International Conferences: Communication, Information & Computing Technology (ICCICT), 2015

 

 
SoS Newsletter Logo

Communication, Information & Computing Technology (ICCICT)

Mumbai, India

 

The International Conference on Communication, Information and Computing Technology (ICCICT) 2015 was held 16-17 Jan, 2015 at Sardar Patel Institute of Technology Mumbai, India.  The ICCICT submissions covered a wide range of topics on antennas, communication engineering, networking, sensor networks, VLSI, embedded systems, speech processing, image processing, cloud computing, software engineering and database management.  Security related papers are cited here.  

 

Lopes, Minal; Sarwade, Nisha, "On the Performance Of Quantum Cryptographic Protocols SARG04 and KMB09," Communication, Information & Computing Technology (ICCICT), 2015 International Conference on, pp. 1, 6, 15-17 Jan. 2015. doi: 10.1109/ICCICT.2015.7045661 Since the first protocol, proposed by Benette and Brassard in 1984 (BB84), the Quantum Cryptographic(QC) protocols has been studied widely in recent years. It is observed that most of the later QC protocols are variants of BB84 with the intention of addressing one or more problems incurred during the practical implementation of BB84 protocol. Amongst many candidates, SARG04 provides robust performance for the weak coherent pulse implementation of QC. Another follower protocol, KMB09 provides improvement in quantum communication distance between Alice and Bob (the classical communicating parties). Both these protocols are chosen to compete, as they found to be a suitable choice for incorporating QC in existing wireless technology. In this paper we present the performance analysis of these two protocols with respect to protocol efficiency, Quantum Bit Error Rate (QBER) and robustness against eavesdropping.

Keywords: Cryptography; Protocols; Robustness; KMB09; QBER; QKD; Quantum Cryptography; SARG04 (ID#: 15-3911)    

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7045661&isnumber=7045627

 

Shoaib, Shaikh; Mahajan, R.C., "Authenticating Using Secret Key In Digital Video Watermarking using 3-level DWT," Communication, Information & Computing Technology (ICCICT), 2015 International Conference on, pp.1,5, 15-17 Jan. 2015. doi: 10.1109/ICCICT.2015.7045664 Authenticating watermarking is nothing but inserting a hidden object in order to detect deceitful alteration by hackers. The object may be in terms of a secret key or password etc. There are quite few numbers of authentication methods are available for videos. Resent developers in digital video and internet technology helps the common user to easily produce illegal copies of videos. In order to solve the copyright protection problem and deceitful alteration by hackers of videos, several watermarking schemes have been widely used. Very few authenticating of watermarking schemes have been produced for defining the copyrights of digital video. The process of Digital watermark embeds the data called watermark in digital media like image, video, audio file etc. so that it can be claimed for rights. The paper represents the complete software implementation of 3-Level DWT algorithms and to have more secure data a secret key is used. The secret key is given to watermark image during embedding process and while extracting the watermark image the same secret key is used. To check effectiveness of the watermark video MSE and PSNR parameters are used.

Keywords: Authentication; Computers; Discrete wavelet transforms; PSNR; Robustness; Watermarking; Discrete Wavelet Transform (DWT); MSE; PSNR; Secret Key; Watermark (ID#: 15-3912)    

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7045664&isnumber=7045627

 

Jain, Nilakshi; Kalbande, Dhananjay R, "Digital Forensic Framework Using Feedback And Case History Keeper," Communication, Information & Computing Technology (ICCICT), 2015 International Conference on, pp.1,6, 15-17 Jan. 2015. doi: 10.1109/ICCICT.2015.7045670 Cyber crime investigation is the integration of two technologies named theoretical methodology and second practical tools. First is the theoretical digital forensic methodology that encompasses the steps to investigate the cyber crime. And second technology is the practically development of the digital forensic tool which sequentially and systematically analyze digital devices to extract the evidence to prove the crime. This paper explores the development of digital forensic framework, combine the advantages of past twenty five forensic models and generate a algorithm to create a new digital forensic model. The proposed model provides the following advantages, a standardized method for investigation, the theory of model can be directly convert into tool, a history lookup facility, cost and time minimization, applicable to any type of digital crime investigation.

