Analysis of Tree structure for Secure Group Communication Using LKH Approach
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.1130-1136, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.11301136
Abstract
Logical Key Hierarchy is a scalable and efficient method to achieve logarithmic rekeying cost in secure group communication. In applications like pay per view, video conferencing with multiple rekeying operations, the key tree will be unbalanced and will generate worst case rekeying cost. With each join, leave operation we change group key, as well as update all keys along the key path of join/leave user. Key aspect in secure group communication is maintained balanced key tree and achieving logarithmic rekeying cost. In this paper improvement in Non-split balancing high order tree is proposed. I-NSBHO (improved Non Split Balancing High order tree) with proposed Join user algorithm and leave user algorithm maintains balance of tree and always achieve logarithmic rekeying cost. Our experimental result shows the achieved improvement in rekeying cost of I-NSBHO join and leave operations compared to original NSBHO join and leave operations. With Node pruning I-NSBHO improves join cost and maintains logarithmic Rekeying cost for leave operation
Key-Words / Index Term
Secure Group Communication, NSBHO Tree, Logical Key Hierarchy, Message cost, Rekeying, Key tree, key path, Logarithmic Rekeying Cost)
References
[1] Takahito Sakamoto, Takashi Tsuji, Yuichi Kaji. "Group key rekeying using the LKH tech-nique and the Huffman algorithm" , 2008 International Symposium on Information Theory and Its Applications, 2008
[2] Kuei-Yi Chou, Yi-Ruei Chen, Wen-Guey Tzeng. "An efficient and secure group key man-agement scheme supporting frequent key updates on Pay-TV systems" , 2011 13th Asia-Pacific Network Operations and Management Symposium, 2011
[3] H. Lu. "A novel high-order tree for secure multicast key management" , IEEE Transactions on Computers, 2/2005
[4] H. Zhou, M. Zheng and T. Wang, “A Novel Group Key scheme for MANETS”, Advanced in control Engineering and Information Science, Procedia Engineering, IJSIA, 2011, pp. 3388-3395.
[5] S. Zhao, R. Kent and A. Aggarwal, “A Key Management and secure routing integrated framework for Ad-hoc Networks”, Ad-hoc Networks, Elsevier, vol-11, 2013, pp. 1046-1061
[6] Hanatani, Yoshikazu, et al. Secure Multicast Group Management and Key Distribution in IEEE 802.21. Security Standardisation Research Springer International Publishing. 2016, pp. 227-243.
[7] S.K. Hafizul Islam, G.P. Biswas A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication J. King Saud Univ.-Comput. Inf. Sci., 29 (1) (2017), pp. 63-73
[8] Vinod Kumar, Rajendra Kumar, S.K. Pandey, "A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA pub-lic key cryptosystem", Journal of King Saud University - Computer and Information Sciences, 2018.
[9] Aparna S. Pande Y. V. Joshi, Manisha Y. Joshi, “Analysis on Logical Key Hierarchy and Variants for Secure Group Communication”, ICCASP 2018, Book chapter, Springer-Atalntis, AISR, ISSN 1951-6851.
[10] J. Goshi and R.E. Ladner, “Algorithms for Dynamic Multicast Key Distribution Trees,” Proc ACM Symp. Principles of Distributed Computing (PODC 2003), 2003.
[11] C. K. Wong, M. Gauda and S. S. Lam, “Secure Group Communications Using Key Graphs,” IEEE/ACM Transactions on Networking, Vol.8, no.1, pp.16-30, 2000.
[12] P.Vijayakumar, S.Bose, A.Kannan, “Centralized key distribution protocol using the great-est common divisor method”, Computers and Mathematics with Applications , volume 65 1360–1368, 2013
Citation
Aparna S. Pande, Yashwant V. Joshi, Manisha Y. Joshi, Lalitkumar Wadhwa, "Analysis of Tree structure for Secure Group Communication Using LKH Approach," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1130-1136, 2019.
