Pub Date : 2017-03-16DOI: 10.1109/ICSCN.2017.8085410
K. Vani
Satellite image processing plays a vital role for research and developments in Astronomy, Remote Sensing, GIS, Agriculture Monitoring, Disaster Management and many other fields of study. Satellite images are recorded in digital forms and then processed by the computers to extract information. Variations in the scene characteristics are represented as variations in brightness on images. A particular part of scene reflecting more energy will appear bright while a different part of the same scene that reflecting less energy will appear black. Digital image consists of discrete picture elements called pixels. Each pixel is a number represented as DN (Digital Number), that depicts the average radiance of relatively small area within a scene.
{"title":"Satellite image processing","authors":"K. Vani","doi":"10.1109/ICSCN.2017.8085410","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085410","url":null,"abstract":"Satellite image processing plays a vital role for research and developments in Astronomy, Remote Sensing, GIS, Agriculture Monitoring, Disaster Management and many other fields of study. Satellite images are recorded in digital forms and then processed by the computers to extract information. Variations in the scene characteristics are represented as variations in brightness on images. A particular part of scene reflecting more energy will appear bright while a different part of the same scene that reflecting less energy will appear black. Digital image consists of discrete picture elements called pixels. Each pixel is a number represented as DN (Digital Number), that depicts the average radiance of relatively small area within a scene.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131701742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-16DOI: 10.1109/ICSCN.2017.8085650
R. Subhashini, K. B. Bagan
The audio watermarking systems are more challenge due to the lack of publicly available reference algorithms. It includes the robustness against acoustic path transmission is only evaluated. So this systems will gives the chance of digital watermarking to be used in many applications where such as e.g., second screen applications, audience measurement, and so on. In this paper introducing a simple audio watermarking algorithm. And then the watermark embedding and detection process will be takesplace. Then the results will gives the high fidelity robust audio watermarking algorithms. Then these algorithms will gives the high robustness and also achieves high capacity against the common signal manipulation. It also gives the flexibility of utilizing the watermarking techniques with different watermarking audio.
{"title":"Robust audio watermarking for monitoring and information embedding","authors":"R. Subhashini, K. B. Bagan","doi":"10.1109/ICSCN.2017.8085650","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085650","url":null,"abstract":"The audio watermarking systems are more challenge due to the lack of publicly available reference algorithms. It includes the robustness against acoustic path transmission is only evaluated. So this systems will gives the chance of digital watermarking to be used in many applications where such as e.g., second screen applications, audience measurement, and so on. In this paper introducing a simple audio watermarking algorithm. And then the watermark embedding and detection process will be takesplace. Then the results will gives the high fidelity robust audio watermarking algorithms. Then these algorithms will gives the high robustness and also achieves high capacity against the common signal manipulation. It also gives the flexibility of utilizing the watermarking techniques with different watermarking audio.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123346195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-16DOI: 10.1109/ICSCN.2017.8085415
C. N. Devi
This paper describes an automatic approach for iris segmentation and recognition with focus on twins. The technique entails localizing and segmenting the iris, followed by iris normalization and obtaining distinctive features. Lastly, iris templates are matched to realize one to one and one to many recognition in twins. Further, effect of various template sizes on the accuracy and memory requirement are studied. To our knowledge, this is the first iris based authentication with special emphasis on twins.
{"title":"Automatic segmentation and recognition of iris images: With special reference to twins","authors":"C. N. Devi","doi":"10.1109/ICSCN.2017.8085415","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085415","url":null,"abstract":"This paper describes an automatic approach for iris segmentation and recognition with focus on twins. The technique entails localizing and segmenting the iris, followed by iris normalization and obtaining distinctive features. Lastly, iris templates are matched to realize one to one and one to many recognition in twins. Further, effect of various template sizes on the accuracy and memory requirement are studied. To our knowledge, this is the first iris based authentication with special emphasis on twins.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127100684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-16DOI: 10.1109/ICSCN.2017.8085416
S. Raghul, T. Subashri, K. Vimal
At large data centers, server load balancing is used to balance the incoming requests among the servers to avoid excessive overloading of any individual server. However the present methods are static and suffer from many drawbacks. Static methods do not offer an even balance of data among servers and require dedicated hardware for load balancing. Hence, dynamic methods are required to enhance the load balance of server. Dynamic method provides load balancing of server inclusion of the dynamic state of traffic on the network. In this paper, the need for dynamic load balancing methods of SDN is discussed and provided with the literature survey of the existing static load balancing schemes.
