Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768635
Sandip Desai, C. Gode, P. Fulzele
In the field of pharmaceutical industry, botany and agricultural there is a need of algorithm which will classify the flowers by processing its image. In this context, we propose a flower classification approach based on convolutional neural network. We have applied transfer learning approach for classification of flowers. We have used VGG19 convolution neural network architecture for extraction of features. As we wanted to classify flowers in 17 different classes so we have used 17 neurons in final dense layer of VGG19 convolution neural network architecture with the use of softmax activation function. Results show that we have classified flowers with the validation accuracy of 91.1 % and training accuracy of 100%.
{"title":"Flower Image Classification Using Convolutional Neural Network","authors":"Sandip Desai, C. Gode, P. Fulzele","doi":"10.1109/ICEEICT53079.2022.9768635","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768635","url":null,"abstract":"In the field of pharmaceutical industry, botany and agricultural there is a need of algorithm which will classify the flowers by processing its image. In this context, we propose a flower classification approach based on convolutional neural network. We have applied transfer learning approach for classification of flowers. We have used VGG19 convolution neural network architecture for extraction of features. As we wanted to classify flowers in 17 different classes so we have used 17 neurons in final dense layer of VGG19 convolution neural network architecture with the use of softmax activation function. Results show that we have classified flowers with the validation accuracy of 91.1 % and training accuracy of 100%.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131973083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768535
Namrata Gupta, Alok Naugarhiya
This paper proposed a 1.4kV-class superjunction vertical IGBT (DMG-SJIGBT) with gate workfunction variation along with stepped oxide thickness. Two distinct workfunction materials, P+ and N+ polysilicon are used as gate poly and oxide thickness is varied in x-direction. All the stepped oxide is connected via metal on the top. The proposed structure's gate oxide is narrow at the emitter and wide at the collector to improve the device performance. It has been discovered that the ON-resistance (Ron.A) of the DMG-SJIGBT has been diminished by 23% as a result of this structural modification. Gate engineering improves the transconductivity by increasing the gate-emitter capacitance (CGE) and reducing the gate-collector capacitance (CGC), which lowers switching delay. To improve performance metrics, the gate length has been optimized. A mixed mode module of SILVACO has used to perform capacitance-voltage analysis. Further the gate charge and FOM has also been measured and indicating 36% and 34% respectively reduction for proposed device signifying enhanced performance.
{"title":"Capacitive Analysis of Superjunction Vertical IGBT with Gate Engineering","authors":"Namrata Gupta, Alok Naugarhiya","doi":"10.1109/ICEEICT53079.2022.9768535","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768535","url":null,"abstract":"This paper proposed a 1.4kV-class superjunction vertical IGBT (DMG-SJIGBT) with gate workfunction variation along with stepped oxide thickness. Two distinct workfunction materials, P+ and N+ polysilicon are used as gate poly and oxide thickness is varied in x-direction. All the stepped oxide is connected via metal on the top. The proposed structure's gate oxide is narrow at the emitter and wide at the collector to improve the device performance. It has been discovered that the ON-resistance (Ron.A) of the DMG-SJIGBT has been diminished by 23% as a result of this structural modification. Gate engineering improves the transconductivity by increasing the gate-emitter capacitance (CGE) and reducing the gate-collector capacitance (CGC), which lowers switching delay. To improve performance metrics, the gate length has been optimized. A mixed mode module of SILVACO has used to perform capacitance-voltage analysis. Further the gate charge and FOM has also been measured and indicating 36% and 34% respectively reduction for proposed device signifying enhanced performance.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133219601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768585
Ranjith Kumar Painam, M. Suchetha
In synthetic aperture radar (SAR) images, speckle noise is common, and SAR data is handled coherently. Multiplicative noise is another name for speckle. The purpose of this paper is to compare several approaches for reducing speckle noise. These techniques will be used to demonstrate trends and numerous different approaches that have evolved over the years. The technical aspects of the various adaptive spatial domain filters were discussed in this paper, and they were summarised for use in removing speckle noise from SAR images. ENL, SSI, and SSIM are the performance parameters that have been quantitatively and qualitatively analysed. It indicates that the adaptive filters with varied window sizes can be used to eliminate speckle and that noise suppression is more effective in SAR images. It may be enhanced to incorporate several machine learning techniques to optimise the result in order to improve various performance parameters. The experimental results show that the structural details are better preserved while speckle noise is suppressed.
