首页 > 最新文献

2018 International Conference on Computer Communication and Informatics (ICCCI)最新文献

英文 中文
Secure Optimal k-NN on Encrypted Cloud Data using Homomorphic Encryption with Query Users 基于查询用户同态加密的云数据安全最优k-NN
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441290
K. Shankar, M. Ilayaraja
In cloud computing, research on security issues among outsourced encrypted data is trending topic. It has broad applications in area-based management, classification, and clustering. As any other normal utilized query for online applications, secure k-Nearest Neighbors (k-NN) calculation on encrypted cloud data is highly being considered now a days, and a few advanced answers have been produced. This paper proposed an innovative plan for encrypting the outsourced database and query points. The new plan can adequately support k-Nearest Neighbor (KNN) computation while preserving data privacy and query privacy. To improve the performance of the system, the Opposition-based Particle Swarm Optimization (OPSO) optimization algorithm is utilized to secure the data by Homomorphic Encryption (HE) method. The broad hypothetical and test assessments exhibit the adequacy of our plan with regards to security and performance.
在云计算领域,外包加密数据的安全问题是研究的热点。它在基于区域的管理、分类和聚类等方面有着广泛的应用。与在线应用的其他常用查询一样,加密云数据上的安全k-最近邻(k-NN)计算现在受到高度关注,并产生了一些高级答案。本文提出了一种对外包数据库和查询点进行加密的创新方案。新方案能够在保证数据隐私和查询隐私的同时,充分支持k-最近邻(KNN)计算。为了提高系统的性能,采用基于对立的粒子群优化算法(OPSO)对数据进行同态加密(HE)保护。广泛的假设和测试评估显示了我们的计划在安全性和性能方面的充分性。
{"title":"Secure Optimal k-NN on Encrypted Cloud Data using Homomorphic Encryption with Query Users","authors":"K. Shankar, M. Ilayaraja","doi":"10.1109/ICCCI.2018.8441290","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441290","url":null,"abstract":"In cloud computing, research on security issues among outsourced encrypted data is trending topic. It has broad applications in area-based management, classification, and clustering. As any other normal utilized query for online applications, secure k-Nearest Neighbors (k-NN) calculation on encrypted cloud data is highly being considered now a days, and a few advanced answers have been produced. This paper proposed an innovative plan for encrypting the outsourced database and query points. The new plan can adequately support k-Nearest Neighbor (KNN) computation while preserving data privacy and query privacy. To improve the performance of the system, the Opposition-based Particle Swarm Optimization (OPSO) optimization algorithm is utilized to secure the data by Homomorphic Encryption (HE) method. The broad hypothetical and test assessments exhibit the adequacy of our plan with regards to security and performance.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128712146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optical data transmission using portable USB Li-Fi module (dongle) 光数据传输使用便携式USB Li-Fi模块(加密狗)
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441490
Shreyash A. Pande, Shruti J. Sonar, Shubham K. Ingale
Wireless communication has become an indispensable part of our lives. Currently, RF spectrum is the most popular means available and hence is crowded with devices such as microwave ovens, video devices, radar systems, radio navigation and many more. Due to which the RF spectrum is on the verge of exhaustion. Clearly, we need to look out for alternatives to transmit the data wirelessly. The most promising alternative seems to be Li-Fi (Light Fidelity) [5]. Li-Fi, an example of OWC (optical wireless communication) can transmit data at a very high rate, moreover it can overcome certain challenges faced by Wi-Fi. It uses the visible light spectrum which is 10,000 times larger than the entire radio frequency spectrum [1]. Li-Fi can transmit data underwater, in aircraft (ensuring smooth working of its surroundings) and petrochemical industries (where using RF spectrum can prove to be lethal). Also, the light waves are not able to penetrate through walls, thus making it most secured form of wireless communication [1]. We have made a portable prototype of device that can establish a wireless communication between two or more personal computers using visible light spectrum. The portable device is compact and can ensure secured data transmission between devices within a room.
