Audio Steganography for Secure Data Transmission
Research Paper | Journal Paper
Vol.5 , Issue.2 , pp.124-129, Feb-2017
Abstract
As the internet growing day by day secure transmission of information is crucial. Steganography and cryptography both techniques provide data confidentiality, integrity and help us to protect data from day by day attacks. Internet communication has become an essential part of infrastructure now a days and also lots of applications are internet based. So the communication made must be secret to avoid attacks. Steganography is a process of hiding the information of secret messages or one can say that it is an art of sending the hidden data or message over a public network. In the proposed approach message is first encrypted through using The Vigenere Square Encryption Algorithm. After those characters of information or data is embedded into deeper layers through modified LSB method. After that further audio transposition encryption technique is used for audio and accuracy for transposition method is measured in terms of MSE.
Key-Words / Index Term
Audio Steganography, Encryption, Audio Encryption, Modified LSB, Vigenere Square Encryption Algorithm, LSB Coding , PSNR-Peak signal to noise ratio, MSE-mean square error
References
[1] Forouzan B., “Cryptography and Network Security†special Indian Edition 2007, pp-240-330 Tata McGraw-Hill Publishing Company Limited, New Delhi.
[2] Suganya.A, Sharmila.R and Gopinathan.N, "A New Method of Secure Communication with Crystography", International Journal of Computer Sciences and Engineering, Vol.2(4), pp225-228, Apr -2014.
[3] Sangwan N., “Text Encryption with Huffman Compressionâ€, International Journal of Computer Applications (0975 – 8887) Volume 6,pp.54, September 2012.
[4] Ayushi, “A Symmetric Key Cryptographic Algorithm†International Journal of Computer Applications, Vol. 1(15), pp.-34-37, 2010.
[5] Wang H. and Wang S., “Cyber warfare: Steganography vs. Steganalysisâ€, Communications of the ACM, vol. 47,pp.120-156 no. 10, 2004
[6] Adhiya K. and Patil S., Hiding Text in Audio Using LSB Based Steganography. Information and Knowledge Management, pp.56-98 2012.
[7] Gilani J., and Khalid M. Asad, "â€An enhanced least significant bit modification technique for audio steganographyâ€, 2011 International Conference on Computer Networks and Information Technology (ICCNIT)," pp.230-233 ,IEEE, 2011.
[8] Gill M.K. and Randhawa R. K.., "Comparative Study of Multibit LSB Steganography with Cryptography", International Journal of Computer Sciences and Engineering, Vol.3(7), pp.120-123, Jul -2015.
[9] Suri S, Joshi H, Mincoha V. and Tyagi A., "Comparative Analysis of Steganography for Coloured Images", International Journal of Computer Sciences and Engineering, Vol.2(4), pp.180-184, Apr -2014
[10] Bender W. , Gruhl D., "Echo hiding," in proceeding of the 1st Information Hiding Workshop, England, pp. 295-315, 1996.
[11] Shirali-Shahreza S., "Steganography in Silence Intervals of Speech," in , proceedings of the Fourth IEEE International Conference on Intelligent Information Hiding and Multimedia Signal (IIH-MSP 2008), Harbin , china,pp.78-80, 2008.
[12] Gopalan S., "Audio Steganography for Covert Data Transmissionby Imperceptible Tone Insertion," in WOC, Banff , Canada, pp. 8-10,2004.
[13] Tapio S. , Cvejic N., "Increasing The Capacity of LSB-Based Audio Steganography," IEEE, 2002.
[14] Kriti, and Saroha P. , "A variant of LSB steganography for hiding images in audio.," International Journal of Computer Applications, vol.6 , pp. 21-27, 2010.
[15] Shahadi H. and Jidin R., "High capacity and inaudibility audio steganography scheme," in 7th International Conference n Information Assurance and Security (IAS), IEEE, pp-890-899,2011.
[16] Bhasker V., Shiva V. Khan S., "An Optimized Method for Concealing Data using Audio Steganography," International Journal of Computer Applications, pp. 0975-8887, 2011.
[17] Gilani J., Asad A., "Three Layered Model," in International Conference on Emerging, US , pp. 56-78 , 2012.
