首页 > 最新文献

2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)最新文献

英文 中文
Automated Detection of Breast Cancer Metastases in Whole Slide Images 全幻灯片图像中乳腺癌转移的自动检测
Pallvi Grover, R. Singh
Cancer is considered as one of the most widely spread disease in today’s world. Many people are suffering from this disease unaware of the facts about cancer. Women are more likely to suffer from breast cancer. Cancer spread in the body when the healthy cells grow out of control and form a mass of cells resulting in tumor. This paper describes an algorithm for automated detection of breast cancer metastases in Whole Slide Images. The current procedure for detecting metastases in a breast lymph node is manual and time-consuming in which an experienced pathologist specializing in detection and characterization of tumor regions spends hours to analyze histological slides. This algorithm leverages the capability of advanced Image Processing and Machine learning to improve the detection accuracy as well as overall time needed to localize tumorous regions in Whole Slide Image.
癌症被认为是当今世界上传播最广泛的疾病之一。许多患有这种疾病的人不知道癌症的事实。女性更容易患乳腺癌。当健康细胞生长失控,形成大量细胞形成肿瘤时,癌症就会在体内扩散。本文描述了一种在全幻灯片图像中自动检测乳腺癌转移的算法。目前检测乳腺淋巴结转移的程序是手动且耗时的,在此过程中,专门检测和表征肿瘤区域的经验丰富的病理学家需要花费数小时来分析组织学切片。该算法利用先进的图像处理和机器学习的能力来提高检测精度以及在整个幻灯片图像中定位肿瘤区域所需的总体时间。
{"title":"Automated Detection of Breast Cancer Metastases in Whole Slide Images","authors":"Pallvi Grover, R. Singh","doi":"10.1109/ICSCCC.2018.8703325","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703325","url":null,"abstract":"Cancer is considered as one of the most widely spread disease in today’s world. Many people are suffering from this disease unaware of the facts about cancer. Women are more likely to suffer from breast cancer. Cancer spread in the body when the healthy cells grow out of control and form a mass of cells resulting in tumor. This paper describes an algorithm for automated detection of breast cancer metastases in Whole Slide Images. The current procedure for detecting metastases in a breast lymph node is manual and time-consuming in which an experienced pathologist specializing in detection and characterization of tumor regions spends hours to analyze histological slides. This algorithm leverages the capability of advanced Image Processing and Machine learning to improve the detection accuracy as well as overall time needed to localize tumorous regions in Whole Slide Image.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124776541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of a novel energy efficient routing framework for Wireless Nanosensor Networks 无线纳米传感器网络的新型节能路由框架设计
Sandeep Verma, Satnam Kaur, Gaurav Dhiman, A. Kaur
With the advancements of the wireless sensing technology, the Wireless Nanosensors Networks (WNSNs) have revolutionized every sector which demands to monitor at the nano-scale level. WNSNs comprises of nanosensors that are acquainted with Nanotransceiver and nanoantenna operating at Terahertz frequency band (0.1-10THz). So far, researchers have focused on energy efficiency in WSNs but the energy issue in WNSNs have not been addressed significantly in the existing literature. In this paper, we have addressed the concern of energy efficiency in WNSNs by proposing the energy balanced clustering in the routing mechanism of WNSNs. The simulation analysis is performed in MATLAB Software to empirically investigate the performance of proposed energy balanced clustering incorporating the appropriate Cluster Head (CH) selection. It is found that the proposed routing framework outperforms the state-of-art routing mechanisms in terms of energy consumption and delay. The proposed scheme is highly triggering for various nanoscale applications.