{"title":"Comparative Performance Analysis of Spatial Domain Filters for Removing Speckle Noise in SAR images","authors":"Ranjith Kumar Painam, M. Suchetha","doi":"10.1109/ICEEICT53079.2022.9768585","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768585","url":null,"abstract":"In synthetic aperture radar (SAR) images, speckle noise is common, and SAR data is handled coherently. Multiplicative noise is another name for speckle. The purpose of this paper is to compare several approaches for reducing speckle noise. These techniques will be used to demonstrate trends and numerous different approaches that have evolved over the years. The technical aspects of the various adaptive spatial domain filters were discussed in this paper, and they were summarised for use in removing speckle noise from SAR images. ENL, SSI, and SSIM are the performance parameters that have been quantitatively and qualitatively analysed. It indicates that the adaptive filters with varied window sizes can be used to eliminate speckle and that noise suppression is more effective in SAR images. It may be enhanced to incorporate several machine learning techniques to optimise the result in order to improve various performance parameters. The experimental results show that the structural details are better preserved while speckle noise is suppressed.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133939918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768565
Ayush Dalara, Dr. Sindhu C, R. Vasanth
Sculpture recognition is one of the most challenging problems in the image classification field due to the high variations in the design of various sculptures. In order to classify the Indian entity's sculpture, we require images from multiple perspectives with different orientations of the structure. This research conducts a comparative study by combining various algorithms for the purpose of sculpture recognition based on their features. The SIFT (Scale Invariant Feature Transform) algorithm was used to find descriptors for the key points detected and it was paired with various classifiers (K-Nearest Neighbors, Support Vector Machine, Artificial Neural Network) by using the “Min key”, “Max key padding”, “Mean key padding”, “Median key padding” and “Mode key padding” approach for efficiency testing purposes. CNNs (Convolutional Neural Networks) were also tested for the same. The models were trained on various representations of different Indian sculptures, gathered from various sources, signifying our cultural diversity. Experiments were carried out on the manually acquired data set that consists of 15 different sculpture classes, where each sculpture class consists of 150 images for training and 20 for testing. An attempt was also made to increase the efficiency of these models by the application of CLAHE (Contrast Limited Adaptive Histogram Equalization). The experiments showed the performance of these models when they were trained on various representations of sculpture images. For 15 different sculpture classes, the maximum accuracy achieved was a respectable 70.66% utilizing the CLAHE along with the CNN model. However, the accuracy values of non-CNN-based approaches were substandard.
{"title":"Entity Recognition in Indian Sculpture using CLAHE and machine learning","authors":"Ayush Dalara, Dr. Sindhu C, R. Vasanth","doi":"10.1109/ICEEICT53079.2022.9768565","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768565","url":null,"abstract":"Sculpture recognition is one of the most challenging problems in the image classification field due to the high variations in the design of various sculptures. In order to classify the Indian entity's sculpture, we require images from multiple perspectives with different orientations of the structure. This research conducts a comparative study by combining various algorithms for the purpose of sculpture recognition based on their features. The SIFT (Scale Invariant Feature Transform) algorithm was used to find descriptors for the key points detected and it was paired with various classifiers (K-Nearest Neighbors, Support Vector Machine, Artificial Neural Network) by using the “Min key”, “Max key padding”, “Mean key padding”, “Median key padding” and “Mode key padding” approach for efficiency testing purposes. CNNs (Convolutional Neural Networks) were also tested for the same. The models were trained on various representations of different Indian sculptures, gathered from various sources, signifying our cultural diversity. Experiments were carried out on the manually acquired data set that consists of 15 different sculpture classes, where each sculpture class consists of 150 images for training and 20 for testing. An attempt was also made to increase the efficiency of these models by the application of CLAHE (Contrast Limited Adaptive Histogram Equalization). The experiments showed the performance of these models when they were trained on various representations of sculpture images. For 15 different sculpture classes, the maximum accuracy achieved was a respectable 70.66% utilizing the CLAHE along with the CNN model. However, the accuracy values of non-CNN-based approaches were substandard.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133396832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768413
P. Rahul Lal, A. Purushothaman
The antenna under study is an extended version of a cylindrical waveguide-based leaky-wave antenna. A cylindrical waveguide is attached to a spherical cavity on one end. The radiating slot in the form of a cylindrical disk is placed at the center of the cavity to achieve the leaky wave characteristics. The combined structure resembles the shape of a mic. The unique characteristics of this shape enable the antenna to radiate in four different directions there by producing a cross-shaped radiation pattern. Novel design exploits the advantages offered by the material body through analysis to maximize the antenna features such as gain, return loss and polarization. The antenna presented in the current literature operates at 90GHz with a moderate gain of 8.7dB in the downward direction, 4.9dB in the upward direction and 3.45dB towards the sides.
