This study proposes a unique segmentation-based clustering algorithm that utilises k-means for segmentation, further uses a local feature selection technique to obtain the top bands for each cluster and deploys clustering on segmented hyperspectral imagery. The suggested methodology is a framework with several stages. k-means is initially utilized for image segmentation. From the obtained segments, significant segments are identified using Gini impurity. Finally, the cluster map is obtained by merging insignificant clusters with significant clusters. This step also makes use of novel local feature selection strategy. Three sets of hyperspectral images are used in investigations to evaluate the efficiency of the proposed methodology. For assessment, the criteria Normalized Mutual Information and Purity score are utilised. The investigation findings demonstrate that the proposed methodology outperforms the other segmentation methodologies that were compared. According to the results, using band selection and redundancy strategies significantly improves accuracy.
{"title":"Hyper Spectral Image Clustering and Local Feature Selection using Gini Impurity","authors":"Prashant Kumar Mali, Hitenkumar Motiyani, Quazi Sameed, Anand Mehta","doi":"10.1109/ICOEI56765.2023.10125605","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125605","url":null,"abstract":"This study proposes a unique segmentation-based clustering algorithm that utilises k-means for segmentation, further uses a local feature selection technique to obtain the top bands for each cluster and deploys clustering on segmented hyperspectral imagery. The suggested methodology is a framework with several stages. k-means is initially utilized for image segmentation. From the obtained segments, significant segments are identified using Gini impurity. Finally, the cluster map is obtained by merging insignificant clusters with significant clusters. This step also makes use of novel local feature selection strategy. Three sets of hyperspectral images are used in investigations to evaluate the efficiency of the proposed methodology. For assessment, the criteria Normalized Mutual Information and Purity score are utilised. The investigation findings demonstrate that the proposed methodology outperforms the other segmentation methodologies that were compared. According to the results, using band selection and redundancy strategies significantly improves accuracy.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129776219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-11DOI: 10.1109/ICOEI56765.2023.10125790
Riya Kedia, B. Kumar, Pallab Banerjee, Pooja Jha, Tannisha Kundu, Mohan Kumar Dehury
Popular cryptographic technology called Advanced Encryption Standard (AES) enables secure data transfer over the internet. It is used for a variety of purposes, such as secure data transfer, mobile phone encryption, and encryption of extremely sensitive data. It operates in terms of blocks, or chunks, of data. Steganography is the process of hiding data in another sort of data, such as a digital image. If a user wants to utilize a cryptographic method to conceal encrypted data in an image, such as AES, it is essential that the method be impervious to all possible attacks. This study has analyzed the possibility to hide data inside digital photos by utilizing encryption techniques like AES. The performance comparison of AES and Data Encryption Standard (DES), a full Python implementation of the AES for image steganography is also presented. To illustrate how each method performs, experimental results are provided. The Advanced Encryption Standard can be programmed in software or built with pure hardware.
{"title":"Analysis and Implementation of Image Steganography by Using AES Algorithm","authors":"Riya Kedia, B. Kumar, Pallab Banerjee, Pooja Jha, Tannisha Kundu, Mohan Kumar Dehury","doi":"10.1109/ICOEI56765.2023.10125790","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125790","url":null,"abstract":"Popular cryptographic technology called Advanced Encryption Standard (AES) enables secure data transfer over the internet. It is used for a variety of purposes, such as secure data transfer, mobile phone encryption, and encryption of extremely sensitive data. It operates in terms of blocks, or chunks, of data. Steganography is the process of hiding data in another sort of data, such as a digital image. If a user wants to utilize a cryptographic method to conceal encrypted data in an image, such as AES, it is essential that the method be impervious to all possible attacks. This study has analyzed the possibility to hide data inside digital photos by utilizing encryption techniques like AES. The performance comparison of AES and Data Encryption Standard (DES), a full Python implementation of the AES for image steganography is also presented. To illustrate how each method performs, experimental results are provided. The Advanced Encryption Standard can be programmed in software or built with pure hardware.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131214553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Multinational companies are taking advantage of the services provided through a cloud service provider (CS P). It is generally observed that, the companies provide customized services to the user as an added benefit rather than using the initial services. The motive of the proposed study is to build a trusted relationship between the user and service provider. This study analyzes several parameters to scale up an approach by adopting advanced technologies. In this study, a matrix has been prepared by including the utility value for the fruit factors used by the user. Compatibility connection between multiple customers are also measured by obtaining services from the particular company. The proposed matrix can identify the actual use of the significant cloud computing features.
