IOSR Journal of Computer Engineering (IOSR-JCE)

National Conference on Recent Trends in Computer Science and Information Technology

Volume 5

Paper Type : Research Paper
Title : Multiple share images using random grids and XOR-Based visual cryptography
Country : India
Authors : Miss A. A. Naphade || Dr.R.N.khobaragade || Dr.V.M.Thakare

Abstract: Visual Cryptography is a special type of secret sharing deterministic and random grid visual cryptography The XOR – based visual cryptography (VC) is a possible methodology to work out on the poor visual quality without darkening the background. This paper focus on some technique as , Extended visual cryptography scheme (EVCS) for general assess structures, RG-based visual secret scheme (VSS), Adaptive region incrementing XOR- based VC ,Compared relation in deterministic and random visual cryptography and XOR based visual cryptography. The new scheme propose for multiple share image using XOR and random grids is proposed which will encrypt and decrypt algorithm by secrete images recovered quality improvement.

Keywords -Visual secret sharing, visual cryptography, meaningful share, XOR visual quality

[1]. Kai-Hui Lee and Pei-Ling Chiu, "An Extended Visual Cryptography Algorithm for General Access Structures" IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012.
[2]. Xiaotian Wu and DuanhaoOu "XOR-Based Meaningful Visual Secret Sharing Generalized Random Grids," ACM 978-1-4503-2081-8/13/06 .
[3]. Ching-Nung Yang,and Dao-Shun Wang "Property Analysis of XOR-Based VisualCryptography" IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 24, NO. 2, FEBRUARY 2014
[4]. Xiaotian Wu and Wai sun "Extended Capabalities for XOR-Based Visual cryptography" IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 10,0CTOBER 2014
[5]. Roberto De Prisco and Alfredo De Santis "On the Relation of Random Grid and Deterministic Visual Cryptography" IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 4, APRIL 2014


Paper Type : Research Paper
Title : Security in Embedded Systems: Vulnerabilities, Pigeonholing of Attacks and Countermeasures
Country : India
Authors : Vijeet H. Meshram || Ashish B. Sasankar

Abstract: Embedded systems are growing by leaps and bounds in many domains such as automobiles, industrial control, mobile phones etc. As these devices have started integrating in our daily life we need to look into for some critical measures that is security of these embedded systems. In this paper we look at existing threats and vulnerabilities in embedded systems. We envision that the findings in this paper provide a valuable insight of the threat landscape facing embedded systems. The knowledge can be used for a better understanding and the identification of security risks in system analysis and design.

Keywords- Embedded Systems, threats, vulnerabilities, attacks

[1]. R. Langner, "Stuxnet: Dissecting a cyberwarfare weapon," Security &Privacy, IEEE, vol. 9, no. 3, pp. 49–51, 2011.
[2]. B. Schneier, "Security risks of embedded systems," https://www.schneier.com/blog/archives/2014/01/security risks 9.html, January 2014.
[3]. S. Parameswaran and T. Wolf, "Embedded systems security – an overview," Design Automation for Embedded Systems, vol. 12, no. 3, pp. 173–183, 2008.
[4]. D. Kleidermacher and M. Kleidermacher, Embedded systems security: practical methods for safe and secure software and systems development. Elsevier, 2012.
[5]. D. N. Serpanos and A. G. Voyiatzis, "Security challenges in embedded systems," ACM Transactions on Embedded Computing Systems (TECS), vol. 12, no. 1s, p. 66, 2013.


Paper Type : Research Paper
Title : An Approach towards Securing Data in Cloud Computing
Country : India
Authors : Miss. V.T. Lanjewar || Prof. R.V.Dharaskar || Dr. V. M. Thakare

Abstract: Users store vast amounts of sensitive data on a cloud. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services. However, secure data sharing is problematic. Security is one of the most difficult task to implement in cloud computing. Different forms of attacks in the application side and in the hardware components. This paper proposes a framework for secure sensitive data sharing in cloud, including secure data delivery,....