随着无线传感技术的发展,无线纳米传感器网络(WNSNs)已经彻底改变了需要在纳米尺度上进行监测的各个领域。WNSNs由熟悉在太赫兹频段(0.1-10THz)工作的纳米收发器和纳米天线的纳米传感器组成。到目前为止,研究人员主要关注无线传感器网络的能量效率问题,但现有文献对无线传感器网络的能量问题尚未进行深入研究。本文通过提出wnsn路由机制中的能量均衡聚类,解决了wnsn的能源效率问题。在MATLAB软件中进行仿真分析,以实证研究包含适当簇头(CH)选择的所提出的能量平衡聚类的性能。结果表明,所提出的路由框架在能量消耗和延迟方面优于现有的路由机制。所提出的方案对各种纳米级应用具有高触发性。
{"title":"Design of a novel energy efficient routing framework for Wireless Nanosensor Networks","authors":"Sandeep Verma, Satnam Kaur, Gaurav Dhiman, A. Kaur","doi":"10.1109/ICSCCC.2018.8703308","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703308","url":null,"abstract":"With the advancements of the wireless sensing technology, the Wireless Nanosensors Networks (WNSNs) have revolutionized every sector which demands to monitor at the nano-scale level. WNSNs comprises of nanosensors that are acquainted with Nanotransceiver and nanoantenna operating at Terahertz frequency band (0.1-10THz). So far, researchers have focused on energy efficiency in WSNs but the energy issue in WNSNs have not been addressed significantly in the existing literature. In this paper, we have addressed the concern of energy efficiency in WNSNs by proposing the energy balanced clustering in the routing mechanism of WNSNs. The simulation analysis is performed in MATLAB Software to empirically investigate the performance of proposed energy balanced clustering incorporating the appropriate Cluster Head (CH) selection. It is found that the proposed routing framework outperforms the state-of-art routing mechanisms in terms of energy consumption and delay. The proposed scheme is highly triggering for various nanoscale applications.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129961758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
TOPSIS optimized Dual-Hop Routing Protocol for Homogeneous Wireless Sensor Networks with Grid-Based Clustering 基于网格聚类的同质无线传感器网络的TOPSIS优化双跳路由协议
Saloni, D. Kakkar
Wireless Sensor Networks (WSNs) is developing as a noteworthy innovation due to its various applications. WSNs comprise many Sensor Nodes (SN) to accumulate the data from physical environment. Every SN is powered by a battery and has both computing and communication capabilities. Because of limited resources, mainly insufficient battery power, there is a need to save the energy for prolonging network’s lifetime. Clustering of SN is among the efficacious techniques that are used to overcome the energy consumption problem in WSNs. In the work proposed here, an optimized dual-hop routing protocol with grid clustering mechanism is presented. This is done by dividing the network field into uniform size grids where every grid is considered as a cluster. From each grid, a Grid Head (GH) is being selected depending upon the residual energy of the SNs. The selection of next-hop for dual-hop communication is based on finding out the optimal node among the neighboring GHs using Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) method. MATLAB is used to perform the simulations. The evaluation of performance of the proposed work is made in terms of energy consumption, lifetime and stability period of the network.