{"title":"A Novel Matrix for Analyzing Cloud Services in Top MNCs","authors":"Nidhi Bansal, Archana Jain, Manoj kumar Sharma, Manish Kumar","doi":"10.1109/ICOEI56765.2023.10125916","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125916","url":null,"abstract":"Multinational companies are taking advantage of the services provided through a cloud service provider (CS P). It is generally observed that, the companies provide customized services to the user as an added benefit rather than using the initial services. The motive of the proposed study is to build a trusted relationship between the user and service provider. This study analyzes several parameters to scale up an approach by adopting advanced technologies. In this study, a matrix has been prepared by including the utility value for the fruit factors used by the user. Compatibility connection between multiple customers are also measured by obtaining services from the particular company. The proposed matrix can identify the actual use of the significant cloud computing features.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125283554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tomatoes are the most widely grown vegetable, used in a wide variety of dishes around the world. After potatoes and sweet potatoes, it is the third most extensively cultivated crop in the world. However, due to several diseases, both the quality and quantity of tomato harvests dedine. To maximize tomato yields, it is important to identify and eradicate the many diseases that harm the crop as early as possible. In this paper, we investigate the potential of deep learning techniques for diagnosing diseases on tomato leaves. The use of automatic methods for tomato leaf disease detection is helpful because it reduces the amount of monitoring needed in large-scale crop farms and does so at a very early stage when the signs of the disease identified on plant leaves are still easy to cure. The Kaggle dataset for tomato leaf disease was used for the study. A technique based on convolutional neural networks is used for disease identification and classification. Deep learning models, such as Inception V3 are used in this work. This proposed system obtained an accuracy of 99.60% suggesting that the neural network approach is effective even under difficult situations.
{"title":"Disease Identification in Tomato Leaves Using Inception V3 Convolutional Neural Networks","authors":"Srinivas Samala, Nakka Bhavith, Raghav Bang, Durshanapally Kondal Rao, C. Prasad, Srikanth Yalabaka","doi":"10.1109/ICOEI56765.2023.10125758","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125758","url":null,"abstract":"Tomatoes are the most widely grown vegetable, used in a wide variety of dishes around the world. After potatoes and sweet potatoes, it is the third most extensively cultivated crop in the world. However, due to several diseases, both the quality and quantity of tomato harvests dedine. To maximize tomato yields, it is important to identify and eradicate the many diseases that harm the crop as early as possible. In this paper, we investigate the potential of deep learning techniques for diagnosing diseases on tomato leaves. The use of automatic methods for tomato leaf disease detection is helpful because it reduces the amount of monitoring needed in large-scale crop farms and does so at a very early stage when the signs of the disease identified on plant leaves are still easy to cure. The Kaggle dataset for tomato leaf disease was used for the study. A technique based on convolutional neural networks is used for disease identification and classification. Deep learning models, such as Inception V3 are used in this work. This proposed system obtained an accuracy of 99.60% suggesting that the neural network approach is effective even under difficult situations.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126430744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-11DOI: 10.1109/ICOEI56765.2023.10125708
S. Ragul, Y. S, V. Vijayabalan, B. Venkatasamy, L. Kalaivani, F. A. Jeffrey Vaz
This work reviews the design of controlling the ceiling Fan speed by using android mobile. This product is to provide comfortable sleeping at midnight during the winter and rainy seasons. It automatically controls the speed of the Fan based on the factors such as temperature and humidity. The speed control can be fully automatic or semi-automatic. The proposed smart controller is implemented between Fan and E.B. mains. There is no need to disturb the existing Fan arrangement. The main aim of this study is to replace the existing Fan regulator alone. The mode of operation of the Fan can be controlled by using IoT/Bluetooth/Manual. PIR sensor is incorporated; it makes the Fan run only when the people are present inside the room. This study also includes a night visible digital clock and wakeup alarm system. The proposed controller is made as two variants; one is to control a single ceiling fan with additional features that make a complete bedroom solution cost-effective. Another is a high-power controller that controls a large number of Fans based on the factors, which conserves a lot of energy.
