, Desprez F, Jeannot E, Jégou Y, Lanteri S, Leduc J, Melab N, MornetG,Namyst R, Primet P, Quetier B, Richard O, El-Ghazali T, Touche I. Grid’5000: a large scale and highly reconfigurable experimental Grid testbed. International Journal of High Performance Computing Applications 2006;20(4):481–497.
[12] Chase JS, Irwin DE, Grit LE, Moore JD, Sprenkle SE. Dynamic virtual clusters in a Grid site manager. Proceedingsof the 12th IEEE International Symposium on High Performance Distributed Computing, USA, 2003; 90–98.
[13] Amini Salehi M, Javadi B, Buyya R. Resource provisioning based on leases preemption in InterGrid. In Proceedingof the 34th Australasian Computer Science Conference (ACSC’11), Vol. 113, CRPIT. ACS: Perth, Australia, 2011;25–34.
[14] Tsafrir D, Etsion Y, Feitelson DG. Backfilling using system-generated predictions rather than user runtime estimates.IEEE Transactions on Parallel and Distributed Systems 2007; 18(6):789–803.
[15] Iosup A, Epema DHJ, Tannenbaum T, Farrellee M, Livny M. Inter-operating grids through delegated matchmaking.In Proceedings of the ACM/IEEE Conference on Supercomputing (SC ’07). ACM: USA, 2007; 1–12.
[16] I. Foster and C. Kesselman, editors. The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann Pub., 1999.
[17] J. P. Jones and B. Nitzberg. Scheduling for parallel supercomputing: A historical perspective of achievable utilization. In JSSPP, volume 1659 of LNCS, pages 1–16, 1999.
[18] U. Lublin and D. G. Feitelson. The workload on parallel supercomputers: modeling the characteristics of rigid jobs. J. PDC, 63(11):1105–1122, 2003.
[19] A. Iosup, M. Jan, O. Sonmez, and D. Epema. The characteristics and performance of groups of jobs in grids. In Euro-Par, LNCS, 2007.
[20] H. H. Mohamed and D. H. J. Epema. Experiences with the koala co-allocating scheduler in multiclusters. In CCGrid, pages 784–791. IEEE CS, 2005.
[21] D. G. Feitelson and L. Rudolph. Metrics and benchmarking for parallel job scheduling. In IPPS/SPDP, volume 1459 of LNCS, pages 1–24, 1998.
[22] A. Iosup, C. Dumitrescu, D. H. Epema, H. Li, and L. Wolters. How are real grids used? The analysis of four grid traces and its implications. In GRID, pages 262–270. IEEE CS, 2006.
[23] Mohamed Graiet; AmelMammar; SouhaBoubaker; Walid Gaaloul. "Towards Correct Cloud Resource Allocation in Business Processes" IEEE Transactions on Services Computing, Year: 2017, Volume: 10, Issue: 1 Pages: 23 - 36.
Citation
B. Muni Lavanya, "Providing the Resources by using scheduling algorithm in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.476-481, 2018.
Hybrid Technique for Improving the Watermarking and Encryption Scheme for Online Multimedia Copyright Protection to using Chaotic Maps Cryptography
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.482-490, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.482490
Abstract
Encryption and watermarking are two innovative techniques that are used for protecting the traditional multimedia files. In this research paper, a proposed hybrid encryption-watermarking algorithm for content copyright protection is proposed. The watermarking steps of this proposed algorithm is based on combining the three techniques like Discrete Wavelet Transform (DWT), the Discrete Cosine Transform (DCT), and the Singular Value Decomposition(SVD), while the encryption phase is based on using different chaotic maps with different dimensions to improve the performance of algorithms efficiency. The proposed watermarking scheme uses a new PN-codes for embedding strategy of the watermark into the cover image. This scheme allows to decreasing the embedding strength factor of the scheme to a value that maximizes imperceptibility performance, while maintaining acceptable robustness and imperceptibility measures of the watermarking scheme. The performance of the proposed watermarking scheme is implemented individually based on the metrics like robustness and the imperceptibility measures. This scheme is compared with some very recent existing algorithms and experimental results show the improvements of the proposed algorithm over other important algorithms. On the other hand, the proposed chaos-based encryption algorithms used different chaotic maps of different dimensions to improve the performance of algorithms efficiency. The proposed encryption algorithm is tested using different set of experiments. The experimental results demonstrate that the proposed encryption algorithm research shows advantages of large key space, high resistance against differential attacks and high security analysis such as (i)Statistical analysis, and (ii)Sensitivity analysis. Compared to some traditional and recent encryption algorithms, our proposed encryption algorithm is much more secure. Finally experimental test demonstrate that the proposed hybrid encryption-watermarking algorithm introduces high degree of efficiency, robustness, and security as compared to previously developed techniques/algorithms.
