Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583914
Amruta R. Dumane, N. Narole, P. Wanjari
With the rapid progression of data exchange in electronic world, information security is becoming more important in data transmission and storage. Security became an essential thing during the transmission of confidential information. Cryptographic algorithm is used to scramble the text from one form to another form. This Paper represents the design of Advanced Encryption Standard on soft-core processor. AES is a block cipher algorithm that can be used for both encryption and decryption. AES algorithm protects the data from unauthorized access. Design of AES algorithm on Soft-core processor uses both EDK and SDK tool. Simulation results are tested on Field Programmable Gate Array (FPGA).
{"title":"Design of advanced encryption standard on soft-core processor","authors":"Amruta R. Dumane, N. Narole, P. Wanjari","doi":"10.1109/STARTUP.2016.7583914","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583914","url":null,"abstract":"With the rapid progression of data exchange in electronic world, information security is becoming more important in data transmission and storage. Security became an essential thing during the transmission of confidential information. Cryptographic algorithm is used to scramble the text from one form to another form. This Paper represents the design of Advanced Encryption Standard on soft-core processor. AES is a block cipher algorithm that can be used for both encryption and decryption. AES algorithm protects the data from unauthorized access. Design of AES algorithm on Soft-core processor uses both EDK and SDK tool. Simulation results are tested on Field Programmable Gate Array (FPGA).","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114465291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583944
Anuja V. Golliwar, M. S. Narlawar
A Microstrip patch antenna having an exclusive shape of Butterfly is presented in this paper. Design of an ultra-wide-band (UWB) antenna with reconfigurable band notches are presented. For cognitive radio applications, reconfiguration of Butterfly Shaped band notch antenna is proposed. Butterfly shaped Monopole antenna having dimension 33 mm × 24 mm. The proposed antenna is composed of butterfly shape design with Microstrip fed with UWB performance. In addition, the notched band at 3.5 GHz and 5.6 GHz is identified by etching a pair of circular split ring on patch. Two split-ring resonators (SRR) having different radius are used to notch WIMAX and WLAN application to avoid interference. The proposed antenna design is simulated and results are observed.
{"title":"Multiple controllable band Notch butterfly shaped Monopole UWB antenna for cognitive radio","authors":"Anuja V. Golliwar, M. S. Narlawar","doi":"10.1109/STARTUP.2016.7583944","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583944","url":null,"abstract":"A Microstrip patch antenna having an exclusive shape of Butterfly is presented in this paper. Design of an ultra-wide-band (UWB) antenna with reconfigurable band notches are presented. For cognitive radio applications, reconfiguration of Butterfly Shaped band notch antenna is proposed. Butterfly shaped Monopole antenna having dimension 33 mm × 24 mm. The proposed antenna is composed of butterfly shape design with Microstrip fed with UWB performance. In addition, the notched band at 3.5 GHz and 5.6 GHz is identified by etching a pair of circular split ring on patch. Two split-ring resonators (SRR) having different radius are used to notch WIMAX and WLAN application to avoid interference. The proposed antenna design is simulated and results are observed.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115298420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583966
Pallavi V. Jirapure, Prarthana A. Deshkar
The apparent of internet has lead to the data explosion which results in the emergence of Data mining. Extraction of useful knowledge based content and recognizing the patterns in the dataset are comprehended in the recent decade. Analyzing meaningful data and applying knowledge to various disciplines for monitoring is the important features in agriculture domain. India's economy is agriculture based, where majority of Indian population have agriculture and farming as main occupation. Analysis of large datasets in effective way requires understanding of appropriate techniques in data mining. The focus of this paper is to provide and build agricultural based information system for Customer and Farmer interaction where scalability, reliability and integrity of information can be access through cloud based technology. This paper aims to analyze and use data mining techniques specially Regression analysis to forecast the crop production. The forecasting of respective crops analyzes patterns in knowledge lie information of certain parameters and historical data.
