Reversible Image Steganography Based on Interpolation and Adaptive Approach
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1394-1398, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.13941398
Abstract
Information has to face certain data security related issues like confidentiality, message integrity, authorization etc while transmitted over internet, therefore need to design appropriate mechanism and techniques that ensures secrecy of private information while it is communicated over public networks has turn out to be an urgent and desired research problem. Steganography has been widely used in historical times and the also currently used with intensive interest. The advantage of steganography over cryptography is that it doesn’t raise any suspicion and the message can be exchanged over a public communication channel. It is an ongoing research area having vast number of applications in distinct fields such as defense and intelligence, medical, on-line banking, on-line transactions handling, for various financial and commercial applications, to stop music piracy etc. In this paper a modified interpolation based method is used with adaptable range table to embed in pixels of interpolated image with secret bits. Proposed method can be used for applications (like for defense, and medical purposes etc) where exact retrieval of cover object at receiver side is required, due to use of reversible embedding approach. From experimental results it is observed that proposed technique achieves higher embedding capacity, acceptable value for visual quality and robustness against statistical and visual attacks.
Key-Words / Index Term
Steganography, Data Security, Reversible Embedding, Interpolation
References
[1] R. J. Anderson and F. A. P. Petitcolas, "On the limits of steganography," in IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 474-481, May 1998.
[2] Kodge B. G., “Information Security: A Review on Steganography with Cryptography for Secured Data Transaction”, International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.6, pp.1-4, 2017.
[3] J. Fridrich, “Steganography in digital Media: Principles, Algorithms, and Applications”, Cambridge University Press, 2009.
[4] H. Wang & S. Wang, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, Vol. 47 No. 10, pp 76-82, 2004.
[5] T. M. Lehmann, C. Gonner and K. Spitzer, "Survey: interpolation methods in medical image processing," in IEEE Transactions on Medical Imaging, vol. 18, no. 11, pp. 1049-1075, Nov. 1999.
[6] Lei Zhang and Xiaolin Wu, "An edge-guided image interpolation algorithm via directional filtering and data fusion," in IEEE Transactions on Image Processing, vol. 15, no. 8, pp. 2226-2238, Aug. 2006.
[7] Ki-Hyun Jung, Kee-Young Yoo, “Data hiding method using image interpolation,” Computer Standards & Interfaces, Volume 31, Issue 2, Pages 465-470, 2009.
[8] L. Luo, Z. Chen, M. Chen, X. Zeng and Z. Xiong, "Reversible Image Watermarking Using Interpolation Technique," in IEEE Transactions on Information Forensics and Security, vol. 5, no. 1, pp. 187-193, March 2010.
[9] Wien Hong, Tung-Shou Chen "Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism," J ournal of Visual Communication and Image Representation, Volume 22, Issue 2, pp 131-140, 2011.
[10] Ya-Ting Chang, Cheng-Ta Huang, Chin-Feng Lee, Shiuh-Jeng Wang, "Image interpolating based data hiding in conjunction with pixel-shifting of histogram", The Journal of Supercomputing Volume 66, Number 2, pp 1093-1110. 2013.
[11] Lu, Tzu-Chuen, Chin-Chen Chang, and Ying-Hsuan Huang. "High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting", Multimedia Tools and Applications, volume 72, issue 1, pp 417–435, 2014.
[12] Yuan-Yu Tsai, Jian-Ting Chen, Yin-Chi Kuo, and Chi-Shiang Chan, "A generalized image interpolation-based reversible data hiding scheme with high embedding capacity and image quality", KSII Transactions on Internet and Information Systems (TIIS) VOL. 8, NO. 9, pp 3286-3301, Sep. 2014.
[13] Mingwei Tang, Shenke Zeng, Xiaoliang Chen, Jie Hu, Yajun Du, “An adaptive image steganography using AMBTC compression and interpolation technique,” Optik, Volume 127, Issue 1, pp 471-477, 2016.
[14] Tzu-Chuen Lu, “An interpolation-based lossless hiding scheme based on message recoding mechanism,” Optik, Volume 130, pp 1377-1396, 2017.
[15] Jun Tian, "Reversible data embedding using a difference expansion," in IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp 890-896, Aug. 2003.
[16] Chia-Chen Lin, Wei-Liang Tai, Chin-Chen Chang, “Multilevel reversible data hiding based on histogram modification of difference images,” Pattern Recognition, Volume 41, Issue 12, pp 3582-3591, 2008.
Citation
Sumeet Kaur, Savina Bansal, R.K. Bansal, "Reversible Image Steganography Based on Interpolation and Adaptive Approach," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1394-1398, 2019.
Systematic Evaluation of Existing CAPTCHA Techniques
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1399-1402, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.13991402
Abstract
Continuous evolution of CAPTCHA techniques is necessary to combat modern generation of AI enabled bots. Designing a new CAPTCHA scheme requires a careful review of existing CAPTCHA techniques. But existing reviews of current CAPTCHA techniques lack systematic evaluation of the current trends in CAPTCHA development. Existing reviews focus on mere enlisting of current CAPTCHA schemes in several categories and explaining their working schema. Hence systematic evaluation and analysis of existing CAPTCHA techniques in several categories is necessary. In this paper we highlight the facts and flaws of existing CAPTCHA techniques in order to provide insights for future improvements in current CAPTCHA techniques. We have focused on providing simple and clear understanding of existing CAPTCHA techniques in a systematic way. This will help researchers to overcome the drawbacks of current CAPTCHA schemes and work on improvement of weaker aspects of existing CAPTCHA techniques.