Key-Words / Index Term
Chaotic maps, Encryption, Digital Watermarking, Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), Singular Value Decomposition (SVD)
References
[1] Dongyan Wang, Fanfan Yang, and Heng Zhang, "Blind Color Image Watermarking Based on DWT and LU Decomposition ," Journal of Information Processing Systems, vol. 12, no. 4, pp. 765~778, 2016.
[2] Y.-M. Chu, N.-F.Huang, and S.-H. Lin, “Quality of service provision in cloud-based storage system for multimedia delivery,” IEEE Systems Journal, vol. 8, no. 1, pp. 292–303, 2014.
[3] I. Hussain, T. Shah, M. A. Gondal, and H. Mahmood, “An efficient approach for the construction of LFT S-boxes using chaotic logistic map,” Nonlinear Dynamics, vol. 71, no. 1-2, pp. 133–140, 2013.
[4] I. Hussain, A. Anees, M. Aslam, R. Ahmed, and N. Siddiqui, “A noise resistant symmetric key cryptosystem based on S-Boxes and chaotic maps,” The European Physical Journal Plus, vol. 133, no. 4, 2018.
[5] I. Hussain, A. Anees, A. H. AlKhaldi, A. Algarni, and M. Aslam, “Construction of chaotic quantum magnets and matrix Lorenz systems S-boxes and their applications,” Chinese Journal of Physics, 2018.
[6] I. Hussain, A. Anees, and A. Algarni, “A novel algorithm for thermal image encryption,” Journal of integrative neuroscience, pp. 1–15, 2018.
[7] A. Anees, A.M. Siddiqui, and F. Ahmed, “Chaotic substitution for highly autocorrelated data in encryption algorithm,” Communications in Nonlinear Science andNumerical Simulation, vol. 19, no. 9, pp. 3106–3118, 2014.
[8] T. T. Mapoka, S. J. Shepherd, and R. A. Abd-Alhameed, “A new multiple service key management scheme for secure wireless mobile multicast,” IEEE Transactions onMobile Computing, vol. 14, no. 8, pp. 1545–1559, 2015.
[9] A. Anees, W. A. Khan, M. A. Gondal, and I. Hussain, “Application of mean of absolute deviation method for the selection of best nonlinear component based on video encryption,”Zeitschrift fur Naturforschung - Section A Journal of Physical Sciences, vol. 68, no. 6-7, pp. 479–482, 2013.
[10] H. Liu and X. Wang, “Color image encryption based on onetime keys and robust chaotic maps,” Computers & Mathematics with Applications. An International Journal, vol. 59, no. 10, pp. 3320–3327, 2010.
[11] A. Anees and Z. Ahmed, “A Technique for Designing Substitution Box Based on Van der Pol Oscillator,” Wireless Personal Communications, vol. 82, no. 3, pp. 1497–1503, 2015.
[12] J. Daemen and V. Rijmen, The Design of Rijndael: AES-The Advanced Encryption Standard, Springer, Berlin, Germany, 2002.
[13] A. Anees andM. A. Gondal, “Construction of Nonlinear Component for Block Cipher Based on One-Dimensional Chaotic Map,” 3D Research, vol. 6, no. 2, 2015.
[14] A. Anees and A. M. Siddiqui, “A technique for digital watermarking in combined spatial and transform domains using chaotic maps,” in Proceedings of the 2013 2nd National Conference on Information Assurance, NCIA 2013, pp. 119–124, pak, December 2013.
[15] S. S. Jamal, M. U. Khan, and T. Shah, “A Watermarking Technique with Chaotic Fractional S-Box Transformation,” Wireless Personal Communications, vol. 90, no. 4, pp. 2033–2049, 2016.
[16] S. S. Jamal, T. Shah, and I. Hussain, “An efficient scheme for digital watermarking using chaotic map,” Nonlinear Dynamics, vol. 73, no. 3, pp. 1469–1474, 2013.
