Pub Date : 2015-09-10DOI: 10.1109/EESCO.2015.7253960
Robert T. R. Shoniwa, Geogen George
Nowadays, malware is being deployed onto victim systems in an increasingly diverse number of ways. One of these methods involves the passive propagation of malware by embedding in JPEG images which goes on to highlight that even simple images can be manipulated maliciously by criminals. The aim of this paper is comprised of two main aspects. The first involves the development of an embedding module which exploits this vulnerability as a proof-of-concept. Its primary purpose will be the pipelining of a Remote Access Trojan into an image file through steganography and obfuscation of the payload. The second aspect will involve developing a corresponding steganalysis tool to scan, detect and notify the user of the presence of a malicious program in either one or a set of selected images. It will also give a brief summarized analysis of the detected payload. Ultimately, this will act as a proof-of-concept highlighting the need to consider images as a potential attack vector and then also offer a corresponding solution to this problem.
{"title":"Scanning tool for the detection of images embedded with malicious programs","authors":"Robert T. R. Shoniwa, Geogen George","doi":"10.1109/EESCO.2015.7253960","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253960","url":null,"abstract":"Nowadays, malware is being deployed onto victim systems in an increasingly diverse number of ways. One of these methods involves the passive propagation of malware by embedding in JPEG images which goes on to highlight that even simple images can be manipulated maliciously by criminals. The aim of this paper is comprised of two main aspects. The first involves the development of an embedding module which exploits this vulnerability as a proof-of-concept. Its primary purpose will be the pipelining of a Remote Access Trojan into an image file through steganography and obfuscation of the payload. The second aspect will involve developing a corresponding steganalysis tool to scan, detect and notify the user of the presence of a malicious program in either one or a set of selected images. It will also give a brief summarized analysis of the detected payload. Ultimately, this will act as a proof-of-concept highlighting the need to consider images as a potential attack vector and then also offer a corresponding solution to this problem.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115566578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-10DOI: 10.1109/EESCO.2015.7254045
N. P. Kumar, J. Shree, K. Vanithamani
Monocrystalline solar cells are the oldest, most efficient and dependable ways to produce electricity from the Sun, and these cells are temperature sensitive. This paper studies the relatively new method of cooling Monocrystalline solar cell with the arrangement of Thermoelectric cooler (TEC) at the back of the solar cell. The objective of thermoelectric cooler and cold plate arrangement is to maintain the operating temperature of solar cell. The experimental results are quite significant and efficiency enhancement is observed. The steady state thermal analysis of the model is done in ANSYS Fluent 6.3.26
{"title":"Experimental investigation and analysis on solar cell efficiency with thermoelectric cooler","authors":"N. P. Kumar, J. Shree, K. Vanithamani","doi":"10.1109/EESCO.2015.7254045","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7254045","url":null,"abstract":"Monocrystalline solar cells are the oldest, most efficient and dependable ways to produce electricity from the Sun, and these cells are temperature sensitive. This paper studies the relatively new method of cooling Monocrystalline solar cell with the arrangement of Thermoelectric cooler (TEC) at the back of the solar cell. The objective of thermoelectric cooler and cold plate arrangement is to maintain the operating temperature of solar cell. The experimental results are quite significant and efficiency enhancement is observed. The steady state thermal analysis of the model is done in ANSYS Fluent 6.3.26","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123493756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-10DOI: 10.1109/EESCO.2015.7253695
V. S. Kumar, S. Anuradha
The Filter Bank Multicarrier (FBMC) modulation scheme has recently seen renewed interest and is being considered as a viable alternative to orthogonal frequency division multiplexing (OFDM). FBMC however suffers from the same high peak-to-average power ratio (PAPR) drawback as OFDM systems. Conventional OFDM PAPR reduction techniques cannot be directly applied to FBMC due to the overlapping nature of FBMC symbols. A novel technique is proposed to limit the peak factor of a multicarrier signal based on Sliding Window Tone Reservation. The peak-reducing signal is forced to have the constraints of SW-TR, so that when added to the original signal, the peak factor is reduced without increasing the BER and the out-of-band radiation. The proposed method has low computational complexity requirements and is fastconverging. Simulation results show that, the proposed technique outperforms a conventional FBMC SW-TR method by 1.6 dB in PAPR reduction at a clip probability of 10−3 on the 2nd iteration.