Keywords: Adaptation models; Computational modeling; Computers; Digital forensics; History; Mathematical model; Digital forensic framework; digital crime ;evidence (ID#: 15-3913)    

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7045670&isnumber=7045627

 

Melkundi, Swathi; Chandankhede, Chaitali, "A Robust Technique For Relational Database Watermarking And Verification," Communication, Information & Computing Technology (ICCICT), 2015 International Conference on, pp. 1, 7, 15-17 Jan. 2015. doi: 10.1109/ICCICT.2015.7045676 Outsourcing of data is increasing with the rapid growth of internet. There is every possibility that data reaches illegal hands. As a result, there is increase in illegal copying of data, piracy, illegal redistribution, forgery and theft. Watermarking technology is a solution for these challenges. It addresses the ownership problem. It deters illegal copying and protects copyright of data. Watermarking technology mainly involves the process of watermark insertion and watermark extraction. Watermark insertion means embedding an imperceptible watermark in the relational database. In watermark extraction we extract the embedded watermark without the help of original database. In this paper we propose a new watermarking technique, which will watermark both textual and numerical data. Our proposed method also does watermark verification where, the watermark extracted from the database is compared with the original watermark that is known only to the owner of the database. This is accomplished through Levenshtein distance algorithm.

Keywords: Algorithm design and analysis; Computers; Encoding; Partitioning algorithms; Relational databases; Watermarking; Levenshtein Distance algorithm; Relational Database; Watermark Verification; Watermarking (ID#: 15-3914)    

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7045676&isnumber=7045627

 

Narayan, Narwade Pradeep; Bonde, S.V.; Doye, D.D., "Offline Signature Verification Using Shape Dissimilarities," Communication, Information & Computing Technology (ICCICT), 2015 International Conference on, pp.1,6, 15-17 Jan. 2015. doi: 10.1109/ICCICT.2015.7045677 Offline signature verification is a challenging and important form of biometric identification. Other biometric measures don't have variability as that of signatures which poses difficult problem in verification of signatures. In this paper, we explore a novel approach for verification of signatures based on curve matching using shape descriptor and Euclidian distance. In our approach, the measurement of similarities are proceeded by 1)finding correspondences between signatures, we attach shape descriptor (shape context) with Euclidian distance between the sample points of one signature and the sample point of other signature for better results, 2)we estimate aligning transforms by using this correspondences between signatures, 3) classify the signatures using linear discriminant analysis and measures of shape dissimilarity between signatures based on shape context distance, bending energy, registration residual, anisotropic scaling.

Keywords: Computers; Context; Forgery; Histograms; Shape; Biometrics; Offline signature verification; curve matching; deformable shape; image processing; measure of shape dissimilarity; structural saliency (ID#: 15-3915)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7045677&isnumber=7045627

 

D'Lima, Nathan; Mittal, Jayashri, "Password Authentication using Keystroke Biometrics," Communication, Information & Computing Technology (ICCICT), 2015 International Conference on, pp.1,6, 15-17 Jan. 2015. doi: 10.1109/ICCICT.2015.7045681 The majority of applications use a prompt for a username and password. Passwords are recommended to be unique, long, complex, alphanumeric and non-repetitive. These reasons that make passwords secure may prove to be a point of weakness. The complexity of the password provides a challenge for a user and they may choose to record it. This compromises the security of the password and takes away its advantage. An alternate method of security is Keystroke Biometrics. This approach uses the natural typing pattern of a user for authentication. This paper proposes a new method for reducing error rates and creating a robust technique. The new method makes use of multiple sensors to obtain information about a user. An artificial neural network is used to model a user's behavior as well as for retraining the system. An alternate user verification mechanism is used in case a user is unable to match their typing pattern.

Keywords: Classification algorithms; Error analysis; Europe; Hardware; Monitoring; Support vector machines; Text recognition; Artificial Neural Networks; Authentication; Keystroke Biometrics; Password; Security (ID#: 15-3916)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7045681&isnumber=7045627

 

Avasare, Minal Govind; Kelkar, Vishakha Vivek, "Image Encryption Using Chaos Theory," Communication, Information & Computing Technology (ICCICT), 2015 International Conference on, pp.1,6, 15-17 Jan. 2015. doi: 10.1109/ICCICT.2015.7045687 In open network, it is important to keep sensitive information secure from becoming vulnerable to unauthorized access. Encryption is used to ensure high security for Images. Chaos has been widely used for image encryption for its different features. There are many chaos based encryption techniques. Most of the proposed discrete chaotic cryptographic approaches are based on stream or block cipher schemes. If these two schemes are combined the security level is improved. Novel image encryption is proposed based on combination of pixel shuffling. Chaos is used for expand diffusion & confusion in image. Chaotic maps gives advantages of large key space and high level security. We survey exiting work which uses different techniques for image encryption and analyse them with respect to various parameters. To evaluate security & performance, key space analysis, correlation coefficient, histogram, information entropy, NPCR, UACI etc. will be studied.

