Pub Date : 2018-09-15DOI: 10.1007/978-981-10-8797-4_59
N. Kini, Gautam, Vishwas G. Kini
{"title":"A Parallel Algorithm to Hide an Image in an Image for Secured Steganography","authors":"N. Kini, Gautam, Vishwas G. Kini","doi":"10.1007/978-981-10-8797-4_59","DOIUrl":"https://doi.org/10.1007/978-981-10-8797-4_59","url":null,"abstract":"","PeriodicalId":373876,"journal":{"name":"Integrated Intelligent Computing, Communication and Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124801815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-15DOI: 10.1007/978-981-10-8797-4_25
V. Janani, M. Manikandan
{"title":"A Genetic-Based Distributed Stateless Group Key Management Scheme in Mobile Ad Hoc Networks","authors":"V. Janani, M. Manikandan","doi":"10.1007/978-981-10-8797-4_25","DOIUrl":"https://doi.org/10.1007/978-981-10-8797-4_25","url":null,"abstract":"","PeriodicalId":373876,"journal":{"name":"Integrated Intelligent Computing, Communication and Security","volume":"19 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126242533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-15DOI: 10.1007/978-981-10-8797-4_56
K. Jayasudha, M. Kabadi, B. Chacko
{"title":"Multilayered Model of Soft Tissues for Surgery Simulation","authors":"K. Jayasudha, M. Kabadi, B. Chacko","doi":"10.1007/978-981-10-8797-4_56","DOIUrl":"https://doi.org/10.1007/978-981-10-8797-4_56","url":null,"abstract":"","PeriodicalId":373876,"journal":{"name":"Integrated Intelligent Computing, Communication and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125798948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-15DOI: 10.1007/978-981-10-8797-4_43
A. Wahid, A. Rao, Dipti Goel
{"title":"Server Communication Reduction for GPS-Based Floating Car Data Traffic Congestion Detection Method","authors":"A. Wahid, A. Rao, Dipti Goel","doi":"10.1007/978-981-10-8797-4_43","DOIUrl":"https://doi.org/10.1007/978-981-10-8797-4_43","url":null,"abstract":"","PeriodicalId":373876,"journal":{"name":"Integrated Intelligent Computing, Communication and Security","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115895531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-15DOI: 10.1007/978-981-10-8797-4_57
Sunil S. Harakannanavar, C. Prashanth, Sapna Patil, K. Raja
{"title":"Face Recognition Based on SWT, DCT and LTP","authors":"Sunil S. Harakannanavar, C. Prashanth, Sapna Patil, K. Raja","doi":"10.1007/978-981-10-8797-4_57","DOIUrl":"https://doi.org/10.1007/978-981-10-8797-4_57","url":null,"abstract":"","PeriodicalId":373876,"journal":{"name":"Integrated Intelligent Computing, Communication and Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127085931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-15DOI: 10.1007/978-981-10-8797-4_44
R. Prasad, Anirudh Siripagada, S. Selvaraj, N. Mohankumar
{"title":"Random Seeding LFSR-Based TRNG for Hardware Security Applications","authors":"R. Prasad, Anirudh Siripagada, S. Selvaraj, N. Mohankumar","doi":"10.1007/978-981-10-8797-4_44","DOIUrl":"https://doi.org/10.1007/978-981-10-8797-4_44","url":null,"abstract":"","PeriodicalId":373876,"journal":{"name":"Integrated Intelligent Computing, Communication and Security","volume":"53 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120922301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-15DOI: 10.1007/978-981-10-8797-4_21
H. Vinutha, B. Poornima
{"title":"Analysis of NSL-KDD Dataset Using K-Means and Canopy Clustering Algorithms Based on Distance Metrics","authors":"H. Vinutha, B. Poornima","doi":"10.1007/978-981-10-8797-4_21","DOIUrl":"https://doi.org/10.1007/978-981-10-8797-4_21","url":null,"abstract":"","PeriodicalId":373876,"journal":{"name":"Integrated Intelligent Computing, Communication and Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133518453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-15DOI: 10.1007/978-981-10-8797-4_28
Mamata Rath, Bibudhendu Pati, B. K. Pattanayak
{"title":"Mobile Agent-Based Improved Traffic Control System in VANET","authors":"Mamata Rath, Bibudhendu Pati, B. K. Pattanayak","doi":"10.1007/978-981-10-8797-4_28","DOIUrl":"https://doi.org/10.1007/978-981-10-8797-4_28","url":null,"abstract":"","PeriodicalId":373876,"journal":{"name":"Integrated Intelligent Computing, Communication and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114894065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-15DOI: 10.1007/978-981-10-8797-4_24
N. Mahendran, T. Mekala
{"title":"An Efficient Optimization Technique for Scheduling in Wireless Sensor Networks: A Survey","authors":"N. Mahendran, T. Mekala","doi":"10.1007/978-981-10-8797-4_24","DOIUrl":"https://doi.org/10.1007/978-981-10-8797-4_24","url":null,"abstract":"","PeriodicalId":373876,"journal":{"name":"Integrated Intelligent Computing, Communication and Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132176204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-15DOI: 10.1007/978-981-10-8797-4_65
A. Das, S. Aji
{"title":"A Fast and Efficient Method for Image Splicing Localization Using BM3D Noise Estimation","authors":"A. Das, S. Aji","doi":"10.1007/978-981-10-8797-4_65","DOIUrl":"https://doi.org/10.1007/978-981-10-8797-4_65","url":null,"abstract":"","PeriodicalId":373876,"journal":{"name":"Integrated Intelligent Computing, Communication and Security","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134151180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}