IOSR Journal of Computer Engineering (IOSR-JCE)

Jul. - Aug. 2016 Volume 18 - Issue 4

Version 1 Version 2 Version 3 Version 4 Version 5 Version 6

Paper Type : Research Paper
Title : Scalable Image Classification Using Compression
Country : India
Authors : Akshata K. Naik || Dr. Dinesh Acharya U

Abstract: The increasing rate of data growth has led to finding techniques for faster processing of data. Big Data analytics has recently emerged as a promising field for examining huge volume of datasets containing different data types. It is a known fact that image processing and retrieval involves high computation especially with a large dataset. We present a scalable method for face recognition based on sparse coding and dictionary learning. Sparse representation has closer resemblance with a cortex like image representation and thus more closer to human perception. The proposed method parallelizes the computation of image similarity for faster recognition.

Keyword: Dictionary learning, Image classification, Parallel computation, Sparse representation.

[1]. M.Li, X. Chen,X.Li,B.Ma, P.Vintayi, The similarity metric, IEEE Trans. Inf. Theory, 2004, 50:3250-3264
[2]. R.Calibrasi,P.Vintayi, Clustering by compression, IEEE Trans.Inf.Theory, 2005, 51:1523-1545
[3]. Cebrian Manuel,Alofonseca Manuel, Ortega Alfonso, Common pitfalls using the normalized compression distance : what to watch out for in a compressor?, Communications in Information & Systems, 2005, 5:367-384
[4]. Elad Michael, on the role of sparse and redundant representations in image processing, IEEE proceedings, 2010, 15: 3736-3745
[5]. K.P. Soman, R. Ramanathan, Digital signal and image processing – The sparse way, Isa publication, 2012.


Paper Type : Research Paper
Title : Enhancement of Dynamic Load Balancing Using Particle Swarm Algorithm in Cloud Environment
Country : India
Authors : Ginni Bansa || Amanpreet Kaur

Abstract: Dynamic load balancing with decentralized load balancer using PSO technique: Cloud consists of multiple resources and various clients request to the cloud for allocation of shared resources. Each request will be allotted to the virtual machines. In different situation different machines get different load. So to balance the load amongst different virtual machines decentralized load balancer is enhanced using particle swarm algorithm. The main objective is reducing the energy and increasing the throughput in comparison to centralized and simple decentralized load balancer using particle swarm optimization.

Keyword: Centralized, Decentralized, Energy, PSO, Throughput

[1]. Michael Pantazoglou, Gavriil Tzortzakis, and Alex Delis, "Decentralized and Energy-Efficient Workload Management in Enterprise Clouds", in press, IEEE 2015.
[2]. Gulshan Soni and Mala Kalra, "A Novel Approach for Load Balancing in Cloud Data Center", IEEE International Conference on Intelligent Computing and Integrated Systems (ICISS), Guilin,vol.14, pp. 807-812, 2014.
[3]. Cristian Mateos, Elina Pacini & Carlos Garc Garino, An ACO-inspired algorithm for minimizing weighted flow time in cloud-based parameter sweep experiments, 2013.
[4]. Hongsheng Su, Ying Qi and Xi Song, "The Available Transfer Capability Based On a Chaos Cloud Particle Swarm Algorithm ", IEEE ninth International Conference on Natural Computation (ICNC), vol 13, pp.574-579, 2013.
[5]. Rajkumar Buyya,"A Particle Swarm Optimization-based Heuristic for Scheduling Workflow A", Cloud Computing and Distributed Systems Laboratory, Department of Computer.


Paper Type : Research Paper
Title : Implementation of an efficient algorithm to enhance connectivity and lifetime in wireless sensor networks
Country : India
Authors : Channakrishnaraju || Dr. M.Siddappa

Abstract: Wireless sensor network is a rapidly growing area for research and commercial development. Wireless Sensor Network (WSN) is a major and very interesting technology, which consists of small battery powered sensor nodes with limited power resources. The sensor nodes are inaccessible to the user once they are deployed. Replacing the battery is not possible every time. K-means algorithm will provide better results in terms of network lifetime enhancement and connectivity. A new cost function has been defined in K- means algorithm to minimize the intra-cluster distance by dynamically updating cluster head to enhance connectivity of the network.

Keyword: Cluster, Connectivity, K-Means algorithm, Lifetime, Wireless sensor network.