无线通信已经成为我们生活中不可缺少的一部分。目前,射频频谱是最流行的可用手段,因此充斥着诸如微波炉、视频设备、雷达系统、无线电导航等设备。因此,射频频谱处于耗尽的边缘。显然,我们需要寻找无线传输数据的替代方案。最有希望的替代方案似乎是Li-Fi(光保真度)[5]。Li-Fi是光无线通信(OWC)的一个例子,它可以以非常高的速率传输数据,并且可以克服Wi-Fi面临的某些挑战。它使用的可见光光谱比整个无线电频谱大1万倍[1]。Li-Fi可以在水下、飞机(确保其周围环境的顺利运行)和石化工业(使用射频频谱可能被证明是致命的)中传输数据。此外,光波不能穿透墙壁,因此使其成为最安全的无线通信形式[1]。我们制作了一个便携式原型装置,它可以利用可见光光谱在两台或多台个人电脑之间建立无线通信。该便携式设备结构紧凑,可确保房间内设备之间的数据传输安全。
{"title":"Optical data transmission using portable USB Li-Fi module (dongle)","authors":"Shreyash A. Pande, Shruti J. Sonar, Shubham K. Ingale","doi":"10.1109/ICCCI.2018.8441490","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441490","url":null,"abstract":"Wireless communication has become an indispensable part of our lives. Currently, RF spectrum is the most popular means available and hence is crowded with devices such as microwave ovens, video devices, radar systems, radio navigation and many more. Due to which the RF spectrum is on the verge of exhaustion. Clearly, we need to look out for alternatives to transmit the data wirelessly. The most promising alternative seems to be Li-Fi (Light Fidelity) [5]. Li-Fi, an example of OWC (optical wireless communication) can transmit data at a very high rate, moreover it can overcome certain challenges faced by Wi-Fi. It uses the visible light spectrum which is 10,000 times larger than the entire radio frequency spectrum [1]. Li-Fi can transmit data underwater, in aircraft (ensuring smooth working of its surroundings) and petrochemical industries (where using RF spectrum can prove to be lethal). Also, the light waves are not able to penetrate through walls, thus making it most secured form of wireless communication [1]. We have made a portable prototype of device that can establish a wireless communication between two or more personal computers using visible light spectrum. The portable device is compact and can ensure secured data transmission between devices within a room.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116708459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Low Power Two Stage Dynamic Comparator Circuit Design for Analog to Digital Converters 模数转换器的低功耗两级动态比较电路设计
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441497
S. Vadivel, N. Nithya
Mixed signal systems plays major role in the communication systems. This paper presents the low power two stage dynamic latch comparator that works in greater speed with less power consumption when related to conventional two stage dynamic latch comparators. The proposed comparator consists of two stages such as dynamic latch and pre amplifier stage. S Edit, T Spice and W edit tool were used for simulating the comparator circuit in the 250nm technologies and the results show the power consumption of 5.761mW which is less compared to conventional comparator design power consumption and 5v input voltage is used for the simulation.
混合信号系统在通信系统中占有重要地位。本文提出了一种低功耗两级动态锁存比较器,与传统的两级动态锁存比较器相比,它的工作速度更快,功耗更低。该比较器由动态锁存器和前置放大级两级组成。利用S Edit、T Spice和W Edit等工具对250nm工艺下的比较器电路进行仿真,结果表明,该电路功耗为5.761mW,低于传统比较器设计功耗,仿真输入电压为5v。
{"title":"Low Power Two Stage Dynamic Comparator Circuit Design for Analog to Digital Converters","authors":"S. Vadivel, N. Nithya","doi":"10.1109/ICCCI.2018.8441497","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441497","url":null,"abstract":"Mixed signal systems plays major role in the communication systems. This paper presents the low power two stage dynamic latch comparator that works in greater speed with less power consumption when related to conventional two stage dynamic latch comparators. The proposed comparator consists of two stages such as dynamic latch and pre amplifier stage. S Edit, T Spice and W edit tool were used for simulating the comparator circuit in the 250nm technologies and the results show the power consumption of 5.761mW which is less compared to conventional comparator design power consumption and 5v input voltage is used for the simulation.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115584151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FPGA implementation of PSO based Approximate SER for the Alamouti DF Relaying Protocol 基于PSO的Alamouti DF中继协议近似SER的FPGA实现
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441389
K. Ali, P. Sampath
In this paper, 32-bit floating-point representation of Particle Swarm Optimization (PSO) based Approximate Symbol Error Rate (A-SER) for Alamouti Decode and Forward (A-DF) Relaying Protocol is implemented using Field programmable gate arrays (FPGA). The A-SER for A-DF Relaying Protocol is described using Very High Speed Integrated Circuit Hardware Description Language (VHDL). From the PSO results, the updatation of velocities and current position achieve better performance in the A-SER and are named as current fitness function. Advantage of VLSI is to provide a single chip solution for A-SER in A-DF Relaying Protocol.
