Pub Date : 2011-11-30DOI: 10.5121/IJCSES.2011.2406
Saurabh Upadhyay, S. Singh
With the innovations and development in sophisticated video editing technology and a wide spread of video information and services in our society, it is becoming increasingly significant to assure the trustworthiness of video information. Therefore in surveillance, medical and various other fields, video contents must be protected against attempt to manipulate them. Such malicious alterations could affect the decisions based on these videos. A lot of techniques are proposed by various researchers in the literature that assure the authenticity of video information in their own way. In this paper we present a brief survey on video authentication techniques with their classification. These authentication techniques are broadly classified into four categories: digital signature based techniques, watermark based techniques, intelligent techniques and other techniques. Furthermore we give the shortcomings of different categories of video authentication techniques in brief.
{"title":"Video Authentication- An Overview","authors":"Saurabh Upadhyay, S. Singh","doi":"10.5121/IJCSES.2011.2406","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2406","url":null,"abstract":"With the innovations and development in sophisticated video editing technology and a wide spread of video information and services in our society, it is becoming increasingly significant to assure the trustworthiness of video information. Therefore in surveillance, medical and various other fields, video contents must be protected against attempt to manipulate them. Such malicious alterations could affect the decisions based on these videos. A lot of techniques are proposed by various researchers in the literature that assure the authenticity of video information in their own way. In this paper we present a brief survey on video authentication techniques with their classification. These authentication techniques are broadly classified into four categories: digital signature based techniques, watermark based techniques, intelligent techniques and other techniques. Furthermore we give the shortcomings of different categories of video authentication techniques in brief.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125098095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-08-30DOI: 10.5121/IJCSES.2011.2308
I. El-Henawy, Alaa El, Din Riad, Ahmed M. Hassan, N. Awadallah
In traditional intrusion detection system (IDS) environments, little activity has been applied to using visual analysis as an aid to intrusion detection. With more information systems being attacked and attack techniques evolving, the task of detecting intrusions is becoming an increasingly difficult. Efficient information visualization is an important element required for urgent detection of intruders. This paper presents a survey on using visualization techniques in intrusion detection system. Finally authors proposed a framework for visualization system for ID.
{"title":"VISUALIZATION TECHNIQUES FOR INTRUSION DETECTION - A SURVEY","authors":"I. El-Henawy, Alaa El, Din Riad, Ahmed M. Hassan, N. Awadallah","doi":"10.5121/IJCSES.2011.2308","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2308","url":null,"abstract":"In traditional intrusion detection system (IDS) environments, little activity has been applied to using visual analysis as an aid to intrusion detection. With more information systems being attacked and attack techniques evolving, the task of detecting intrusions is becoming an increasingly difficult. Efficient information visualization is an important element required for urgent detection of intruders. This paper presents a survey on using visualization techniques in intrusion detection system. Finally authors proposed a framework for visualization system for ID.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124095641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-08-30DOI: 10.5121/IJCSES.2011.2305
Arvinder Kaur, Diksha Dani
This paper provides a systematic review of previous web measurement studies particularly focussing on web quality , web metric ,models and methods.The paper reviews journals and conference proceedings to evaluate the progress and direct future research in this area.
{"title":"The Systematic Review of Web Measurement","authors":"Arvinder Kaur, Diksha Dani","doi":"10.5121/IJCSES.2011.2305","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2305","url":null,"abstract":"This paper provides a systematic review of previous web measurement studies particularly focussing on web quality , web metric ,models and methods.The paper reviews journals and conference proceedings to evaluate the progress and direct future research in this area.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121460432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-08-30DOI: 10.5121/IJCSES.2011.2307
S. Bandyopadhyay, Munmun Sengupta, Souvik Maiti, Subhajit Dutta
Internet of Things (IoT) has been recognized as a part of future internet and ubiquitous computing. It creates a true ubiquitous or smart environment. It demands a complex distributed architecture with numerous diverse components, including the end devices and application and association with their context. This article provides the significance of middleware system for (IoT). The middleware for IoT acts as a bond joining the heterogeneous domains of applications communicating over heterogeneous interfaces. First, to enable the better understanding of the current gap and future directions in this field a comprehensive review of the existing middleware systems for IoT is provided here. Second, fundamental functional blocks are proposed for this middleware system, and based on that feature wise classification is performed on the existing IoT-middleware. Third, open issues are analyzed and our vision on the research scope in this area is presented.