{"title":"Literature survey on traffic-based server load balancing using SDN and open flow","authors":"S. Raghul, T. Subashri, K. Vimal","doi":"10.1109/ICSCN.2017.8085416","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085416","url":null,"abstract":"At large data centers, server load balancing is used to balance the incoming requests among the servers to avoid excessive overloading of any individual server. However the present methods are static and suffer from many drawbacks. Static methods do not offer an even balance of data among servers and require dedicated hardware for load balancing. Hence, dynamic methods are required to enhance the load balance of server. Dynamic method provides load balancing of server inclusion of the dynamic state of traffic on the network. In this paper, the need for dynamic load balancing methods of SDN is discussed and provided with the literature survey of the existing static load balancing schemes.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122418784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-16DOI: 10.1109/ICSCN.2017.8085675
I. Gogul, V. S. Kumar
Automatic identification and recognition of medicinal plant species in environments such as forests, mountains and dense regions is necessary to know about their existence. In recent years, plant species recognition is carried out based on the shape, geometry and texture of various plant parts such as leaves, stem, flowers etc. Flower based plant species identification systems are widely used. While modern search engines provide methods to visually search for a query image that contains a flower, it lacks in robustness because of the intra-class variation among millions of flower species around the world. Hence in this proposed research work, a Deep learning approach using Convolutional Neural Networks (CNN) is used to recognize flower species with high accuracy. Images of the plant species are acquired using the built-in camera module of a mobile phone. Feature extraction of flower images is performed using a Transfer Learning approach (i.e. extraction of complex features from a pre-trained network). A machine learning classifier such as Logistic Regression or Random Forest is used on top of it to yield a higher accuracy rate. This approach helps in minimizing the hardware requirement needed to perform the computationally intensive task of training a CNN. It is observed that, CNN combined with Transfer Learning approach as feature extractor outperforms all the handcrafted feature extraction methods such as Local Binary Pattern (LBP), Color Channel Statistics, Color Histograms, Haralick Texture, Hu Moments and Zernike Moments. CNN combined with Transfer Learning approach yields impressive Rank-1 accuracies of 73.05%, 93.41% and 90.60% using OverFeat, Inception-v3 and Xception architectures, respectively as Feature Extractors on FLOWERS102 dataset.
{"title":"Flower species recognition system using convolution neural networks and transfer learning","authors":"I. Gogul, V. S. Kumar","doi":"10.1109/ICSCN.2017.8085675","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085675","url":null,"abstract":"Automatic identification and recognition of medicinal plant species in environments such as forests, mountains and dense regions is necessary to know about their existence. In recent years, plant species recognition is carried out based on the shape, geometry and texture of various plant parts such as leaves, stem, flowers etc. Flower based plant species identification systems are widely used. While modern search engines provide methods to visually search for a query image that contains a flower, it lacks in robustness because of the intra-class variation among millions of flower species around the world. Hence in this proposed research work, a Deep learning approach using Convolutional Neural Networks (CNN) is used to recognize flower species with high accuracy. Images of the plant species are acquired using the built-in camera module of a mobile phone. Feature extraction of flower images is performed using a Transfer Learning approach (i.e. extraction of complex features from a pre-trained network). A machine learning classifier such as Logistic Regression or Random Forest is used on top of it to yield a higher accuracy rate. This approach helps in minimizing the hardware requirement needed to perform the computationally intensive task of training a CNN. It is observed that, CNN combined with Transfer Learning approach as feature extractor outperforms all the handcrafted feature extraction methods such as Local Binary Pattern (LBP), Color Channel Statistics, Color Histograms, Haralick Texture, Hu Moments and Zernike Moments. CNN combined with Transfer Learning approach yields impressive Rank-1 accuracies of 73.05%, 93.41% and 90.60% using OverFeat, Inception-v3 and Xception architectures, respectively as Feature Extractors on FLOWERS102 dataset.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124595520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-16DOI: 10.1109/ICSCN.2017.8085420
Ravipati Linita, V. V. Reddy, Avireni Srinivasulu
An integrator circuit is presented in this paper that has used Differntial Difference Current Conveyor Transconductance Amplifier (DDCCTA). It has one DDCCTA and one passive component. It has been realized only with first order low pass response. The operation of the circuit has been observed and enforced at a supply voltage of ± 1.8V (bias current 50pA) using cadence and the model parameters of gpdk 180nm CMOS technology. The worthy of the proposed circuit has been test checked using DDCCTA and further tested for its efficiency on a laboratory breadboard. In this commercially available AD844AN and LM13600 ICs are used. Further, the circuit presented in this paper is impermeable to noise, possessing low voltage and insensitive to temperature.