Key-Words / Index Term
CAPTCHA, HCI, Web security, Human Interactive Proof (HIP), Bots
References
[1] A.L. Coates, H. S. Baird and R. J. Faternan, “Pessimal Print: A Reverse Turing Test,” In the Proceedings of the 6th International Conference on Document Analysis and Recognition, Seattle, WA, USA, pp. 1154-1158, 2001.
[2] M. Chew and H. S. Baird, “BaffleText: a Human Interactive Proof,” In the Proceedings of 10th SPIE/IS&T Document Recognition and Retrieval Conference (DRR2003), Santa Clara, CA, USA, pp. 305-316, 2003.
[3] G. Moy, N. Jones, C. Harkless, and R. Potter, “Distortion Estimation Techniques in Solving Visual CAPTCHAs,” In the Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’04), vol. 2, pp. 23-28, 2004.
[4] K. Chellapilla, K. Larson, P. Y. Simard, and M. Czerwinski, “Building Segmentation Based Human-Friendly Human Interaction Proofs (HIPs),” In the Proceedings of HIP 2005, Bethlehem, PA, USA, pp. 1-26, May 19-20, 2005.
[5] H. S. Baird and J. L. Bentley, “Implicit CAPTCHAs,” In the Proceedings of SPIE/IS&T Conference on Document Recognition and Retrieval XII (DR&R2005), San Jose, pp. 191-196, 2005.
[6] J. Tam, J. Simsa, S. Hyde, and V. Ahn, “Breaking Audio CAPTCHAs,” In the Proceedings of 21st International Conference on Neural Information Processing Systems, Vancouver, British Columbia, Canada, pp. 1625-1632, December 2008.
[7] K.A. Kluever and R. Zanibbi., “Balancing usability and security in a video CAPTCHA,” In the Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS `09), ACM, New York, NY, USA, Article 14, pp. 1-11, 2009.
[8] M. Shirali-Shahreza and S. Shirali-Shahreza, “Question-Based CAPTCHA,” In the Proceedings of International Conference on Computational Intelligence and Multimedia Applications, Sivakasi, Tamil Nadu, India,pp. 54-58, 2007.
[9] C. J. Hernandez-Castro and A. Ribagorda, “Pitfalls in CAPTCHA design and implementation: The Math CAPTCHA, a case study,” Computers & Security, Vol. 29, No. 1, pp. 141-157, 2010.
[10] M. M. Tanvee, M. T. Nayeem, and M. M. Rafee, “Move & Select: 2 Layer CAPTCHA Based on Cognitive Psychology for Securing Web Services,” International Journal of Video & Image Processing and Network Security, IJVIPNS/IJENS, Vol. 11, No. 5, pp. 917, 2011.
[11] T. Yamamoto, T. Suzuki, and M. Nishigaki, “A Proposal of Four-Panel cartoon CAPTCHA,” In the Proceedings of International Conference on Advanced Information Networking and Applications 2011, Singapore , pp. 159–166, 2011.
[12] M. J. M. Chowdhury, N. R. Chakraborty, “CAPTCHA Based on Human Cognitive Factor,” International Journal of Advanced Computer Science and Applications, Vol. 4, No. 11, pp. 144-149, 2013.
[13] V. Dhaka, G. Gandhi, “Developing a CAPTCHA Utilizing Cognitive Ability of Human through PHP,” International Journal of Advanced Networking Applications, Special Issue, pp. 50–54, 2015.
[14] G. Goswami, B. M. Powell, M. Vatsa, R. Singh, and A. Noore., “FaceDCAPTCHA: Face Detection based Color Image CAPTCHA,” Future Generation Computer Systems, Vol. 31, pp. 59–68, February 2014.
[15] M. De Marsico, L. Marchionni, A. Novelli, and M. Oertel, “FATCHA: biometrics lends tools for CAPTCHAs,” Multimedia Tools Applications, Vol. 76, No. 4, pp. 5117-5140, February 2017.
[16] E. Uzun, S. P. H. Chung, I. Essa, and W. Lee, “rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System,” Network and Distributed Systems Security Symposium (NDSS), San Diego, CA, USA, 2018.
[17] Bin B. Zhu, Jeff Yan, Guanbo Bao, Maowei Yang, and Ning Xu, “Captcha as Graphical Passwords-A New Security Primitive Based on Hard AI Problems,” IEEE Transactions on Information Forensics and Security, Vol. 9, No. 6, pp. 891-904, June 2014.
[18] A. Bhalerao, L. Rade, “A Basic Survey of CAPTCHA :Application and Challenges”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 06, No. 01, pp.1-5, 2018.
Citation
S.S. Kulkarni, H.S. Fadewar, "Systematic Evaluation of Existing CAPTCHA Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1399-1402, 2019.
Scraping and Visualization of Product Data from E-commerce Websites
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1403-1407, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.14031407
Abstract
the paper entitled as “Scraping and Visualization of Product Data from E-commerce Websites”. Extracting data from websites is called as web scrapping. The main advantages of the scrapping are inexpensive, easy to implement, low maintenance and speed. The main objective of the work is to scrap the data from websites and store the extracted data in Comma-separated values (CSV) format for analysis. The data available in the websites are in the form of unstructured information. Web scraping helps to collect these unstructured data and store it in a structured form. The process of Web scraping is to extract the data using various methods from the internet. Millions of people consider universally accessible resource as internet. The rise in the usage of internet has commonly been increased day by day and there is high growth in competition between the organizations in their business. This work consists with three phases. The first phase of the work is web scrapping. In this phase, the extracted data will be stored as a csv file. The second phase of the work is data analysis. In this phase, the data is imported from the csv format and analyzed using statistical analysis. The third phase of the work is visualization and in this the extracted data has been visualized with the help of different charts.
