Volume 5 Issue 6- June 2015

 

Page Title Full Text
137-141 Review: To Study Scope of Data Hiding in MP3 Files
Nishant Sharma and Gaurav Deep
Abstract

Steganography is a kind of secret communication method used to hide secret data in some digital media such as images, audio etc. Hiding secret data using audio files as carrier is known as “Audio Steganography”.  The availability and the popularity of audio files make them eligible to carry hidden information, and thus hold significance. With the advancement in digital audio media, many audio steganography techniques have been developed and also used. After the events of September 11, 2001, there was immediate concern voiced regarding the possible use of steganography by the al Qaida network. There has been additional concern voiced regarding the television broadcast of bin Laden. There is the possibility that there could have been hidden messages in the audio portion of the broadcasts. MP3 file format has been very popular since its inception due to its ability to minimize the file size without compromising audible quality. Several techniques have been devised for steganography in mp3 files. One such padding byte stuffing techniques hides data by replacing padding byte in a MP3 frame by secret data. In this paper, we look at various audio steganography techniques and we study about MP3 files and techniques for data hiding in MP3 files. We study about concept of padding in MP3 file and how this can be used to implement steganography in MP3 file.

Full Text PDF
142-145 Online Examination System using Command Line Interface
Tushar B Kute , Tushar J. Surwade
Abstract

We have to appear for various types of online examination in our day-to-day life and while appearing for examination, candidates are able to switch between many different programs. One such program can be a Web Browser or an Informative Document and may lead to malpractice or copying. In order to avoid such malpractices, we must ensure that other programs are inaccessible to the appearing candidate. So, we present a system about an online test module which works on the principle of RPC (Remote Procedure Call) developed in C-language and is currently implemented to work on Linux Operating System. The reason behind choosing Linux as a platform is that it has many advantages, one of them being that it avoids Windows malwares up to 90%. In addition, Linux is an open source operating system and it provides any user to deeply explore its features. The system we are about to present executes on terminal-only mode or CLI (Command Line Interface). It is based on Client-Server architecture in which there is a server and number of clients. The system also uses multithreading to handle various clients simultaneously, where each client is allotted to an individual candidate.
Keywords— Client, Command Line Interface, Examination, Linux, Networking, RPC, Server, Terminal.

Full Text PDF
146-148 Performance Analysis of Advanced Modulation Formats in Inter-Satellite Optical Wireless Communication System
Prabhjot Kaur, Bhawna Utreja
Abstract

In this article, different modulation formats CSRZ, DRZ, DPSK have been investigated in inter-satellite links on optical wireless communication system. It has been observed that DPSK performs better at long range than CSRZ, DRZ techniques while CSRZ and DRZ perform better for little range. Q-Factor has been used for the assessment of the techniques to give the simulation results. The results show that DPSK which has simple design and less cost performs best at a higher transmission range at the data rate of 40Gbps. DPSK system has been simulated at different power levels and Q-factor has been observed at these power levels. The increasing aperture diameters of both transmitters and receivers have shown significant improvement in the performance of DPSK system.

Keywords: - IsOWC (Inter-Satellite Optical Wireless Communication), DPSK (Differential Phase Shift Keying), Q-Factor.

Full Text PDF
149-151 Artificial Intelligence Meets Internet of Things
Anand M,Clarice Susan
Abstract

The next biggest evolution would be iot. This concept deals with the basic principle that everything wold be connected through a /internet. Several countries are linked together to exchange data and news through internet. Here, physical objects are programmed to interact in the way computer devices do. This Isa new technology, where devices communicate with each other using sensors. Most of the companies are investing in IOT, and it is believed this is the area which would see immense growth. This paper gives an overview of IoT and its application areas.

Keywords— Internet of Things (IoT), Artificial Intelligence, Machine Learning

Full Text PDF
152-154 A Rational Approach for Detecting and Removing Cracks from Digitized Paintings
Deepika Pagrotra ,. Navneet Kaur
Abstract

The quality of historical art work related painting around several hundreds of years, which are still available for reference today and which is preserved by museum and universities all around the world, is poor due to physical deterioration. Digital image processing techniques are necessary to improve the legibility of the paintings. Cracking is one of the most common deteriorations found in old masters paintings.Old paintings are great resource of transferring information from one generation to another. So it is very important to restore them. In this paper we present a fuse method for crack detection and virtual restoration of old deteriorated paintings.