{"title":"An integrator circuit using differential difference current conveyor transconductance amplifier","authors":"Ravipati Linita, V. V. Reddy, Avireni Srinivasulu","doi":"10.1109/ICSCN.2017.8085420","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085420","url":null,"abstract":"An integrator circuit is presented in this paper that has used Differntial Difference Current Conveyor Transconductance Amplifier (DDCCTA). It has one DDCCTA and one passive component. It has been realized only with first order low pass response. The operation of the circuit has been observed and enforced at a supply voltage of ± 1.8V (bias current 50pA) using cadence and the model parameters of gpdk 180nm CMOS technology. The worthy of the proposed circuit has been test checked using DDCCTA and further tested for its efficiency on a laboratory breadboard. In this commercially available AD844AN and LM13600 ICs are used. Further, the circuit presented in this paper is impermeable to noise, possessing low voltage and insensitive to temperature.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134071992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-16DOI: 10.1109/ICSCN.2017.8085717
B. Rubhini, P. Ranjan
Continuous Condition Monitoring of the machine is importan to improve efficiency of the machine, to avoid unexpected accidents and financial losses. Condition monitoring using audio signal processing is focused in this paper. The sound of the machine carries information about the machine condition. The change in features of audio signal are observed using the Peak Variation Response (PVR) of the Fast Fourier Transform (FFT) of signal. In this paper, the conventional FFT method has been used to prove that, it is sufficient for the detection of abnormalities due to different loading condition of the machine using audio signature. And a study on PVR of Intrinsic Mode Function (IMF) has been carried out to present the cause of variation in the energy and frequency of the oscillations of audio frequency (AF) modulated signals.
{"title":"Machine condition monitoring using audio signature analysis","authors":"B. Rubhini, P. Ranjan","doi":"10.1109/ICSCN.2017.8085717","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085717","url":null,"abstract":"Continuous Condition Monitoring of the machine is importan to improve efficiency of the machine, to avoid unexpected accidents and financial losses. Condition monitoring using audio signal processing is focused in this paper. The sound of the machine carries information about the machine condition. The change in features of audio signal are observed using the Peak Variation Response (PVR) of the Fast Fourier Transform (FFT) of signal. In this paper, the conventional FFT method has been used to prove that, it is sufficient for the detection of abnormalities due to different loading condition of the machine using audio signature. And a study on PVR of Intrinsic Mode Function (IMF) has been carried out to present the cause of variation in the energy and frequency of the oscillations of audio frequency (AF) modulated signals.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122631757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-16DOI: 10.1109/ICSCN.2017.8085645
Gopi Chand Naguboina, K. Anusudha
Reversible logic is the emerging field for research in present era. The aim of this paper is to design and synthesize a Programmable Read Only Memory (PROM) using a reversible decoder which is designed using reversible logic with minimum quantum cost. The PROM is a Programmable Logic device which consists of fixed AND Gates and programmable OR gates array. Fixed AND gates can be termed as a decoder. PROM finds its applications in cell phones, RFID tags, video game consoles, medical devices, computers and other electronic devices. An n input and k output Boolean function f (a1, a2, a3, ….an) (referred as (n, k)) is said to be logically reversible if and only if, the number of inputs are equal to the number of outputs i.e., ‘n’ equals ‘k’ and the input pattern uniquely maps the output pattern. The reversible logic must run both forward and backward as well such that the inputs can also be retrieved from outputs. There are many reversible logic gates in literature like NOT gate, Feynman Gate (CNOT gate), Double Feynman Gate, Peres Gate, TR gate, Seynman Gate and many more. Fan-out and Feed-back are not allowed in Logical Reversibility. To overcome the Fan out limitation, the signals from required output lines are duplicated to desired lines using additional reversible combinational circuits. Reversible Logic owns its applications in various fields which include Quantum Computing, Optical Computing, Nano-technology, Computer Graphics, low power VLSI etc., Reversible logic is gaining its own importance in recent years largely due to its property of low power consumption and low heat dissipation. In this paper, the Programmable Read Only Memory (PROM) using reversible decoder which has less heat dissipation and low power consumption is proposed. The designed circuit is analyzed in terms of quantum cost, garbage outputs and number of gates. The Circuit has been designed and simulated using Xilinx software and implemented on FPGA SPARTAN — 3E.