[1]. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, "Wireless sensor networks: a survey", Computer Networks 38 (4) (2002)
393–422.
[2]. M.Cardei, D.Z. Du," Improving wireless sensor network lifetime through power aware organization", Wireless Networks 11 (3)
(2005) 333–340.
[3]. Meenakshi Bansal, Iqbal Singh, Parvinder S. Sandhu," Coverage and Connectivity Problem in Sensor Networks" "World Academy
of Science, Engineering and Technology 73, 2011
[4]. Z. He, B.S. Lee, X.S. Wang, "Aggregation in sensor networks with a user-provided quality of service goal", Information Sciences
178 (9) (2008) 2128–2149.
[5]. Chalermek Intanagonwiwat, Ramesh Govindan, and Deborah Estrin, Directed diffusion: "a scalable and robust communication
paradigm for sensor networks", MobiCom ‟00: Proceedings of the Sixth Annual International Conference on Mobile Computing
and Networking, ACM, 2000, pp. 56–67


Paper Type : Research Paper
Title : Soft Computing Techniques for Treating Neural Problem: Dementia Used Throughout the World –Areview
Country : India
Authors : Mr.Girish T.M. || Dr.Vivek Kumar Sing

Abstract: Dementia Furthermore it's A large portion regular manifestation, Alzheimer's disease, will be an intricate confusion that afflicts fundamentally the elderly, influencing an evaluated from claiming 63 million toward the quite a while 2030. Concerning illustration there need aid no successful medicinal services medicines to ceasing dementia, along these lines the social mind perspective assumes a paramount part on treating the disease, on superior figure out which intercessions would viable standard What's more dependable Conclusion measures need aid necessary..

Keyword: Alzheimer's, Dementia, E.E.G. (Electro Encephalogram), M.R.I. (Magnetic Resonance Imaging), Soft Computing.

[1]. John W. LargenLongitudinal Changes in Intellectual Memory, and Perceptual Functions in Dementia of the Alzheimer's Type 1984, Vol. 24, No. 3-4 , Pages 313-314 Texas Research Institute of Mental Sciences, 1300, Moursund, Houston, Texas, 77030
[2]. Methuselah, Gerhard Werner—An expert system for diagnosis in geriatric psychiatry Computers and Biomedical ResearchVolume 20, Issue 5, October 1987, Pages 477–488 DOI:10.1016/0010-4809(87)90035-8
[3]. Roy LachmanExpert systems: A cognitive science perspective Behavior Research Methods, Instruments, &ComputersMarch 1989, Volume 21, Issue 2, pp 195-204

[4]. Differential diagnosis of dementia: a comparison between the expert system EVINCE and clinicians http://dx.doi.org/10.1176/jnp.3.4.398 Volume 3 Issue 4, November 1991, pp. 398-404
[5]. Christian NøhrArtificial Intelligence in MedicineVolume 6, Issue 2, April 1994, Pages 123–135The evaluation of expert diagnostic systems — How to assess outcomes and quality parameters?doi:10.1016/0933-3657(94)90041-8


Paper Type : Research Paper
Title : Framework of Security Mechanisms for Monitoring Adaptive Distributed Systems
Country : India
Authors : Manjunath Kotari || Dr. Niranjan N. Chiplunkar || Dr. Nagesh H.R

Abstract: The distributed systems have a noteworthy role in today's information technology, whether it is governmental or nongovernmental organizations. The major concern of today's software industry is that dealing with security, scalability and dynamicity of distributed systems. Adaptive Distributed Systems (ADSs) are nodes in networked computers, which change itself according to changes in the environments. A monitoring system or tool is used to identify the changes in the distributed systems and all the activities of the entire network. This monitoring system may be compromised by the intruder while gathering the information from the distributed systems........

Keyword:Adaptive Distributed Systems, Network Monitoring Tool, Security Mechanisms, System Under Study.

[1] G. Couloris, J. Dollimore, and T. Kinberg, Distributed Systems – Concepts and Design, 4th Edition, Addison-Wesley, Pearson
Education, UK, 2001.
[2] Jorma Jormakka , Jan Lucenius, Intruder Detection System Architecture for an SOA-based C4I2SR System Computation World:
Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns, 2009
[3] A. Tanenbaum and M. Van Steen, Distributed Systems: Principles and Paradigms, Prentice Hall, Pearson Education, USA, 2002.
[4] R. D. Schlichting (1998). Designing and Implementing Adaptive Distributed Systems, available at
http://www.cs.arizona.edu/adaptiveds/overview.html.
[5] Scarlet Schwiderski, Monitoring the Behaviour of Distributed Systems, Selwyn College University of Cambridge, A dissertation
submitted for the degree of Doctor of Philosophy April-1996.