本文利用现场可编程门阵列(FPGA)实现了基于粒子群优化(PSO)的近似符号误码率(A-SER)的32位浮点表示,用于Alamouti解码和转发(A-DF)中继协议。使用超高速集成电路硬件描述语言(VHDL)描述了A-DF中继协议的A-SER。从PSO结果来看,速度和当前位置的更新在A-SER中表现较好,称为当前适应度函数。VLSI的优势在于为a - df中继协议中的a - ser提供单芯片解决方案。
{"title":"FPGA implementation of PSO based Approximate SER for the Alamouti DF Relaying Protocol","authors":"K. Ali, P. Sampath","doi":"10.1109/ICCCI.2018.8441389","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441389","url":null,"abstract":"In this paper, 32-bit floating-point representation of Particle Swarm Optimization (PSO) based Approximate Symbol Error Rate (A-SER) for Alamouti Decode and Forward (A-DF) Relaying Protocol is implemented using Field programmable gate arrays (FPGA). The A-SER for A-DF Relaying Protocol is described using Very High Speed Integrated Circuit Hardware Description Language (VHDL). From the PSO results, the updatation of velocities and current position achieve better performance in the A-SER and are named as current fitness function. Advantage of VLSI is to provide a single chip solution for A-SER in A-DF Relaying Protocol.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126659550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of High Pass Filter in Robotics: A Circuit Perspective 高通滤波器在机器人中的应用:电路视角
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441390
L. Naidoo, V. Srivastava
Electronic robotic system has a section of transmitter and receiver. For the receiver, to provide the required selectivity of frequencies, a filter is used. There is a wide variety of these filters that can be used within the Radio Frequency (RF) range. Radio frequencies range from 3 kHz to 300 GHz. This work analyzes the steps involved in the design and simulation of a 100 GHz (0.1 THz) third order active high pass filter. This filter uses the operational amplifier for the first stage and transistor for the further stage. By cascading these two stages a third order filter is designed. Using this model of filter a fine signal (command) can be given to robotic system.
电子机器人系统由发射器和接收器组成。对于接收器,为了提供所需的频率选择性,使用滤波器。在射频(RF)范围内可以使用各种各样的这些滤波器。无线电频率范围从3khz到300ghz。本文分析了100 GHz (0.1 THz)三阶有源高通滤波器的设计和仿真步骤。该滤波器在第一级使用运算放大器,在第二级使用晶体管。通过级联这两个阶段,设计了一个三阶滤波器。利用这种滤波模型可以给机器人系统一个精细的信号(指令)。
{"title":"Application of High Pass Filter in Robotics: A Circuit Perspective","authors":"L. Naidoo, V. Srivastava","doi":"10.1109/ICCCI.2018.8441390","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441390","url":null,"abstract":"Electronic robotic system has a section of transmitter and receiver. For the receiver, to provide the required selectivity of frequencies, a filter is used. There is a wide variety of these filters that can be used within the Radio Frequency (RF) range. Radio frequencies range from 3 kHz to 300 GHz. This work analyzes the steps involved in the design and simulation of a 100 GHz (0.1 THz) third order active high pass filter. This filter uses the operational amplifier for the first stage and transistor for the further stage. By cascading these two stages a third order filter is designed. Using this model of filter a fine signal (command) can be given to robotic system.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128039570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Classification of Seizure Through SVM Based Classifier 基于SVM分类器的癫痫发作分类
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441364
Abdulla Shahid, Mohd Wahab, Omar Farooq, N. Rafiuddin
Epilepsy is the most prevalent neural disorder characterized by abrupt and repetitive impairment of brain known as seizure, whose clinical symptoms are hyper synchronous activities of nerve cells in the brain. Since seizure, in general, occur very infrequently it is highly recommended for self-regulated disclosure of it during longstanding EEG measurement. The data handled in our work is publicly accessible online comprising of five classes. The segments in data set for each class were partitioned into two parts. Former comprised first 16 seconds (about 68%) of EEG which was used to train the network and rest of the signal were marked as test data. Statistical features for each class were evaluated. A supervised learning algorithm which is mostly used for classification and regression known as Support Vector Machine was used for classification of each set representing the different class. The classification results achieved taking all the five class was 91.42%. In order to confirm the accuracy of the classifier, the classifier is tested for different classification problem that were reported previously.