{"title":"Role Of Middleware For Internet Of Things: A Study","authors":"S. Bandyopadhyay, Munmun Sengupta, Souvik Maiti, Subhajit Dutta","doi":"10.5121/IJCSES.2011.2307","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2307","url":null,"abstract":"Internet of Things (IoT) has been recognized as a part of future internet and ubiquitous computing. It creates a true ubiquitous or smart environment. It demands a complex distributed architecture with numerous diverse components, including the end devices and application and association with their context. This article provides the significance of middleware system for (IoT). The middleware for IoT acts as a bond joining the heterogeneous domains of applications communicating over heterogeneous interfaces. First, to enable the better understanding of the current gap and future directions in this field a comprehensive review of the existing middleware systems for IoT is provided here. Second, fundamental functional blocks are proposed for this middleware system, and based on that feature wise classification is performed on the existing IoT-middleware. Third, open issues are analyzed and our vision on the research scope in this area is presented.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122180337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-08-30DOI: 10.5121/IJCSES.2011.2309
Bhavana Narain, Anuradha Sharma, Sanjay Kumar, V. Patle
Use of Wireless sensor networks have been widely seen in the fields of target detection and tracking, environmental monitoring, industrial process monitoring, and tactical systems.In wireless sensor networks nodes work with a incomplete power source, energy efficient operations in an important factor of the nodes in wireless sensor network. Energy conservation plays important role in different layers of the TCP/IP protocol suit, and for MAC layer it is the effective part. Therefore, to work in wireless communicating sensors network, we use MAC protocol which improve energy efficiency by increasing sleep duration, decreasing idle listening and overhearing, and eliminating hidden terminal problem or collision of packets. In this paper First section we describe the accessible energy –efficient MAC protocols for sensor networks their energy saving method. In Second section we discuss the architecture of same protocols and then compare same protocols depending on their Advantages and Disadvantages.
{"title":"Energy Efficient Mac Protocols For Wireless Sensor Networks: A Survey","authors":"Bhavana Narain, Anuradha Sharma, Sanjay Kumar, V. Patle","doi":"10.5121/IJCSES.2011.2309","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2309","url":null,"abstract":"Use of Wireless sensor networks have been widely seen in the fields of target detection and tracking, environmental monitoring, industrial process monitoring, and tactical systems.In wireless sensor networks nodes work with a incomplete power source, energy efficient operations in an important factor of the nodes in wireless sensor network. Energy conservation plays important role in different layers of the TCP/IP protocol suit, and for MAC layer it is the effective part. Therefore, to work in wireless communicating sensors network, we use MAC protocol which improve energy efficiency by increasing sleep duration, decreasing idle listening and overhearing, and eliminating hidden terminal problem or collision of packets. In this paper First section we describe the accessible energy –efficient MAC protocols for sensor networks their energy saving method. In Second section we discuss the architecture of same protocols and then compare same protocols depending on their Advantages and Disadvantages.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122017164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-08-30DOI: 10.5121/IJCSES.2011.2311
Nisha S. Raote
The ad-hoc networks are the temporarily established wireless networks which does not require fixed infrastructure it is also called as infrastructure less network. Because of some flaws of adhoc network such as shared wireless medium and lack of any central coordination makes them more prone to attacks in comparison with the wired network. Among all the attacks wormhole attack is the most severe attack. In this attack an attacker capture the packets at one location in the network and send it two another attacker at a distant location through tunnels which is established through different ways like packet encapsulation, using high power transmission or by using direct antennas. This tunnel between two colluding attackers is virtual and it is called as a wormhole. The wormhole attack is possible even if the attacker has not comprised any hosts, and all communication provides authenticity and confidentiality. By using the various approaches for finding the solution over wormhole attack, the dynamic information of the packets could still be modified. So in order to give more robust protection in some special scenario like battlefields, which requires highly secured information, there is need of developing some secured mechanism for wormhole detection and prevention. Taking into consideration this problem the proposed scheme is developed. This paper discusses proposed works on wormhole attack along with its available counter measures in ad-hoc wireless network.