{"title":"Sliding Window Tone Reservation using smart gradient projection method for PAPR reduction of FBMC signals","authors":"V. S. Kumar, S. Anuradha","doi":"10.1109/EESCO.2015.7253695","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253695","url":null,"abstract":"The Filter Bank Multicarrier (FBMC) modulation scheme has recently seen renewed interest and is being considered as a viable alternative to orthogonal frequency division multiplexing (OFDM). FBMC however suffers from the same high peak-to-average power ratio (PAPR) drawback as OFDM systems. Conventional OFDM PAPR reduction techniques cannot be directly applied to FBMC due to the overlapping nature of FBMC symbols. A novel technique is proposed to limit the peak factor of a multicarrier signal based on Sliding Window Tone Reservation. The peak-reducing signal is forced to have the constraints of SW-TR, so that when added to the original signal, the peak factor is reduced without increasing the BER and the out-of-band radiation. The proposed method has low computational complexity requirements and is fastconverging. Simulation results show that, the proposed technique outperforms a conventional FBMC SW-TR method by 1.6 dB in PAPR reduction at a clip probability of 10−3 on the 2nd iteration.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121858852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-10DOI: 10.1109/EESCO.2015.7253971
Sonali Lagnajita, Srinivas Ramavath
Spatial modulation (SM), which uses the spatial dimension to transmit information and removes ICI completely between transmit antennas, is a promising transmission schemes that has been proposed for multi input multi output systems. In this paper a novel scheme called “precoded STBC for Spatial modulation” is proposed, which accumulates the benefits of both the schemes by eradicating its drawbacks. In this proposed scheme DFT codebook based precoding technique is used which intensively decrease the pair wise error probability of STBC code with improving system performance. Hence the combination of precoding STBC with SM employs the transmission of data on antenna indices with high spectral efficiency and with low probability of error by exploiting CSI at transmitter side. The simulation result justifies our theoretical analysis and demonstrates the performance advantages of the proposed precoded STBC-SM over STBC, Precoded STBC and STBC-SM.
{"title":"Precoded space time block code for spatial modulation","authors":"Sonali Lagnajita, Srinivas Ramavath","doi":"10.1109/EESCO.2015.7253971","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253971","url":null,"abstract":"Spatial modulation (SM), which uses the spatial dimension to transmit information and removes ICI completely between transmit antennas, is a promising transmission schemes that has been proposed for multi input multi output systems. In this paper a novel scheme called “precoded STBC for Spatial modulation” is proposed, which accumulates the benefits of both the schemes by eradicating its drawbacks. In this proposed scheme DFT codebook based precoding technique is used which intensively decrease the pair wise error probability of STBC code with improving system performance. Hence the combination of precoding STBC with SM employs the transmission of data on antenna indices with high spectral efficiency and with low probability of error by exploiting CSI at transmitter side. The simulation result justifies our theoretical analysis and demonstrates the performance advantages of the proposed precoded STBC-SM over STBC, Precoded STBC and STBC-SM.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131199292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-10DOI: 10.1109/EESCO.2015.7253642
R. Raja, T. S. Sinha, R. P. Dubey
This paper presents the biometrical authentication process of any subject from side-view of human-face. Relevant geometric features of the human-face have been extracted using genetic-algorithm and connected component method from side-view of the human-face image. The present paper incorporates the frontal face images only for the formation of corpus. But for the biometrical authentication, side-view of the face has been analysed and connected component of face are calculated using neuro-genetic approach. Neuro-genetic means the combination of artificial neural network and genetic algorithm. The work has been carried out in two phases. In the first phase, formation of the FACE_MODEL as a corpus and calculation of connected component using frontal face images of the different subjects have been done. In the second phase, the model or the corpus has been used at the back-end for biometrical authentication using a proposed algorithm called NGBABA (Neuro-Genetic based Approach for Biometrical Authentication) and number of connected component of face is calculated using NGBBFSA (Neuro-Genetic Based Breadth First Search Algorithms). The authentication process has been carried out with the help of an unknown zero-degree (parallel to x-axis) oriented image. Hence relevant geometrical features and connected component with reducing orientation in image from ninety-degree to lower degree with 10-degree change have been matched with the corpus. The classification process of acceptance and rejection has been done after best-fit matching. The proposed algorithm has been tested with 10 subjects of varying age groups. The result has been found very satisfactory with the data sets.