[18] Ballestero D. and Moreno J., "Highly transparent steganography model of speech signals using Efficient Wavelet Masking," vol. 6 ,pp. 48-56 , 2012.
[19] Katariya V., Patil K., Bankar P., "Audio Steganography using LSB," international Journal of Electronics, vol. 5, pp. 90-92, 2012.
[20] R A.,Al-Anani M., Al-Khalid R. , & Al-Dallah M., "An Efficient technique for data hiding in audio signals.," American Academic & Scholarly Research Journal, vol. 56 , pp. 10-16, 2012.
[21] Galshetwar G.,Jeyakumar A., Mane A., "Data Hiding Technique: Audio Steganography using LSB Technique," International Journal of Engineering Research and Applications, vol. 5, pp. 1123-1125, 2012.
[22] Reddy M. , S.S. Divya, "Hiding Text In Audio Using Multiple LSB Steganography And Provide Security Using Cryptography," International Journal of Scientific &Technology,vol. 4 pp. 68-70, 2012.
[23] Gaidhani C.R., Deshpande V.M. and Bora V.N., "Image Steganography for Message Hiding Using Genetic Algorithm", International Journal of Computer Sciences and Engineering, Vol.2(3), pp.67-70, Mar -2014.
[24] Banerjee S., Rana L., "Dual Layer Randomization in Audio Steganography Using Random Byte Position Encoding," International Journal of Engineering and Innovative Technology, vol. 3,pp. 8, 2013.
[25] John S., B.D, Muruganantham C. and Murthy D., Babu L., "Steganographic Method for Data Hiding in Audio Signals with LSB & DCT," International Journal of Computer Science and Mobile Computing, vol.2, pp. 89-93, August 2013.
[26] Prof. Trivedi.V., Jain M., "Effective Audio Steganography by using Coefficient Comparison in DCT Domain," International Journal of Engineering Research & Technology (IJERT), vol 2 pp. 45-51, 2013.
[27] Nasef M. and Fatma T. , Eid Meligy A., "An Efficient Method to Audio Steganography based on Modification of Least Significant Bit Technique using Random Keys," I. J. Computer Netwok and Information Security, vol .4, pp. 24-29, 2015.
[28] Bhowmick A., Kishore B., Sinha N., "Encrypted Information Hiding using Audio Steganography and Audio Cryptography," International Journal of Computer Applications, vol. 2 , pp. 0975-8123, 2015.
Citation
N. Kundu, A. Kaur , "Audio Steganography for Secure Data Transmission," International Journal of Computer Sciences and Engineering, Vol.5, Issue.2, pp.124-129, 2017.
ESTG_EDP: External sorting as a Tool Used to Process Gas Holder Details Using Early Data Preprocessing
Research Paper | Journal Paper
Vol.5 , Issue.2 , pp.130-135, Feb-2017
Abstract
This paper takes external sorting as a tool in which processing made simpler. External sorting usually processes the huge data stored on the external storage devices such as a tape, disks or flash or combination etc. When there is huge gas holders details stored in a database, Some process is required in order to process the operations like filtering (sorting), searching over the gas holders details. The kind of sorting (process) required is external sorting which is used to process huge data (databases or big data) available on secondary storage devices. The external sorting is a useful and efficient technique to perform the operations on the gas holders database. To process the information and producing reports or results, an automated tool is required which asks required user details for processing the searching operation, filtering operation is to be performed if any duplication is found in the data set. The results are specified or illustrated in the Results chapter. Data pre-processing is required when there is any inconsistency present in the given dataset which set-right into quality or neat data set.
Key-Words / Index Term
External sorting, Database, searching, filtering, tool, ESTG_EDP
References
[1]. Hrushikesava Raju S. , Nagabhushana Rao M.,“ Improvement of Time Complexity on Pattern Matching using One -Time Look Indexing and Data Preprocessingâ€, International Journal of computer sciences and Engineering, Vol.4(11), pp.82-86, 2016, E-ISSN:2347-2693.
[2]. Hrushikesava Raju S.,Swarna Latha T. ,“Dynamic Pattern Matching: Efficient Pattern Matching using Data Preprocessing with help of One time look indexing methodâ€, International Journal of Advanced Research in Computer Engineering and Technology,Vol.2(2),592-599,2013,ISSN:2278-1323.