{"title":"Qualitative data analysis using regression method for agricultural data","authors":"Pallavi V. Jirapure, Prarthana A. Deshkar","doi":"10.1109/STARTUP.2016.7583966","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583966","url":null,"abstract":"The apparent of internet has lead to the data explosion which results in the emergence of Data mining. Extraction of useful knowledge based content and recognizing the patterns in the dataset are comprehended in the recent decade. Analyzing meaningful data and applying knowledge to various disciplines for monitoring is the important features in agriculture domain. India's economy is agriculture based, where majority of Indian population have agriculture and farming as main occupation. Analysis of large datasets in effective way requires understanding of appropriate techniques in data mining. The focus of this paper is to provide and build agricultural based information system for Customer and Farmer interaction where scalability, reliability and integrity of information can be access through cloud based technology. This paper aims to analyze and use data mining techniques specially Regression analysis to forecast the crop production. The forecasting of respective crops analyzes patterns in knowledge lie information of certain parameters and historical data.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115356550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583961
P. Ganesan, V. Kalist, B. Sathish
Images received from the satellite contains huge amount of information to process and analyze. So the segmentation is a crucial and important procedure in the analysis of images to gather necessary information from the satellite images. In the proposed approach, the satellite images are segmented using hill climbing local optimization technique and modified k-means clustering algorithm. In this approach, satellite images in RGB color space is converted into CIELAB color space. This color space is intended to approximate vision of human and perceptually uniform. Moreover, the intensity (L) component of this color space exactly matches the human perception of lightness. In the next step, the hill climbing process is applied on the color histogram of CIELAB color space image to obtain the initial cluster centers. In the final step, these cluster centers are given to the k-means clustering algorithm to produce the segmented image as the output. The effectiveness of the proposed approach has been demonstrated by number of experiments. The proposed method is more effective and efficient in the segmentation of satellite images to obtain meaningful clusters as compared to other conventional methods.
{"title":"Histogram based hill climbing optimization for the segmentation of region of interest in satellite images","authors":"P. Ganesan, V. Kalist, B. Sathish","doi":"10.1109/STARTUP.2016.7583961","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583961","url":null,"abstract":"Images received from the satellite contains huge amount of information to process and analyze. So the segmentation is a crucial and important procedure in the analysis of images to gather necessary information from the satellite images. In the proposed approach, the satellite images are segmented using hill climbing local optimization technique and modified k-means clustering algorithm. In this approach, satellite images in RGB color space is converted into CIELAB color space. This color space is intended to approximate vision of human and perceptually uniform. Moreover, the intensity (L) component of this color space exactly matches the human perception of lightness. In the next step, the hill climbing process is applied on the color histogram of CIELAB color space image to obtain the initial cluster centers. In the final step, these cluster centers are given to the k-means clustering algorithm to produce the segmented image as the output. The effectiveness of the proposed approach has been demonstrated by number of experiments. The proposed method is more effective and efficient in the segmentation of satellite images to obtain meaningful clusters as compared to other conventional methods.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128191323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583913
Savio Sebastian, S. Malgaonkar, Paulami Shah, Mudit Kapoor, Tanay Parekhji
This paper presents a technical study review of code obfuscation. To address this, we discuss the need and methods of code obfuscation. We analyze the different techniques which are used to thwart reverse engineers and to protect against malicious code injection and attacks. Obfuscation, in software technology, is the deliberate act of creating an obfuscated code, that is difficult for humans to understand. Code obfuscation is a protective mechanism which is used to reduce the attack activities on a software system. It is a behavior preserving program transformation which aims to make a program unintelligible to automated program comprehension tools. Code obfuscation is convenient in situations where depending on cryptographic techniques is not enough; this is normal in remote execution situations where the software is executed on an unforeseen exposed hostile environment, such as the new computing platforms: cloud-computing paradigm and smart phones.
{"title":"A study & review on code obfuscation","authors":"Savio Sebastian, S. Malgaonkar, Paulami Shah, Mudit Kapoor, Tanay Parekhji","doi":"10.1109/STARTUP.2016.7583913","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583913","url":null,"abstract":"This paper presents a technical study review of code obfuscation. To address this, we discuss the need and methods of code obfuscation. We analyze the different techniques which are used to thwart reverse engineers and to protect against malicious code injection and attacks. Obfuscation, in software technology, is the deliberate act of creating an obfuscated code, that is difficult for humans to understand. Code obfuscation is a protective mechanism which is used to reduce the attack activities on a software system. It is a behavior preserving program transformation which aims to make a program unintelligible to automated program comprehension tools. Code obfuscation is convenient in situations where depending on cryptographic techniques is not enough; this is normal in remote execution situations where the software is executed on an unforeseen exposed hostile environment, such as the new computing platforms: cloud-computing paradigm and smart phones.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126427530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Smart grid doesn't have a single standard definition to define it. Commonly, Smart Grid is an incorporation of advanced technologies over the normal electrical grid. Smart grid provides some novel features that mainly includes two way communication and automatic self-healing capability. Like the Internet, the Smart Grid consists of many new technologies and equipment that are bind together. These technologies works with the electrical grid to respond digitally accordingly to our quickly changing electric demand. Even though it is stuffed with pros, it suffers a lot due to its fragile data security. Smart grid usually have a centralized control system called SCADA to monitor and maintain all the data sources. Attackers would always tend to sneak through this centralized system through numerous types of attacks. Since SCADA system has no definite protocol, it can be fixed into any kind of protocol that is required by the utility. In this paper, the proposed method provides two techniques one to detect and remove sniffers from the network. Another one is to safeguard the SCADA system from the DDoS attack. Promiscuous mode detection and MD-5 algorithm is used to find the sniffers and by analyzing the TTL values, DDoS attack is been identified and isolated. The proposed technique is also compared with a real time existing IDS tool to show its better bandwidth consumption.