癫痫是最常见的神经系统疾病,其特征是突然和反复的大脑损伤,即癫痫发作,其临床症状是大脑神经细胞的超同步活动。由于癫痫发作通常很少发生,因此强烈建议在长期脑电图测量期间自我调节地披露。在我们的工作中处理的数据是公开的在线访问,包括五个类。将每一类数据集中的段划分为两部分。前者包括前16秒(约68%)的脑电信号用于训练网络,其余信号标记为测试数据。评估每个类别的统计特征。一种主要用于分类和回归的监督学习算法被称为支持向量机,用于代表不同类别的每个集合的分类。5个类别的分类合格率为91.42%。为了验证分类器的准确性,对之前报道的不同分类问题对分类器进行了测试。
{"title":"Classification of Seizure Through SVM Based Classifier","authors":"Abdulla Shahid, Mohd Wahab, Omar Farooq, N. Rafiuddin","doi":"10.1109/ICCCI.2018.8441364","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441364","url":null,"abstract":"Epilepsy is the most prevalent neural disorder characterized by abrupt and repetitive impairment of brain known as seizure, whose clinical symptoms are hyper synchronous activities of nerve cells in the brain. Since seizure, in general, occur very infrequently it is highly recommended for self-regulated disclosure of it during longstanding EEG measurement. The data handled in our work is publicly accessible online comprising of five classes. The segments in data set for each class were partitioned into two parts. Former comprised first 16 seconds (about 68%) of EEG which was used to train the network and rest of the signal were marked as test data. Statistical features for each class were evaluated. A supervised learning algorithm which is mostly used for classification and regression known as Support Vector Machine was used for classification of each set representing the different class. The classification results achieved taking all the five class was 91.42%. In order to confirm the accuracy of the classifier, the classifier is tested for different classification problem that were reported previously.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129722807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Hand Gesture Recognition for Traffic Control System Using ti Sensor Tag 基于ti传感器标签的交通控制系统高效手势识别
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441483
Gandluri Yasmeen, S. Arun, J. N. Swaminathan, S. Jilani, S. Asif
In this paper, we are describing the hand gesture recognition mechanism using the accelerometer values of the TI Sensor Tag for controlling the Traffic lights. The TI Sensor Tag is aBLE (Bluetooth Low Energy) device which consumes very low power during its operation and it uses single coin battery for months of life. It uses the Bluez Library for reading the data from different sensors of Sensor Tag. Now-a-days the traffic on the road has been increasing drastically due to increase in number of vehicle users. On the other hand the simple time based traffic control system is not sufficient for controlling the uneven traffic on the roads during peak hours, which calls for a new Traffic control system. The gesture technology has become very popular for HMI (Human Machine Interface), which provides a virtual environment for controlling devices by giving Gestures. Here we used the Ti Sensor Tag for Hand Gesture Recognition.