[3]. Hrushikesava Raju S. , Nagabhushana Rao M., “Pattern Matching Using Data Preproc-Essing With The Help Of One Time Look Indexing Methodâ€, International Journal of Pharmacy and Technology, Vol.8(3),pp.18395-18407,2016, ISSN:0975-766X.
[4]. Hrushikesava Raju S. , Nagabhushana Rao M.,“A Review on Specific Data Structures Using Data Preprocessing and Refinement of Existing Algorithms in Order to Improve Time Complexitiesâ€,International Journal of computer sciences and Engineering, Vol.4(9),pp.146-151,2016.
[5]. HweeHwa Pang , Michael Carey J. , Miron Livny ,†Memory-Adaptive External Sorting“, pp.1-12. Proceedings of the 19th VLDB Conference Dublin, Ireland, 1993.
[6]. John Yiannis, Justin Zobel, “Compression Techniques for Fast External Sortingâ€, Proc. British National Conference on Databases, A.James (ed),Coventry, UK, pp.115-130, July2003.
[7]. Young Sik Lee, Luis Cavazos Quero, Youngjae Lee,Jin-Soo Kim, Seungryoul Maeng, “Accelerating External Sorting via On-the-fly Data Merge in Active SSDsâ€, pp.1-5,2014.
[8]. Cormen Th. H., Leiserson Ch. E., Rivest R. L., and Stein C.,â€Introduction to Algorithmsâ€, 2nd edition, MIT Press ,2001.
[9]. Knuth D. E., “The Art of Computer Programming: Volume 3 (Sorting and Searching)â€,2nd edition, Addison-Wesley ,1998.
[10]. Garcia Molina H., Ullman J. D., and Widom J., “Database Systems: The complete Bookâ€,International edition, Prentice Hall , 2002.
[11]. Ramakrishnan R.,Gehrke J.,â€Database Management Systemsâ€, Second Edition,pp.301-315,1997.
Citation
R.S. Hrushikesava, R.M. Nagabhushana , "ESTG_EDP: External sorting as a Tool Used to Process Gas Holder Details Using Early Data Preprocessing," International Journal of Computer Sciences and Engineering, Vol.5, Issue.2, pp.130-135, 2017.
PMT_EDS: Pattern Matching as a Tool for Efficient and Dynamic Search in the Large Files
Research Paper | Journal Paper
Vol.5 , Issue.2 , pp.136-140, Feb-2017
Abstract
There exist many pattern matching approaches, which consume more time and unable to perform operations like recording history, finding number of times a pattern is found along with positions, page numbers etc. and they have limitations in performing operations beyond their usual operations. The pattern matching using indexOf method is proposed to find out a specific pattern or multiple patterns at a time in less time complexity. The additional information is reported by recording history operation, information of where the pattern is located like page number, number of times that pattern is found can be processed by searching operation, and multi-process operation searches multiple patterns and returns their locations, page numbers in less time complexity by using indexOf metod as a thread in achieving better efficiency. To do all these operations, an automated tool is required that asks for operation to perform, required details to be provided in that operation, and results going to be illustrated or reported. Data pre-processing is required when there is any inconsistency present in the dataset.
Key-Words / Index Term
pattern matching, statistics, searching, multi-process, time complexity, tool, PMT_EDS
References
[1]. Hrushikesava Raju S., Nagabhushana Rao M., “Improvement of Time Complexity on Pattern Matching using One -Time Look Indexing and Data Preprocessingâ€, IJCSE, Vol.4(11),PP.100-106,2016 E-ISSN:2347-2693.
[2]. Hrushikesava Raju S. ,Swarna Latha T.,“Dynamic Pattern Matching: Efficient Pattern Matching using Data Preprocessing with help of One time look indexing methodâ€, IJARCET,Vol.2(2),pp.592-599, 2013,ISSN:2278-1323.
[3]. Hrushikesava Raju S., Nagabhushana Rao M.,“ “Pattern Matching Using Data Preproc-Essing With The Help Of One Time Look Indexing Methodâ€, IJPT, Vol.8(3),pp.14749-14756, ISSN:0975-766X.