无线传感器网络(WSNs)由于其广泛的应用而成为一项值得关注的创新。无线传感器网络由多个传感器节点(Sensor node, SN)组成,用于从物理环境中积累数据。每个SN由电池供电,具有计算和通信能力。由于资源有限,主要是电池电量不足,因此需要节约能源来延长网络的使用寿命。无线传感器网络的聚类是克服无线传感器网络能耗问题的有效技术之一。本文提出了一种优化的带有网格聚类机制的双跳路由协议。这是通过将网络字段划分为统一大小的网格来实现的,其中每个网格都被视为一个集群。从每个网格中,根据SNs的剩余能量选择网格头(GH)。双跳通信的下一跳选择是基于使用TOPSIS (Order Preference Technique by Similarity to Ideal Solution)方法在相邻GHs中找到最优节点。利用MATLAB进行仿真。从电网的能耗、寿命和稳定周期三个方面对所提工作的性能进行了评价。
{"title":"TOPSIS optimized Dual-Hop Routing Protocol for Homogeneous Wireless Sensor Networks with Grid-Based Clustering","authors":"Saloni, D. Kakkar","doi":"10.1109/ICSCCC.2018.8703304","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703304","url":null,"abstract":"Wireless Sensor Networks (WSNs) is developing as a noteworthy innovation due to its various applications. WSNs comprise many Sensor Nodes (SN) to accumulate the data from physical environment. Every SN is powered by a battery and has both computing and communication capabilities. Because of limited resources, mainly insufficient battery power, there is a need to save the energy for prolonging network’s lifetime. Clustering of SN is among the efficacious techniques that are used to overcome the energy consumption problem in WSNs. In the work proposed here, an optimized dual-hop routing protocol with grid clustering mechanism is presented. This is done by dividing the network field into uniform size grids where every grid is considered as a cluster. From each grid, a Grid Head (GH) is being selected depending upon the residual energy of the SNs. The selection of next-hop for dual-hop communication is based on finding out the optimal node among the neighboring GHs using Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) method. MATLAB is used to perform the simulations. The evaluation of performance of the proposed work is made in terms of energy consumption, lifetime and stability period of the network.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132479766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DDoS detection and discrimination from flash events: a compendious review DDoS检测和区分的闪光事件:一个简短的审查
A. Dhingra, M. Sachdeva
Although there has been an immense advancement in the robustness of IT infrastructure, the organizations still face downtimes, lasting for short periods and even continuing for days. This could be due to malicious requests, deliberately sent to disrupt the services or the volume of legitimate users trying to access the website. Detection of these network traffic anomalies and then categorizing them as DDoS Attack or Flash event, is a challenging task in the front of network security researchers. This paper reviews and summarizes the details and scenarios of these anomalies. It highlights the various features, parameters and metrics used in research till date to detect these anomalies and distinguish the legitimate request from the malicious one. The intent of paper is to guide researchers in selecting efficient parameters in order to obtain accurate results with low false positives. It highlights the list of characteristics to discriminate the two traffic patterns has been proposed for better understanding of the problem. Thus, the paper is expected to help academicians and researchers find effective solution for the above-mentioned anomalous behavior of the network traffic.
尽管在IT基础设施的健壮性方面已经取得了巨大的进步,但组织仍然面临停机时间,持续时间很短,甚至持续数天。这可能是由于恶意请求,故意发送破坏服务或合法用户试图访问该网站的数量。检测这些网络流量异常,并将其归类为DDoS攻击或Flash事件,是摆在网络安全研究人员面前的一项具有挑战性的任务。本文对这些异常的细节和场景进行了回顾和总结。它强调了迄今为止研究中用于检测这些异常并区分合法请求和恶意请求的各种特征,参数和指标。本文旨在指导研究人员选择有效的参数,以获得准确的低误报结果。它强调了区分两种交通模式的特征列表,这是为了更好地理解问题而提出的。因此,本文有望帮助学术界和研究人员找到有效的解决上述网络流量异常行为的方法。
{"title":"DDoS detection and discrimination from flash events: a compendious review","authors":"A. Dhingra, M. Sachdeva","doi":"10.1109/ICSCCC.2018.8703335","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703335","url":null,"abstract":"Although there has been an immense advancement in the robustness of IT infrastructure, the organizations still face downtimes, lasting for short periods and even continuing for days. This could be due to malicious requests, deliberately sent to disrupt the services or the volume of legitimate users trying to access the website. Detection of these network traffic anomalies and then categorizing them as DDoS Attack or Flash event, is a challenging task in the front of network security researchers. This paper reviews and summarizes the details and scenarios of these anomalies. It highlights the various features, parameters and metrics used in research till date to detect these anomalies and distinguish the legitimate request from the malicious one. The intent of paper is to guide researchers in selecting efficient parameters in order to obtain accurate results with low false positives. It highlights the list of characteristics to discriminate the two traffic patterns has been proposed for better understanding of the problem. Thus, the paper is expected to help academicians and researchers find effective solution for the above-mentioned anomalous behavior of the network traffic.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127544557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Comparative study of various Video Tampering detection methods 各种视频篡改检测方法的比较研究
Sandeep Kaur, A. Kushwaha
Now a day’s, digital pictures and video (recordings) hold high signiflcance since they have turned into the fundamental wellspring of data. With video and picture altering tools made it simple to altering of media content The prerequisite of validating the honesty of contents of digital videos ranges from a person to associations, barrier and security setups to law authorization organizations. So, there is need of researching viable video forgery detection procedures. In this paper, there is an outline of forgery detection techniques that have been proposed in the literatura and also there is a comparative studies of surveyed techniques and goes for featuring the difficulties and brings out opportunities in the field of forgery detection.