Paper Type : Research Paper
Title : A Survey on Digital Image Authentication by DCT and RPM Based Watermarking
Country : India
Authors : Kuldeep Singh || Prof. Ashish Mishra

Abstract: An image watermarking, data is embedded into cover media to prove ownership. Various Watermarking techniques are proposed by several authors within the last many years that embody spatial domain and transform domain watermarking. This paper elaborates quality of discrete cosine transform for image watermarking, DCT primarily based image watermarking method, classification and analysis of discrete cosine transform based mostly watermarking techniques..........

Keyword: Watermarking, Visibility, Security, Robustness, Discrete cosine transform, Reversible data hiding

[1]. A.B. Watson, G.Y. Yang, J.A. Solomon, and J. Villasenor, "Visibility of wavelet quantization noise" IEEE Trans. Image Processing, vol. 6, pp. 1164-1175, Aug. 1997
[2]. Rafael C. Gonzalez, Richard E. Woods, Steven, L. Eddins, "Digital Image Processing Using MATLAB" Pearson Education, 2007.
[3]. IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, June 2011 307 Embedded Extended Visual Cryptography Schemes Feng Liu and Chuankun Wu.
[4]. IEEE Transactions on Information Forensics and Security, Vol. 6, No. 3, September 2011 873 Improved Embedding for Prediction- Base Reversible Watermarking Dinu Coltuc, Member, IEEE.
[5]. I. Cox, J. Kilian, F. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673–1687, Dec. 1997.Mohammad Ali Akhaee,


Paper Type : Research Paper
Title : A Novel Based Approach For Pose Estimation And Normalization Using Multi-Class Svm And Affine Transformation For Face Recognition
Country : India
Authors : shilpa R || shreekumar T

Abstract: The goal of the paper is to estimate the pose, normalize the pose, and remove the illumination to recognize the face. The training section includes the techniques Affine Transformation and DCT. During the testing section the estimation of pose is calculated and later normalized frames of the pose variant frames and illumination variant frames of the testing person are obtained by using Affine Transformation and DCT methods respectively. Once the normalization and illumination removal methods are done, face recognition is carried out. The features are extracted using the principle component analysis; later face recognition is carried out by matching the obtained features with the database features.

Keyword: Support Vector Machine, Affine Transformation, Discrete Cosine Transformation, Principal Component Analysis.

[1]. Wu-Jun Li, Chong-Jun Wang, Dian-Xiang Xu and Shi-Fu Chen, "Illumination Invariant Face Recognition Based on Neural
Network Ensemble", In Proceedings of 16th IEEE International Conference on Tools with Artificial Intelligence, pp. 486-490,
November 2004.
[2]. Majumdar and Ward, "Pseudo-Fisher face Method for Single Image Per Person Face Recognition", In Proceedings of IEEEInternational Conference on Acoustics, Speech and Signal Processing, Las Vegas, NV, pp. 989-992, 2008.
[3]. D. Beymer and T. Poggio. Face Recognition From One
[4]. Example View. ICCV, Boston, MA, pp. 500-507, 1995
[5]. Xiujuan Chai1, Shiguang Shan, Wen Gao, "Pose normalization for robust face recognition using Statistical Affine Transformation",
In proceeding of ICICS- PCM 2003, 15-18 Dec 2003, Singapore.


Paper Type : Research Paper
Title : Application Architecture of Car Automobile Dealers Using Enterprise Architecture Planning (EAP)
Country : Indonesia
Authors : Cornelius Juvian Limanto || Lily Puspa Dewi || Adi Wibowo

Abstract: Mandala Company is one of company which engaged in the field of car automotive dealer. The company has several business processes i.e. sales units and test drive, service, sales and purchases of spare parts. At this time not all business processes in this Company is supported by the existence of an information system. Existing information systems currently only support part of unit sales, finance, and accounting. Based on these circumstances to integrate the information systems of unit sales, service, sales and spare parts purchases, so we will do some analysis for Mandala Company using Enterprise Architecture Planning (EAP).