{"title":"IoT based Smart Controller for Ceiling Fan","authors":"S. Ragul, Y. S, V. Vijayabalan, B. Venkatasamy, L. Kalaivani, F. A. Jeffrey Vaz","doi":"10.1109/ICOEI56765.2023.10125708","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125708","url":null,"abstract":"This work reviews the design of controlling the ceiling Fan speed by using android mobile. This product is to provide comfortable sleeping at midnight during the winter and rainy seasons. It automatically controls the speed of the Fan based on the factors such as temperature and humidity. The speed control can be fully automatic or semi-automatic. The proposed smart controller is implemented between Fan and E.B. mains. There is no need to disturb the existing Fan arrangement. The main aim of this study is to replace the existing Fan regulator alone. The mode of operation of the Fan can be controlled by using IoT/Bluetooth/Manual. PIR sensor is incorporated; it makes the Fan run only when the people are present inside the room. This study also includes a night visible digital clock and wakeup alarm system. The proposed controller is made as two variants; one is to control a single ceiling fan with additional features that make a complete bedroom solution cost-effective. Another is a high-power controller that controls a large number of Fans based on the factors, which conserves a lot of energy.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122763630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-11DOI: 10.1109/ICOEI56765.2023.10126055
Parveen Akhther. A, A. Maryposonia, P. S.
The task to ensure security in a network that is distributed over several nodes is a significant and challenging one. Since the primary objective of a DDoS attack is to prevent authorized nodes from gaining access to the service, this type of attack presents a significant threat to distributed networks. It is highly important that a modular and dependable NIDS must be created for handling DOS attacks in the distributed environment effectively, and in turn, all the nodes are available in the distributed network.The high need for modular techniques required in the detection phase for collecting, storing and analyzing the big data from the nodes in the distributed network poses significant hurdles in finding out the Distributed DOS attack.This research proposes a Big Data-based Distributed Denial of Service Network Intrusion Detection System to address these issues. Important features of the proposed intrusion detection system include a module for detecting network traffic and another for collecting data on that traffic. In this study, micro-batch data processing is employed for traffic feature gathering in the Network collection module and Random Forest (RF) algorithm-based classification technique is used in the traffic detection module for feature selection. For Storing a large number of wary attacks, Hadoop File System (HDFS) is used, and for accelerating the speed of data processing, S park is used as a suggested solution.The method was assessed using the NSL-KDD benchmark dataset to find the accuracy and many other parameters. Experimental results for Accuracy, Recall, F1-Measure and Precision, from the proposed work are compared to those from the machine learning techniques, DT(Decision Tree), PCA RF(Principal Component Analysis Random Forest), NB(Naive Bayes), SVM(Support Vector Machine), and LR (Logistic Regression). According to the experimental findings, the suggested detection algorithm achieved an Accuracy of 99.89%, respectively.
{"title":"An Efficient Network Intrusion Detection System for Distributed Networks using Machine Learning Technique","authors":"Parveen Akhther. A, A. Maryposonia, P. S.","doi":"10.1109/ICOEI56765.2023.10126055","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10126055","url":null,"abstract":"The task to ensure security in a network that is distributed over several nodes is a significant and challenging one. Since the primary objective of a DDoS attack is to prevent authorized nodes from gaining access to the service, this type of attack presents a significant threat to distributed networks. It is highly important that a modular and dependable NIDS must be created for handling DOS attacks in the distributed environment effectively, and in turn, all the nodes are available in the distributed network.The high need for modular techniques required in the detection phase for collecting, storing and analyzing the big data from the nodes in the distributed network poses significant hurdles in finding out the Distributed DOS attack.This research proposes a Big Data-based Distributed Denial of Service Network Intrusion Detection System to address these issues. Important features of the proposed intrusion detection system include a module for detecting network traffic and another for collecting data on that traffic. In this study, micro-batch data processing is employed for traffic feature gathering in the Network collection module and Random Forest (RF) algorithm-based classification technique is used in the traffic detection module for feature selection. For Storing a large number of wary attacks, Hadoop File System (HDFS) is used, and for accelerating the speed of data processing, S park is used as a suggested solution.The method was assessed using the NSL-KDD benchmark dataset to find the accuracy and many other parameters. Experimental results for Accuracy, Recall, F1-Measure and Precision, from the proposed work are compared to those from the machine learning techniques, DT(Decision Tree), PCA RF(Principal Component Analysis Random Forest), NB(Naive Bayes), SVM(Support Vector Machine), and LR (Logistic Regression). According to the experimental findings, the suggested detection algorithm achieved an Accuracy of 99.89%, respectively.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123173835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-11DOI: 10.1109/ICOEI56765.2023.10125786
Rishabh Kothari, B. Rangwala, Kush Patel
One of the major challenges during online examinations is the assessment of answers, particularly of the subjective type. Subjective answers test a student's ability to retain information and express it in natural language. While objective questions have a correct fixed answer, subjective questions can have multiple correct answers. These answers can convey the same information while using a completely different language and grammatical syntax. This makes it difficult to automate the process of grading subjective questions and requires a lot of manual work hours. This study intends to automate the process of grading subjective questions using Machine Learning (ML) and Natural Language Processing (NLP). The study has compared the subjective answer with an ideal answer that is provided by the authority that creates the question. Based on the similarity between the two answers, a score is generated which can be mapped to an appropriate grade. The authors have provided a web application made using the Django framework for people to give online examinations and be automatically graded in near real-time. No machine learning model can be 100% accurate, so there is a functionality for admins to edit the grades.