现在,每天的数码照片和视频(录音)具有很高的意义,因为它们已经成为数据的基本来源。有了视频和图片修改工具,修改媒体内容变得简单。验证数字视频内容真实性的先决条件从个人到协会,从屏障和安全设置到法律授权组织。因此,有必要研究可行的视频伪造检测方法。本文对文献中提出的伪造检测技术进行了概述,并对已调查的技术进行了比较研究,指出了伪造检测领域存在的困难和机遇。
{"title":"A Comparative study of various Video Tampering detection methods","authors":"Sandeep Kaur, A. Kushwaha","doi":"10.1109/ICSCCC.2018.8703277","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703277","url":null,"abstract":"Now a day’s, digital pictures and video (recordings) hold high signiflcance since they have turned into the fundamental wellspring of data. With video and picture altering tools made it simple to altering of media content The prerequisite of validating the honesty of contents of digital videos ranges from a person to associations, barrier and security setups to law authorization organizations. So, there is need of researching viable video forgery detection procedures. In this paper, there is an outline of forgery detection techniques that have been proposed in the literatura and also there is a comparative studies of surveyed techniques and goes for featuring the difficulties and brings out opportunities in the field of forgery detection.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114720975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Military Surveillance Robot 军用监视机器人的设计
M. Ghute, K. Kamble, M. Korde
The system proposed in this paper consists of a single unit, which will monitor the environment in various hazardous conditions and provide live video feedback. Basics of robotics like sensors and actuators, gives an overview on robotic construction. The proposed system is also able to capture real-time videos which are useful for surveillance for a specific person or area. Controlling of Robot is done using a Raspberry Pi3 processor. This robot is more comfortable for military applications such as surveillance of interested area. It will provide tactical advantage during hostage situations or in hostile grounds. It is capable of walking on any surface and providing monitoring over an area. With the help of high quality video transmission the surveillance become more effective. Video quality is improvised in the proposed system. These will prove important in applications like robots for civil use and military robots.
本文提出的系统由一个单元组成,该单元将监测各种危险条件下的环境并提供实时视频反馈。机器人的基础知识,如传感器和执行器,给出了机器人结构的概述。该系统还能够捕获实时视频,这对监视特定的人或区域很有用。机器人的控制是使用树莓Pi3处理器完成的。这种机器人更适合军事应用,如对感兴趣的区域进行监视。它将提供战术优势在人质的情况下或在敌对地区。它能够在任何表面上行走,并提供对一个区域的监控。在高质量视频传输的帮助下,监控变得更加有效。该系统对视频质量进行了改进。这将在民用机器人和军用机器人等应用中发挥重要作用。
{"title":"Design of Military Surveillance Robot","authors":"M. Ghute, K. Kamble, M. Korde","doi":"10.1109/ICSCCC.2018.8703330","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703330","url":null,"abstract":"The system proposed in this paper consists of a single unit, which will monitor the environment in various hazardous conditions and provide live video feedback. Basics of robotics like sensors and actuators, gives an overview on robotic construction. The proposed system is also able to capture real-time videos which are useful for surveillance for a specific person or area. Controlling of Robot is done using a Raspberry Pi3 processor. This robot is more comfortable for military applications such as surveillance of interested area. It will provide tactical advantage during hostage situations or in hostile grounds. It is capable of walking on any surface and providing monitoring over an area. With the help of high quality video transmission the surveillance become more effective. Video quality is improvised in the proposed system. These will prove important in applications like robots for civil use and military robots.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125034775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Expanding Lifetime Of Wireless Sensor Network Using Fuzzy Logic 利用模糊逻辑扩展无线传感器网络寿命
Padmini Mishra, Saurabh Jaiswal, N. Agarwal, V. Patel