Key-Words / Index Term
Web scrapping, Data Analysis, Visualization, data mining, websites
References
[1] Eloisa Vargiu, Mirko Urru, “Exploiting web scraping in a collaborative filteringbased approach to web advertising”, Artificial Intelligence Research, Vol. 2, Issue 1, pp. 44-54, 2013.
[2] Vasani Krunal A., “Content Evocation Using Web Scraping and Semantic Illustration”, IOSR Journal of Computer Engineering (IOSR-JCE) Vol. 16, Issue 3, pp. 54-60, 2014
[3] Jose Ignacio Fern ´ andez-Villamor, Jacobo Blasco-Garc ´ ´ıa, Carlos A. Iglesias, Mercedes Garijo, “A Semantic Scraping Model for Web Resources-Applying Linked Data to Web Page Screen” in the Proceedings of the 3rd International Conference on Agents and Artificial Intelligence, Volume 2 - Agents, Rome, Italy, 2011.
[4] Emilio Ferraraa, Pasquale De Meob, Giacomo Fiumarac, Robert Baumgartner, “Web Data Extraction, Applications and Techniques: A Survey”, Elsevier, knowledge-Based Systems, pp. 301-323, 2014.
[5] Faustina Johnson and Santosh Kumar Gupta. “Web Content Mining Techniques: A Survey”, International Journal of Computer Applications Vol. 47, Issue 11, pp. 44-50, 2012 .
[6] Rahul Dhawani, Mrudav Shukla, Priyanka Puvar, Bhagirath Prajapati, “A Novel Approach to Web Scraping Technology”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 5, Issue 5, pp.747-750, 2015
[7] Anand V.Saukar, Kedar G.Pathare, Shweta A. Gode, “An Overview on Web Scrapping Techniques and Tools”, International Journal on Future Revolution in Compuer Science & Communication Engineering, Vol. 4, Issue 4, 2018.
[8] Riya Shah, Karishma Pathan, Anand Masurkar, Shweta Rewatkar, Prof. (Ms.) P.N.Vengurlekar, “Comparison of E-commerce Products using web mining”, International Journal of Scientific and Research Publications, Vol. 6, Issue 5,pp.640-644, 2016.
[9] Nakash, J., Anas, S., Ahmad, S. M., Azam, A. M., Khan, T. “Real Time Product Analysis using Data Mining” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Vol. 4, Issue 3, pp. 815–820, 2015.
[10] Rehman S.U. ‘Smart agent for automated E-commerce’, 2011 World Congress on Sustainable Technologies (WCST), UK IEEE pp.124-128, 2011.
[11] Shikha Mahajan, Nikhit Kumar , “A Web Scraping Approach in Node.js”, International Journal of Science, Engineering and Technology Research (IJSETR) Vol. 4, Issue 4, pp. 909-912, 2015.
[12] Sneh Nain, Bhumika Lall, “Web Data Scraper Tools: Survey”, International Journal of Computer Science and Engineering, Vol. 2, Issue 5, pp. 39-44, 2014.
[13] Sarah Swain, Shriya Mishra,” Prolego: A Data Science Approach to Predict the Outcome of a Football Match “, Vol. 6, Issue 4, pp. 132-136, 2018
Citation
V. Srividhya, P. Megala, "Scraping and Visualization of Product Data from E-commerce Websites," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1403-1407, 2019.
Review Paper on Data Integrity for Cloud
Review Paper | Journal Paper
Vol.7 , Issue.5 , pp.1408-1411, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.14081411
Abstract
Usage of internet applications has increased in this world of technology. Growing technology has both advantages and disadvantages. On the one hand, it provides lots of comfort and ease, on the other hand, it provides it poses a security threat. To secure our communication over the internet we use cryptography. Cryptography is done using asymmetric cryptography and symmetric cryptography. Asymmetric cryptography uses two keys, one is used for encryption and other is used for decryption. The key used for encryption is public and it is not required to keep it secret. While key used for decryption is always kept secret. In symmetric cryptography both the keys are same and both need to be secret. RSA is a popular cryptography algorithm. It is an asymmetric-key algorithm. Diffie-Hellman is an algorithm which uses symmetric keys. This paper presents a novel modified hybrid RSA-Diffie Hellman algorithm, in order to utilize the key benefits of both.
Key-Words / Index Term
decryption, public key, prime number, RSA algorithm, Diffie Hellman algorithm
References
[1] Mahalakshmi and Suseendran G., (2018). "An analysis of Cloud Computing issues on data Integrity, privacy, and its current solutions".
[2] K David Raju, L Vijay Kumar, K Anthony Rahul Showry, B LhoitKrishn ,(2018) ." techniques of providing data integrity in cloud computing".
[3] Joseph Selvanayagam1, Akash Singh2, Joans Michael3, Jaya Jeswani4 (2018) ."secure file storage on cloud using cryptography".
[4]https://searchsecurity.techtarget.com/definition/asymmetric-cryptography
[5] Shreen Nisha, Mohammed Farik (2017), " RSA public key cryptography algorithm - a review", international journal of scientific and technology research volume 6.
[6] Prabhat Kumar Panda, (2017). "A hybrid security algorithm for RSA cryptosystem".
[7] Sultan Aldossary, William Allen, (2016). "Data Security, Privacy, Availability, and Integrity in Cloud Computing: Issues and Current Solutions".