{"title":"Automatic Subjective Answer Grading Software Using Machine Learning","authors":"Rishabh Kothari, B. Rangwala, Kush Patel","doi":"10.1109/ICOEI56765.2023.10125786","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125786","url":null,"abstract":"One of the major challenges during online examinations is the assessment of answers, particularly of the subjective type. Subjective answers test a student's ability to retain information and express it in natural language. While objective questions have a correct fixed answer, subjective questions can have multiple correct answers. These answers can convey the same information while using a completely different language and grammatical syntax. This makes it difficult to automate the process of grading subjective questions and requires a lot of manual work hours. This study intends to automate the process of grading subjective questions using Machine Learning (ML) and Natural Language Processing (NLP). The study has compared the subjective answer with an ideal answer that is provided by the authority that creates the question. Based on the similarity between the two answers, a score is generated which can be mapped to an appropriate grade. The authors have provided a web application made using the Django framework for people to give online examinations and be automatically graded in near real-time. No machine learning model can be 100% accurate, so there is a functionality for admins to edit the grades.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125798625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-11DOI: 10.1109/ICOEI56765.2023.10125814
Kapil Kant Kamal, Padmaja Joshi, A. Bang, Kavita Bhatia
In recent years, mobile applications have become increasingly important. These applications differ significantly from desktop and web applications, and being used increasingly in various enterprise domains. Accordingly, this motivates the mobile industries to increase the accessibility of mobile applications and their development across many platforms, including Android and iPhone. This research work discusses the security testing procedure and features of India's first indigenous AppStore “mSeva AppStore”. To ensure the quality of the hosted mobile applications, distinct techniques, and effective testing approaches are required. Before hosting the application on mSeva AppStore regressive testing is performed in all aspects like insecure permissions, data storage, secure logic, proper platform algorithms, etc. However, in the current mobile application testing scenario, other AppStore does not consider all factors before hosting the applications, which is quite necessary. This study highlights the key terminologies of mobile application testing and quality parameters. Further, demonstrates the actual results that are obtained during the security testing of various applications. Along with this, the first-ever Common Weakness Enumeration (CWE) based classification regarding common artifacts in mobile application testing is provided. The peculiarities discussed with respect to mobile applications and the testing requirements in the context of secure hosting will help the relevant researcher and stakeholders in this field.