{"title":"Design of a Leaky Wave Multi-Beam Antenna with a Cross Shaped Pattern","authors":"P. Rahul Lal, A. Purushothaman","doi":"10.1109/ICEEICT53079.2022.9768413","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768413","url":null,"abstract":"The antenna under study is an extended version of a cylindrical waveguide-based leaky-wave antenna. A cylindrical waveguide is attached to a spherical cavity on one end. The radiating slot in the form of a cylindrical disk is placed at the center of the cavity to achieve the leaky wave characteristics. The combined structure resembles the shape of a mic. The unique characteristics of this shape enable the antenna to radiate in four different directions there by producing a cross-shaped radiation pattern. Novel design exploits the advantages offered by the material body through analysis to maximize the antenna features such as gain, return loss and polarization. The antenna presented in the current literature operates at 90GHz with a moderate gain of 8.7dB in the downward direction, 4.9dB in the upward direction and 3.45dB towards the sides.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117147488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768558
Shridevi Soma, Nischita Waddenkery
Intelligent Video surveillance is one of the most emerging technologies in Computer vision, used for object detection and locating within the video or image. Majority of the research are carried on the Yolo algorithm on vehicle tracking, monitoring vehicles, and medical science. The main objective of this paper is to develop an optimal solution to detect, locate multiple objects such as person and vehicles in a single frame using Kitti dataset. Usually the kitti data set focuses on foreground vehicle detection; in the proposed algorithm it detects person, vehicle and also the background objects. The output obtained for every image includes the information of object such as probability, classification of the object, bonding box, object center (x, y coordinates), height, width using Non-Maximum Suppression (NMS) algorithm. The Kitti dataset of 350 images is used and it is observed that classification rate is 80% at 0.3 confidence threshold value over bounding boxes pixel area for vehicle and person detection. This work can be further carried out in detecting and tracking of objects at different weather conditions like rainy, winter and also during night.
{"title":"Machine-Learning Object Detection and Recognition for Surveillance System using YoloV3","authors":"Shridevi Soma, Nischita Waddenkery","doi":"10.1109/ICEEICT53079.2022.9768558","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768558","url":null,"abstract":"Intelligent Video surveillance is one of the most emerging technologies in Computer vision, used for object detection and locating within the video or image. Majority of the research are carried on the Yolo algorithm on vehicle tracking, monitoring vehicles, and medical science. The main objective of this paper is to develop an optimal solution to detect, locate multiple objects such as person and vehicles in a single frame using Kitti dataset. Usually the kitti data set focuses on foreground vehicle detection; in the proposed algorithm it detects person, vehicle and also the background objects. The output obtained for every image includes the information of object such as probability, classification of the object, bonding box, object center (x, y coordinates), height, width using Non-Maximum Suppression (NMS) algorithm. The Kitti dataset of 350 images is used and it is observed that classification rate is 80% at 0.3 confidence threshold value over bounding boxes pixel area for vehicle and person detection. This work can be further carried out in detecting and tracking of objects at different weather conditions like rainy, winter and also during night.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116925758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768655
Palanisamy A M, N. V
Data integrity is one of the most important issues in information management systems. Periodic database auditing is the only way to ensure data integrity. Blockchain is a technology that supports and employs a variety of cryptographic models. Initially, the Blockchain technology was developed as a methodology to record cryptocurrency transactions (bitcoin technology). Additionally, blockchain has the potential to transform the current data auditing practices in a decentralized manner. In this paper, we make an attempt to review the application of blockchain in an enterprise information management system and explore closely on how to incorporate blockchain technology in CampusStack, an integrated information management system, to audit the database for ensuring data integrity.