Pervasive Computing: A New Horizons
Review Paper | Journal Paper
Vol.7 , Issue.3 , pp.1137-1140, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.11371140
Abstract
Pervasive Computing environment gracefully integrates networked computing devices from tiny sensors to extremely dynamic and powerful devices – with people and their ambient environment. Service discovery is an essential element for pervasive computing to accomplish “anytime, anywhere” computing without users’ active attention to computing devices and network services. Privacy and security issues, however, have not been properly addressed. Therefore, devices and network services are unprotected; personal privacy is sacrificed; and devices and network services are inconvenient to use. In this paper, we will present what is pervasive computing and its applications. In particular, I will focus on how pervasive computing provides various features like history, principle, applications, characteristics, problems and challenges.
Key-Words / Index Term
ICT, Ubiquitous Computing, Calm Technology
References
[1] H. Pourreza and P. Graham. On the fly service composition for local interaction environments. In IEEE International Conference on Pervasive Computing and Communications Workshops, page 393. IEEE Computer Society, 2006.
[2] S. B. Mokhtar, N. Georgantas, and V. Issarny. Cocoa: Conversation-based service composition in pervasive computing environments. Proceedings of the IEEE International Conference on Pervasive Services, 2006.
[3] Z. Song, Y. Labrou, and R. Masuoka. Dynamic service discovery and management in task computing. Mobiquitous, 00:310-318, 2004.
[4] M. Vallee, F. Ramparany, and L. Vercouter. Flexible composition of smart device services. In International Conference on Pervasive Systems and Computing (PSC05), pages 165-171. CSREA Press, 2005.
[5] A.C. Huang and P. Steenkiste. A Flexible Architecture for Wide-Area Service Discovery, The Third IEEE Conference on Open Architectures and Network Programming (OPENARCH 2000), March 26-27, 2000.
[6] C. Adjih, P. Jacquet, and L. Viennot, “Computing Connected Dominated Sets with Multipoint Relays,” Technical Report 4597, INRIA-Rapport de recherche, Oct. 2002
[7] S Mahajan, "Convergence of IT and Data Mining with other technologies ", International Journal of Scientific Research in Computer Science and Engineering, Volume-01, Issue-04, pp (31-37), Aug 2013
[8] Jaskaranjit Kaur and Gurpreet Kaur , "Clustering Algorithms in Data Mining: A Comprehensive Study", International Journal of Computer Sciences and Engineering, Volume-03, Issue-07, Page No (57-61), Jul -2015.
Citation
Kiran Mangesh Pradhan, "Pervasive Computing: A New Horizons," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1137-1140, 2019.
Classification of Text and Images from PDF Using Graph Based Technique
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.1141-1146, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.11411146
Abstract
Today’s e-book plays an important role in all fields to learn new things through personal computer, laptop or mobile phones. There are various formats available for an e-book. The extensively used format is PDF because it retains the original format of the document. Segmentation is for reusing the content but in existing system the documents are segmented as the text content only. It doesn’t consider the non-text elements such as graphs, tables, and images. In this research layout analysis is performed by extracting both text objects and non-text objects from the PDF document and segmenting the objects separately using Support Vector Machine (SVM) classifiers. Finally we get the output as text objects and non-text objects separately. This method utilizes both bottom up approach for text line extraction and top down approach to divide graph tree created by Kruskal’s algorithm into sub graph which use Euclidean distance between adjacent vertices. Both text and non-text objects are classified using SVM technique. For each segmented text and non-text different dimensional features are extracted for labeling purpose. Several E-book PDF documents are tested and some sample input and output PDF documents are shown in the experimental result.
Key-Words / Index Term
E-book, PDF, Kruskal’s algorithm, Euclidean distance, SVM
References
[1] Gupta, N., &Banga, V. K. (2012, April). Image segmentation for text extraction. In 2nd International Conference on Electrical, Electronics and Civil Engineering (ICEECE’2012) (pp. 182-185).
[2] Pasha, S., & Padma, M. C. (2015, December). Handwritten Kannada character recognition using wavelet transform and structural features. InEmerging Research in Electronics, Computer Science and Technology (ICERECT), 2015 International Conference on (pp. 346-351). IEEE.
[3] Adak, C. (2013, August). Unsupervised text extraction from G-maps. InHuman Computer Interactions (ICHCI), 2013 International Conference on (pp. 1-4). IEEE.