Keywords: Cloud environment, Kerberos, Sensitive data

[1]. Peng Li; Song Guo "Load Balancing for Privacy-Preserving Access to Big Data in Cloud", 2014IEEE INFOCOM Workshop on Security and Privacy in Big data Computer Communications Workshops (INFOCOM WKSHPS), vol.21, no.4, 524 – 528, May 2014.
[2]. Xinhua Dong; Ruixuan Li; Heng He; Wanwan Zhou; Zhengyuan Xue; Hao Wu, "Secure Sensitive Data Sharing On a Big Data Platform", Tsinghua Science and Technology published in IEEE, Vol.20, No.1, pp.72-80, Feb. 2015; doi: 10.1109/TST.2015.7040516
[3]. W. Teng; G. Yang; Y. Xiang; T. Zhang; D. Wang, "Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing," in IEEE Transactions on Cloud Computing , vol.PP, no.99, pp.1-1, 02 June 2015,doi: 10.1109/TCC.2015.2440247
[4]. J. Li; W. Yao; Y. Zhang; H. Qian; J. Han, "Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing," in IEEE Transactions on Services Computing , vol. PP, no.99, pp.1-1, 22 January 2016, doi: 10.1109/TSC.2016.2520932
[5]. V. Chang and M. Ramachandran, "Towards Achieving Data Security with the Cloud Computing Adoption Framework," in IEEE Transactions on Services Computing, vol.9, no.1, pp.138-151, Jan.-Feb.1 2016,doi: 10.1109/TSC.2015.2491281


Paper Type : Research Paper
Title : SNS Historical Advances and Types
Country : India
Authors : Ashish Shah || Dr. A. S. Khandelwal

Abstract: The word using internet has now days have changed to using Social Networking Site such as facebook, twitter, myspace etc. SNS has transformed many aspect of social interaction among all age group especially among youth. Since the introduction of these sites, they have attracted people having same area of interest. Social networking site has developed a platform for members to connect to each other, share video's, photos to be in touch and know there updates.....

Keywords:- Internet, Social Networking Sites, Definition

[1]. Danahboyd, Nicole B. Ellison and Sociality through Social Networking Site.s.1 : Oxford,2013.
[2].The Telegraph.telegraph[Online] May 17,2015.[Cited: March 20,2016.] http://www.telegraph.co.uk/finance/newsbysector/mediatechnologyandtelecoms/11610959/Is-your-daily-social-media-usage-higher-than-average.html.
[3]. Research Paper on Social Networking: Research Paper on Social Networking. Cecconi, Alessandro. Nova Southeastern University : s.n., 2007.
[4]. Graphiq A research Engin. socialnetworking.findthebest.com. [Online] 2016. http://socialnetworking.findthebest.com/q/102/356/What-kind-of-features-does-Friendster-social-networking-site-have.
[5]. wikipedia. en.wikipedia.org. [Online] September 6, 2015. [Cited: march 20, 2016.] http://en.wikipedia.org/wiki/Dogster.


Paper Type : Research Paper
Title : A Statistical Pattern Classification and Data Mining Approach through Cloud Computing and Security
Country : India
Authors : V.R. Nikam || Dr. G. S. Katkar || Dr.MK Umathe

Abstract: Pattern recognition as a field of study developed significantly in the 1960s. It was very much an interdisciplinary subject, covering developments in the areas of statistics, engineering, artificial intelligence, computer science, psychology and physiology, among others Increasing adoption of cloud computing technology worldwide has also increased stress on its privacy and security issue........

Keywords: Network traffic classification, WEKA, Pattern classification, Data mining,

[1]. Abramson, I.S. (1982) On bandwidth variation in kernel estimates – a square root law. Annals of Statistics, 10:1217–1223.
[2]. Abu-Mostafa, Y.S., Atiya, A.F., Magdon-Ismail, M. and White, H., eds (2001) Special issue o "Neural Networks in Financial Engineering‟. IEEE Transactions on Neural Networks, 12(4)
[3]. Sebastian Zander, Thuy Nguyen, Grenville Armitage "Automated Traffic Classification and Application Identification using Machine Learning" Proceedings of the IEEE Conference on Local Computer Networks 30th Anniversary (LCN‟05).
[4]. Andrew W. Moore, Denis Zuev "Internet Traffic Classification Using Bayesian Analysis Techniques" SIGMETRICS'05, June 6.10, 2005, Banff, Alberta, Canada.
[5]. Tom Auld, Andrew W. Moore and Stephen F. Gull "Bayesian Neural Networks for Internet Traffic Classification" IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 18, NO. 1, JANUARY 2007 pp 223-239..


Paper Type : Research Paper
Title : Star Classification using Tree based Data Mining Techniques
Country : India
Authors : Dr. R. A. Ingolikar || S. R. Gedam

Abstract: Classification of Astronomical Data having large database is a troublesome activity. Data mining decision tree based techniques are applied for classification of star. The objective of the work is to evaluate the effectiveness of random forest on astronomical object classification. Random forest is an ensemble based classifier method where each classifier is decision trees. Results shows that ensemble method performs better as compared to single tree based classifier.