[17] X. Wang and D. Chen, “A parallel encryption algorithm based on piecewise linear chaotic map,” Mathematical Problems in Engineering, vol. 2013, 2013.
[18] A. Anees, A. M. Siddiqui, J. Ahmed, and I. Hussain, “A technique for digital steganography using chaotic maps,” Nonlinear Dynamics, vol. 75, no. 4, pp. 807–816, 2014.
[19] F. Ahmed, A. Anees, V. U. Abbas, and M. Y. Siyal, “A noisy channel tolerant image encryption scheme,” Wireless Personal Communications, vol. 77, no. 4, pp. 2771–2791, 2014.
[20] F. Ahmed and A. Anees, “Hash-Based Authentication of Digital Images in Noisy Channels,” Robust Image Authentication in the Presence of Noise, pp. 1–42, 2015.
[21] Wang XY, Zhang HL. A color image encryption with heterogeneous bit- permutation and correlated chaos. Opt Commun2015; 342:51–60.
[22] Wang XY, Liu LT, Zhang YQ. A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 2015; 66:10–8.
[23] Abuturab MR. an asymmetric single-channel color image encryption based on Hartley transform and gyrator transform. Opt Lasers Eng 2015; 69:49–57.
[24] Xu, Lu, et al. "A novel bit-level image encryption algorithm based on chaotic maps." Optics and Lasers in Engineering 78 (2016): 17-25.
[25] Zhang YQ, Wang XY. Asymmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice.InfSci2014; 273(20):329–51.
[26] Zhenjun Tang, JuanSong, Xianquan Zhang, Ronghai Sun, “Multiple-image encryption with bit-plane decomposition and chaotic maps”, Optics and Lasers in Engineering, Volume 80, May 2016
[27] Benyamin Norouzi, Sattar Mirzakuchaki, “Breaking an Image Encryption Algorithm based on the New Substitution Stage with Chaotic Functions”, Optik - International Journal for Light and Electron Optics 127(14), Volume 127, Issue 14, July 2016
[28] Adrian-Viorel Dianconu, “Circular inter-intra bit-level permutation and chaos-based image encryption”, Information Sciences, Volumes 355–356, Elsevier, August 2016
[29] XiaoweiLi, ChengqingLi, In-Kwon Lee, “Chaotic image encryption using pseudo-random masks and pixel mapping”, European Association for Signal Processing, Volume 125, Elsevier, August 2016
[30] Wenhao Liu, Kehui Sun, Congxu Zhu, “A fast image encryption algorithm based on chaotic map”, Elsevier, 2016
[31] Akram Belazi, Ahmed A. Abd El-Latif, Safya Belghith, “A novel image encryption scheme based on substitution-permutation network and chaos”, European Association for Signal Processing, Elsevier, 2016
[32] Khadijeh Mirzaei Talarposhti, Mehrzad Khaki Jamei, “A secure image encryption method based on dynamic harmony search (DHS) combined with chaotic map”, Optics and Lasers in Engineering, Volume 81, Elsevier, 2016.
Citation
J. Udayakumar, G. Prabakaran, "Hybrid Technique for Improving the Watermarking and Encryption Scheme for Online Multimedia Copyright Protection to using Chaotic Maps Cryptography," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.482-490, 2018.
Behavioural Analysis of Handover Mechanism in Heterogeneous Wi-Li-Fi Environment
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.491-496, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.491496
Abstract
Light-fidelity (Li-Fi) is a dominant technology for wireless networking working on the principle of visible light communication (VLC). Li-Fi has wide-bandwidth, licence-free characteristics enables communication in radio frequency (RF) sensitive environments, realizes energy-efficient data transmission, and has the potential to boost the capacity of wireless access network through divergence. The new network environment called hybrid Wi-Li-Fi system developed, utilizing unidirectional Li-Fi channel as downlink and Wi-Fi channel as both uplink and downlink. The handover in traditional heterogeneous RF based wireless network has already been analyzing. However integration of Li-Fi network with heterogeneous RF network will create a hybrid Het-Net and the handover method also become highly conjugate. In this paper, we analysed hybrid heterogeneous handover schemes while user equipment (UE) rotate and roam and novel insights are analysed. Experimental results revealed that the hybrid system out performs the conventional Wi-Fi, and Li-Fi environment for the crowded environments in terms of throughput, delay time and handover rate.