Due to availability of limited resources such as bandwidth size, memory capacity, battery power etc, high node density and huge amount of traffic convergence make wireless sensor network more prone to congestion and it results in loss of information and more energy dissipation. Because of this, a congestion control mechanism is required which can detect congestion accurately and control it accordingly. In order to achieve this purpose, a fuzzy based congestion detection and alleviation scheme is developed by taking the advantage of some metrics-Buffer occupancy, traffic rate, contenders, number of packets sent by source node, number of packets received by the destination node and level of congestion. These metrics help to estimate congestion status in the sensor network and also minimizes the congestion level by adjusting rest of the other metrics. The performance of the proposed scheme is evaluated and compared with existing schemes such as ESRT, FLCE, CCSFL and FBACC with respect to various quality of service parameters. Finally, it is observed that the proposed model reduces the energy consumption by controlling congestion in the sensor network, minimizes packet loss, extend network lifespan and tries to maintain traffic rate in order to attain better utilization of the network bandwidth.
由于带宽大小、内存容量、电池电量等有限资源的可用性,高节点密度和大量的流量收敛使得无线传感器网络更容易发生拥塞,导致信息丢失和更多的能量消耗。因此,需要一种能够准确检测并控制拥塞的拥塞控制机制。为了达到这一目的,利用缓冲区占用率、流量率、竞争者、源节点发送数据包数、目的节点接收数据包数和拥塞程度等指标,提出了一种基于模糊的拥塞检测和缓解方案。这些指标有助于估计传感器网络中的拥塞状态,并通过调整其他指标的其余部分来最小化拥塞水平。在各种服务质量参数方面,对所提出方案的性能进行了评估,并与现有方案(如ESRT、FLCE、CCSFL和FBACC)进行了比较。最后,观察到所提出的模型通过控制传感器网络中的拥塞来降低能量消耗,最小化丢包,延长网络寿命,并试图保持流量速率以获得更好的网络带宽利用率。
{"title":"Expanding Lifetime Of Wireless Sensor Network Using Fuzzy Logic","authors":"Padmini Mishra, Saurabh Jaiswal, N. Agarwal, V. Patel","doi":"10.1109/ICSCCC.2018.8703208","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703208","url":null,"abstract":"Due to availability of limited resources such as bandwidth size, memory capacity, battery power etc, high node density and huge amount of traffic convergence make wireless sensor network more prone to congestion and it results in loss of information and more energy dissipation. Because of this, a congestion control mechanism is required which can detect congestion accurately and control it accordingly. In order to achieve this purpose, a fuzzy based congestion detection and alleviation scheme is developed by taking the advantage of some metrics-Buffer occupancy, traffic rate, contenders, number of packets sent by source node, number of packets received by the destination node and level of congestion. These metrics help to estimate congestion status in the sensor network and also minimizes the congestion level by adjusting rest of the other metrics. The performance of the proposed scheme is evaluated and compared with existing schemes such as ESRT, FLCE, CCSFL and FBACC with respect to various quality of service parameters. Finally, it is observed that the proposed model reduces the energy consumption by controlling congestion in the sensor network, minimizes packet loss, extend network lifespan and tries to maintain traffic rate in order to attain better utilization of the network bandwidth.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123400828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Based Saliency Algorithm For Image Forgery Classification And Localization 基于机器学习的图像伪造分类与定位显著性算法
A. Thakur, N. Jindal
In this paper, two algorithms are proposed to classify and localize image forgery. In the first algorithm, deep learning based convolution neural network is used to classify spliced and authentic images. In the second algorithm, machine learning based saliency algorithm is used to detect and localize forged images. Input images are preprocessed using color illumination maps with equal size and channels. Saliency algorithm detect unique features such as color illumination, pixel resolution etc. of the image. These unique features depict the forged regions in an image. The results are obtained on CASIA-v1, CASIA-v2, DVMM and BSDS-300 dataset. Simulated results in both algorithm are better as compare to the state of the art method.