{"title":"Neuro-Genetic and CCM based biometrical authentication through side-view of human-face","authors":"R. Raja, T. S. Sinha, R. P. Dubey","doi":"10.1109/EESCO.2015.7253642","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253642","url":null,"abstract":"This paper presents the biometrical authentication process of any subject from side-view of human-face. Relevant geometric features of the human-face have been extracted using genetic-algorithm and connected component method from side-view of the human-face image. The present paper incorporates the frontal face images only for the formation of corpus. But for the biometrical authentication, side-view of the face has been analysed and connected component of face are calculated using neuro-genetic approach. Neuro-genetic means the combination of artificial neural network and genetic algorithm. The work has been carried out in two phases. In the first phase, formation of the FACE_MODEL as a corpus and calculation of connected component using frontal face images of the different subjects have been done. In the second phase, the model or the corpus has been used at the back-end for biometrical authentication using a proposed algorithm called NGBABA (Neuro-Genetic based Approach for Biometrical Authentication) and number of connected component of face is calculated using NGBBFSA (Neuro-Genetic Based Breadth First Search Algorithms). The authentication process has been carried out with the help of an unknown zero-degree (parallel to x-axis) oriented image. Hence relevant geometrical features and connected component with reducing orientation in image from ninety-degree to lower degree with 10-degree change have been matched with the corpus. The classification process of acceptance and rejection has been done after best-fit matching. The proposed algorithm has been tested with 10 subjects of varying age groups. The result has been found very satisfactory with the data sets.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114787997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-10DOI: 10.1109/EESCO.2015.7253863
R. Tiwari, G. Verma
Today's automatic visual surveillance is prime need for security and this paper presents first step in the direction of automatic visual gun detection. The objective of our paper is to develop a framework for visual gun detection for automatic surveillance. The proposed framework exploits the color based segmentation to eliminate unrelated object from an image using K-mean clustering algorithm. Speeded up robust features (SURF) interest point detector is used to locate the object (gun) in the segmented images. Our framework is robust enough in terms of scale, rotation, affine and occlusion. We have implemented and tested the system over sample images of gun, collected by us. We got promising performance of our system to detect a gun. Further, our system performs very well under different appearance of images. Thus our system is rotation, scale and shape invariant.
{"title":"A computer vision based framework for visual gun detection using SURF","authors":"R. Tiwari, G. Verma","doi":"10.1109/EESCO.2015.7253863","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253863","url":null,"abstract":"Today's automatic visual surveillance is prime need for security and this paper presents first step in the direction of automatic visual gun detection. The objective of our paper is to develop a framework for visual gun detection for automatic surveillance. The proposed framework exploits the color based segmentation to eliminate unrelated object from an image using K-mean clustering algorithm. Speeded up robust features (SURF) interest point detector is used to locate the object (gun) in the segmented images. Our framework is robust enough in terms of scale, rotation, affine and occlusion. We have implemented and tested the system over sample images of gun, collected by us. We got promising performance of our system to detect a gun. Further, our system performs very well under different appearance of images. Thus our system is rotation, scale and shape invariant.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128130671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-10DOI: 10.1109/EESCO.2015.7253908
D. Dobariya, P. Upadhyay
The shunt active power filters (SAPFs) and hybrid active power filter (HAPF) is used for practical solution to solve the electric power quality, (EPQ) issues. The emerging power-electronic devices and the new developments in digital signal processing (DSP), have made possible its practical use. The active power filters can compensate the nonlinear load current of electrical systems: harmonics, reactive power, imbalances, etc. In this paper simulation and comparison between shunt active power filter and hybrid combination of shunt active power filter and shunt passive power filter is presented. FFT (Fast Fourier Transform) analysis and waveforms are presented for both filters. The superior performance of hybrid active power filter is also presented.
{"title":"Simulation and comparison between hybrid active power filter and shunt active power filter","authors":"D. Dobariya, P. Upadhyay","doi":"10.1109/EESCO.2015.7253908","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253908","url":null,"abstract":"The shunt active power filters (SAPFs) and hybrid active power filter (HAPF) is used for practical solution to solve the electric power quality, (EPQ) issues. The emerging power-electronic devices and the new developments in digital signal processing (DSP), have made possible its practical use. The active power filters can compensate the nonlinear load current of electrical systems: harmonics, reactive power, imbalances, etc. In this paper simulation and comparison between shunt active power filter and hybrid combination of shunt active power filter and shunt passive power filter is presented. FFT (Fast Fourier Transform) analysis and waveforms are presented for both filters. The superior performance of hybrid active power filter is also presented.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126234037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-10DOI: 10.1109/EESCO.2015.7253638
Naman S. Khandelwal, Pariza Kamboj
Impersonation is the obvious security risk in an undefended distributed network. An adversary pretends to be a client and can have illicit access to the server. To counter this threat, user authentication is used which is treated as the first line of defense in a networked environment. The most popular and widely used authentication protocol is Kerberos. Kerberos is the de facto standard, used to authenticate users mutually by the use of trusted third party. But this strong protocol is vulnerable to various security attacks. This paper gives an overview of Kerberos protocol and its existing security problems. To enhance security and combat security attacks, it also describes a novel approach of incorporating the features of Visual Cryptography and Digital Envelope into Kerberos. Using Visual cryptography, we have added one more layer of security by considering a secret share as one of the factor of providing mutual authentication. While the session key is securely distributed by using the concept of Digital envelope in which user's private key is considered as another factor of authentication. Thus, our proposed scheme makes the Kerberos protocol highly robust, secure and efficient.