Keywords— Ensemble, Random forest, Decision trees, Classification

[1]. Nong Ye. The Handbook of Data Mining. Lawrence Erlbaum Publishers, 2003.
[2]. J. Han and M. Kamber. Data Mining, Concepts and Techniques. Morgan Kaufmann Publishers, 2001.
[3]. Marios Kampakolou, Roberto Trotta, and Joseph Silk. Monolithic or hierarchical star formation? A new statistical analysis. Monthly Notices of the Royal Astronomical Society, 384(4):1414-1426, 2008.
[4]. Shaukat N. Goderya and Shawn M. Lolling. Morphological classification of galaxies using computer vision and artificial neural network: A computational scheme. Astrophysics and Space Science, 279(4):pp. 377-387, 2005.
[5]. Yogesh Wadadekar. Estimating photometric redshifts using support vector machines. Publications of the Astronomical Society of the Pacific, 117(827):pp. 79-85, 2005.


Paper Type : Research Paper
Title : An overview of Cryptographic Hash Functions MD-5 and SHA
Country : India
Authors : H. B. Pethe || Dr. S. R. Pande

Abstract: Data Integrity is the most important service of cryptography. Hash functions are used to check the integrity of the file. Hash functions are useful, if the active attack is performed by the attacker. For the secured communication before sending any file though the unsecured network the hash value of any file or message is found out using hash function. After receiving the file by the recipient again the hash value of the received file is calculated....

Keywords - Data Integrity, Cryptography, Hash functions, SHA, MD-5, File integrity

[1]. Liu Jian – dong, Tian Ye, Wang Shu-hong, Yang Kai, "A fast New one way cryptographic hash function", IEEE 2010.
[2]. Joseph Sterling Grah "Hash functions in cryptography"
[3]. G. Bertoni, J. Daemen, M. Peeters, & G. V. Assche (2012), Keccak An update. Retrieved March 22-23, 2012, from Third SHA-3 candidate conference, Washington DC.
[4]. Danilo Gligoroski, Svein Johan Knapskog, J0rn Amundsen, Rune Erlend Jensen "Internationally Standardized Efficient Cryptographic Hash Function".
[5]. Abdulaziz Ali Alkandari, Imad Fakhri Al-shaikhli, Mohammad A. Alahmad "Cryptographic Hash functions: A High Level View" International conference on informatics and creative multimedia.


Paper Type : Research Paper
Title : Reversible Data Hiding Technique and its Type, a survey
Country : India
Authors : Manisha G. Gedam || Shruti M. Rakhunde || Usha P. Kosarkar

Abstract: This is a survey paper describes different types of algorithms for Reversible Data Hiding (RDH). Reversible data hiding can be defined as an approach where the data is hidden in the host media such as image, audio and video files. Reversible Data Hiding (RDH) or lossless data hiding, is a method by which the original cover can be lossless restored after the embedded information is extracted. Many RDH techniques have been developed. This paper summarizes and reviews these techniques. Previous literature has shown that difference expansion, interpolation technique...

Keywords: Reversible Data Hiding (RDH), Difference Expansion (DE), sorting and prediction, histogram modification

[1]. Abbas Cheddad, Joan Condell, KevinCurran and Paul McKevitt, (2010), "Digital Image Steganography: Survey and Analysis of Current Methods", Elsevier signal processing, Vol. 90, pp. 727-752.
[2]. Jun Tian, "Reversible Data Embedding Using a Difference Expansion", IEEE transactions on circuits and systems for video technology, vol. 13, no. 8, august 2003.
[3]. Ali Al-Ataby and Fawzi Al-Naima,(2010), " A Modified High Capacity Image Steganography Technique Based on Wavelet Transform", The International Arab Journal of Information Technology, Vol. 7, No. 4, pp 357-363.
[4]. Bret Dunba r, (2002), "A detailed look at stegonagraphic Techniques and their use in an Open – Systems Environment", SANS Institute.
[5]. Shruti M. Rakhunde, Archana A. Nikose, "New Approach for Reversible Data Hiding Using Visual Cryptography", IEEE International Conference on Computational Intelligence and Communication Networks 2014, Print ISBN: 978-1-4799-6928-9, Pages 846 - 855



IOSR Journals are published both in online and print versions.