{"title":"A Novel Methodology to Ensure Data Integrity in Enterprise Information Systems Using Blockchain Technology","authors":"Palanisamy A M, N. V","doi":"10.1109/ICEEICT53079.2022.9768655","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768655","url":null,"abstract":"Data integrity is one of the most important issues in information management systems. Periodic database auditing is the only way to ensure data integrity. Blockchain is a technology that supports and employs a variety of cryptographic models. Initially, the Blockchain technology was developed as a methodology to record cryptocurrency transactions (bitcoin technology). Additionally, blockchain has the potential to transform the current data auditing practices in a decentralized manner. In this paper, we make an attempt to review the application of blockchain in an enterprise information management system and explore closely on how to incorporate blockchain technology in CampusStack, an integrated information management system, to audit the database for ensuring data integrity.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114959553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768445
Jasleen Chhabra, Nemi Chand Barwar
With the increase in the amount of traffic on the roads, it has become essential to provide safety to drivers, passengers, and pedestrians, which can be done through the development of effective routing protocols for vehicular ad-hoc networks. In this paper, the performance of VANET routing protocols namely GPSR, MM-GPSR, and PA-GPSR has been analyzed under Dense urban and Highway scenarios and by varying the through traffic factor in Jodhpur city using Simulation of Urban Mobility(SUMO) and Network Simulator-version 3(NS-3). Various performance metrics such as the packet loss rate, the average end-to-end delay, and throughput are considered to evaluate the performance of these protocols. This study on GPSR-based routing protocols can be beneficial for society as it can be used in healthcare applications where optimum routing paths can be adopted in emergency situations to provide fast services to the patients by the ambulance in a real-time environment.
{"title":"Evaluation of GPSR-based routing protocols in Vehicular ad-hoc network: A case study of Jodhpur city","authors":"Jasleen Chhabra, Nemi Chand Barwar","doi":"10.1109/ICEEICT53079.2022.9768445","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768445","url":null,"abstract":"With the increase in the amount of traffic on the roads, it has become essential to provide safety to drivers, passengers, and pedestrians, which can be done through the development of effective routing protocols for vehicular ad-hoc networks. In this paper, the performance of VANET routing protocols namely GPSR, MM-GPSR, and PA-GPSR has been analyzed under Dense urban and Highway scenarios and by varying the through traffic factor in Jodhpur city using Simulation of Urban Mobility(SUMO) and Network Simulator-version 3(NS-3). Various performance metrics such as the packet loss rate, the average end-to-end delay, and throughput are considered to evaluate the performance of these protocols. This study on GPSR-based routing protocols can be beneficial for society as it can be used in healthcare applications where optimum routing paths can be adopted in emergency situations to provide fast services to the patients by the ambulance in a real-time environment.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114891836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768548
Anu Babu, S. Jerome
Breast cancer is the most treacherous tumour among women and its early detection enhances the chances of survival of the patient. Screening mammography improves a physician's ability to detect even small tumours which cannot be felt physically by the patient. Mammographic image noises influence the diagnostic images which can affect the diagnostic process. Hence it is indispensable to filter out the noises by preserving important features of the image. This paper investigates and identifies the most appropriate denoising filter and enhancement technique among mean, median, adaptive median, gaussian, wiener, contrast stretching, histogram equalization and Contrast Limited Adaptive Histogram Equalization (CLAHE). The matrices used to analyse the performance is Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR) and Structural Similarity Index Metric (SSIM). From experimental results and analysis, it is proved that adaptive median filter and histogram equalization techniques are efficacious in removing noise and thereby enhancing the calibre of the image.