[8] Ayan Roy (2016)," brief comparison of RSA and Diffie-hellman (public key) algorithm"
[9] Israt Jahan, Mohammad Asif, Liton Jude Rozario (2015),
Improved RSA cryptosystem based on the study of number theory and public key cryptosystems. American Journal of Engineering research.
[10]https://www.ibm.com/support/knowledgecenter/en/SSB23S_1.1.0.14/gtps7/s7symm.html
[11] Miss. Renushree Bodkhe , Prof. Vimla Jethani , (2015) "Hybrid encryption algorithm based improved RSA and Diffie - Hellman ".
[12] Gaurav R. Patel, Prof. Krunal Panchal (2014), "Hybrid encryption Algorithm".
[13] Mahima Joshi, Yudhveer Singh Moudgil,"secure Cloud Storage."
[14]Sarthak R Patel, Prof. Khushbu Shah, Gaurav R Patel, "Study on Improvements in RSA algorithm"
[15] P. Anusha, . R. Maruthi ” A survey paper on data integrity for cloud”
[16] Shraddha Saxena , Manish Sharma “Secure technique to achieve data privacy and data integrity in cloud computing “
Citation
Shivani kaushik, Anirudh tripathi, Pankaj Pratap Singh, Amit kishor, "Review Paper on Data Integrity for Cloud," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1408-1411, 2019.
Classification of Healthy and Diseased Cactus plants using SVM
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1412-1426, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.14121426
Abstract
Machine learning is very important technology that can support people in different disciplines (Agriculture, health centers, household, transportation, etc) and different levels of life. Machine learning increases accuracy. It uses various types of data (image, video, audio and text) for different purposes and applications. Our work mainly focuses on cactus diseases detection to early prevent the reduction of productivity (quantitatively and qualitatively) of the cereal. To do this, the researchers have used 500 unhealthy and 72 healthy cactus images. The images were enhanced, noises were removed and images were segmented to create good model using imadjust, guided filter and K-means clustering techniques respectively. These image preprocessing techniques were selected from many techniques after implementing each technique and measuring their performances. As part of creating the model, feature extraction techniques (Color histogram, Bag of features and GLCM) were applied to extract color, bag of features and texture and respectively. After testing the model applying these features, bag of features were found to be best for creating better model and they were selected as features of our model. We created our machine learning model using bag of features applying linear SVM. Other machine learning algorithms were used to train and test the model for detecting the diseases, but linear SVM was found with best performance (97.2%). In this task, 75% of each class were used for training and 25% were used for testing the model. Finally, the similarity for classification was checked using linear kernel, RBF kernel and Polynomial kernel and an average accuracy of 94% was achieved though linear kernel is the best classifying method with an accuracy of 98.951%.
Key-Words / Index Term
Machine learning, supervised learning, unsupervised learning, training, classification, feature, bag of features, algorithm, k-means, MSE, PNSR, and linear SVM
References
[1]. Gareth James, Daniela Witten, Trevor Hastie, Robert Tibshirani: “An Introduction to Statistical Learning with Applications in R, Springer Texts in Statistics, 2013.
[2]. http://www.cs.princeton.edu/~schapire/talks/picasso-minicourse.pdf:“Machine Learning Algorithms for Classification”, accessed on 22-04-2019 at 2:00 PM.
[3]. https://www.tutorialspoint.com/software_architecture_design/architecture_models.htm: “Software Architecture and Design Architecture Models”, accessed on 03-03-2019 at 8:00 PM.
[4]. R. William Lewis, Computing Consultant, “Introduction to Scientific Computing with MATLAB”, SAW Training Course, MATLAB R2015a.
[5]. Anna Fabijańska, Dominik Sankowski: “Image Noise Removal – The New Approach”, International Journal of Computer Aided Design System in Microelectronics, February 2007.
[6]. R. Srinivas, Satarupa Panda: “Performance Analysis of Various Filters for Image Noise Removal in Different Noise Environment”, International Journal of Advanced Computer Research, December 2013.
[7]. D. Palani, K. Venkatalakshmi E. Venkatraman: “Implementation & Comparison of Different Segmentation Algorithms for Medical Imaging”, International Journal of Innovative Research in Science, Engineering and Technology, March 2014.
[8]. Er. Anjna, Er.Rajandeep Kaur: “Review of Image Segmentation Technique”, International Journal of Advanced Research in Computer Science, May 2017.
[9]. Gajendra Singh Chandel, Ravindra Kumar, Deepika Khare, Sumita Verma: “Analysis of Image Segmentation Algorithms Using MATLAB”, International Journal of Engineering Innovation & Research, 2012.
[10]. Zoltan Kato, Ting-Chuen Pong: “A Markov random field image segmentation model for color textured images”, Image and Vision Computing, March 2006.
[11]. Daniel Zemene Mequanint: “Automatic Malaria Detection from Images of Microscopic Thin Blood Films”, unpublished MSc thesis, March 2016.
[12]. Stephen O’hara and Bruce A. Draper: “Introduction to the Bag of Features Paradigm for Image Classification and Retrieval”, First Edition, Jan 17, 2011.
[13]. www.ens-lyon.fr/LIP/Arenaire/ERVision/bof_classification_winter.pdf:“Bag-of-features for image classification”, accessed on 08-05-2019 at 6:14 PM.
[14]. shodhganga.inflibnet.ac.in/bitstream/10603/44194/8/08_chapter3.pdf: “Color feature extraction”, accessed on 04-05-2019 at 11:00 AM.