Key-Words / Index Term
VLC, Li-Fi, Het-Net, Handover,Wi-Li-Fi
References
[1]. Wentao Zhang, LiChen*, XiaohuiChen,ZihaoYu, ZhiyuanLi,Weidong Wang. Design and realization of indoor Li-Fi-wi-fi hybrid network,Journal of Communications and Information Networks,Vol.2,No.4,Dec. 2017,(78).
[2]. M.Vladescu, D. T. Vuza. Redundant uplink optical channel for visible light communication systems[C]//Advanced Topics in Optoelectronics, Microelectronics, and Nano technologies VII, 2015: 92581J.
[3]. LIU Yang, ZHAO Hua, HUANG Kaizhi, et al. “Research on networking strategy of visible light indoor environment”[J], Telecommunication Science (in Chinese), 30(1): 8-14 , 2014.
[4]. Y. Q.Wang, Y. G.Wang, N. Chi, et al. Demonstration of 575-Mb/s downlink and 225-Mb/s uplink bi-directional SCM-WDM visible light communication using RGB LED and phosphor-based LED [J].Optics express, 2013, 21(1): 1203-1208.
[5]. Y.F.Liu, C.H.Yeh, C.W.Chow, et al. Demonstration of bi-directional LED visible light communication using TDD traffic with mitigation of reflection interference [J].Optics express, 2012, 20(21): 23019-23024.
[6]. L. Chen, W. D.Wang, C. Zhang. Coalition formation for interference management in visible light communication networks [J]. IEEE transactions on vehicular technology, 2017, 66(8): 7278-7285
[7]. X. Li, R. Zhang, and L. Hanzo. “Cooperative Load Balancing in Hybrid Visible Light Communications and WiFi”[J], IEEE Transactions on Communications, 63(4): 1319-1329, 2015.
[8]. F. Wang, Z. Wang, C. Qian, et al. “Efficient vertical handover scheme for heterogeneous LI-FI-RF systems”[J], IEEE/OSA Journal of Optical Communications and Networking, 7(12): 1172-1180, 2015.
[9]. T. Komineand, M. Nakagawa, “Fundamental analysis for visible-light communication system using led lights,” Consumer Electronics, IEEE Transactions on, vol. 50, no. 1, pp. 100–107, 2004.
[10]. Mohammad Dehghani Soltani, Hossein Kazemi, Majid Safari, Harald Haas, “Handover Modeling for Indoor Li-Fi Cellular Network: The Effects of Receiver Mobility and Rotation”,
[11]. IEEE Computer Society. IEEE Draft Standard for Local and Metropolitan Area Networks - Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY). June 2012.
Citation
P. Sivananaintha perumal, S. Arunmozhi Selvi, John K Joel, R.S. Rajesh, "Behavioural Analysis of Handover Mechanism in Heterogeneous Wi-Li-Fi Environment," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.491-496, 2018.
Comparative Study on different Video HidingTechniques
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.497-502, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.497502
Abstract
In general, the data or information hiding mechanism with different perspective is a recent trend in the video data hiding and protection on-going research issues. For the most part of the video data hiding focuses on video content in different phases with modern cryptographic algorithms in order to secure from unauthorized access over the communication channel or network. In our previous research work contemplate its focuses on the data or textual content hiding mechanism over the content sharing among different clients through networks. The objective of the previous research is achieved with the help of data compression mechanism and hiding aspect in new direction regarding to protect the multimedia data content. This research paper describes the progress in the field of video steganography and intends to give the comparison between its different uses and techniques.
Key-Words / Index Term
Multimedia, Data, Content, Hiding and Compression
References
[1] Ramandeep Kaur, Pooja, “XOR Encryption Based Video Steganography”, International Journal of Science and Research (IJSR), Vol.4, Issue 11, November 2015.
[2] Pooja Jain and Navdeep Kanwal, “Image Steganography in RGB Color Components using Improved LSB Technique Image Pattern Compression using Weighted Principal Components Algorithm”, Indian Journal of Science and Technology, 9(45), 2016.
[3] J. Jeswani and D. T. Sarode, “A New DCT based Color Video Watermarking using Luminance Component,” IOSR Journal of Computer Engineering (IOSR-JCE), vol.16, no.2, pp. 83–90, 2014.
[4] S.R.Hallur, S. Kuri, G. S. Sudi, and D. G.H.Kulkarni, “A Robust Digital Watermarking For Gray Scale Image,” International Journal For Technological Research In Engineering, vol.2, no. 10, pp. 2440–2443,2015.