{"title":"A novel IDS technique to detect DDoS and sniffers in smart grid","authors":"S. Shitharth, D. Winston","doi":"10.7753/IJSEA0508.1005","DOIUrl":"https://doi.org/10.7753/IJSEA0508.1005","url":null,"abstract":"Smart grid doesn't have a single standard definition to define it. Commonly, Smart Grid is an incorporation of advanced technologies over the normal electrical grid. Smart grid provides some novel features that mainly includes two way communication and automatic self-healing capability. Like the Internet, the Smart Grid consists of many new technologies and equipment that are bind together. These technologies works with the electrical grid to respond digitally accordingly to our quickly changing electric demand. Even though it is stuffed with pros, it suffers a lot due to its fragile data security. Smart grid usually have a centralized control system called SCADA to monitor and maintain all the data sources. Attackers would always tend to sneak through this centralized system through numerous types of attacks. Since SCADA system has no definite protocol, it can be fixed into any kind of protocol that is required by the utility. In this paper, the proposed method provides two techniques one to detect and remove sniffers from the network. Another one is to safeguard the SCADA system from the DDoS attack. Promiscuous mode detection and MD-5 algorithm is used to find the sniffers and by analyzing the TTL values, DDoS attack is been identified and isolated. The proposed technique is also compared with a real time existing IDS tool to show its better bandwidth consumption.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131469853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583948
P. Rajendran, M. Janaki, S. Hemalatha, B. Durkananthini
Internet being an expansive network of computers is unprotected against malicious attacks. Email that travels along this unprotected Internet is eternally exposed to electronic dangers. Businesses are increasingly relying on electronic mail to correspond with clients and colleagues. As more sensitive information is transferred online, the need for email privacy becomes more pressing. Spam mails eat up huge amounts of bandwidths and annoy the receivers. Unsolicited messages are often used to compel the users to reveal their personal information. Spam mails are commonly used to ask for information that can be used by the attackers. Email is a private medium of communication, and the inherent privacy constraints form a major obstacle in developing efficient spam filtering methods which require access to a large amount of email data belonging to multiple users. To alleviate this problem, we foresee a privacy preserving spam filtering system that is adaptive in nature and help the user to compose privacy settings for their emails. We propose a two level framework which filters spam and also determines the best available privacy policy. Spam detection is done by similarity matching scheme using HTML content and the adaptive privacy framework enables the automatic settings for email that are filtered as spam.
{"title":"Adaptive privacy policy prediction for email spam filtering","authors":"P. Rajendran, M. Janaki, S. Hemalatha, B. Durkananthini","doi":"10.1109/STARTUP.2016.7583948","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583948","url":null,"abstract":"Internet being an expansive network of computers is unprotected against malicious attacks. Email that travels along this unprotected Internet is eternally exposed to electronic dangers. Businesses are increasingly relying on electronic mail to correspond with clients and colleagues. As more sensitive information is transferred online, the need for email privacy becomes more pressing. Spam mails eat up huge amounts of bandwidths and annoy the receivers. Unsolicited messages are often used to compel the users to reveal their personal information. Spam mails are commonly used to ask for information that can be used by the attackers. Email is a private medium of communication, and the inherent privacy constraints form a major obstacle in developing efficient spam filtering methods which require access to a large amount of email data belonging to multiple users. To alleviate this problem, we foresee a privacy preserving spam filtering system that is adaptive in nature and help the user to compose privacy settings for their emails. We propose a two level framework which filters spam and also determines the best available privacy policy. Spam detection is done by similarity matching scheme using HTML content and the adaptive privacy framework enables the automatic settings for email that are filtered as spam.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131273819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583973
Pallavi D. Chavanke, Supriya S. Thombre
Increasing sharpness and visual quality of a low resolution image is an important task in a multiview image processing domain. By using super-resolution approach for multiview images in a mixed resolution setup, quality of a low resolution view will be improved. Firstly, registration of an image is done, to find correspondence between the pixels in different view images. High frequency content generated from high resolution reference images is used to refine the target image with the help of depth map. Depth map calculated by stereo matching algorithm. Finally, Super resolution algorithm is used for multiview images with the help of depth map of a reference images.