[15]. Fritz Albregtsen: “Statistical Texture Measures Computed from Gray Level Coocurrence Matrices”, First Edition, November 5, 2008.
[16]. Hailay Beyene Berhe, Narayan A. Joshi: “Image Processing Techniques for Cactus (Beles) Diseases detection (implementation and analysis)”, February 2019.
Citation
Hailay Beyene, Narayan A.Joshi, "Classification of Healthy and Diseased Cactus plants using SVM," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1412-1426, 2019.
Secured MapReduce Based K-Means Clustering In Big Data Framework
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1427-1430, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.14271430
Abstract
Clustering is a significant task of research in data mining and analysis of statistics, which is initiate in many areas, including health care, social networking, image analysis, object recognition, etc. volume, quantity and speed. To effectively manage large-scale data sets and clusters, public cloud infrastructure plays an important role in both performance and economy. However, the use of public cloud services inevitably involves confidentiality issues. Indeed, not only a large scale of data mining applications but also deals with sensitive data such as personal healthcare information, location data, financial data, etc. In this paper we proposed Novel Secured MapReduce Based K-Means Clustering in Big Data Framework. This scheme achieves clustering speed and accuracy that are comparable to the K-means clustering without privacy protection. Furthermore we design securely integrated MapReduce framework and make it extremely suitable for parallelized processing in cloud computing environment.
Key-Words / Index Term
K-means clustering, Data encryption, Privacy-preserving, MapReduce
References
[1] J. Vaidya and C. Clifton, “Privacy-preserving k-means clustering over vertically partitioned data,” in ACM SIGKDD, 2003, pp. 206–215.
[2] C. Su, J. Zhou, F. Bao, T. Takagi, and K. Sakurai, “Two-party privacypreserving agglomerative document clustering,” in ISPEC. SpringerVerlag, 2007, pp. 193 – 208.
[3] G. Jagannathan and R. Wright, “Privacy-preserving distributed k-means clustering over arbitrarily partitioned data,” in ACM SIGKDD, 2005, pp. 593–599.
[4] P. Bunn and R. Ostrovsky, “Secure two-party k-means clustering,” in ACM CCS, 2007, pp. 486–497.
[5] C. Gentry, “Fully homomorphic encryption using ideal lattices,” in ACM STOC, 2009, pp. 169–178.
[6] C. Gentry and S. Halevi, “Implementing gentry’s
fully-homomorphicencryptionscheme,”in EUROCRYPT. Springer, 2011, pp. 129–148.
[7] R. Agrawal and R. Srikant, “Privacy preserving data mining,” in ACM SIGMOD, vol. 29, 2000, pp. 439–450.
[8] Y. Lindell and B. Pinkas, “Privacy preserving data mining,” in Journal of Cryptology, vol. 15, 2002, pp. 177 – 206.
Citation
D. Saidulu, V. Devasekhar, V. Swathi, "Secured MapReduce Based K-Means Clustering In Big Data Framework," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1427-1430, 2019.
Queueing Models Using Simulation Method in Busy Mall
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1431-1435, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.14311435
Abstract
This paper contains the analysis of Queuing systems for data of sales check out operation at a busy mall as an example. Queuing theory is a most important area of applied mathematics which pacts with observable fact of waiting and take place from the employ of potent mathematical study to explain busy mall sales and this work provides signifies the data in the form of queueing models to evaluate the performance measures. The paper describes a queuing simulation for a multiple server process as well as for single queue models. This study requires an empirical data which may include the variables like, arrival time in the queue of checkout operating unit , departure time, service time, etc More over study of future behavior of the busy mall, using monte carlo simulation method to reduce minimum waiting time of the customers and length of the queues for M/M/1 and M/M/C so that to provide better service to the customers in the busy mall.
Key-Words / Index Term
Queue model, multi channels queuing models (M/M/C), probability distributions, average waiting time, average queue length
References
[1]. Erlang A.K. The theory of probabilities of telephone conversation, Nyt Jindsskriff mathematics ,B 20,33-39 , 1997 .
[2]. Edie,A.C.(1954) . Traffic delays at toll booths, Journal of Operations Research Society of America , 2,PP: 107-138, 1999
[3]. Belenky, A.S. “Operations Research in Transportation Systems-Ideas and Schemes of Optimization Methods” , lower Academic Publisher, 1998
[4]. Woo T, and Lester Hoel. “ Toll Plaza Capacity and Level of Service.” Transportation Research Record . 1320.Pp.119-127.Print, 1991.
[5]. Aycin , Murat. “ Simple methodology for Evaluating Toll Plaza Operation.” Transportation Research Record .1988.Pp:92-101.Print , 2006.
[6]. Klodzinski, Jack,and Haitham AI-Deek.”Transferability of a Stochastic Toll Plaza Computer Model.”Transportation Research Record.1811, PP:40-49.Print, 2002.
[7]. S.Shanmugasundaram and S.Punitha..” A Simulation Study on toll gate system in M/M/1 Queueing Models .” IOSR-JM PP 01-09, 2014
[8]. S.Shanmugasundaram and S.Punitha.” Future behavior of toll plaza using Monte Carlo simulation “ GJPAM-ISSN 0973-1768 Volume 11, 2015.
[9]. A brief history- Monte Carlo simulation -Lancaster university, Mathematics and statistics – STOR-i.
[10].A.Vijayaraj and R.Saravanan “Automated EB Billing System Using Gsm And Ad-Hoc Wireless Routing”, International Journal of Engineering and Technology Vol.2 (5), Pp: 343-347, 2010
[11].S.Shanmugasundaram and P .Banumathi.” A simulation study on railway system in M/M/1 Queueing models” , Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 2895-2906, 2017.