Keywords: Chaotic communication; Ciphers; Encryption; Sensitivity; chaos; diffusion; encryption; permutation (ID#: 15-3917)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7045687&isnumber=7045627

 

Save, Shraddha; Gala, Mansi; Patil, Surabhi; Kalbande, Dhananjay R., "Applying Human Computer Interaction To Individual Security Using Mobile Application," Communication, Information & Computing Technology (ICCICT), 2015 International Conference on, pp.1,6, 15-17 Jan. 2015. doi: 10.1109/ICCICT.2015.7045691 Individual Security is a major concern in both developed as well as developing countries. There are various ways in which an individual can assure his/her safety, one of the ways being mobile applications. We compared various security mobile applications and analysed user's opinions about ‘Security through Mobile Applications’ through survey[1]. Studying the problems, constraints and importance of quick communication in emergency situations we came up with few significant modifications for the existing mobile applications. Thinking on the lines of reducing the time of communication, we suggest a voice based activation of the application even when the application is locked. This idea is based on the principles of Human Computer Interaction and enhancing simplicity, usability and accessibility of mobile applications as a security device.

Keywords: Computers; Global Positioning System; Internet; Mobile communication; Mobile handsets; Safety; Security ;GPS; HCI; emergency; location; message; mobile application; safety; voice (ID#: 15-3918)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7045691&isnumber=7045627

 

Patil, Sandesh; Talele, Kiran, "Suspicious Movement Detection And Tracking Based On Color Histogram," Communication, Information & Computing Technology (ICCICT), 2015 International Conference on, pp. 1, 6, 15-17 Jan. 2015. doi: 10.1109/ICCICT.2015.7045698 In automated video surveillance applications, detection of suspicious human behaviour is of great practical importance. However due to random nature of human movements, reliable classification of suspicious human movements can be very difficult. Defining an approach to the problem of automatically tracking people and detecting unusual or suspicious movements in Closed Circuit TV (CCTV) videos is our primary aim. We are proposing a system that works for surveillance systems installed in indoor environments like entrances/exits of buildings, corridors, etc. Our work presents a framework that processes video data obtained from a CCTV camera fixed at a particular location. First, we obtain the foreground objects by using background subtraction. These foreground objects are then classified into people and inanimate objects (luggage). These objects are tracked using a real-time blob matching technique. Using temporal and spatial properties of these blobs, activities are classified using semantics-based approach.

Keywords: Cameras; Computers; Correlation; Histograms; Image color analysis; Monitoring; Training; background subtraction color histogram; image processing; object detection; tracking (ID#: 15-3919)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7045698&isnumber=7045627

 

Kekre, H.B.; Sarode, Tanuja; Natu, Shachi, "Robust Watermarking By SVD Of Watermark Embedded In DKT-DCT And DCT Wavelet Column Transform Of Host Image," Communication, Information & Computing Technology (ICCICT), 2015 International Conference on, pp.1,6, 15-17 Jan. 2015. doi: 10.1109/ICCICT.2015.7045700 Watermarking in wavelet domain and with SVD is popular due to its robustness. In this paper a watermarking technique using DCT wavelet and hybrid DKT-DCT wavelet along with SVD is proposed. Wavelet transform is applied on host and SVD is applied on watermark. Few singular values of watermark are embedded in mid frequency band of host. Scaling of singular values is adaptively done for each channel (Red, green and blue) using the highest transform coefficient from selected mid frequency band and first singular value of corresponding channel of watermark. Singular values of watermark are placed at the index positions of closely matching transform coefficients. This along with the adaptive selection of scaling factor adds to the robustness of watermarking technique. Performance of the proposed technique is evaluated against image processing attacks like cropping, compression using orthogonal transforms, noise addition, histogram equalization and resizing. Performance for DCT wavelet and DKT-DCT wavelet is compared and in many of the attacks DCT wavelet is found to be better than DKT-DCT wavelet.

Keywords: Discrete cosine transforms; Image coding; Noise; Robustness; Watermarking; Wavelet transforms; DCT wavelet; DKT-DCT wavelet; SVD; Watermarking; adaptive scaling factor (ID#: 15-3920)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7045700&isnumber=7045627

 