在本文中,我们描述了使用TI传感器标签的加速度计值来控制交通灯的手势识别机制。TI传感器标签是aBLE(低功耗蓝牙)设备,在其运行过程中消耗非常低的功率,它使用单个硬币电池长达数月的寿命。它使用Bluez库从传感器标签的不同传感器读取数据。如今,由于车辆使用者数量的增加,道路上的交通急剧增加。另一方面,简单的基于时间的交通控制系统不足以控制高峰时段道路上的不均匀交通,这需要一种新的交通控制系统。手势技术在人机界面(HMI)中非常流行,它通过手势提供一个虚拟环境来控制设备。在这里,我们使用Ti传感器标签进行手势识别。
{"title":"Efficient Hand Gesture Recognition for Traffic Control System Using ti Sensor Tag","authors":"Gandluri Yasmeen, S. Arun, J. N. Swaminathan, S. Jilani, S. Asif","doi":"10.1109/ICCCI.2018.8441483","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441483","url":null,"abstract":"In this paper, we are describing the hand gesture recognition mechanism using the accelerometer values of the TI Sensor Tag for controlling the Traffic lights. The TI Sensor Tag is aBLE (Bluetooth Low Energy) device which consumes very low power during its operation and it uses single coin battery for months of life. It uses the Bluez Library for reading the data from different sensors of Sensor Tag. Now-a-days the traffic on the road has been increasing drastically due to increase in number of vehicle users. On the other hand the simple time based traffic control system is not sufficient for controlling the uneven traffic on the roads during peak hours, which calls for a new Traffic control system. The gesture technology has become very popular for HMI (Human Machine Interface), which provides a virtual environment for controlling devices by giving Gestures. Here we used the Ti Sensor Tag for Hand Gesture Recognition.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131014436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Image Encryption with an Encrypted QR, Random Phase Encoding, and Logistic Map 使用加密QR的图像加密,随机相位编码和逻辑映射
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441219
N. Prasad, Vasudharini Moranam Ravi, Lakshmi Chandrasekhar
This paper presents an image encryption technique with three layers of security. The aim is to increase the degree of randomness in the image through data and location shuffling. This is implemented through a logistic map, symmetric key cryptography, and generation of Quick Response (QR) codes. Finally, the corresponding image metrics such as entropy, correlation, differential and error metric analyses were performed and results were listed out.
本文提出了一种三层安全的图像加密技术。其目的是通过数据和位置变换来增加图像的随机性程度。这是通过逻辑映射、对称密钥加密和生成快速响应(QR)代码来实现的。最后,对图像进行熵、相关、微分和误差等度量分析,并给出分析结果。
{"title":"Image Encryption with an Encrypted QR, Random Phase Encoding, and Logistic Map","authors":"N. Prasad, Vasudharini Moranam Ravi, Lakshmi Chandrasekhar","doi":"10.1109/ICCCI.2018.8441219","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441219","url":null,"abstract":"This paper presents an image encryption technique with three layers of security. The aim is to increase the degree of randomness in the image through data and location shuffling. This is implemented through a logistic map, symmetric key cryptography, and generation of Quick Response (QR) codes. Finally, the corresponding image metrics such as entropy, correlation, differential and error metric analyses were performed and results were listed out.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133640808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
OTP on Demand - An Embedded System for User Authentication 按需OTP -用户认证的嵌入式系统
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441400
S. Janakiraman, K. Sree, V. Manasa, Sundararaman Rajagopalan, K. Thenmozhi, Rengarajan Amirtharajan
Security plays a vital role in the world of communication. In applications such as banking, making access to any personal resource of an individual via wireless media requires the validation of authorized user at every moment. Static passwords have been in use which is vulnerable to attacks such as reply attack. One Time Password (OTP) is a particular kind of password that is valid only for only one login session or transaction. OTP provides a secure way for user authentication as it becomes invalid when used beyond the prescribed time frame. High level of randomness is the significant property required for OTPs. True randomness can be generated from real-world parameters that can produce unpredictable variations in its output. This paper presents an embedded hardware OTP generation system based on remote request via DTMF signals. The proposed hardware uses a confluence of real-world parameters and software-based chaotic function on an embedded platform for OTP generation. The proposed system also facilitates change in the generation of OTPs via discretionary external inputs from users.