[12].Prof. Michael Mascagni- A Practitioner’s overview ‘Randam numbers Generation’. http://www.cs.fsu.edu/~mascagni/PO_KAUST.pdf.
Citation
V.P. Murugan, P. Sekar, "Queueing Models Using Simulation Method in Busy Mall," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1431-1435, 2019.
Dual Threshold Based Classification Technique (DTBCT) For Assessing Liver Abnormalities from Medical Images
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1436-1439, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.14361439
Abstract
Healthcare systems have been using data mining to predict disease in recent years. Early prediction of liver diseases is important to save human life, mainly to decrease mortality rates by taking appropriate disease control measures. This paper explores early predictions of liver disease through various classification techniques. The liver disease dataset selected for this study consists of 15 CT scan images of the liver. The images were segmented with GLCM features. The main purpose of this paper is to propose a hybrid classifier algorithm for predicting liver diseases involving multiple techniques. The proposed technique is also compared with existing classifiers like Naïve Bayes, K nearest neighbor and support vector machine (SVM) on the scales of sensitivity, specificity and classification accuracy. Experimental results of the proposed hybrid classifier algorithm were found to better in predicting liver diseases.
Key-Words / Index Term
Classification, GLCM, liver disease, prediction, standard deviation
References
[1] Bendi Venkata Ramana, Surendra. Prasad Babu. M, Venkateswarlu. N.B, A Critical Study of Selected Classification Algorithms for Liver Disease Diagnosis, International Journal of Database Management Systems ( IJDMS ), Vol.3, No.2, May 2011 page no 101-114
[2] Grimaldi. M, Cunningham. P, Kokaram. A, An evaluation of alternative featureselection strategies and ensemble techniques for classifying music, in: Work-shop in Multimedia Discovery and Mining, ECML/PKDD03, Dubrovnik, Croatia, 2003.
[3] Chaitrali S. Dangare, Sulabha S. Apte, “Improved Study of Heart Disease Prediction System using Data Mining Classification Techniques”, International Journal of Computer Applications (0975 – 888), Volume 47– No.10, June 2012, page no 44-48
[4] Omar S.Soliman, Eman Abo Elhamd, Classification of Hepatitis C Virus using Modified Particle Swarm Optimization and Least Squares Support Vector Machine, International Journal of Scientific & Engineering Research, Volume 5, Issue 3, March-2014 122
[5] Karthik. S, Priyadarishini. A, Anuradha. J and Tripathi. B. K, Classification and Rule Extraction using Rough Set for Diagnosis of Liver Disease and its Types, Advances in Applied Science Research, 2011, 2 (3): page no 334-345
[6] Dhamodharan. S, Liver Disease Prediction Using Bayesian Classification, Special Issue, 4th National Conference on Advanced Computing, Applications & Technologies, May 2014, page no 1-3.
[7] Rosalina. A.H, Noraziah. A. Prediction of Hepatitis Prognosis Using Support Vector Machine and Wrapper Method, IEEE, (2010), 2209- 22
[8] Kotsiantis. S.B, Increasing the Classification Accuracy of Simple Bayesian Classifier, AIMSA, pp. 198-207, 2004
[9] Milan Kumari, Sunila Godara, Comparative Study of Data Mining Classification Methods in Cardiovascular Disease Prediction, International Journal of Computer Sci ence and Technology, Vol. 2, Iss ue 2, June 2011, page no 304-308
[10] Gur Emre Güraksın, Hüseyin Hakli, Harun U˘guz, Support vector machines classification based on particle swarmoptimization for bone age determination, Elsevier publications, Science direct, page no 597- 602
[11] Han, J.; Kamber, M., “Data Mining Concepts and Techniques”. 2nd Edition, Morgan Kaufmann, San Francisco.
[12] Patrick Breheny, Kernel density classification, STA 621: Nonparametric Statistics October 25
[13] Pushpalatha. S, Jagdesh Pandya, Data model comparison for Hepatitis diagnosis, International Journal of Emerging Research in Management &Technology ISSN: 2278-9359 (Volume-3, Issue-7) 2014, page no 138-141
Citation
R. Malathi, S. Ravichandran, "Dual Threshold Based Classification Technique (DTBCT) For Assessing Liver Abnormalities from Medical Images," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1436-1439, 2019.
A Novel Automated CNN Based Lung Cancer Prediction Technique (CNNLCPT) for CT scan images
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1440-1444, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.14401444
Abstract
There are many incidents of Lung Cancer in the globe. This Cancer is curable if diagnosed early stage, where screening plays an important role in prevention of the disease. Computed Tomography (CT) scans can provide medical information, but its access is limited in rural areas. Computer-aided diagnosis (CAD) which can assist in screening of cancer from medical images can also provide help to doctors in remote areas. Previous studies have promoted and proposed CAD based systems for predicting lung cancer. Their findings have laid the foundation of promise lung cancer diagnosis using the deep learning approaches. This paper proposes and demonstrates a novel Automated CNN Based Lung Cancer Prediction Technique (CNNLCPT), a set of unique steps in image processing for predicting lung cancer from medical CT scans. The accuracy of predictions is also demonstrated in the paper.