Khuspe, Kalyani; Mane, Vanita, "Robust Image Forgery Localization And Recognition In Copy-Move Using Bag Of Features and SVM," Communication, Information & Computing Technology (ICCICT), 2015 International Conference on, pp.1,5, 15-17 Jan. 2015. doi: 10.1109/ICCICT.2015.7045718 Nowadays in the world of advanced digital computer, tampering and implication of digital images can be easily performed by a tyro with a number of accessible advanced image processing softwares like Adobe Photoshop, Corel Draw etc. Therefore it becomes very challenging for end users to distinguish whether the image is novel or forged. In the fields such as forensics, medical imaging, e-commerce, and industrial photography, legitimacy and integrity of digital images is crucial. This motivates the need for detection tools that are transparent to tampering and can reveal whether an image has been counterfeit just by scrutinizing the counterfeit image. Recently many new methods are presented with improved performances of detection. However there is still place to improve this performance further. Some of the proposed state-of-the-art image tamper detection techniques have been selected for proposal. In the training stage, it extracts the keypoints for every training image using the Mirror invariance feature transform (MIFT), a vector quantization technique maps keypoints from every training image into a unified dimensional histogram vector (bag-of-words) after K-means clustering. This histogram is treated as an input vector for a multiclass SVM to build the training classifier. In the testing stage, the keypoints are extracted and fed into the cluster model to map them into a bag-of-words vector, which is finally fed into the multiclass SVM training classifier to recognize the tampered region.

Keywords: Computers; Digital images; Feature extraction; Forgery; Support vector machines; Training; Vectors; Bag-of-words; K-means; MIFT; blind image forensics; codebook; copymove image forgery; support vector machine (SVM) (ID#: 15-3921)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7045718&isnumber=7045627

 

Rajesh, Shah Avani; Bharadi, Vinayak A.; Jangid, Pravin, "Performance Improvement Of Complex Plane Based Feature Vector For Online Signature Recognition Using Soft Biometric Features," Communication, Information & Computing Technology (ICCICT), 2015 International Conference on, pp. 1, 7, 15-17 Jan. 2015. doi: 10.1109/ICCICT.2015.7045719 This paper proposes well-worn approach for verification of Online Signature which is one of the biometric entity. The signature will capture on digitizer the missing points of the signature are calculated from MDDA algorithm. This paper uses a notion to extract the feature vector generation based on CAL-SAL function. To extract the feature vector intermediate transform of row & col will be evaluated and distributed over complex Walsh plane. The mean value for each blocks will be calculated which separates the first and last row & col of mean & density of CAL-SAL components for other transforms. Lastly soft biometric features are added to improve the performance. The results for the unimodal & Multi Algorithmic features vectors are compared. Performance Index & Security Performance Index will be evaluated which delivers the performance of the system.

Keywords: Algorithm design and analysis; Computers; Feature extraction; Performance analysis; Vectors; Wavelet transforms; CAL & SAL functions; Complex Plane; Multialgorhmic Features; Unimoal Features (ID#: 15-3922)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7045719&isnumber=7045627

 

Saudagar, Abdul Khader Jilani; Mohammed, Habeeb Vulla; Iqbal, Kamran; Gyani, Yasir Javed, "Efficient Arabic Text Extraction And Recognition Using Thinning And Dataset Comparison Technique," Communication, Information & Computing Technology (ICCICT), 2015 International Conference on,pp. 1,5, 15-17 Jan. 2015. doi: 10.1109/ICCICT.2015.7045725 The objective of this research paper is to propose a novel technique for Arabic text extraction and recognition which is a part of research work aimed at developing a system for moving Arabic video text extraction for efficient content based indexing and searching. Numerous techniques were proposed in the past for text extraction but very few of them focus on Arabic text. All the earlier proposed implementations are not successful in attaining 100 % accuracy in text extraction and recognition process. The proposed technique is new and is based on thinning the given sample image containing Arabic text and splitting the resulting image horizontally (X-axis direction) from right to left in equal intervals. Compare each part of the image for equal number of white pixels to those of samples in the dataset. Upon matching, with the help of index value the corresponding character is stored in an array. This process is repeated by varying the splitting interval until all the characters in the sample image are recognized. To our knowledge, our research is the primary to address the above problem and propose a solution with increased retrieval accuracy and reduced computation time for Arabic text extraction and recognition.

Keywords: Character recognition; Data mining; Feature extraction; Image color analysis; Image edge detection; Indexes; Text recognition; Arabic Text Extraction; Arabic Text Recognition; Indexing; Searching; Traversing (ID#: 15-3923)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7045725&isnumber=7045627

 