[5] O. S. Faragallah, “Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain,” AEU - International Journal of Electronics and Communications, vol.67, no.3, pp.189–196,2013.
[6]. R. J. Mstafa and K. M. Elleithy, “ A highly secure video stegnography using Hamming code (7, 4)” in Systems, Applications and Technology Conference (LISAT), 2014 IEEE Long Island, 2014, pp.1-6
[7]. Ms. Pooja Vilas Shinde and Dr. Tasneem Bano Rehman, “A Survey: Video Stegnography techniques” in International Journal of Engineering Research and General Science Volume 3, Issue 3, May-June, 2015 ISSN 2091-2730.
[ 8]. Syeda Musfia Nasreen,et al.,“A Study on Video Stegnography Techniques” in International Journal of Computational Engineering Research (IJCER), Vol 05, Issue 10, October–2015, ISSN (e): 2250–3005.
[9] H. Almara`beh “Steganography Techniques - Data Security Using Audio and Video” International Journal of Advanced Research in Computer Science and Software Engineering Volume 6, Issue 2, pp.45-50, February 2016.
[10] S. Kamesh, K. Durga Devi, S. N. V. P. Raviteja, “DWT based data hiding using video steganography”, International journal of engineering sciences & research technology, pp.361-367, 2017.
[11] Disha and K.Saini. "A review on video steganography techniques in spatial domain" IEEE Conference on Recent Developments in Control, Automation & Power Engineering , Noida, India, 2017.
[12] D. B. Suryawanshi and S. S. Belsare “An Efficient Implementation of Video Steganography on FPGA using DWT and LSB Algorithm”, International Journal of Scientific & Engineering Research, Vol.7, Issue.5, pp.450-453, 2016.
[13] Kousik Dasgupta, J.K. Mandal and Paramartha Dutta,” Hash based Least Significant Bit Technique”, International Journal of Security, Privacy and Trust Management ( IJSPTM), Vol. 1, No 2, April 2012
[14] A. Swathi, Dr. S.A.K Jilani,, “Video Steganography by LSB Substitution Using Different Polynomial national Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5
[15] Mritha Ramalingam: Stego Machine – Video Steganography using Modified LSB Algorithm World Academy of Science, Engineering and Technology Vol:50 2011-02-26
[16] Ashawq T. Hashim*, Dr.Yossra H. Ali** & Susan S. Ghazoul*” Developed Method of Information Hiding in Video AVI File Based on Hybrid Encryption and Steganography” Engg.and tech journal, vol 29,No.2,2011.
Citation
P.Saravanan, K. K. Thyagarajan, "Comparative Study on different Video HidingTechniques," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.497-502, 2018.
Bug Localization Approach on Lexical Pattern Extraction with Lexical Pattern Clustering
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.503-509, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.503509
Abstract
Bug localization is an important task of classification in software programming data set resources. Software programming data is used to find out the related programming codes, similar errors and files. Bug localization ranks the list of possible relevant entities. The bug localization task determines which source code entity is relevant to a particular bug report. In addition, the proposed paper also designs lexical pattern extraction clustering algorithm to classify the bugs in the given bugs report. It measures the semantic similarity between words which is an important component in various tasks on the web, such as relation extraction, community mining, and automatic extraction of metadata. To find out the various semantic relations existing between two given bug sentences, this paper proposes a new pattern extraction algorithm and a pattern clustering algorithm. The proposed method outperforms previously proposed web-based semantic similarity measures on the given data sets. It shows a high correlation with human ratings. Moreover, the above proposed method significantly progresses the accuracy in community mining task.
Key-Words / Index Term
Bug Localization, Lexical Pattern Extraction, Lexical Pattern Clustering, Information Retrieval
References
[1] Mozilla Foundation, Bugzilla.2012.
[2] S.K. Lukins, N.A. Kraft, and L.H. Etzkorn, Bug Localization Using Latent Dirichlet Allocation, Information and Software Technology, vol. 52, no. 9,pp. 972-990, 2010.
[3] A.T. Nguyen, T.T. Nguyen, J. Al-Kofahi,H.V. Nguyen, and T.N Nguyen, “A Topic-Based Approach for Narrowing the Search Space of Buggy Files from a Bug Report,” Proc. 26th Int’l Conf Automated Software Eng., pp. 263-272, 2011.