可逆逻辑是当前新兴的研究领域。本文的目的是设计和合成一种可编程只读存储器(PROM),该可编程只读存储器采用可逆逻辑设计,具有最小的量子成本。PROM是一种可编程逻辑器件,由固定与门和可编程或门阵列组成。固定与门可以称为解码器。PROM在手机、RFID标签、视频游戏机、医疗设备、计算机和其他电子设备中都有应用。一个n个输入和k个输出的布尔函数f (a1, a2, a3, .... An)(称为(n, k))被认为是逻辑可逆的,当且仅当,输入的数量等于输出的数量,即' n '等于' k ',并且输入模式唯一地映射到输出模式。可逆逻辑必须同时向前和向后运行,以便也可以从输出中检索输入。文献中有许多可逆逻辑门,如非门,费曼门(CNOT门),双费曼门,佩雷斯门,TR门,塞恩曼门等等。在逻辑可逆性中不允许扇出和反馈。为了克服扇出限制,使用额外的可逆组合电路将来自所需输出线的信号复制到所需线路。可逆逻辑在量子计算、光学计算、纳米技术、计算机图形学、低功耗VLSI等各个领域都有广泛的应用,近年来,由于其低功耗、低散热的特性,可逆逻辑得到了越来越多的重视。本文提出了一种采用可逆解码器的可编程只读存储器(Programmable Read Only Memory, PROM),具有散热小、功耗低的特点。从量子成本、垃圾输出和门数三个方面对所设计的电路进行了分析。利用Xilinx软件对该电路进行了设计和仿真,并在FPGA SPARTAN - 3E上实现。
{"title":"Design and implementation of programmable read only memory using reversible decoder on FPGA","authors":"Gopi Chand Naguboina, K. Anusudha","doi":"10.1109/ICSCN.2017.8085645","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085645","url":null,"abstract":"Reversible logic is the emerging field for research in present era. The aim of this paper is to design and synthesize a Programmable Read Only Memory (PROM) using a reversible decoder which is designed using reversible logic with minimum quantum cost. The PROM is a Programmable Logic device which consists of fixed AND Gates and programmable OR gates array. Fixed AND gates can be termed as a decoder. PROM finds its applications in cell phones, RFID tags, video game consoles, medical devices, computers and other electronic devices. An n input and k output Boolean function f (a1, a2, a3, ….an) (referred as (n, k)) is said to be logically reversible if and only if, the number of inputs are equal to the number of outputs i.e., ‘n’ equals ‘k’ and the input pattern uniquely maps the output pattern. The reversible logic must run both forward and backward as well such that the inputs can also be retrieved from outputs. There are many reversible logic gates in literature like NOT gate, Feynman Gate (CNOT gate), Double Feynman Gate, Peres Gate, TR gate, Seynman Gate and many more. Fan-out and Feed-back are not allowed in Logical Reversibility. To overcome the Fan out limitation, the signals from required output lines are duplicated to desired lines using additional reversible combinational circuits. Reversible Logic owns its applications in various fields which include Quantum Computing, Optical Computing, Nano-technology, Computer Graphics, low power VLSI etc., Reversible logic is gaining its own importance in recent years largely due to its property of low power consumption and low heat dissipation. In this paper, the Programmable Read Only Memory (PROM) using reversible decoder which has less heat dissipation and low power consumption is proposed. The designed circuit is analyzed in terms of quantum cost, garbage outputs and number of gates. The Circuit has been designed and simulated using Xilinx software and implemented on FPGA SPARTAN — 3E.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115406454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-16DOI: 10.1109/ICSCN.2017.8085417
Jitta Sai Meghana, T. Subashri, K. Vimal
Network security has become a major concern in any industry. Address resolution protocol (ARP) is a basic protocol used by all hosts in a network. When ARP is compromised, it leads to several security attacks. In this survey, we present a deep investigation of existing ARP cache poisoning or ARP spoofing solutions. We first introduce Address resolution protocol and its operation. We then dwell on ARP spoofing, with an emphasis on its impact on network security. Then we provide an overview on existing solutions to detect and mitigate ARP spoofing in both traditional networking and software-defined networking (SDN) platforms. Finally, we compare the techniques discussed and conclude that SDN based solutions are more effective in detecting and eliminating any kind of ARP spoofing attack.