Thepade, Sudeep D.; Bhondave, Rupali K., "Bimodal biometric identification with Palmprint and Iris traits using fractional coefficients of Walsh, Haar and Kekre transforms," Communication, Information & Computing Technology (ICCICT), 2015 International Conference on, pp.1,4, 15-17 Jan. 2015

doi: 10.1109/ICCICT.2015.7045729 Biometric identification verifies user identity by comparing an encoded value with a stored value of the concerned biometric characteristic. Multimodal person authentication system is more effective and more challenging. The fusion of multiple biometric traits helps to minimize the system error rate. The benefit of energy compaction of transforms in higher coefficients is taken here to reduce the feature vector size of image by taking fractional coefficients of transformed image. Smaller feature vector size results as less time for comparison of feature vectors resulting in faster identification. Iris and Palmprint are together taken here for bimodal biometric identification with fractional energy of Kekre, Walsh and Haar transformed Palm and Iris images. The test beds of 60 pairs of Iris and Palmprint samples of 10 persons (6 per person of iris as well asPalmprint) are used as test bed for experimentation. Experimental result that the show fractional coefficients perform better as indicatedby higher GAR values over consideration of 100% coefficients. In Walsh and haar transforms the bimodal identification of iris and Palmprint could not perform better than individual consideration of alone Palmprint but perform better than Iris. In Kekre transform bimodal with Palmprint and Iris has shown improvement in performance.

Keywords: Computers; Databases; Educational institutions; Feature extraction; Iris recognition; Transforms; Vectors; Feature Vector; GAR; Haar transform; Kekre transform; Walsh transform (ID#: 15-3924)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7045729&isnumber=7045627

 

haikh, Ansar Ahemad; Vani, Nilesh S, "An Extended Approach For Securing The Short Messaging Services Of GSM Using Multi-Threading Elliptical Curve Cryptography," Communication, Information & Computing Technology (ICCICT), 2015 International Conference on, pp.1, 5, 15-17 Jan. 2015.doi: 10.1109/ICCICT.2015.7045733 Currently, mobile phones are not only used for formal communication but also for sending and receiving sensitive information. Short Messaging Service's(SMS) are one of the popular ways of communication. Sending an SMS is easy, quick and inexpensive. However, when information is exchanged using SMS, protecting the short messages from the known attacks like man in the middle attack, reply attack and non-repudiation attack is very difficult. Such attacks on SMS security are hindering their application. This paper evaluates performance of elliptical curve cryptography by implementing it with threading and without threading. Based on the results of evaluation the one with the best performance is chosen for end to end SMS security.

Keywords: Computers; Elliptic curve cryptography; Elliptic curves; Message systems; Mobile communication; Elliptical curve cryptography; Public key cryptosystem; SMS Security (ID#: 15-3925)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7045733&isnumber=7045627

 

Dhage, Sudhir; Kundra, Pranav; Kanchan, Anish; Kap, Pratiksha, "Mobile Authentication Using Keystroke Dynamics," Communication, Information & Computing Technology (ICCICT), 2015 International Conference on, pp.1,5, 15-17 Jan. 2015. doi: 10.1109/ICCICT.2015.7045746 As mobiles become a ubiquitous, they are used more and more for operations that may involve sensitive data or huge amounts of money. The mobile is also increasingly being used as the tool of preference for browsing and using the Internet. Hence, new security measures must be developed to support increased functionality of these devices, to protect users in the case of any mishap. Authentication using keystroke dynamics for mobiles is an area that has received attention recently. In this paper, we have studied some authentication techniques used earlier including relative and absolute distance measures, mean and standard deviation based methods and feature fusion methods. We provide a method for authentication using fusion techniques for our own novel mean and standard deviation based approaches, which gives low error rates.

Keywords: Authentication; Computers; Feature extraction; Heuristic algorithms; Mobile communication; Standards; Biometric Security; Keystroke Dynamics; Mobile Authentication (ID#: 15-3926)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7045746&isnumber=7045627

 

Morey, Anita K.; Morey, Kailash H., "Remote File Search Using SMS," Communication, Information & Computing Technology (ICCICT), 2015 International Conference on, pp.1,6, 15-17 Jan. 2015. doi: 10.1109/ICCICT.2015.7045753 Due to exponential increase in the information transfer or communication using messages; Short Message Service (SMS) has become important. The efficient and easy to use techniques are being developed for SMS. In the last few years, SMS has made a big impact on the way of communication. Instead of communicating over the phone using voice, people prefer SMS for messaging as well as for information exchange. This paper proposes a method of implementing an extendable generic application which is used to search a file on remote desktop and mail it to user. Mobile users send required information through a SMS to a mobile gateway which then forwards it to the generic application. Using the information send by user, such file name, folder name or drive, email address of the user, the generic application automatically searches the file asked by the user on remote machine and mails it to the user on his email address.

Keywords: Computers; Electronic mail; GSM; Ground penetrating radar; Mobile communication; Mobile handsets; Modems; AT commands; Desktop Search; GPRS; GSM; Google; Quick search Yahoo!; SMS (ID#: 15-3927)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7045753&isnumber=7045627


Note:



Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to news@scienceofsecurity.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.