{"title":"Defending Wormhole Attack in Wireless Ad-hoc Network","authors":"Nisha S. Raote","doi":"10.5121/IJCSES.2011.2311","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2311","url":null,"abstract":"The ad-hoc networks are the temporarily established wireless networks which does not require fixed infrastructure it is also called as infrastructure less network. Because of some flaws of adhoc network such as shared wireless medium and lack of any central coordination makes them more prone to attacks in comparison with the wired network. Among all the attacks wormhole attack is the most severe attack. In this attack an attacker capture the packets at one location in the network and send it two another attacker at a distant location through tunnels which is established through different ways like packet encapsulation, using high power transmission or by using direct antennas. This tunnel between two colluding attackers is virtual and it is called as a wormhole. The wormhole attack is possible even if the attacker has not comprised any hosts, and all communication provides authenticity and confidentiality. By using the various approaches for finding the solution over wormhole attack, the dynamic information of the packets could still be modified. So in order to give more robust protection in some special scenario like battlefields, which requires highly secured information, there is need of developing some secured mechanism for wormhole detection and prevention. Taking into consideration this problem the proposed scheme is developed. This paper discusses proposed works on wormhole attack along with its available counter measures in ad-hoc wireless network.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127133830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-08-30DOI: 10.5121/IJCSES.2011.2312
Dimple Parekh, R. Vig
Classification refers to assigning a given fingerprint to one of the existing classes already recognized in the literature. A search over all the records in the database takes a long time, so the goal is to reduce the size of the search space by choosing an appropriate subset of database for search. Classifying a fingerprint images is a very difficult pattern recognition problem, due to the minimal interclass variability and maximal intraclass variability. This paper presents a sequence flow diagram which will help in developing the clarity on designing algorithm for classification based on various parameters extracted from the fingerprint image. It discusses in brief the ways in which the parameters are extracted from the image. Existing fingerprint classification approaches are based on these parameters as input for classifying the image. Parameters like orientation map, singular points, spurious singular points, ridge flow, transforms and hybrid feature are discussed in the paper.
{"title":"Survey on Parameters of Fingerprint Classification Methods Based On Algorithmic Flow","authors":"Dimple Parekh, R. Vig","doi":"10.5121/IJCSES.2011.2312","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2312","url":null,"abstract":"Classification refers to assigning a given fingerprint to one of the existing classes already recognized in the literature. A search over all the records in the database takes a long time, so the goal is to reduce the size of the search space by choosing an appropriate subset of database for search. Classifying a fingerprint images is a very difficult pattern recognition problem, due to the minimal interclass variability and maximal intraclass variability. This paper presents a sequence flow diagram which will help in developing the clarity on designing algorithm for classification based on various parameters extracted from the fingerprint image. It discusses in brief the ways in which the parameters are extracted from the image. Existing fingerprint classification approaches are based on these parameters as input for classifying the image. Parameters like orientation map, singular points, spurious singular points, ridge flow, transforms and hybrid feature are discussed in the paper.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128321827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-08-30DOI: 10.5121/IJCSES.2011.2303
Zeynep Orman, Abdulkadir Battal, E. Kemer
Face and eye detection is one of the most challenging problems in computer vision area. The goal of this paper is to present a study over the existing literature on face and eye detection and gaze estimation. With the uptrend of systems based on face and eye detection in many different areas of life in recent years, this subject has gained much more attention by academic and industrial area. Many different studies have been performed about face and eye detection. Besides having many challenging problems like, having different lighting conditions, having glasses, facial hair or mustache on face, different orientation pose or occlusion of face, face and eye detection methods performed great progress. In this paper we first categorize face detection models and examine the basic algorithms for face detection. Then we present methods for eye detection and gaze estimation.