Key-Words / Index Term
Automation, Deep Learning, Image processing, Lung cancer, Prediction
References
[1] W. H. Organization, “Cancer,” 2018. [Online]. Available: http: //www.who.int/mediacentre/factsheets/fs297/en/
[2] U. Kauczor, and H. Hatabu, “Standard-dose vs. low-dose ct protocols in the evaluation of localized lung lesions: Capability for lesion characterizationilead study,” European Journal of Radiology Open, vol. 3, pp. 67 – 73, 2016.
[3] Kumar V, Gu Y, Basu S, Berglund A, Eschrich SA, Schabath MB, Forster K, Aerts HJ, Dekker A, Fenstermacher D and Goldgof DB: Radiomics: the process and the challenges. Magnetic resonance imaging, 30(9), pp.1234–1248. (2012)
[4] M. T. Islam, M. A. Aowal, A. T. Minhaz, and K. Ashraf, “Abnormality detection and localization in chest x-rays using deep convolutional neural networks,” vol. abs/1705.09850, 2017
[5] X. Wang, Y. Peng, L. Lu, Z. Lu, M. Bagheri, and R. M. Summers, “Chestx-ray8: Hospital-scale chest x-ray database and benchmarks on weakly-supervised classification and localization of common thorax diseases,” in The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), July 2017.
[6] Hussein S, Gillies R, Cao K, Song Q and Bagci U: Tumornet: Lung nodule characterization using multi-view convolutional neural network with gaussian process. In Biomedical Imaging (ISBI 2017), 2017 IEEE 14th International Symposium on, pp. 1007–1010. IEEE (2017)
[7] Song Q, Zhao L, Luo X and Dou X: Using Deep Learning for Classification of Lung Nodules on Computed Tomography Images. Journal of healthcare engineering (2017) Proc Int Jt Conf Neural Netw. Author manuscript; available in PMC 2018 November 13.
[8] Jiang H, Ma H, Qian W, Wei G, Zhao X and Gao M: A novel pixel value space statistics map of the pulmonary nodule for classification in computerized tomography images. In Engineering in Medicine and Biology
[9] A. K. Jain, Fundamentals of Digital Image Processing. Englewood Cliffs, NJ: Prentice-Hall, 1989.
[10] Z. Zhou, Y. Jiang, Y. Yang, S.Chen “Lung Cancer Cell Identification Based on Artificial Neural Network Ensembles”, Artificial Intelligence in Medicine, 2002, vol.24, no.1, pp.25-36. @Elsevier
[11] A. Kalousis, J. Prados, M. Hilario, “Stability of Feature Selection Algorithms: a study on high dimensional spaces,” Knowledge and information System, vol. 12, no. 1, pp. 95-116, 2007.
[12] Bartlett EC, Walsh SL, Hardavella G, et al. Interobserver Variation in Characterisation of Incidentally-Detected Pulmonary Nodules: An International, Multicenter Study. Available online: http://4wcti.org/2017/SS5-3.cgi
[13] Zinovev D, Feigenbaum J, Furst J, et al. Probabilistic lung nodule classification with belief decision trees. Conf Proc IEEE Eng Med Biol Soc 2011;2011:4493-8.
[14] Ciompi F, Chung K, van Riel SJ, et al. Towards automatic pulmonary nodule management in lung cancer screening with deep learning. Sci Rep 2017;7:46479.
[15] Aerts HJ, Velazquez ER, Leijenaar RT, et al. Decoding tumour phenotype by noninvasive imaging using a quantitative radiomics approach. Nat Commun 2014;5:4006.
Citation
M. Muthuraman, S. Ravichandran, "A Novel Automated CNN Based Lung Cancer Prediction Technique (CNNLCPT) for CT scan images," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1440-1444, 2019.
A Survey on Bio Inspired Algorithms: An Efficient Approach for Frequent Path Mining
Survey Paper | Journal Paper
Vol.7 , Issue.5 , pp.1445-1452, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.14451452
Abstract
Bio inspired algorithm plays a major role in data mining. The scope of the bio-inspired algorithm is very enormous, it provides major advantages to solve many computational problems. Bio-inspired and frequent path mining is embedded to solve critical problems in data mining. Frequent patterns in a data stream can provide an important basis for decision making and applications. This survey paper represents the applications bio-inspired algorithms, comparative study of Swarm based algorithms, which includes Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Cuckoo Search (CS), Artificial Bee Colony (ABC), and Firefly algorithm, which enhance the performance to predict their competent frequent paths.
Key-Words / Index Term
Bioinspired, Swarm algorithms, Evolutionary programming, Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Cuckoo Search(CS), Artificial Bee Colony (ABC), Firefly algorithm
References
[1] Bellaachia, Abdelghani, and Anasse Bari, "SFLOSCAN: A biologically-inspired data mining framework for community identification in dynamic social networks”,In the preceedings of 2001 IEEE Symposium on Swarm Intelligence, Paris, pp. 1-8, 2011.
[2] Forestiero, Agostino, Clara Pizzuti, and Giandomenico Spezzano,"Flockstream: “A bio-inspired algorithm for clustering evolving data streams”, In the proceedings of 2009 21st IEEE International Conference on Tools with Artificial Intelligence, USA, pp. 1-8. IEEE, 2009.
[3] Lan, Kun, Dan-tong Wang, Simon Fong, Lian-sheng Liu, Kelvin KL Wong, and NilanjanDey, "A survey of data mining and deep learning in bioinformatics”, Journal of medical systems Vol.42, no. 8, 2018.
[4] Cui, Zhihua, Rajan Alex, RajendraAkerkar, and Xin-She Yang, "Recent advances on bioinspired computation”,The Scientific World Journal ,2014.