Keyword: Enterprise Architecture Planning, Application Architecture, Information System, Automotive

[1] Khusna, A.N, Kusrini & Arief R.M. (2012).Pemodelan arsitektur enterprise untuk strategi pengelolaan aplikasi bidang tanggap darurat bencana. Program Studi Teknik Informatika Universitas Ahmad Dahlan, 722-729
[2] Spewak, S.H , Enterprise Architecture Planning (Developing a Blueprint for Data, Application and Technology), Jhon Wiley & Sons, Inc (2012)
[3] Minoli, D. (2008) Enterprise Architecture A to Z. USA: Taylor and Francis Group.
[4] Spewak, S.H., UPDATING THE ENTERPRISE ARCHITECTURE PLANNING MODEL, Journal of Enterprise Architecture (2006)
[5] Rosmala, D., & Falahah. (2007). Pemodelan proses bisnis B2b dengan BPMN (Studi kasus pengadaan barang pada divisi logistik). Institut Teknologi Nasional Bandung. ISSN 1907-5022, J63-J67


Paper Type : Research Paper
Title : An Enhanced Password-Username Authentication System Using Cryptographic Hashing and Recognition Based Graphical Password
Country : Nigeria
Authors : Tivkaa, M.L. || Choji, D. N. || Agaji, I. || Ats am, D.

Abstract:Password-username authentication is a critical component of today's web application technology that is commonly used to control access to restricted resources. However, poor design, coding flaws and weak user login credentials exposes this functionality to Sequel Query Language Injection (SQLI) and online password guessing attacks. Current techniques advanced by researchers to address authentication attacks only focus on either one of them, thus failing to envisage a scenario where the login form can be used to launch both SQLI and online password guessing attacks.......

Keyword: Authentication, Password Guessing, Graphical Password, SQL Injection, Web Application Security

[1]. Kiiski, Lauri. "Security Patterns in Web Applications." Publications in Telecommunications Software and Multimedia Laboratory,
Available at: http://www. tml. tkk. fi/Publications/C/25/papers/Kiiski_final. pdf (Last Accessed: November 2011) (2007).
[2]. Jesudoss, A, and N Subramaniam. "A Survey on Authentication Attacks and Countermeasures in a Distributed Environment."
Indian Journal of Computer Science and Engineering, 5(2) (2014).
[3]. Kienzle, Darrell M, and Matthew C Elder. "Final technical report: Security patterns for web application development." DARPA,
Washington DC (2002).
[4]. Dave, Mr Sachin R, and Vaishali B Bhagat. "Defecating online password guessing attack using 3 tier security." International
Journal of Application or Innovation in Engineering & Management 2(12) (2013)


Paper Type : Research Paper
Title : Design and Development of an Automatic Online Newspaper Archiving System
Country : Bangladesh
Authors : Md. Ashik Saeed || Tanzina Rahman

Abstract: News archive has always been a great source of information. Till date, several printed and manual information retrieval systems served the purposes. But these systems are gradually becoming out of date, since they offer limited scope and facility for searching and retrieval of information and require a large amount of storage capacity. This study aims to illuminate a prototype of an automatic online newspaper archiving and information retrieval system based on online newspaper websites, which will offer a large amount of information storage capacity and easy navigation system for users.

Keyword:Archiving system, database design, User Interface design, Java programming language, Web crawler

[1]. Mike Burner,Crawling towards eternity building an archive of the World Wide Web, Web Techniques, 2(5), May 1997.
[2]. Carlos Castillo and Ricardo Baeza-Yates, A new crawling model, In Poster proceedings of the eleventh conference on World Wide Web, Honolulu, Hawaii, USA, 2002.
[3]. Allan Heydon and Marc Najork .Mercator, A scalable, extensible web crawler, World Wide Web Conference, 2(4), April 1999, 219–229.
[4]. Jenny Edwards, Kevin S. Mccurley, and John A. Tomlin, An adaptive model for optimizing performance of an incremental web crawler, In Proceedings of the Tenth Conference on World Wide Web, Hong Kong, May 2001, 106–113.
[5]. Jean-Pierre Eckmann and Elisha Moses, Curvature of co-links uncovers hidden thematic layers in the World Wide Web, PNAS, 99(9):5825–5829, April 2002.