{"title":"A survey on ARP cache poisoning and techniques for detection and mitigation","authors":"Jitta Sai Meghana, T. Subashri, K. Vimal","doi":"10.1109/ICSCN.2017.8085417","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085417","url":null,"abstract":"Network security has become a major concern in any industry. Address resolution protocol (ARP) is a basic protocol used by all hosts in a network. When ARP is compromised, it leads to several security attacks. In this survey, we present a deep investigation of existing ARP cache poisoning or ARP spoofing solutions. We first introduce Address resolution protocol and its operation. We then dwell on ARP spoofing, with an emphasis on its impact on network security. Then we provide an overview on existing solutions to detect and mitigate ARP spoofing in both traditional networking and software-defined networking (SDN) platforms. Finally, we compare the techniques discussed and conclude that SDN based solutions are more effective in detecting and eliminating any kind of ARP spoofing attack.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122478200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-01DOI: 10.1109/ICSCN.2017.8085727
R. Sandeep, Saksham Sharma, P. Bora
A function that outputs a feature vector from the perceptual contents of the input video is called a perceptual video hashing function and the output feature vector that characterizes the perceptual contents of the input video is called the perceptual video hash. This hash must be robust to the manipulations that preserves the perceptual contents of the video and fragile to the modifications that vary the perceptual contents of the video. The wide scale applications of perceptual hash in the world of multimedia, such as video authentication, video copyright protection, and video retrieval, emphasize the importance of this area of research. This work generates a perceptual hash from the video using the 3D-radial projection of the pixels and assesses the differentiating capabilities and the perceptual robustness of the hash generated. This method is the 3D extension of the 2D radial projection based image hashing. In this work, the variance of the luminance values of the projected pixels is calculated for each randomly generated sub-tensor. The variance of all the sub-tensors are averaged along the second dimension and projected onto the discrete cosine transform (DCT) basis. The performance measure of the proposed work is assessed using the receiver operating characteristic (ROC) curves. Simulation results indicate that the performance of the proposed method is satisfactory for both the content-preserving and the content changing attacks.
{"title":"Perceptual video hashing using 3D-radial projection technique","authors":"R. Sandeep, Saksham Sharma, P. Bora","doi":"10.1109/ICSCN.2017.8085727","DOIUrl":"https://doi.org/10.1109/ICSCN.2017.8085727","url":null,"abstract":"A function that outputs a feature vector from the perceptual contents of the input video is called a perceptual video hashing function and the output feature vector that characterizes the perceptual contents of the input video is called the perceptual video hash. This hash must be robust to the manipulations that preserves the perceptual contents of the video and fragile to the modifications that vary the perceptual contents of the video. The wide scale applications of perceptual hash in the world of multimedia, such as video authentication, video copyright protection, and video retrieval, emphasize the importance of this area of research. This work generates a perceptual hash from the video using the 3D-radial projection of the pixels and assesses the differentiating capabilities and the perceptual robustness of the hash generated. This method is the 3D extension of the 2D radial projection based image hashing. In this work, the variance of the luminance values of the projected pixels is calculated for each randomly generated sub-tensor. The variance of all the sub-tensors are averaged along the second dimension and projected onto the discrete cosine transform (DCT) basis. The performance measure of the proposed work is assessed using the receiver operating characteristic (ROC) curves. Simulation results indicate that the performance of the proposed method is satisfactory for both the content-preserving and the content changing attacks.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125855680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}