[4] Liu, J., Fan, X. Z., & Chen, K. (2007, October). Research on method of extracting Chinese domain terms based on rough and fuzzy clustering. InSemantics, Knowledge and Grid, Third International Conference on (pp. 366-369). IEEE.
[5] Chaple, G. N., Daruwala, R. D., & Gofane, M. S. (2015, February). Comparisons of Robert, Prewitt, Sobel operator based edge detection methods for real time uses on FPGA. In Technologies for Sustainable Development (ICTSD), 2015 International Conference on (pp. 1-4). IEEE.
[6] Gautam, A. (2013). Segmentation of Text From Image Document. International Journal of Computer Science and Information Technologies,4(3), 538-540.
[7] Tounsi,M., Mo Moalla, I., Alimi, A. M., & Lebouregois, F. (2015, August). Arabic characters recognition in natural scenes using sparse coding for feature representations. In Document Analysis and Recognition (ICDAR), 2015 13th International Conference on (pp. 1036-1040). IEEE.
[8] O`Gorman, L. (1993). The document spectrum for page layout analysis. IEEE Transactions on Pattern Analysis and Machine Intelligence, 15(11), 1162-1173.
[9] Nathiya, N., & Pradeepa, K. (2013, December). Optical Character Recognition for scene text detection, mining and recognition. In Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on (pp. 1-4). IEEE.
[10] Yuan, Q., & Tan, C. L. (2001). Text extraction from gray scale document images using edge information. In Document Analysis and Recognition, 2001. Proceedings. Sixth International Conference on (pp. 302-306). IEEE.
[11] Kumari, S., & Vijay, R. (2012). Effect of symlet filter order on denoising of still images. Advanced Computing, 3(1), 137.
[12] Lienhart, R., & Wernicke, A. (2002). Localizing and segmenting text in images and videos. IEEE Transactions on circuits and systems for video technology, 12(4), 256-268.
[13] Wu, L., Shivakumara, P., Lu, T., & Tan, C. L. (2015). A New Technique for Multi-Oriented Scene Text Line Detection and Tracking in Video. IEEE Transactions on Multimedia, 17(8), 1137-1152.
[14] Ranjini, S., &Sundaresan, M. (2013). Extraction and Recognition of Text From Digital English Comic Image Using Median Filter. International Journal on Computer Science and Engineering, 5(4), 238.
[15] Mehta, A., Parihar, A. S., & Mehta, N. (2015, September). Supervised classification of dermoscopic images using optimized fuzzy clustering based Multi-Layer Feed-forward Neural Network. In Computer, Communication and Control (IC4), 2015 International Conference on (pp. 1-6). IEEE.
[16] Tehsin, S., Masood, A., &Kausar, S. (2014). Survey of Region-Based Text Extraction Techniques for Efficient Indexing of Image/Video Retrieval. International Journal of Image, Graphics and Signal Processing, 6(12), 53.
[17] Green, R., & Oliver, C. (2013, November). Layout analysis of book pages. In2013 28th International Conference on Image and Vision Computing New Zealand (IVCNZ 2013) (pp. 118-123). IEEE.
[18] Hoang, T. V., &Tabbone, S. (2010, June). Text extraction from graphical document images using sparse representation. In Proceedings of the 9th IAPR International Workshop on Document Analysis Systems (pp. 143-150). ACM.
[19] Moniz, N., & Rodrigues, F. (2012). Extracting Structure, Text and Entities from PDF Documents of the Portuguese Legislation. In KDIR (pp. 123-131).
Citation
D. Selvanayagi, "Classification of Text and Images from PDF Using Graph Based Technique," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1141-1146, 2019.
Review on Soil Analysis for Future Crop Prediction
Review Paper | Journal Paper
Vol.7 , Issue.3 , pp.1147-1150, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.11471150
Abstract
As India is agricultural based country. In a field of agriculture, sustained harvesting must be followed with fixed check of fertility rate of soil because soil nutrient measurement is very essential and plays an important role in proper plant growth and effective fertilization. The more accurate method leads to better future of farmers. In this paper we have reviewed many methods for measuring the soil nutrients. The traditional approach is to perform test in soil testing laboratories where chemical process is performed after drying the soil and other preprocessing but it leads to more efforts and tedious process. As a solution a smarter way in which the level is observed and measured using Photodiodes, Light Emitting Diodes, analog-to-digital converter (ADC), FPGA and NIR Laser. AS a result it will leads to more time saving and detailed measure of nutrients. According to NPK values of soil that are acquired and whether attributes, prediction of future crop is possible. Using various techniques for measuring soil nutrients and according to that nutrients using various classification and machine learning algorithms we can make the prediction of which crop to cultivate. Those Methods are studied analyzed according to various requirements.