Paper Type : Research Paper
Title : Contrast Study of Social Engineering Techniques
Country : India
Authors : Rohit Dhull || Prof. Sugandha Singh Hooda

Abstract: Social engineering has become a menace in our virtual world and is an effectual way to attack our systems. The objective of this study is to discuss different existing social engineering techniques and aspects of social engineering. This paper presents the various social engineering techniques and after the comparison among them a conclusion is drawn.

Keyword: Psychological Manipulation, Phishing, Spoofing, Social engineering

[1]. Mosin Hasan, Nilesh Prajapati and Safvan Vohara. "CASE STUDY ON SOCIAL ENGINEERING TECHNIQUES FOR PERSUASION," International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPHHOC) Vol.2, No.2, June 2010.

[2]. Katharina Krombholz, Heidelinde Hobel, Markus Huber, Edgar Weippl. "Advanced Social Engineering Attacks," Journal of Information Security and Applications, July 2014.

[3]. Xin (Robert) Luo, Richard Brody, Alessandro Seazzu, Stephen Burd. "Social Engineering: The Neglected Human Factor for Information Security Management," Information Resources Management Journal, 24(3), 1-8, July-September 2011.

[4]. P. S. Maan and Manish Sharma. “Social Engineering: A Partial Technical Attack,” IJCSI International Journal of Computer ScienceIssues, Vol. 9, Issue 2, No 3, March 2012.

[5]. https://en.wikipedia.org/wiki/Social_engineering_(security)“Social engineering (security)”.


Paper Type : Research Paper
Title : Interfacing and Analysis of GPS data using VB
Country : India
Authors : Rohit Dhull || Prof. Sugandha Singh Hooda

Abstract: Global Positioning System (GPS) provides location and time information anywhere on the earth. We can utilize GPS data to create new applications that can be very useful nowadays. If we want to build a new application or system with GPS technology then we must analyse the GPS data and understand it systematically. The objective of this study is to interface the GPS module and analyse the GPS data. This paper presents a simple way to interface the GPS Module using VB.NET.........

Keyword:Global Positioning System, Designated L1 signal, NMEA data, COM interoperability.

[1]. J.Parthasarathy. "Positioning And Navigation System Using Gps," International Archives Of The Photogrammetry, Remote Sensing And Spatial Information Science, Volume Xxxvi, Part 6, Tokyo Japan 2006.

[2]. Pankaj Verma, J.S Bhatia. "Design And Development Of Gps-Gsm Based Tracking System With Google Map Based Monitoring," International Journal Of Computer Science, Engineering And Applications (Ijcsea), Vol.3, No.3, June 2013.

[3]. Shital Mohol, Amit Pavanikar, Ganesh Dhage. "Gps Vehicle Tracking System," International Journal Of Emerging Engineering Research And Technology, Volume 2, Issue 7, October 2014.

[4]. Ms. Bhalerao Pournima, Prof. V. B. Baru. “Gps Tracking And Controller For Car Black Box On Fpga,” International Journal Of Advanced Research In Computer Science And Software Engineering, Volume 3, Issue 12, December 2013.

[5]. Lawrence Harte, Ben Levitan. “Global Positioning System,”2nd Edition, 2009.


Paper Type : Research Paper
Title : Back Office E-Commerce Application for X Store
Country : Indonesia
Authors : Hans Kurniawan || Leo Willyanto Santoso || Alexander Setiawan

Abstract: X store is a company which their focus on sales computer accessories. In doing their business process, all sales recorded manually. Their sales using whatsapp, BBM and email for online services. The sales department had hard time to maintain their customer one by one manually. Based on this background, application designed to overcome the problems.Application was build base on website that can be accessed by sales department to maintain their sales.........

Keyword: E-Commerce, Sales Report, Delivery Report, Stock Report

[1]. Laudon, C.K. & Traver, C.G. (2011). E-Commerce 2011 business, technology, society (7th ed.) United States: Pearson.
[2]. Nixon, R. (2014). Learning PHP, MySQL, JavaScript, CSS & HTML5 (3rd ed.). United States: O'Reilly
[3]. Romney, M.B. & Steinbart, P.J. (2012). Accounting Information Systems (12th ed.). United States: Pearson Prentice Hall.


Paper Type : Research Paper
Title : Mobile Agents for Wireless Network Security
Country : Egypt
Authors : A. H. Mohamed || K.H. Marzouk

Abstract: Wireless sensor networks (WSNs) have widely applied in many applications. But, a security is considered one of their main problems. There are many different types of the security attacks faced WSNs. The suggested research focuses on using the mobile agents approach to improve the security systems for the WSN that can deal with the sinkhole and clone attacks. The suggested system has been applied for a WSN used in communicating between an electronic accelerator system and its control unit as a case of study. Comparing the obtained results by the proposed system and some traditional systems, the suggested system has proved its good acceptance for applicability in the real-time situations.