安全在通信世界中起着至关重要的作用。在银行等应用中,通过无线媒体访问个人的任何个人资源都需要授权用户随时进行验证。静态密码已被使用,容易受到回复攻击等攻击。一次性密码(OTP)是一种特殊类型的密码,仅对一次登录会话或事务有效。OTP为用户身份验证提供了一种安全的方式,因为当超过规定的时间范围使用时,它将失效。高水平的随机性是otp所需的重要属性。真正的随机性可以从现实世界的参数中产生,这些参数可以在其输出中产生不可预测的变化。介绍了一种基于DTMF信号远程请求的嵌入式硬件OTP生成系统。所提出的硬件在嵌入式平台上使用现实世界参数和基于软件的混沌函数的融合来生成OTP。拟议的系统还通过用户酌情提供的外部投入,促进了otp产生方面的变化。
{"title":"OTP on Demand - An Embedded System for User Authentication","authors":"S. Janakiraman, K. Sree, V. Manasa, Sundararaman Rajagopalan, K. Thenmozhi, Rengarajan Amirtharajan","doi":"10.1109/ICCCI.2018.8441400","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441400","url":null,"abstract":"Security plays a vital role in the world of communication. In applications such as banking, making access to any personal resource of an individual via wireless media requires the validation of authorized user at every moment. Static passwords have been in use which is vulnerable to attacks such as reply attack. One Time Password (OTP) is a particular kind of password that is valid only for only one login session or transaction. OTP provides a secure way for user authentication as it becomes invalid when used beyond the prescribed time frame. High level of randomness is the significant property required for OTPs. True randomness can be generated from real-world parameters that can produce unpredictable variations in its output. This paper presents an embedded hardware OTP generation system based on remote request via DTMF signals. The proposed hardware uses a confluence of real-world parameters and software-based chaotic function on an embedded platform for OTP generation. The proposed system also facilitates change in the generation of OTPs via discretionary external inputs from users.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114909035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Smart Contracts: Automated Stipulations on Blockchain 智能合约:区块链上的自动规定
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441347
Vruddhi Mehta, Sakshi More
Contracts, a set of legally negotiated rules between the transacting parties are often the prime cause of legal as well as business disputes. Due to this discord, they are generally viewed with contempt. The need to revolutionize contracts has been much felt by the attorneys and the business professionals, so as to avoid these daedal contract conflicts. This resulted in the advent of smart contracts that was led by Blockchain technology. It is a blend of legalese from lawyers and computer code. A smart contract is a versatile system capable of facilitating, automating and enforcing an agreement (i.e. contract). In this paper, we preview as well as analyze smart contract based on blockchain technology for a decentralized system.
合同是交易双方之间合法协商的一套规则,往往是法律纠纷和商业纠纷的主要原因。由于这种不和谐,他们通常被蔑视。为了避免这些复杂的合同冲突,律师和商业专业人士已经感受到对合同进行革命的必要性。这导致了以区块链技术为主导的智能合约的出现。它是律师的法律术语和计算机代码的混合体。智能合约是一个多功能系统,能够促进、自动化和执行协议(即合同)。在本文中,我们对分布式系统中基于区块链技术的智能合约进行了预览和分析。
{"title":"Smart Contracts: Automated Stipulations on Blockchain","authors":"Vruddhi Mehta, Sakshi More","doi":"10.1109/ICCCI.2018.8441347","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441347","url":null,"abstract":"Contracts, a set of legally negotiated rules between the transacting parties are often the prime cause of legal as well as business disputes. Due to this discord, they are generally viewed with contempt. The need to revolutionize contracts has been much felt by the attorneys and the business professionals, so as to avoid these daedal contract conflicts. This resulted in the advent of smart contracts that was led by Blockchain technology. It is a blend of legalese from lawyers and computer code. A smart contract is a versatile system capable of facilitating, automating and enforcing an agreement (i.e. contract). In this paper, we preview as well as analyze smart contract based on blockchain technology for a decentralized system.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133910586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 International Conference on Computer Communication and Informatics (ICCCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1