Key-Words / Index Term
Data mining, NPK detection, Optical transducer, Soil fertility, Classification, Crop prediction
References
[1] S. S. Gadgil and R. R. Lobo, "Arduino Applications for Smart Cities," IJCSE, vol. 04, no. 04, pp. 4-20, 2016.
[2] K. b. M. Yusof, Suhaila binti Isaak and N. H. b. Ngajikin, "LED based soil spectroscopy," Buletin Optik, 2016.
[3] M. Marianah and S. A. R. Mohamad, "Detection of Nitrogen, Phosphorus, and Potassium," IEEE, 2017.
[4] A. Rawankar, M. Nanda, H. Jadhav and P. Lotekar, "Detection of N,P,K Fertilizers in Agricultural Soil with NIR Laser Absorption Technique," in International Conference on Microwave and Photonics (ICMAP 2018), 2018.
[5] J. C. PUNO, E. S. E. DADIOS, I. VALENZUELA and J. CUELLO, "Determination of Soil Nutrients and pH level using Image Processing and Artificial Neural Network," IEEE, 2017.
[6] M. W. JIanhan Lin and M. Zhang, "Electrochemical sensors for soil nutrient detection: Oppertunity and challange," KLMPASI, Ministory of Education, China, Baijing.
[7] D. Vadalia, M. Vaity, K. Tawate and D. Kapse, "Real Time soil fertility analyzer and crop prediction," International Research Journal of Engineering and Technology (IRJET), vol. 04, no. 03, 2017.
[8] S. S.N. and D. M.B., "Real-Time Monitoring of Soil Nutrient Analysis using WSN," in International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), 2017.
[9] M. K. R. S. Preetha, S. Nishanthini and D. Santhiya, "Crop Yield Prediction," IJETS, vol. III, 2016.
[10] C. P. Devi and T Vigneswari, "A Survey on Machine Learning and Stastical Meyhods for Bankruptcy Prediction," IJCSE, vol. 7, no. 3, 2019.
[11] Y. He, Y. Zhang, S. Zhang and H. Fang, "Application of Artificial Neural Network on Relationship Analysis between Wheat Yield and Soil Nutrients," in IEEE Engineering in Medicine and Biology 27th Annual Conference, Shanghai, China, 2005.
[12] P. D. Zingade, O. Buchade, N. Mehta, S. Ghodekar and C. Mehta, "Machine Learning based Crop Prediction System Using Multi-Linear Regression," IJETCS, vol. 3, no. 2018, 2018.
[13] T. Sujjaviriyasup and K. Pitiruek, "Agricultural Product Fore- casting Using Machine," Int. Journal of Math. Analysis, vol. 7, 2013.
[14] R. Kumar, M. Singh, P. Kumar and J. Singh, "Crop Selection Method to Maximize Crop Yield Rate using Machine Learning Technique," in International Conference on Smart Technologies and Management,Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Chennai, 2015.
Citation
K.B.Kaji, "Review on Soil Analysis for Future Crop Prediction," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1147-1150, 2019.
Road Accident Prevention and Collision Avoidance at Intersection In VANET
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.1151-1155, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.11511155
Abstract
Now a days on road accidents is a major problem of concern. Road accidents happen due to various different reasons such as street development, surge hours, human conduct, drunken driving, red light jumping etc. Increase in urban population have led to increase in road traffic and road accidents. VANET provides various methods to provide road safety. Maximum number of accidents have occurred at intersections with good visibility in urban areas. This paper presents a focused view on the safety of the vehicles at intersecting roads. A scheme is implementing to provide road safety at intersecting roads. In the proposed scheme vehicle to roadside communication is used with Intelligent Traffic Lights (ITLs) and IEEE 802.11p protocol. The advancement in Vehicular Ad hoc Network have led to various organizations, Institutes to focus on the methods of street security and it is now widely used now a days.