{"title":"Two factor authentication using Visual Cryptography and Digital Envelope in Kerberos","authors":"Naman S. Khandelwal, Pariza Kamboj","doi":"10.1109/EESCO.2015.7253638","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253638","url":null,"abstract":"Impersonation is the obvious security risk in an undefended distributed network. An adversary pretends to be a client and can have illicit access to the server. To counter this threat, user authentication is used which is treated as the first line of defense in a networked environment. The most popular and widely used authentication protocol is Kerberos. Kerberos is the de facto standard, used to authenticate users mutually by the use of trusted third party. But this strong protocol is vulnerable to various security attacks. This paper gives an overview of Kerberos protocol and its existing security problems. To enhance security and combat security attacks, it also describes a novel approach of incorporating the features of Visual Cryptography and Digital Envelope into Kerberos. Using Visual cryptography, we have added one more layer of security by considering a secret share as one of the factor of providing mutual authentication. While the session key is securely distributed by using the concept of Digital envelope in which user's private key is considered as another factor of authentication. Thus, our proposed scheme makes the Kerberos protocol highly robust, secure and efficient.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122278271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In modern power systems, the increase of renewable energy generation is a big challenge to the power system stability. The novel stabilizer based on the superconducting magnetic energy storage (SMES) is a promising method for stability enhancement of power system. In the application of SMES, the controller is a key component which determines the capability of SMES. This paper proposes a new controller for SMES to enhance both the damping and the transient stability of power system. The proposed controller utilizes different laws in the different stage of power system transients after a large disturbance. The simulation results show that the system with the proposed controller has smaller states deviation than using the damping controller and less oscillation decay time than using the transient controller when a three-phase-fault happens in the transmission line. Meanwhile, the proposed controller maintains the high damping ratio of the system in steady state.
{"title":"A transients segmentation based control for SMES to enhance power system stability","authors":"Xiaohan Shi, Shaorong Wang, A. Waqar, Wenxuan Wu, Jianzhao Guo, Yiyong Zhu","doi":"10.1109/EESCO.2015.7253961","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7253961","url":null,"abstract":"In modern power systems, the increase of renewable energy generation is a big challenge to the power system stability. The novel stabilizer based on the superconducting magnetic energy storage (SMES) is a promising method for stability enhancement of power system. In the application of SMES, the controller is a key component which determines the capability of SMES. This paper proposes a new controller for SMES to enhance both the damping and the transient stability of power system. The proposed controller utilizes different laws in the different stage of power system transients after a large disturbance. The simulation results show that the system with the proposed controller has smaller states deviation than using the damping controller and less oscillation decay time than using the transient controller when a three-phase-fault happens in the transmission line. Meanwhile, the proposed controller maintains the high damping ratio of the system in steady state.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117078361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-10DOI: 10.1109/EESCO.2015.7254044
A. Shah, R. Gulati
Growing concerns amongst the competitors for maintaining the privacy of their customer's information has increased in recent years. Multiple parties desire to collaborate to conduct data mining without breaching privacy of each contributing party. Organizations, both public and private, publish sensitive micro data for research and/or trend analysis. The main confront for developing a secured framework is a consideration for privacy as well as efficiency and complications amongst the collaborating parties for generating standardization. The paper surveys various techniques applied for Privacy Preserving Collaborative Data Mining and summarizes the demerits of the same.
{"title":"Contemporary trends in privacy preserving collaborative data mining- A survey","authors":"A. Shah, R. Gulati","doi":"10.1109/EESCO.2015.7254044","DOIUrl":"https://doi.org/10.1109/EESCO.2015.7254044","url":null,"abstract":"Growing concerns amongst the competitors for maintaining the privacy of their customer's information has increased in recent years. Multiple parties desire to collaborate to conduct data mining without breaching privacy of each contributing party. Organizations, both public and private, publish sensitive micro data for research and/or trend analysis. The main confront for developing a secured framework is a consideration for privacy as well as efficiency and complications amongst the collaborating parties for generating standardization. The paper surveys various techniques applied for Privacy Preserving Collaborative Data Mining and summarizes the demerits of the same.","PeriodicalId":305584,"journal":{"name":"2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115619160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}