[4] S. Rao and A. Kak, “Retrieval from Software Libraries for Bug Localization: A Comparative Study of Generic and Composite Text Models,” Proc. Eighth Working Conf. Mining Software Repositories, pp. 43-52, 2011.
[5] A.T. Nguyen, T.T. Nguyen, J. Al-Kofahi, H.V. Nguyen, and T.N. Nguyen, “A Topic-Based Approach for Narrowing the Search Space of Buggy Files from a Bug Report,” Proc. 26th Int’l Conf. Automated Software Eng., pp. 263-272, 2011.
[6] G. Salton, A. Wong, and C.S. Yang, “A Vector Space Model for Automatic Indexing,” Comm. ACM, vol. 18, no. 11, pp.613-620, 1975.
[7] S.K. Lukins, N.A. Kraft, and L.H. Etzkorn, Source Code Retrieval for Bug Localization Using Latent Dirichlet Allocation, Proc. 15th Working Conf. Reverse Eng., pp. 155-164, 2008.
[8] D.Poshyvanyk, Y. Gueheneuc, A. Marcus, G.Antoniol, and V. Rajlich, “Feature Location Using Probabilistic Ranking of Methods Based on Execution Scenarios and Information Retrieval,” IEEE Trans. Software Eng., vol. 33, no. 6 pp. 420-432, June 2007.
[9] D.Poshyvanyk and A. Marcus, “Combining Formal Concept Analysis with Information Retrieval for Concept Location in Source Code,” Proc. 15th Int’l Conf. Program Comprehension, pp. 37-48, 2007.
[10] B.Cleary, C.Exton, J.Buckley, and M.English, “An Empirical Analysis of Information Retrieval Based Concept Location Techniques in Software Comprehension,” Empirical Software Eng., vol. 14, no. 1, pp. 93-130, 2008.
[11] M. Revelle, B. Dit, and D. Poshyvanyk, Using Data Fusion and Web Mining to Support Feature Location in Software, Proc. 18th Int’l Conf. Program Comprehension, pp. 14-23, 2010.
[12] A.K. McCallum, “Mallet: A Machine Learning for Language Toolkit,” http://mallet.cs.umass.edu, 2002.
[13] Z. Harris, “Distributional Structure,” Word, vol. 10, pp. 146-162, 1954.
[14] J.Ren,M.Harman,M.Di Penta,“ Cooperative Co-evolutionary optimization of software project staff assignments “ in Proc.Int.Symp.Search –Based Sotw. Eng., 2011 , pp. 127-141
[15] C.D.Manning, P.Raghavan and H.Schutze, Introduction to Information retrieval, vol.1, Cambridge Univ. Press Cambridge, 2008.
Citation
N. Kamaraj, A.V. Ramani, "Bug Localization Approach on Lexical Pattern Extraction with Lexical Pattern Clustering," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.503-509, 2018.
Implementation and Comparison of the Spatial Denoising Filter for Impulse Noise on MIAS Dataset
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.510-514, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.510514
Abstract
Image preprocessing is the important phase in digital image processing domain to analyze the undesirable signal present in an image and removal of the same. For any further processing of an image, noise removal is mandatory to get the desired resultant. Before applying any noise removal algorithm to an image, it is obligatory to understand what kind of noise that exactly presents in an image. In this paper, we have handled the impulse noise presence in mammogram image and various spatial based median filters are applied to it. Initially, to confirm the impulse noise presence, the sub-window of an image is subjected to undergo the detection process, where the impulse noise pixels are identified. Secondly, for the detected noise window the traditional median filter is applied. This process does not affect the image quality and produces the noise-free enhanced image. Finally, we have experimented and compared the five different median based denoising algorithms, each one has different detection framework and found the best denoising algorithm for impulse noise removal with the help of qualitative and quantitative metrics.
Key-Words / Index Term
Preprocessing, Impulse Noise, Denoising, Mammogram Image
References
[1] Campilho, A.C., 2000. Medical Image Analysis. An overview. Electrónica e Telecomunicações, 3(2), pp.135-142.
[2] Ramani, R., Vanitha, N.S. and Valarmathy, S., 2013. The pre-processing techniques for breast cancer detection in mammography images. International Journal of Image, Graphics and Signal Processing, 5(5), p.47.