Key-Words / Index Term
VANET, Ad Hoc Network, Accident Prevention, Collision Avoidance, IEEE protocol, ITLs
References
[1] World Health Organization 2017 Report on Road Safety www.who.int/violence_injury_prevention/road_safety_status/2017/
[2] http://savelifefoundation.org/wp-content/uploads/2017/09/Road-Crash-Factsheet_SLF_2016.pdf
[3] http://indianexpress.com/article/india/road-accidents-in-india-2016-17-deaths-on-roads-every-hour-chennai-and-delhi-most-dangerous-4837832/
[4] Chung-ming, Chung-ming and Yao-chung Chang, “Telematics communication Technologies and Vehicular Networks: Wireless Architectures and Applications,” Book, 2009.
[5] Brian Cronin, “Vehicle-to-Vehicle Communications for Safety,” ITSJoint Program Office Research and Innovative Technology, available at http://www.its.dot.gov/research/v2v.htm#sthash.GCEQCvMo.dpuf, June 2014.
[6] Hassan Artail, Kareem Khalifeh, and Mohamad Yahfoufi, “Avoiding
Car-Pedestrian Collision using VANET,” Electrical and Computer Engineering Department American University of Beirut, pp. 458-465 IEEE Conference 2017.
[7] Estrella Garcia-Lozanoy, Carolina Tripp Barba, M´onica Aguilar Igartua and Celeste Campoy, “A Distributed, bandwidth-efficient accident prevention system for interurban VANET”, Departament d’Enginyeria Telem`atica, Universitat Polit`ecnica de Catalunya (UPC), Barcelona, Spain Department of Telematic Engineering, University Carlos III of Madrid, Spain, IEEE conference, 2013.
[8] Ganesh S. Khekare, Apeksha V. Sakhare, “A smart city framework for intelligent traffic system using VANET”, Department of Computer Science and Engineering, IEEE conference, pp. 302-305, 2013.
[9] Junping, Z., Fei-Yue, W., Kunfeng, W., Wei-Hua, L., Xin, X., Cheng,
C., “Data-Driven Intelligent Transportation Systems: Survey,” IEEE Transactions on Intelligent Transportation Systems, Vol. 12, Issue 4, pp. 1624-1639, 2011.
[10] Karp, B., Kung, H. T., “GPSR: Greedy Perimeter Stateless Routing for wireless Networks,” MobiCom 2000.
[11] Zhongyi l., Tong, Z., Wei, Y., Xiaoming, L., “GOSR: geographical opportunistic source routing for VANETs,” ACM SIGMOBILE Mobile Computing and Communications, Vol. 13, Issue 1, 2009.
[12] Perkins, C.E., Belding-Royer, E. M., Das, S.R., “Ad hoc on demand distance vector (AODV) routing,” IEEE Personal Communications, pp.16-28, 2001.
[13] Mi-hye Lee, Sun-young Im, Byeong-uk Lee, Byeong-hee Roh , and Bo-mi Kim,”Red signal delay scheme to prevent vehicle accidents at the intersection", Dept. of Information and Computer Engineering, Ajou University Suwon, Korea, IEEE conference, pp. 232-236, 2015.
[14] S. Atev, H. Arumugam, O. Masoud, R. Janardan, and N. P. Papanikolopoulos,"A Vision-Based Approach to Collision Prediction at Traffic Intersections," IEEE Tr. Intelligent Transportation Systems, vol. 6, ppAI6-423, Dec. 2005.
[15] N. Buch, S. A. Velastin, 1. Orwell, "A Review of Computer Vision Techniques for the Analysis of Urban Traffic," IEEE Tr. Intelligent Transportation Systems, vol. 12, pp.920-939, Sep. 20 II.
[16] Vaishali Manwar, Sayali N. Mane, Dr. Manish Sharma,”Intersection collision avoidance at vehicular ad hoc network”, D Y Patil College of Engineering, IEEE International Conference on Computer, Communication and Control (IC4-2015)
[17] Sumit A. Khandelwal, Ashwini B. Abhale, Uma Nagaraj,” Accident
prevention and air pollution control under VANET using cloud environment”, 3rd International Conference on Recent Trends in Engineering & Technology (ICRTET’2014), pp. 900-904, March 2014.