{"title":"Depth based super-resolution for multiview images","authors":"Pallavi D. Chavanke, Supriya S. Thombre","doi":"10.1109/STARTUP.2016.7583973","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583973","url":null,"abstract":"Increasing sharpness and visual quality of a low resolution image is an important task in a multiview image processing domain. By using super-resolution approach for multiview images in a mixed resolution setup, quality of a low resolution view will be improved. Firstly, registration of an image is done, to find correspondence between the pixels in different view images. High frequency content generated from high resolution reference images is used to refine the target image with the help of depth map. Depth map calculated by stereo matching algorithm. Finally, Super resolution algorithm is used for multiview images with the help of depth map of a reference images.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123114317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583950
D. Poovaradevi, S. Priyadharsini
Many applications require high degree of sensor node to identify their locations in wireless sensor network. Location information is gathered from manual setting or GPS device. Since manual setting requires huge cost of human time, and GPS requires expensive device cost. Both approaches are not applicable for large scale WSN. The mobile anchor node is used to finding the position of unknown location node. The optimal path planning mechanism is evaluated to minimize the time for determining the localization and should increase the accuracy. In proposed system the circle based path planning mechanism can be implemented, because it covers four corners of the sensing field by increasing the diameter of the concentric circles. The sensor node is located at the center of this circle, a single mobile anchor node moves randomly through the sensing field to determine the localization and also detecting the hacker node in WSN.
{"title":"Circle based path planning algorithm for localization using mobile anchor in WSN","authors":"D. Poovaradevi, S. Priyadharsini","doi":"10.1109/STARTUP.2016.7583950","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583950","url":null,"abstract":"Many applications require high degree of sensor node to identify their locations in wireless sensor network. Location information is gathered from manual setting or GPS device. Since manual setting requires huge cost of human time, and GPS requires expensive device cost. Both approaches are not applicable for large scale WSN. The mobile anchor node is used to finding the position of unknown location node. The optimal path planning mechanism is evaluated to minimize the time for determining the localization and should increase the accuracy. In proposed system the circle based path planning mechanism can be implemented, because it covers four corners of the sensing field by increasing the diameter of the concentric circles. The sensor node is located at the center of this circle, a single mobile anchor node moves randomly through the sensing field to determine the localization and also detecting the hacker node in WSN.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131050545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583908
Divesh Agrawal, S. Bodkhe
This paper gives the information about object matching and tracking has found important and wide applications. An object matching and tracking algorithm based on SURF (Speeded-Up Robust Feature) method is presented in this project. In existing system the SIFT (Scale-Invariant Feature Transform) method is used which have some problems like time complexity, feature extraction, occlusion problem. To overcome these problems SURF method will be used in this project. Firstly, feature points are extracted respectively from base image using SURF method. Then, a coarse-to-fine matching method is used to realize the match of SURF feature points. It shows that, compared with the frequently-used normal cross correlation method, the presented algorithm can process more complicated geometric deformations existed between images and gives high matching accuracy as compare to the matching algorithm based on SIFT feature, in the presented algorithm the processing speed is faster than other algorithm and also lower computational burden, which can meet the real-time requirements for object matching and tracking.
{"title":"New improved image registration based tracking system","authors":"Divesh Agrawal, S. Bodkhe","doi":"10.1109/STARTUP.2016.7583908","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583908","url":null,"abstract":"This paper gives the information about object matching and tracking has found important and wide applications. An object matching and tracking algorithm based on SURF (Speeded-Up Robust Feature) method is presented in this project. In existing system the SIFT (Scale-Invariant Feature Transform) method is used which have some problems like time complexity, feature extraction, occlusion problem. To overcome these problems SURF method will be used in this project. Firstly, feature points are extracted respectively from base image using SURF method. Then, a coarse-to-fine matching method is used to realize the match of SURF feature points. It shows that, compared with the frequently-used normal cross correlation method, the presented algorithm can process more complicated geometric deformations existed between images and gives high matching accuracy as compare to the matching algorithm based on SIFT feature, in the presented algorithm the processing speed is faster than other algorithm and also lower computational burden, which can meet the real-time requirements for object matching and tracking.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132510775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}