[4]. Michael Good Rich T. and Roberto Tamassia, “Data Structures and Algorithms in javaâ€, Fifth Edition, January,2010.
[5]. Akepogu Ananda Rao and Radhika Raju polagiri, “Data Structures and Algorithms using C++â€, Kindle Edition,Pearson, July,2010.
[6]. Donald Adjeroh, Timothy Bell and Amar Mukharjee,“The Burrows Wheeler Transformâ€, Springer, July,2008.
[7]. Machael McMillan,“Data Structures and Algorithms using Visual Basic.NETâ€, Cambridge Edition, March,2005.
[8]. Svetlana, Eden, “Introduction to String Matching and modification in R using Regular expressionsâ€, March,2007.
[9]. Jeffrey.E.F.Fredl,“Mastering Regular Expressionâ€, 3rd Edition, O,reilly publications,December,1998.
[10]. Regular expressions and Matching in Modern Perl 2011-12 edition,ISBN-10: 1680500880,ISBN-13: 978-1680500882,October,2015.
[11]. S. S. Sheik,Sumit K. Aggarwal,Anindya Poddar, N. Balakrishnan,and K. Sekar ,â€A FAST Pattern Matching Algorithmâ€, J. Chem. Inf. Comput. Sci. 2004, 44, 1251-1256.
[12]. Micheline Kamber and Jiawei Han, “Data Mining Concepts and Techniquesâ€, Second Edition,March,2006.
Citation
R.S. Hrushikesava, R.M. Nagabhushana , "PMT_EDS: Pattern Matching as a Tool for Efficient and Dynamic Search in the Large Files," International Journal of Computer Sciences and Engineering, Vol.5, Issue.2, pp.136-140, 2017.
Ligand Design- A Multiobjective Optimization Based Approach
Research Paper | Journal Paper
Vol.5 , Issue.2 , pp.141-147, Feb-2017
Abstract
Excess accumulation or inadequate production of certain protein leads to diseases. A drug can play most important role in this scenario. A drug is an organic molecule that triggers or inhibits the function of a biomolecule such as a protein; this will be beneficial to the patient. In the most basic sense, drug design involves the design of small molecules that are complementary in shape and charge to the bio molecular target with which they interact and therefore will bind to it. The process of drug discovery by laboratory experiments is time consuming and very expensive. To reduce the time and cost of drug discovery process, computational techniques are incorporated to speed up the process. Initially dock the molecular fragments obtained by breaking the sigma bonds between the bioactive molecules against tuberculosis to the target site of the protein using docking software known as AutoDock. The score obtained from this is given as input to the program. Then, prioritize the fragments using Multiobjective Differential Evolution (MODE) algorithm with two objectives namely oral bioavailability and free energy. Next step is to design set of ligand molecules that can be represented as an array of fragments. Then analyses the performance of proposed approach by comparing it with another multiobjective optimization algorithm namely Archived Multiobjective Simulated Annealing (AMOSA).
Key-Words / Index Term
Drug Discovery, Drug Design, Multi-objective Differential Evolution, AMOSA
References
[1] Bandyopadhyay S, Saha S, Maulik U, and Deb K, “A Simulated-Annealing Based Multiobjective Optimization Algorithm:AMOSA,†IEEE Trans. Evolutionary Computing, vol. 12,no. 3, pp. 269-283, June 2008.
[2] Goha G, and Foster A,†Evolving Molecules for Drug Design Using Genetic Algorithms†Proc. Int. Con. On Genetic and Evol. Computing, Morgan Kaufmann ,pp.27-33,2000.
[3] Bandyopadhyay S,â€Active Site Driven Ligand Design: An Evolutionary Approachâ€, Journal of Bioinformatics and Computational Biology Vol. 3, No. 5, pp. 1053–1070, 2005.
[4] Ecemis I¸ Wikel H, Bingham C, and Bonabeau E, †A Drug Candidate Design Environment Using Evolutionary Computationâ€, Presented at IEEE Trans. Evolutionary Computation,Vol.12, pp. 591-603, October-2008.