[18] Prashant Panse1, Dr. Tarun Shrimali2, Dr. Meenu Dave,” An Approach for Preventing Accidents and Traffic Load Detection on Highways using V2V”, IJICCT, Vol IV, pp. 181-186, Issue I (Jan-Jun 2016): ISSN 2347-7202.
[19] Centre for Applied Informatics (ZAIK), Institute of Transport Research, German Aerospace Centre, “Sumo,” http://sumo.sourceforge.ne
[20] Yashashwani, Sapna Gambhir, “A Survey On Road Accidents And Vehicle Collision In VANET”, International Journal of Management,
Technology and Engineering, Vol. 8, Issue 5, pp. 182-190, May 2018.
[21] Anjali Verma and Dr. Sapna Gambhir, “Comparison Study of Various Cluster Based Routing Protocols in VANET”, Proceedings of International Journal of Advanced Computer Science and Technology, Vol. 2, no. 1, pp. 53-61, 2012.
[22] Megha, Sapna Gambhir, “Security Issues and Challenges In Vehicular Ad Hoc Networks (VANETs)” International Journal of Electrical Electronics & Computer Science Engineering Volume 3, Issue 1, pp. 13-18, February, 2016.
Citation
Mohit Gambhir, Sapna Gambhir, "Road Accident Prevention and Collision Avoidance at Intersection In VANET," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1151-1155, 2019.
A SIFT with RANSAC Based Spatial Tampering Detection in Digital Video
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.1156-1163, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.11561163
Abstract
This paper presents passive blind forensic scheme to detect spatial tampering in MPEG-4 (Moving Picture Experts Group-4) digital video. In spatial tampering, small region of frame is copied and pasted at some other location in same frame. A proposed algorithm uses SIFT (Scale Invariant Feature Transform) and RANSAC (Random Sample Consensus) to detect the tampering. In this local features from each frame are extracted using SIFT and those features are matched to identify forged area. At the end RANSAC homography is used to remove the false matching to increase the detection accuracy. The proposed method performance is measured with respect to detection accuracy and computational time and verified on compressed and uncompressed videos. To create test data various geometric alterations used in forgery such as scaling, rotation are considered. The simulation results proves that the proposed method finds the forged area efficiently for all the above mentioned cases with average detection accuracy of 99.5%. The algorithm is tested for various compression rates to check its robustness. The detection accuracy of the algorithm increases as the compression rate increases. The performance of the proposed algorithm is compared with two other methods reported in literature which shows that the proposed scheme has higher detection accuracy compared to other methods. The average computational time observed is 0.56 seconds.
Key-Words / Index Term
Spatial tampering, Forgery detection, SIFT, RANSAC, Forensic scheme
References
[1] K. Sitara, B. M. Mehtre, “Digital video tampering detection: An overview of passive techniques”, Digital Investigation,vol 18,pp 8-22,2016.
[2] S. Milani, M. Fontani, P. Bestagini, M. Barni, A. Piva, M. Tagliasacchi, and S. Tubaro, “An overview on video forensics,” APSIPA Transactions on Signal and Information Processing, vol.1, pp.1-18,2012.
[3] S. Upadhyay and S. K. Singh, “Video authentication: Issues and challenges,” International Journal of Computer Science, vol. 9, no. 1-3, pp. 409–418,2012.
[4] H. Yin, W. Hui, H. Li, C. Lin, and W. Zhu, "A Novel Large-Scale Digital Forensics Service Platform for Internet Videos," IEEE Transactions on Multimedia, vol. 14, pp. 178-186, 2012.
[5] T. Stütz, F. Autrusseau, and A. Uhl, "Non-blind structure-preserving substitution watermarking of H. 264/CAVLC inter-frames,” IEEE Transactions on Multimedia, vol. 16, pp. 1337-1349, 2014.
[6] Ardizzone, A. Bruno, G. Mazzola, “Copy-move forgery detection by matching triangles of key points”, IEEE Transactions on Information Forensics and Security vol.10, no.10, pp. 2084-2094, 2015
[7] J. Li, X. Li, B. Yang, X. Sun, “Segmentation-based image copy-move forgery detection scheme”, IEEE Transactions on Information Forensics and Security, vol. 10, no 3,pp.507-518,2015.