Full Text PDF
155-157 Document Clustering for Forensic Analysis via Cosine Similarity
Priyanka kasote , Shruti singh ,Chhaya Varade
Abstract

In study of computer forensic, hundreds and thousands of files are usually inspected. Most of the data is present in amorphous form. In this framework mechanized methods of investigation are of great interest. In specific, algorithms used for clustering documents can ease the innovation of fresh and useful information from the document under study. We use a methodology that relates the document clustering algorithms to forensic analysis of computer apprehended in police investigations. We demonstrate our method by using the well-known clustering algorithms (CSPA and cosine similarity matrix). Research have been implemented with different combinations of parameters, causing in 16 different instantiations of algorithm, connected study in literature are more restricted than our study. In our study we use CSPA algorithm for clustering which will include various sub algorithms such as cosine similarity matrix and text processing algorithm.

Full Text PDF
158-161 An Adaptive Approach: Text Line Extraction from Multi-Skewed Hand Written Documents
Rajath.A.N
Abstract

Advancing technology has made document image processing an important feature in automation of office documentation. Digital filing system save space, paper and printing cost. The problem arises when document to be read is not placed correctly in scanner, which leads to the miss interpretation of document and increases the storage space .This paper deals with extraction of text from those skewed document and proper alignment of those texts.

KeywordsMulti-Skewed, Text Line Extraction, Connected Component Labelling, RLS Algorithm, Horizontal and Vertical Projection.

Full Text PDF
162-165 Integration of BPCS Steganography and Visual Cryptography for Secure e-Pay
S.Nagendrudu, V.Ramakrishna Reddy
Abstract

A high-speed prosperity in E-Commerce market has been witnessed in recent time throughout the world. With ever increasing popularity of online shopping, Debit or Credit card fraud and personal information security are major concerns for customers, merchants and banks specifically in the case of CNP (Card Not Present). This paper presents a new approach for providing limited information only that is necessary for fund transfer during online shopping thereby safeguarding customer data and increasing customer confidence and preventing identity theft. The method uses combined application of steganography and visual cryptography for this purpose.

Keywords: Information security, steganography, Visual Cryptography, Online shopping, Phishing

Full Text PDF
166-172 Designing and Implementation of an Efficient Fingerprint Recognition System Using Minutia Feature and KNN Classifier
Mayank Tripathy , Deepak Shrivastava
Abstract

Biometric feature based person recognition system becomes very important and necessary in this age, due to higher demand of security in corporate culture. A biometric system offers automatic identification of an individual based on a unique feature or characteristic obsessed by the individual. Human fingerprints are rich in details called minutiae, which can be used as identification marks for fingerprint verification. This work deals with the development of a highly robust and efficient biometric person identification system based on fingerprint features. Particularly this work is intended to designing and implementation of an efficient fingerprint recognition system based on minutia feature and KNN classifier. To achieve good minutiae feature extraction from fingerprints, pre-processing in form of image enhancement and binarization is first applied on fingerprints before they are evaluated. Minutia-marking with false minutiae removal methods are also used to remove false minutia. The proposed work utilizes finger print minutia as a feature for finger print identification and for the efficient classification K-Nearest Neighbour (KNN) classifier is utilized. The software platform used for the implementation of the proposed work is MATLAB. A database of total 50 real fingerprint images has been developed to test the effectiveness of the proposed system. For proper evaluation of proposed system performance 25 female and 25 male fingerprint images have been used. After the complete comparative analysis recognition efficiency among proposed system and conventional minutia matching based system, it is found that the fingerprint recognition efficiency of the developed system is very high about 99.9%, while about 70% for conventional minutia matching based system.

Keywords— Biometric system, fingerprint, minutia, feature extraction, feature matching, KNN Classifier.

Full Text PDF
173-181 Time Efficient Algorithms for Mining Association Rules
Supriya S. Borhade, Dr. S. V. Gumaste
Abstract

The difficulty of discovering association rules between items in a large database of corporate or retail organizations sales transactions. In this paper studied and presented two new algorithms for solving this problem that are basically different from the known algorithms. Experiments with mock as well as real-life data show that these algorithms do better than known algorithms by factors ranging from three for small problems to more than an order of magnitude for large problems.  Also showing how the best features of the two proposed algorithms can be combined into a hybrid algorithm, called Apriori Hybrid. Scale-up experiments show linear scales that with the number of transactions using Apriori Hybrid algorithm. Apriori Hybrid also has outstanding scale-up properties with respect to the transaction size and the number of items in the database.

Keywords— Apriori, Apriori-Tid,  AIS,  SETM,  Association rule.