{"title":"A STUDY ON FACE , EYE DETECTION AND GAZE ESTIMATION","authors":"Zeynep Orman, Abdulkadir Battal, E. Kemer","doi":"10.5121/IJCSES.2011.2303","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2303","url":null,"abstract":"Face and eye detection is one of the most challenging problems in computer vision area. The goal of this paper is to present a study over the existing literature on face and eye detection and gaze estimation. With the uptrend of systems based on face and eye detection in many different areas of life in recent years, this subject has gained much more attention by academic and industrial area. Many different studies have been performed about face and eye detection. Besides having many challenging problems like, having different lighting conditions, having glasses, facial hair or mustache on face, different orientation pose or occlusion of face, face and eye detection methods performed great progress. In this paper we first categorize face detection models and examine the basic algorithms for face detection. Then we present methods for eye detection and gaze estimation.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121570249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-31DOI: 10.5121/IJCSES.2011.2205
C. Rao, B. Rama, K. Mani
As the number of security incidents had been sharply growing, the issue of security-defense draws more and more attention from network community in past years. Firewall is known one of the most popular security-defense mechanism for corporations. It is the first defense-line for security infrastructure of corporations to against external intrusions and threats. A firewall will filter packets by following its policy rules to avoid suspicious intruder executing illegal actions and damaging internal network. Well-designed policy rules can increase the security-defense effect to against security risk. In this paper, we apply association rule mining to analyze network logs and detect anomalous behaviors, such as connections those shown frequently in short period with the same source IP and port. From these anomalous behaviors, we could inference useful, up-to-dated and efficient firewall policy rules. Comparing with the method proposed in [18], we utilize incremental mining to handle the increasingly changed traffic log data. The proposed method can highly enhance the execution performance in data analyzing. Experimental results show that the execution efficiency of our method is better than that of traditional methods when dealing with large-sized log files.
{"title":"Firewall Policy Management Through Sliding Window Filtering Method Using Data Mining Techniques","authors":"C. Rao, B. Rama, K. Mani","doi":"10.5121/IJCSES.2011.2205","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2205","url":null,"abstract":"As the number of security incidents had been sharply growing, the issue of security-defense draws more and more attention from network community in past years. Firewall is known one of the most popular security-defense mechanism for corporations. It is the first defense-line for security infrastructure of corporations to against external intrusions and threats. A firewall will filter packets by following its policy rules to avoid suspicious intruder executing illegal actions and damaging internal network. Well-designed policy rules can increase the security-defense effect to against security risk. In this paper, we apply association rule mining to analyze network logs and detect anomalous behaviors, such as connections those shown frequently in short period with the same source IP and port. From these anomalous behaviors, we could inference useful, up-to-dated and efficient firewall policy rules. Comparing with the method proposed in [18], we utilize incremental mining to handle the increasingly changed traffic log data. The proposed method can highly enhance the execution performance in data analyzing. Experimental results show that the execution efficiency of our method is better than that of traditional methods when dealing with large-sized log files.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127400867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-31DOI: 10.5121/IJCSES.2011.2203
S. Alam, Asaf Khan, L. Saha, Mehedi Hasan Pavel, T. Rahman
This paper presents the numerical simulations of dual band two elements Inverted-L antenna for 3.5 GHz mobile WiMAX and 5 GHz Wi-Fi operation. The proposed antenna is feed by a coaxial connector. The antenna arms effectively control the excited resonant modes for Wi-Fi and mobile WiMAX operation. Total area occupies by the antenna is 20 mm × 30 mm. The antenna contains substantial gain with less than 0.3 and 2 dBi gain variation within the -10 dB return loss bandwidth at 3.5 and 5 GHz operating frequency respectively. In addition, the antenna has achievable bandwidth, return loss and radiation characteristics for both frequencies. Due to the compact area occupied, the proposed antenna is promising to be embedded within the different portable devices employing 3.5 GHz mobile WiMAX and 5 GHz Wi-Fi operation .
{"title":"Dual Band Two Elements Inverted-L Antenna for 3.5 & 5 Ghz Mobile Wimax/Wi-Fi Applications","authors":"S. Alam, Asaf Khan, L. Saha, Mehedi Hasan Pavel, T. Rahman","doi":"10.5121/IJCSES.2011.2203","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2203","url":null,"abstract":"This paper presents the numerical simulations of dual band two elements Inverted-L antenna for 3.5 GHz mobile WiMAX and 5 GHz Wi-Fi operation. The proposed antenna is feed by a coaxial connector. The antenna arms effectively control the excited resonant modes for Wi-Fi and mobile WiMAX operation. Total area occupies by the antenna is 20 mm × 30 mm. The antenna contains substantial gain with less than 0.3 and 2 dBi gain variation within the -10 dB return loss bandwidth at 3.5 and 5 GHz operating frequency respectively. In addition, the antenna has achievable bandwidth, return loss and radiation characteristics for both frequencies. Due to the compact area occupied, the proposed antenna is promising to be embedded within the different portable devices employing 3.5 GHz mobile WiMAX and 5 GHz Wi-Fi operation .","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131791869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}