[3] Tashk, A., Helfroush, M.S., Danyali, H. and Akbarzadeh, M., 2013, May. An automatic mitosis detection method for breast cancer histopathology slide images based on objective and pixel-wise textural features classification. In Information and Knowledge Technology (IKT), 2013 5th Conference on (pp. 406-410). IEEE.
[4] Halalli, B. and Makandar, A., 2018. Computer Aided Diagnosis-Medical Image Analysis Techniques. In Breast Imaging. InTech.
[5] Buades, A., Coll, B. and Morel, J.M., 2005, June. A non-local algorithm for image denoising. In Computer Vision and Pattern Recognition, 2005. CVPR 2005. IEEE Computer Society Conference on (Vol. 2, pp. 60-65). IEEE.
[6] Alajlan, N., 2010. A Novel Recursive Algorithm For Detail-Preserving Impulse Noise Removal. Journal of King Saud University-Computer and Information Sciences, 22, pp.37-44.
[7] Garnett, R., Huegerich, T., Chui, C. and He, W., 2005. A universal noise removal algorithm with an impulse detector. IEEE Transactions on image processing, 14(11), pp.1747-1754.
[8] Piao, W., Yuan, Y. and Lin, H., 2018. A Digital Image Denoising Algorithm Based on Gaussian Filtering and Bilateral Filtering. In ITM Web of Conferences (Vol. 17, p. 01006). EDP Sciences.
[9] Sun, T. and Neuvo, Y., 1994. Detail-preserving median based filters in image processing. Pattern Recognition Letters, 15(4), pp.341-347.
[10] Nasri, M., Saryazdi, S. and Nezamabadi-pour, H.S.N.L.M., 2013. SNLM: A switching non-local means filter for removal of high density salt and pepper noise. Scientia Iranica, 20(3), pp.760-764.
[11] Mingliang, X., Pei, L., Mingyuan, L., Hao, F., Hongling, Z., Bing, Z., Yusong, L. and Liwei, Z., 2016. Medical image denoising by parallel non-local means. Neurocomputing, 195, pp.117-122.
[12] Singh, P. and Shree, R., 2017. A new homomorphic and method noise thresholding based despeckling of SAR image using anisotropic diffusion. Journal of King Saud University-Computer and Information Sciences.
[13] Wang, M., Yan, W. and Zhou, S., 2018. Image Denoising Using Singular Value Difference in the Wavelet Domain. Mathematical Problems in Engineering, 2018.
[14] Nair, M.S. and Mol, P.A., 2013. Direction based adaptive weighted switching median filter for removing high density impulse noise. Computers & Electrical Engineering, 39(2), pp.663-689.
[15] Gupta, V., Chaurasia, V. and Shandilya, M., 2015. Random-valued impulse noise removal using adaptive dual threshold median filter. Journal of visual communication and image representation, 26, pp.296-304.
[16] Faragallah, O.S. and Ibrahem, H.M., 2016. Adaptive switching weighted median filter framework for suppressing salt-and-pepper noise. AEU-International Journal of Electronics and Communications, 70(8), pp.1034-1040.
[17] Meher, S.K. and Singhawat, B., 2014. An improved recursive and adaptive median filter for high density impulse noise. AEU-International Journal of Electronics and Communications, 68(12), pp.1173-1179.
[18] Ismaeil, M., Pritamdas, K., Devi, K.J.K. and Goyal, S., 2017, April. Performance analysis of new adaptive decision based median filter on FPGA for impulsive noise filtering. In Electronics, Materials Engineering and Nano-Technology (IEMENTech), 2017 1st International Conference on (pp. 1-5). IEEE.
[19] Bakwad, K.M., Pattnaik, S.S., Sohi, B.S., Devi, S., Panigrahi, B.K. and Gollapudi, S.V., 2009. Bacterial foraging optimization technique cascaded with adaptive filter to enhance peak signal to noise ratio from single image. IETE Journal of Research, 55(4), pp.173-179.
[20] Dong, Y. and Xu, S., 2007. A new directional weighted median filter for removal of random-valued impulse noise. IEEE Signal Processing Letters, 14(3), pp.193-196.
[21] Esakkirajan, S., Veerakumar, T., Subramanyam, A.N. and PremChand, C.H., 2011. Removal of high density salt and pepper noise through modified decision based unsymmetric trimmed median filter. IEEE Signal processing letters, 18(5), pp.287-290.