[8] V. Christlein, C. Riess, J. Jordan, C. Riess, E. Angelopoulou, “An evaluation of popular copy-move forgery detection approaches”, IEEE Transactions on information forensics and security, vol. 7,no 6,pp.1841-1854,2012.
[9] R. C. Pandey, S. K. Singh, K. Shukla, R. Agrawal, “Fast and robust passive copy-move forgery detection using SURF and SIFT image features”, in 9th International Conference on Industrial and Information Systems (ICIIS), IEEE, pp.1-6, 2014.
[10] S. Prasad, B. Ramkumar, “Passive copy-move forgery detection using SIFT, HOG and SURF features”, in IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), IEEE, pp.706-710, 2016
[11] Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra, “A sift-based forensic method for copy-move attack detection and transformation recovery,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1099–1110, Sep. 2011.
[12] W. Li and N. Yu, “Rotation robust detection of copy-move forgery,” in Proc. IEEE International Conference on Image Processing ICIP’10, pp. 2113–2116,2010.
[13] H. Bay, T. Tuytelaars, and L. Van Gool, “Surf: Speeded up robust features,” Computer Vision–ECCV, pp. 404–417, 2006.
[14] N. Dalal and B. Triggs, “Histograms of oriented gradients for human detection,” in Proc. IEEE computer Society Conference on Computer Vison and Pattern Recognition, CVPR’05, 2005.
[15] T. Van Lanh, K. Chong, S. Emmanuel, and M. Kankanhalli, “A survey on digital camera image forensic methods,” in Proc. IEEE International Conference on Multimedia and Expo ICME’07, pp. 16–19,2007.
[16] X. Pan and S. Lyu, “Region duplication detection using image feature matching,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 4, pp. 857–867, Dec. 2010.
[17] Bestagini P, Milani Tagliasacchi M, Tubaro S (2013) Local tampering detection in video sequences, IEEE MMSP, pp. 488–493
[18] W. Wang and H. Farid, "Exposing digital forgeries in video by detecting duplication," in Proceedings of the 9th workshop on Multimedia & security, pp. 35-42, 2007.
[19] V. Subramanyam and S. Emmanuel, "Video forgery detection using HOG features and compression properties," in IEEE International Workshop on Multimedia Signal Processing, pp. 89-94, 2012
[20] M. Pun, X. C. Yuan, and X. L. Bi, "Image forgery detection using adaptive over segmentation and feature point matching,” IEEE Transactions on Information Forensics and Security, vol. 10, pp. 1705-1716, 2015.
[21] Ramesh Chand Pandey, Sanjay Kumar Singh and K.K.Shukla, “Passive Copy- Move Forgery Detection in Videos,” 5th International Conference on Computer and Communication Technology, pp.301-306,ICCCT-2014.
[22] C.-C. Hsu, T.-Y. Hung, C.-W. Lin, and C.-T. Hsu, "Video forgery detection using correlation of noise residue," IEEE 10th Workshop on Multimedia Signal Processing, pp. 170-174, 2008.
[23] M. Kobayashi, T. Okabe, and Y. Sato, "Detecting video forgeries based on noise characteristics," in Advances in Image and Video Technology, Springer, pp. 306-317, 2009.
Citation
Jayashree D. Gavade, Sangeeta R.Chougule, "A SIFT with RANSAC Based Spatial Tampering Detection in Digital Video," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1156-1163, 2019.
Vowel Recognition of Speech using Data mining
Survey Paper | Journal Paper
Vol.7 , Issue.3 , pp.1164-1167, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.11641167
Abstract
Over the past few years, technology has become very dynamic. It is fuelling itself at an ever increasing rate. An Artificial Neural Network (ANN) is an information processing paradigm that is inspired by the way biological nervous systems, such as the brain, process information. Over the last decades many interesting techniques of Neural Network (NN) were introduced, and shown to be useful in many applications in different fields. Since neural network brings together techniques from different fields such as vowel recognition, pattern recognition, Character recognition, face recognition, pattern matching, image processing, signature verification, data compression, signal processing among many different sources. This paper presents a study survey of various method of vowel recognition. The methods included and analyzed in this survey are Knowledge Based Cascade Correlation (KBCC), Multilayer Perceptron, Formants, and Linear predictive features.