[5] Ghosh A, Ghosh A, Chowdhury A, and Hazra J, “An Evolutionary Approach to Drug-Design Using Quantum Binary Particle Swarm Optimization Algorithm†,in IEEE students’ Conference on Electrical Electronics and Computer Science(SCEEC) pp.1-4, March-2012.
[6] Ghosh A, Ghosh A, Chowdhury A, and Konar A, "An Evolutionary Approach to Drug-Design Using a Novel Neighbourhood Based Genetic Algorithm", Journal .presented at CoRR, 2012.
[7] Roey V, Pereira B, Li Z, Hiraga K, Belfort M, and Derbyshire V, “Crystallographic and Mutational Studies of Mycobacterium Tuberculosis Reca Mini-Inteins Suggest a Pivotal Role for a Highly Conserved Aspartate Residue,†Journal Molecular Bilogy,vol. 367, pp. 162-73, 2007.
[8] Sengupta S and Bandyopadhyay S, “De novo design of potential RecA inhibitors using Multi Objective Optimizationâ€,IEEE/ACM Transactions on Computational Biology and Bioinformatics,Vol. 9,pp.1139-1154, July 2012.
[9] Bandyopadhyay S, Saha S, Maulik U, and Deb K, “A Simulated-Annealing Based Multiobjective Optimization Algorithm:AMOSA,†IEEE Trans. Evolutionary Computing, vol. 12,no. 3, pp. 269-283, June 2008.
[10] R. Storn and K. Price. “Differential evolution: a simple and efficient adaptive scheme for global optimization over continuous spacesâ€,Journal Global Optimization,vol.11(4),pp.341- 359, 1997.
[11] S. Ekins, J.D. Honeycutt, and J.T. Metz, “Evolving Molecules Using Multi-Objective Optimization: Applying to ADME/Tox,†Journal Drug Discovery Today, vol. 15, pp. 451-460, 2010.
[12] Roey V, Pereira B, Li Z,Hiraga K, Belfort M, and Derbyshire V, “Crystallographic and Mutational Studies of MycobacteriumTuberculosis Reca Mini-Inteins Suggest a Pivotal Role for a Highly Conserved Aspartate Residue,†Journal Molecular Bilogy,vol. 367, pp. 162-73, 2007.
[13] Little J, “Autodigestion of lexA and phage lambda repressorsâ€, Proc. National Academy of Sciences USA, vol. 81, no. 5, pp. 1375-1379,1984.
[14] Roca I and Cox M, “The RecA Protein: Structure and Functionâ€, Journal Biochemistry and Molecular Biology,vol.25, no. 6, pp.415-456,1990.
[15] Dey F and Caflisch A, “Fragment-Based de Novo Ligand Design by Multiobjective Evolutionary Optimization,†Journal Chemical Information Modelling, vol. 48, pp. 679-690, 2008.
[16] Ferreira L, Recardo N,Santos D, Oliva G and Audricopulo Aâ€Molecular Docking and Structure Based Drug Design Strategies,†Journal Molecules,Vol 20,pp. 13384-13421,July 2015.
[17] UmaDevi B,Sundar D,Alli P,â€Enhancement of the portfolio determination using Multiobjective Optimizationâ€,IJCSE,vol 2,pp. 67-75, 2014.
Citation
D. Sreedhar, S. Chandrika, "Ligand Design- A Multiobjective Optimization Based Approach," International Journal of Computer Sciences and Engineering, Vol.5, Issue.2, pp.141-147, 2017.