本文提出了两种图像伪造分类和定位算法。在第一种算法中,使用基于深度学习的卷积神经网络对拼接图像和真实图像进行分类。第二种算法采用基于机器学习的显著性算法对伪造图像进行检测和定位。输入图像使用相同大小和通道的彩色照明图进行预处理。显著性算法检测图像的独特特征,如颜色照明,像素分辨率等。这些独特的特征描绘了图像中的伪造区域。结果在CASIA-v1、CASIA-v2、DVMM和BSDS-300数据集上得到。两种算法的仿真结果都优于目前的方法。
{"title":"Machine Learning Based Saliency Algorithm For Image Forgery Classification And Localization","authors":"A. Thakur, N. Jindal","doi":"10.1109/ICSCCC.2018.8703287","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703287","url":null,"abstract":"In this paper, two algorithms are proposed to classify and localize image forgery. In the first algorithm, deep learning based convolution neural network is used to classify spliced and authentic images. In the second algorithm, machine learning based saliency algorithm is used to detect and localize forged images. Input images are preprocessed using color illumination maps with equal size and channels. Saliency algorithm detect unique features such as color illumination, pixel resolution etc. of the image. These unique features depict the forged regions in an image. The results are obtained on CASIA-v1, CASIA-v2, DVMM and BSDS-300 dataset. Simulated results in both algorithm are better as compare to the state of the art method.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129165468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Advanced Petya Ransomware and Mitigation Strategies 高级Petya勒索软件和缓解策略
Jagmeet Singh Aidan, Zeenia, Urvashi Garg
In this cyber era, the cyber threats have reached a new level of menace and maturity. One of the major threat in this cyber world nowadays is ransomware attack which had affected millions of computers. Ransomware locks the valuable data with often unbreakable encryption codes making it inaccessible for both organization and consumers, thus demanding heavy ransom to decrypt the data. In this paper, advanced and improved version of the Petya ransomware has been introduced which has a reduced anti-virus detection of 33% which actually was 71% with the original version. System behavior is also monitored during the attack and analysis of this behavior is performed and described. Along with the behavioral analysis two mitigation strategies have also been proposed to defend the systems from the ransomware attack. This multi-layered approach for the security of the system will minimize the rate of infection as cybercriminals continue to refine their tactics, making it difficult for the organization’s complacent development.