Key-Words / Index Term
Vowel,speech,Speech recognition (SR), Knowledge Based Cascade Correlation (KBCC), Multilayer perceptron (MLP), linear predictive (LP)
References
[1] Franqois Rivest and Thomas R. Shultz “Application of Knowledge-based Cascade-correlation to Vowel Recognition”.
[2] Mihaela Grigore “Vowel recognition with non linear perceptron”.
[3] Hult, G. “Some vowel recognition experiments using multilayer perceptrons”
[4] Jeff Byorick, Ravi P. Ramachandran and Robi Polikar “Isolated Vowel Recognition Using Linear Predictive Features and Neural Network Classifier Fusion”
[5] Biljana Prica and Sini?sa Ili´c “Recognition of Vowels in Continuous Speech by UsingFormants”
[6] François Rivest and Thomas R. Shultz “Knowledge-based Cascade-correlation: A Review”
[7] Thomas R. Shultz and Francois Rivest “Knowledge-based Cascade-correlation: Varying the Size and Shape of Relevant Prior Knowledge”
[8] Hua Nong TING and Jasmy YUNUS “speaker independent malay vowel recognition of children using multi layer perceptron”
[9] Buckingham D, Shultz TR (2000) The developmental course of distance, time, and velocity concepts: A generative connectionist model. J Cog and Dev 1: 305–345
[10] Rivest F, Shultz TR (2002) Application of knowledge-based cascade-correlation to vowel recognition. IEEE Internat World Congr on Comp Intell, pp. 53–58
[11] Allison B (2007) The I of BCIs: next generation interfaces for brain–computer interface systems that adapt to individual users. In: International conference on human-computer interaction. Springer, Berlin, Heidelberg, pp 558–568
[12] Birbaumer N, Cohen LG (2007) Brain–computer interfaces: communication and restoration of movement in paralysis. J Physiol 579(3):621–636
[13] Faradji F, Ward RK, Birch GE (2009) Plausibility assessment of a 2-state self-paced mental task-based BCI using the no-control performance analysis. J Neurosci Methods 180(2):330–339
[14] Nijboer F, Sellers EW, Mellinger J, Jordan MA, Matuz T, Furdea A, Halder S, Mochty U, Krusienski DJ, Vaughan TM, Wolpaw JR (2008) A P300-based brain–computer interface for people with amyotrophic lateral sclerosis. Clin Neurophysiol 119(8):1909–1916
[15] Lawhern VJ, Solon AJ, Waytowich NR, Gordon SM, Hung CP, Lance BJ. EEGNet: A compact convolutional neural network for EEG-based brain-computer interfaces. J Neural Eng. 2018;15: 056013.
[16] DaSalla CS, Kambara H, Sato M, Koike Y. Spatial filtering and single-trial classification of EEG during vowel speech imagery. i-CREATe 2009—International Convention on Rehabilitation Engineering and Assistive Technology. Association for Computing Machinery; 2009. pp. 1–4. doi: 10.1145/1592700.1592731
[17] Tzovara A, Murray MM, Plomp G, Herzog MH, Michel CM, De Lucia M. Decoding stimulus-related information from single-trial EEG responses based on voltage topographies. Pattern Recognit. 2012;45: 2109–2122.
[18] Blankertz B, Lemm S, Treder M, Haufe S, Müller KR. Single-trial analysis and classification of ERP components—A tutorial. Neuroimage. 2011;56: 814–825.
[19] Karpathy A, Toderici G, Shetty S, Leung T, Sukthankar R, Fei-Fei L. Large-scale video classification with convolutional neural networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2014. pp. 1725–1732.
[20] An X, Kuang D, Guo X, Zhao Y, He L. A deep learning method for classification of EEG data based on motor imagery. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag; 2014. pp. 203–210.
Citation
Susheel Kumar Tiwari, Manmohan Singh, Rahul Sharma, "Vowel Recognition of Speech using Data mining," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1164-1167, 2019.