Keyword:Wireless Sensor Network Security; Mobile Agents; Network Security

[1]. O. Abiona, et. al, (2013), " Wireless Network Security: The Mobile Agent Approach" , International Journal of Communications, Network and System Sciences, Vol. 6, pp.443-450.
[2]. A. K. Srivastava and A. Goel , (2011), " Security Solution for WSN Using Mobile Agent Technology " International Journal of Research and Reviews in Wireless Sensor Networks (IJRRWSN) Vol. 1, No. 3, September 2011, vol. 2, Issue1, pp.1-5.

[3]. H. Yang, F. Ricciato, L. Songwu and L. Zhang, (2006), "Securing a Wireless World," The Proceedings of IEEE, Vol. 94, No. 2, pp. 442-454.
[4]. S.Poornima and B.B.Amberker, (2010), "Agent Based Secure Data Collection in Heterogeneous Sensor networks", In proc. of Second International Conference on Machine Learning and Computing IEEE Computer Society of 2010 , pp.116-120.


Paper Type : Research Paper
Title : A Novel Implementation of Chiral Structure in Computer Honeycomb Diamond Networks Topology
Country : India
Authors : Mr. Susheel George Joseph M.C.A, M.Tech, M.Phil (Cs)

Abstract: This project deals with the efficiency of the Chiral structure in Honeycomb Diamond network. Honeycomb and diamond networks have been proposed as alternatives to mesh and torus architectures for parallel processing. When wraparound links are included in honeycomb and diamond networks, the resulting structures can be viewed as having been derived via a systematic pruning scheme. Honeycomb networks are more efficient than mesh connected systems in terms of degree, diameter, and cost and bisection bandwidth.........

Keyword: Honeycomb, Chiral, Pruning, Diamond Networks

[1]. Behrooz Parhami, Fellow, IEEE, And Ding-Ming Kwai, ``A Unified Formulation Of Honeycomb And Diamond Networks'', IEEE Trans. Parallel And Distributed Systems, 12(1) Jan 2001.
[2]. Yutaka Yamada, Hideharu Amano, Michihiro Koibuchi, Akiya Jouraku, Kenichiro Anjo, And Katsunobu Nishimura, ``Folded Fat H-Tree: An Interconnection Topology For Dynamically Reconfigurable Processor Array'', Embedded And Ubiquitous Computing, International Conference EUC 2004, Aizu-Wakamatsu City, Japan, August 25-27, 2004.
[3]. André Dehon, ``Compact, Multilayer Layout For Butterfly Fat-Tree'', Twelfth Annual ACM Symposium On Parallel Algorithms And Architectures (SPAA 2000, July 9-12, 2000), P. 206--215.
[4]. B. Parhami, D.-M. Kwai., ``Comparing Four Classes Of Torus-Based Parallel Architectures: Network Parameters And Communication Performance'', Mathematical And Computer Modeling, Vol. 40, Nos. 7-8, Pp. 701-720, October 2004.


Paper Type : Research Paper
Title : A Review Paper on Image Forgery Detection In Image Processing
Country : India
Authors : Shivani Thakur || Ramanpreet Kaur || Dr. Raman Chadha || Jasmeet Kaur

Abstract: The image forensics is the technique which is applied to hide image important information. In the base paper, the technique of SIFT algorithm is applied to mark the objects in the image. In the SIFT algorithm whole image is scanned and from the scanned image objects are marked. The properties of the marked object are accessed and objects which have similar properties are classified into group and other are into second. To classify the similar type of objects techniques like block based & Key Point based technique, shift key point can be used.