[5] UpekaPremaratne ,JagathSamarabandu, and Tarlochan Sidhu, “A New Biologically Inspired Optimization Algorithm”,In the proceedings of Fourth International Conference on Industrial and Information Systems, (ICIIS), Sri Lanka, pp.28-31 ,2009.
[6] Alam, Shafiq, Gillian Dobbie, Yun Sing Koh, and Saeed urRehman, Biologically Inspired Techniques for Data Mining: “A Brief Overview of Particle Swarm Optimization for KDD”,In Biologically-Inspired Techniques for Knowledge Discovery and Data Mining, IGI Global,pp. 1-10, 2014.
[7] Chen, Yi-Ting, Jeng-Shyang Pan, Shu-Chuan Chu, and Mong-Fong Horng. "Bio-inspired Evolutionary Computing with Context-Awareness and Collective-Effect",In the proceedings of International Conference on Technologies and Applications of Artificial Intelligence, Springer, pp. 99-113, 2014.
[8] Kar, Arpan Kumar, “Bio-inspired computing:A review of algorithms and scope of applications." Expert Systems with Applications No.59, pp. 20-32,2016.
[9] Binitha, S., and S. Siva Sathya, "A survey of bio-inspired optimization algorithms”, International Journal of Soft Computing and Engineering , no. 2, pp.137-151,2012.
[10] Jafar, OA Mohamed, and R. Sivakumar, "A study of the bio-inspired algorithm to data clustering using different distance measures”, International Journal of Computer Applications Vol.66, no. 12 ,pp. 33-35,2013.
[11] S. Elsayed, R. Sarker, “Differential evolution framework for big data optimization”, MemeticComput,Vol.8 ,No.1,pp. 17–33,2016.
[12] A.Alex Freitas, “A Review of Evolutionary Algorithms for Data Mining”,Soft Computing for Knowledge Discovery and Data Mining,springer, Newyork, pp. 61-93, 2007.
[13] Shah_Hosseini, “Problem solving by intelligent water drops”,In the preceedings of IEEE Congress on Evolutionary Computation,CEC 2007.
[14] https://www.researchgate.net/figure/Pseudo-code-for-the-evolutionary-programming-EP-algorithm.
[15] Tajuddin MFN, Ayob SM, Salam Z, Saad MS, “Evolutionary based maximum power point tracking technique using differential evolution algorithm”,Energy Buildings, Vol.67,pp.245–52,2013.
[16] L.Meghana.,R.Jaya. “Swarm Intelligence Algorithms - A Survey”, IJCSE, Volume.6, Issue.2, pp.184-187,2018.
[17] L. Wang, H. Geng, P. Liu, K. Lu, J. Kolodziej, R. Ranjan, and A.Y. Zomaya, “Particle swarm optimization based dictionary learning for remote sensing big data”, Knowledge.-Based Systems. Vol.79,pp. 43-50,2015.
[18] https://en.wikipedia.org/wiki/Particle_swarm_optimization.
[19] S. D. Shtovba, “Ant Algorithms Theory and Applications”, journal programming and computing software,Vol. 31, Issue. 4, 2005.
[20] Andreas Holzinge, “Towards interactive Machine Learning (iML): Applying Ant Colony Algorithms to Solve the Traveling Salesman Problem with the Human-in-the-Loop Approach”, In the preceedings of IFIP International Cross Domain Conference and Workshop,(CD-ARES),Austria,Springer, pp.81-95,2016.
[21] https://www.researchgate.net/figure/Pseudocode-of-the-cuckoo-search-algorithm.
[22] X. S. Yang, S. Deb, “Cuckoo search: Recent advances and applications,” Neural Computing and Applications, vol. 24, no. 1, pp. 169–174, 2014.
[23] https://www.researchgate.net/figure/Pseudo-code-of-Artificial-Bee-Colony-algorithm-for-data-clustering.
[24] DervisKaraboga, BeyzaGorkemli, CelalOzturk ,and NurhanKaraboga, “A comprehensive survey: artificial bee colony (ABC) algorithm and applications”, Journal Artificial Intelligence Review, vol. 42, Issue. 1, pp. 21–57, 2014.
[25] Nidhi Gondalia, Foram Joshi , Nirali Makad “A Novel Approach of Image Ranking Based On Enhanced Artificial Bee Colony Algorithm”, International Journal of Scientific in Recent Sciences (ISROSET), Vol. 1, Issue 1, 2013.
[26] Bahriye Akay, DervisKaraboga,” Artificial bee colony algorithm for large-scale problems and engineering design optimization”, Journal of Intelligent Manufacturing ,Vol.23, Issue.4, pp 1–14,2012.
[27] G.R. Shahmohammadi, Kh..Mohammadi, “Key Management in Hierarchical Sensor Networks Using Improved Evolutionary Algorithm”, IJSRNSC, Vol.4, Issue.2, 2016.
[28] X. S. Yang ,S. Deb, “Two-stage eagle strategy with differential evolution,” International Journal of Bio-Inspired Computation, vol. 4, no. 1, pp. 1–5, 2012.
[29] V.Selvi, R.Umarani, “Comparative Analysis of Ant Colony and Particle Swarm Optimization Techniques”, International Journal of Computer Applications , Vol. 5– No.4, 2010.
[30] Ashraf Darwish,” Bio-inspired computing: Algorithms review, deep analysis, and the scope of applications”, Vol.3, Issue.2, pp. 231-246, 2018.
Citation
S.Kiruthika, A. Malathi, "A Survey on Bio Inspired Algorithms: An Efficient Approach for Frequent Path Mining," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1445-1452, 2019.