在网络时代,网络威胁的威胁程度和成熟度都达到了新的高度。当今网络世界的主要威胁之一是勒索软件攻击,它已经影响了数百万台计算机。勒索软件通常用无法破解的加密代码锁定有价值的数据,使组织和消费者都无法访问这些数据,因此需要支付高额赎金才能解密数据。在本文中,介绍了Petya勒索软件的高级和改进版本,该版本的反病毒检测率降低了33%,而原始版本的反病毒检测率为71%。在攻击期间还监视系统行为,并执行和描述对该行为的分析。除了行为分析外,还提出了两种缓解策略来保护系统免受勒索软件攻击。随着网络犯罪分子不断改进他们的策略,这种多层次的系统安全方法将最大限度地降低感染率,使组织难以自满发展。
{"title":"Advanced Petya Ransomware and Mitigation Strategies","authors":"Jagmeet Singh Aidan, Zeenia, Urvashi Garg","doi":"10.1109/ICSCCC.2018.8703323","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703323","url":null,"abstract":"In this cyber era, the cyber threats have reached a new level of menace and maturity. One of the major threat in this cyber world nowadays is ransomware attack which had affected millions of computers. Ransomware locks the valuable data with often unbreakable encryption codes making it inaccessible for both organization and consumers, thus demanding heavy ransom to decrypt the data. In this paper, advanced and improved version of the Petya ransomware has been introduced which has a reduced anti-virus detection of 33% which actually was 71% with the original version. System behavior is also monitored during the attack and analysis of this behavior is performed and described. Along with the behavioral analysis two mitigation strategies have also been proposed to defend the systems from the ransomware attack. This multi-layered approach for the security of the system will minimize the rate of infection as cybercriminals continue to refine their tactics, making it difficult for the organization’s complacent development.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129856985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security challenges in Internet of Vehicles (IoV) environment 车联网环境下的安全挑战
Nishant Sharma, N. Chauhan, N. Chand
with recent advancements in technology, different devices that are used in our day-to-day lives are able to connect to internet, communicate and exchange messages with each other. This new paradigm is called “Internet of Things” and is providing services such as smart hospitals, smart city, home automation etc. “Internet of Things” has changed conventional small scale Vehicular Ad-hoc Network (VANET) to a highly scalable, manageable internet based “Internet of Vehicle” (IoV). IoV is a vehicular network model consisting of vehicles, users and other smart devices connected to network and aims to provide various safety as well as entertainment services. Vehicles in IoV system are equipped with different sensors that collect different types of data and send it to computation unit for computation and analysis, based on which directions and other information is sent to each vehicle. We present a model overview of IoV system in this paper. Security in IoV becomes of paramount importance as any system failure directly affects user safety. In this paper, we discuss security issues, various security attacks and their countermeasures from IoV perspective. We also propose an authentication mechanism for Vehicle-to-Infrastructure (V2I) communication in IoV.
随着科技的进步,我们日常生活中使用的不同设备都能够连接到互联网,相互通信和交换信息。这种新模式被称为“物联网”,并提供智能医院、智慧城市、家庭自动化等服务。“物联网”将传统的小规模车辆自组网(VANET)转变为高度可扩展、可管理的基于互联网的“车联网”(IoV)。IoV是一种车联网模式,由车辆、用户和其他连接到网络的智能设备组成,旨在提供各种安全以及娱乐服务。车联网系统中的车辆配备了不同的传感器,收集不同类型的数据并将其发送给计算单元进行计算和分析,并根据计算单元将方向等信息发送给每辆车。本文介绍了车联网系统的模型概述。安全在车联网中变得至关重要,因为任何系统故障都会直接影响用户的安全。本文从车联网的角度探讨了车联网的安全问题、各种安全攻击以及防范措施。我们还提出了一种车联网(IoV)中V2I通信的认证机制。
{"title":"Security challenges in Internet of Vehicles (IoV) environment","authors":"Nishant Sharma, N. Chauhan, N. Chand","doi":"10.1109/ICSCCC.2018.8703272","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703272","url":null,"abstract":"with recent advancements in technology, different devices that are used in our day-to-day lives are able to connect to internet, communicate and exchange messages with each other. This new paradigm is called “Internet of Things” and is providing services such as smart hospitals, smart city, home automation etc. “Internet of Things” has changed conventional small scale Vehicular Ad-hoc Network (VANET) to a highly scalable, manageable internet based “Internet of Vehicle” (IoV). IoV is a vehicular network model consisting of vehicles, users and other smart devices connected to network and aims to provide various safety as well as entertainment services. Vehicles in IoV system are equipped with different sensors that collect different types of data and send it to computation unit for computation and analysis, based on which directions and other information is sent to each vehicle. We present a model overview of IoV system in this paper. Security in IoV becomes of paramount importance as any system failure directly affects user safety. In this paper, we discuss security issues, various security attacks and their countermeasures from IoV perspective. We also propose an authentication mechanism for Vehicle-to-Infrastructure (V2I) communication in IoV.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125341108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1