{"title":"Mammogram Image Grade Gauging of Denoising Filters & Enhancement Methods","authors":"Anu Babu, S. Jerome","doi":"10.1109/ICEEICT53079.2022.9768548","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768548","url":null,"abstract":"Breast cancer is the most treacherous tumour among women and its early detection enhances the chances of survival of the patient. Screening mammography improves a physician's ability to detect even small tumours which cannot be felt physically by the patient. Mammographic image noises influence the diagnostic images which can affect the diagnostic process. Hence it is indispensable to filter out the noises by preserving important features of the image. This paper investigates and identifies the most appropriate denoising filter and enhancement technique among mean, median, adaptive median, gaussian, wiener, contrast stretching, histogram equalization and Contrast Limited Adaptive Histogram Equalization (CLAHE). The matrices used to analyse the performance is Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR) and Structural Similarity Index Metric (SSIM). From experimental results and analysis, it is proved that adaptive median filter and histogram equalization techniques are efficacious in removing noise and thereby enhancing the calibre of the image.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115992625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768562
M. Sankari, L. Sathyapriya, B. Barathi
Basically, people can be capturing images and outsourced to the mobile cloud. Privacy of image is the major challenge to be facing now-a-days. Encryption is one of the greatest solutions to security. While outsourced the image data to the cloud, Cloud Service Provider (CSP) could be possible to share the image to the unauthorized users for their profit. And the past encryption techniques such as AES, DES, RSA are unsuitable to image than text. Due to the lacking of CSP and past encryption techniques, we propose the encryption technique called iPrivacy-Pseudo Random Permutation (PRP) based Encryption, which is applied to the image to ensure security/privacy. The proposed scheme(iPrivacy-SDS) handled by three simple steps such as Split, Distribute and Scramble to attain secure and fast execution. The proposed work may prevent users from accessing of private images. The experimental results show that the time consumption is efficient and around 50% reduction while compared to AES and compared with various image formats such as JPEG, BMP, GIFF and PNG.
基本上,人们可以捕捉图像并将其外包给移动云。图像隐私是当今面临的主要挑战。加密是最好的安全解决方案之一。在将图像数据外包给云计算的同时,云服务提供商(CSP)可能会将图像共享给未经授权的用户以获取利润。而以往的AES、DES、RSA等加密技术对图像的加密比对文本的加密效果差。由于缺乏CSP和以往的加密技术,我们提出了基于iPrivacy-Pseudo Random Permutation (PRP)的加密技术,并将其应用于图像以确保安全/隐私。所提出的方案(iPrivacy-SDS)通过拆分、分发和Scramble三个简单的步骤来处理,以实现安全快速的执行。建议的工作可能会阻止用户访问私人图像。实验结果表明,与AES和JPEG、BMP、GIFF、PNG等多种图像格式相比,该算法的时间消耗降低了50%左右。
{"title":"Proposed iPrivacy based Image Encryption in Mobile cloud","authors":"M. Sankari, L. Sathyapriya, B. Barathi","doi":"10.1109/ICEEICT53079.2022.9768562","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768562","url":null,"abstract":"Basically, people can be capturing images and outsourced to the mobile cloud. Privacy of image is the major challenge to be facing now-a-days. Encryption is one of the greatest solutions to security. While outsourced the image data to the cloud, Cloud Service Provider (CSP) could be possible to share the image to the unauthorized users for their profit. And the past encryption techniques such as AES, DES, RSA are unsuitable to image than text. Due to the lacking of CSP and past encryption techniques, we propose the encryption technique called iPrivacy-Pseudo Random Permutation (PRP) based Encryption, which is applied to the image to ensure security/privacy. The proposed scheme(iPrivacy-SDS) handled by three simple steps such as Split, Distribute and Scramble to attain secure and fast execution. The proposed work may prevent users from accessing of private images. The experimental results show that the time consumption is efficient and around 50% reduction while compared to AES and compared with various image formats such as JPEG, BMP, GIFF and PNG.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123625893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}