{"title":"Effective Security Testing of Mobile Applications for Building Trust in the Digital World","authors":"Kapil Kant Kamal, Padmaja Joshi, A. Bang, Kavita Bhatia","doi":"10.1109/ICOEI56765.2023.10125814","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125814","url":null,"abstract":"In recent years, mobile applications have become increasingly important. These applications differ significantly from desktop and web applications, and being used increasingly in various enterprise domains. Accordingly, this motivates the mobile industries to increase the accessibility of mobile applications and their development across many platforms, including Android and iPhone. This research work discusses the security testing procedure and features of India's first indigenous AppStore “mSeva AppStore”. To ensure the quality of the hosted mobile applications, distinct techniques, and effective testing approaches are required. Before hosting the application on mSeva AppStore regressive testing is performed in all aspects like insecure permissions, data storage, secure logic, proper platform algorithms, etc. However, in the current mobile application testing scenario, other AppStore does not consider all factors before hosting the applications, which is quite necessary. This study highlights the key terminologies of mobile application testing and quality parameters. Further, demonstrates the actual results that are obtained during the security testing of various applications. Along with this, the first-ever Common Weakness Enumeration (CWE) based classification regarding common artifacts in mobile application testing is provided. The peculiarities discussed with respect to mobile applications and the testing requirements in the context of secure hosting will help the relevant researcher and stakeholders in this field.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121624775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-11DOI: 10.1109/ICOEI56765.2023.10125792
P. Pandey, M. Wazid, A. Mishra, N. Mohd., D. P. Singh
Cyber security is used to safeguard computer systems, networks and other digital devices from the damage. Hackers always try to use advance tool to obfuscate their detection and launch a new cyber attack. Therefore, some advance cyber security tools to check the security of the systems are required. In this paper, the details of some of potential cyber security tools and their uses are provided. The information about their functionalities, licensing and online links are given. Moreover, the need of cyber security is explained. Finally, some of the potential research directions related to cyber security are provided.
{"title":"Need of Cyber Security, Tools, Uses and Future Research","authors":"P. Pandey, M. Wazid, A. Mishra, N. Mohd., D. P. Singh","doi":"10.1109/ICOEI56765.2023.10125792","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125792","url":null,"abstract":"Cyber security is used to safeguard computer systems, networks and other digital devices from the damage. Hackers always try to use advance tool to obfuscate their detection and launch a new cyber attack. Therefore, some advance cyber security tools to check the security of the systems are required. In this paper, the details of some of potential cyber security tools and their uses are provided. The information about their functionalities, licensing and online links are given. Moreover, the need of cyber security is explained. Finally, some of the potential research directions related to cyber security are provided.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121819549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The use of digital photographs has increased along with the development of digital technologies. Due to the vast amounts of information it contains, digital photographs need a lot of storage space, as well as bigger transmission bandwidths and longer transmission times. Therefore, on compressing the images all the redundant bits of information present in the image under test are removed while keeping only the essential information needed to reconstruct the image later on. In this study, DWT-SPIHT technique is introduced, which may be used to compress and reconstruct images at various degrees of wavelet decomposition across wavelet families that were initially a subdivision of the MATLAB wavelet family. Simulations have been conducted on Cameraman Image during this work of different resolution at different levels of decomposition and for different types of thresholding techniques to prove that this algorithm works well and provide us with the good reconstruction quality of the image. The simulation results demonstrate that, when compared to the DWT-EZW algorithm, the proposed DWT-SPIHT algorithm performs significantly better in terms of evaluation parameters like peak signal to noise ratio (PSNR), mean square error (MSE), and visual perception at higher compression ratios (CR) and low bit per pixel values (BPP).
{"title":"Comparative Study and Analysis of DWT-SPIHT with DWT-EZW Method for Image Compression","authors":"Dikendra K. Verma, Garima Singh, Saurabh Pargaien, Purushottam Das, Sashank Chaube, Upendra Bhatt","doi":"10.1109/ICOEI56765.2023.10125692","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125692","url":null,"abstract":"The use of digital photographs has increased along with the development of digital technologies. Due to the vast amounts of information it contains, digital photographs need a lot of storage space, as well as bigger transmission bandwidths and longer transmission times. Therefore, on compressing the images all the redundant bits of information present in the image under test are removed while keeping only the essential information needed to reconstruct the image later on. In this study, DWT-SPIHT technique is introduced, which may be used to compress and reconstruct images at various degrees of wavelet decomposition across wavelet families that were initially a subdivision of the MATLAB wavelet family. Simulations have been conducted on Cameraman Image during this work of different resolution at different levels of decomposition and for different types of thresholding techniques to prove that this algorithm works well and provide us with the good reconstruction quality of the image. The simulation results demonstrate that, when compared to the DWT-EZW algorithm, the proposed DWT-SPIHT algorithm performs significantly better in terms of evaluation parameters like peak signal to noise ratio (PSNR), mean square error (MSE), and visual perception at higher compression ratios (CR) and low bit per pixel values (BPP).","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122932001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}