[22] Meher, S.K. and Singhawat, B., 2014. An improved recursive and adaptive median filter for high density impulse noise. AEU-International Journal of Electronics and Communications, 68(12), pp.1173-1179.
Citation
A.Ramya, D.Murugan, G. Muthulakshmi, "Implementation and Comparison of the Spatial Denoising Filter for Impulse Noise on MIAS Dataset," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.510-514, 2018.
A Novel Service Broker Policy for e-Governance using Federation of cloud
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.515-521, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.515521
Abstract
In the Federated cloud, the load balancing is a main challenge. It distributes uniformly dynamic load among multiple nodes in the distributed system environment. This makes any node not to be overloaded while the other nodes are idle or least load. The proper load balancing techniques improve the performance of cloud and utilize resource efficiently. The present study proposed Extended Performance Optimized Routing Policy service broker algorithm and compares it with the existing service broker algorithms in terms of response time and DC Processing time. The extended Performance Optimized Routing Policy service broker algorithm could be utilized in e-Governance framework that might help to develop the optimal and improved resource utilization. This possesses the scope to accelerate the e-Governance services and distribute the load at the peak hours.
Key-Words / Index Term
Cloud computing, e-Governance, Cloud Federation, Service Broker Algorithm, Load balancing
References
[1] Mandeep Kaur, Verender Singh Madra, “ Performance Evaluation of Virtual Machines using Service Broker Policies in Cloud Computing”, In International Journal of Science and Research (IJSR) – Volume 4 Issue 7, July 2015
[2] National Institute of Standards and Technology (NIST), The NIST Definition of Cloud Computing, http://csrc.nist.gov/ publications/ drafts/ 800-145/Draft-SP-800-145_cloud- definition.pdf.
[3] Hetal V. Patel, Ritesh Patel, “ Cloud Analyst: An Insight of Service Broker Policy” In International Journal of Advanced Research in Computer and Communication Engineering Vol. 4 Issue 1, January 2015.
[4] Charalampos Tsaravas, Marinos Themistocleous “ Cloud Computing and EGovernment: A Literature Review”, European Mediterranean & Middle Eastern Conference on Information Systems 2011.
[5] Bhathiya Wickremasinghe and rajkumar Buyya, “ CloudAnalyst: A CloudSim-based tool for Modelling and Analysis of Large scale cloud computing environments,” Distributed computing project, CSE Department, University of Melbourne.
[6] Kunal Kishor, Vivek Thapar, “ An Efficient Service Broker policy for Cloud Computing Environment” In International Journal of Computer Science Trends and Technology (IJCST) – Volume 2 Issue 4, July-Aug 2014.
[7] Vaishali Sharma, “ Efficient Data Center Selection Policy for Service Proximity Service Broker in Cloud Analyst” In International Journal of Innovative Computer Science & Engineering (IJICSE) – Volume 1 Issue 2, 2014.
[8] Dhaval Limbani, Bhavesh Oza, “ A Proposed Service Broker Policy for Data Center Selection in Cloud Environment with Implementation” In Int. J. Computer Technology & Applications Vol 3(3) MAY-JUNE 2012.
[9] Soumya Ray, Ajanta De Sarkar, “ Execution Analysis of Load Balancing Algorithms In Cloud Computing Environment “, In International Journal on Cloud Computing: Services and Architecture ( IJCCSA), Vol.2, No. 5, October 2012.
[10] Ashutosh Gupta, Praveen Dhyani, O.P. Rishi, Vishwambhar Pathak, “ Service Request Approach for e-Governance using Federation of Cloud” In International Journal of Computer Science and Engineering Vol 6, Issue 5 May 2018.
[11] Nguyen Xuan Phi, Cao Trung Tin, Luu Nguyen Ky Thu, Tran Cong Hung, “ Proposed Load balancing Algorithm to reduce response time and processing time on Cloud Computing” In International Journal of Computer Networks & Communications (IJCNC) Vol 10, No. 3, May 2018.
[12] Ankita Sharma, Isha Awasthi, “ Noval technique of load balancing in cloud computing” In International Journal of Computer Applications (0975-8887) Vol 182, No.4, July 2018.
Citation
Ashutosh Gupta, Praveen Dhyani, O.P. Rishi, Vishwambhar Pathak, "A Novel Service Broker Policy for e-Governance using Federation of cloud," International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.515-521, 2018.