Full Text PDF
182-184 Defining Privacy for Data Mining- An Overview
Supriya S. Borhade, Dr. S. V. Gumaste
Abstract

PPDM (Privacy preserving data mining) in receipt of valid data mining results without learning the original or essential data values. It has been receiving attention in the research scoiety and beyond. That time it was unclear what privacy preserving means. This paper provides a study framework and metrics for discussing the meaning of privacy preserving data mining, as groundwork for extra research in this field.
 Keywords: Privacy, Security, Obscuring, SMC, PPDM

Full Text PDF
185-189 Analysis of Website using Click Analytics
Kawaljit Kaur, Hardeep Singh
Abstract

Click Analytics is sub-domain of web analytics with a primary focus on what and where the website users are clicking on a web page. This helps analysts  to study most clicked or avoided areas on a web page and the behavior of users inside the web  page. Nowadays Web analytics is utilized to analyze different types of websites, but the use of Click Analytics has not been explored much especially in the educational domain of websites. In this paper, we used a Click Analytics tool called Crazy Egg in order to analyze and improve the website (www.gndu.ac.in). We collected the data of users coming on the web page for a month and then performed the analysis of collected data. We discuss the various observations and factors that play an important role towards the success or failure of a website among its users. The interpretation of results helped to know various problems existing on the web page
Keywords—click analytics, heatmap, website, overlay, web analytics.

Full Text PDF
190-199 Design and Implementation of Autopilot System for Quadcopter
Firas Abdullah Thweny Al-Saedi, Rawad A. Sabar
Abstract

In this paper, a full approach of modeling and control of a four rotor unmanned air vehicle (UAV) known as quadcopter aircraft is presented. The main features of the quadcopter’s structure are across-shaped aerial vehicle, cross intersection columns leading to composition of two diagonals of a square. Four motors have been attached to the end of the cross intersection. The body angular rate ( ) of all motors is the key to the control of the quadcopter. The dynamics system modeling is examined to understand the force growth in play. The control algorithm is represented by the smart Fuzzy controller address the stability and robustness. The genetic algorithm (GA) is involved in constructing the flight controller due to its effectiveness and efficiency in optimization of the control systems. The control strategies represented by the smart Fuzzy controller was linked with the GA to obtain further improvements in the system response in both the transient and steady states. The GA is used as an optimization technique because it is becoming a very common tool for resolving optimization problems and it is employed to effectively secure optimal solutions. The Matlab Simulink is a great tool which was used to test the efficiency and the accuracy of the developed system. 

Keywords - Quadrotor, Fuzzy Controller, Unmanned Aerial Vehicle

Full Text PDF
200-205 Remote Vehicle Tracking System through Voice Recognition App Using Smart Phone
FUsha Rani J,Dr T H Sreenivas
Abstract

The car accidents/thefts in recent times have been increasing rapidly though there are a number of safety measures being installed in them. The new standard technologies designed for the cars can be easily cracked with adequate knowledge about the technology in use. A prototype of what can be implemented in real time applications has been developed in order to overcome the drawbacks in the existing system with an additional option for customization of user needs.
A simple and reliable system has been designed which will give an alert in the form of a text message as soon as any problem arises. The problems here may range from theft to accidents. Minute changes like ignition on and off can also be controlled. The system operates based on speech commands or speech control signals like ‘stop’, ‘left’, and ‘right’, back, ‘go’ and so on.

Key Words— GPS (Global Positioning System), GSM (Global System for Mobile communication), HCI (Human-Computer Interaction), SMS (Short Message Service)

Full Text PDF
206-213 Data Hiding Using Video Steganography -A Survey
Swetha V,Prajith V,Kshema V
Abstract

Digital data communication has become an integral part of infrastructure nowadays. In this tech era, with the increasing importance of internet and the fast communication techniques, the security and the confidentiality of the sensitive data has become of prime concern. This has resulted in an unpredictable growth in the field of information hiding. Cryptography and steganography are the two popular methods available to provide security. One hides the existence of the message and the other distorts the message itself. Steganography is a technique to hide secret information in some other media without leaving any apparent evidence of data alteration. It comes under the assumption that if the feature is visible, the point of attack is evident, thus the objective of steganography is always to conceal the very existence of the secret data. This paper provides a state-of-the-art review and analysis of the different existing methods of video steganography and also covers classification and applications.

Keywords- Cover Media, Cryptography, Data Hiding, LSB, Security, Steganography

Full Text PDF

 

 

 

 

 

IJCSET Menu

Downloads