Keyword: Image Processing, image forensics, digital signature, image preprocessing

[1]. S And Basavaraj S. Anami, " Comparison And Analysis Of Photo Image Forgery Detection Techniques", International Journal On Computational Sciences & Applications (Ijcsa) Vo2, No.6, December 2012
[2]. Ms. P. G.Gomase, Ms. N. R. Wankhade, " Advanced Digital Image Forgery Detection- A Review", Iosr Journal Of Computer Science (Iosr-Jce) E-Issn: 2278-0661, P-Issn: 2278-8727 Pp 80-83 2014
[3]. Andrea Costanzo, Irene Amerini, Roberto Caldelli, Mauro Barni, "Forensic Analysis Of Sift Keypoint Removal And Injection", Ieee Transactions On Information Forensics And Security, Vol. 9, No. 9, September 2014
[4]. Gagandeep Kaur, Manoj Kumar, "Study Of Various Copy Move Forgery Attack Detection In Digital Images", International Journal Of Research In Computer Applications And Robotics, Vol.3 Issue 9, Pg.: 30-34 September 2015
[5]. Rohini.A.Maind, Alka Khade, D.K.Chitre, "Image Copy Move Forgery Detection Using Block Representing Method", International Journal Of Soft Computing And Engineering (Ijsce) Issn: 2231-2307, Volume-4, Issue-2, May 2014


Paper Type : Research Paper
Title : Impact of Face Partitioning On Face Recognition Performance
Country : India
Authors : Harihara Santosh Dadi || Krishna Mohan P.G.

Abstract: Face partitioning algorithm is presented in this paper. Face is first divided into face parts namely head, eye pair, left eye, right eye, mouth and nose. Instead of giving the entire face as input in testing and training phases of face recognition algorithm, the face parts are given individually. Eigen features of all the face parts are extracted separately and given to the individual classifiers. Finally the classifier outputs are given to the decision making algorithm. This accepts all the face parts and generates a face based on the algorithm..........

Keyword: Face Partitioning, Facial features, Recognition engine, Support Vector Machine, Decision making algorithm.

[1]. M. Turk and A. Pentland (Jun. 1991). "Face Recognition Using Eigenfaces." Proceedings of CVPR IEEE Computer Society. [Online]. pp. 586-591. Available: https://www.cs.ucsb.edu/~mturk/Papers/mturk-CVPR91.pdf.
[2]. Wenyi Zhao, Rama Chellappa, P Jonathon Phillips, "Subspace linear discriminant analysis for face recognition," Computer Vision Laboratory, Center for Automation Research, University of Maryland. Apr. 1994.
[3]. H. Wechsler, P. J. Phillips, V. Bruce, F. Fogelman Soulie and T. S. Huang (eds), "Face recognition: from theory to applications", NATO ASI series F, Computer and Systems Sciences, vol. 163, pp.446-456. 1998.
[4]. Wenyi Zhao, Arvindh Krishnaswamy, Rama Chellappa, Daniel L Swets, and John Weng, "Discriminant analysis of principal components for face recognition," Face Recognition, Springer Berlin Heidelberg, pp. 73-85. 1998.


Paper Type : Research Paper
Title : An Efficient Routing and Data Gathering Technique for Big data in Wireless Sensor Network
Country : India
Authors : Kunal G. S || Ramesh

Abstract: Recently, the big data emerged as a hot topic because of the tremendous growth of the information and communication technology. One of the highly anticipated key contributors of the big data in the future networks is the distributed wireless sensor networks (WSNs). Although the data generated by an individual sensor may not appear to be significant, the overall data generated across numerous sensors in the densely distributed WSNs can produce a significant portion of the big data. Energy-efficient big data gathering in the densely distributed sensor networks is, therefore, a challenging research area.............

[1]. C. Jiming, X. Weiqiang, H. Shibo, S. Youxian, P. Thulasiraman, and S. Xuemin, ``Utility-based asynchronous flow control algorithm for wire- less sensor networks,'' IEEE J. Sel. Areas Commun., vol. 28, no. 7, Sep. 2010.
[2]. D. Baum and CIO Information Matters. (2013). Big Data, Big Opportunity [Online].
[3]. L. Ramaswamy, V. Lawson, and S. Gogineni, ``Towards a quality-centric big data architecture for federated sensor services,'' in Proc. IEEE Int. BigData Congr., Jul. 2013, pp. 86_93.
[4]. C.-C. Lin, M.-J. Chiu, C.-C. Hsiao, R.-G. Lee, and Y.-S. Tsai, ``Wireless health care service system for elderly with dementia,'' IEEE vol. 10, no. 4, pp. 696_704, Oct. 2006.
[5]. P. E. Ross, ``Managing care through the air [remote health monitoring],'' IEEE Spectr., vol. 41, no. 12, pp. 26_31, Dec. 2004.


Researcher can also search IOSR published article contents through

IOSR Xplore