Identity Based Attack Detection using Spatial Information in Clusters for Wireless Sensor Network
Case Study | Journal Paper
Vol.5 , Issue.2 , pp.148-153, Feb-2017
Abstract
Wireless Sensor Network is a network of wireless devices which is spatially distributed in autonomous tiny computing devices and equipped with sensors, a wireless radio, a processor, and a power source. Wireless sensor networks are deployed in the physical environment to monitor and gather a wide range of information. Due to its dynamic operational and manhandled mobile devices used it also suffers from lot of network security threats. Mostly identity based attacks for example masquerade uses MAC address of some authorized person through malicious device to get hold of the secret information inside the wireless network which largely affects the performance of the network. Identifying a device appropriately is a massive challenge in network securities domain which can be perfectly executed by using the spatial information, a physical property of wireless sensor node. We propose OADL (Optimized Attack Detection & Localization) model which uses the average received signal gain of received signal strength with spatial information correlation to find out the identity of attacker and again using PAM clustering algorithm for detecting the number of with multiple illegitimate identities and eliminate them. When we have the datasets discovered by support vector machines can be used to localize the exact position of multiple illegitimate identities. Evaluating this technique using both wifi (802.11 network) and zigbee model (802.15.4 network) we are able to determine result that attained more than 90% percent hit rate. Using integrated detection and localization algorithms provide high accuracy for multiple attackers.
Key-Words / Index Term
Identity Based Attack, Wireless Sensor Network, Received Signal Strength, Clustering Algorithm, Localization, OADL
References
[1] Yingying Chen, J. Cheng, W. Trappe, Jie Yang, “Detection and Localization of Multiple Spoofing Attackers in Wireless Networksâ€, IEEE Transactions on Parallel & Distributed Systems (IEEE TPDS), Volume 24, No.1, Pages 44-58, 2013.
[2] Bellardo and S. Savage, “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutionsâ€, Proc. USENIX Security Symp., at San Diego, USA pp. 15- 28, August 2003.
[3] D.G.Harkut, M. S.Ali and P.B.Lohiya, "Scheduling Task of Wireless Sensor Network Using Earliest Deadline First Algorithm", International Journal of Scientific Research in Computer Science and Engineering, Vol.2(2), pp.1-6, Apr 2014
[4] Kaur H. and Kaur B, "Selective DDoS Attacks in Application server and Wireless Network – Survey", International Journal of Computer Sciences and Engineering, Vol.4(8), pp.78-80, Aug -2016
[5] Q. Li, W. Trappe, “Relationship-based detection of spoofing-related anomalous traffic in ad hoc networks,†in Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON) at Reston, Virginia, USA, September 2006. ISBN: 1-4244-0626-9.
[6] A. Singh, L.Kaur and K. Singh, "Impact of DDoS Attacks on Different Services Using Various AQM Techniques", International Journal of Computer Sciences and Engineering, Vo.4(4), pp.149-155, Apr -2016
[7] Y. Sheng, K. Tan, G. Chen, D. Kotz, and A.Campbell, “Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength,†Proc. IEEE INFOCOM at Phoenix, Arizona, USA, Apr. 2008. ISBN: 978-1-4244-2219-7.
[8] Y. Chen, W. Trappe and R. P. Martin, “Detecting and Localizing Wireless Spoofing Attacks,†2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, San Diego, CA, pp. 193-202, 2007. ISBN: 1-4244-1268-4.
[9] V. Brik, S. Banerjee, M. Gruteser, and S. Oh, “Wireless Device Identification with Radiometric Signatures,†Proc. 14th ACM Int’l Conf. Mobile Computing and Networking at San Francisco, CA, USA, pp. 116-127, 2008. ISBN: 978-1-60558-096-8
[10] Das T “Identity Based Attack Detection and Localization by the Clustering in Wireless Sensor Network†International Journal of Computer Sciences and Engineering, Vol.-4(2), pp.96-99, Feb 2016. E-ISSN: 2347-2693
[11] P. Bahl and V.N. Padmanabhan, “RADAR: An in-Building RFBased User Location and Tracking System,†Proc. IEEE INFOCOM, Tel Aviv, Israel, pp. 775-784 2000. ISBN: 0-7803-5880-5.
[12] J. Yang and Y. Chen, “A Theoretical Analysis of Wireless Localization Using RF-Based Fingerprint Matching,†Proc. Fourth Int’l Workshop System Management Techniques, Processes and
Services (SMTPS), Miami, Florida USA, pp. 1-6, Apr. 2008.
[13] C. Hsu and C. Lin, “A Comparison of Methods for Multiclass Support Vector Machines,†IEEE Trans. Neural Networks, vol. 13, no. 2, pp. 415-425, Mar. 2002.
[14] ma Korupolu, S Kartik and G Kalyan Chakravarthi, "An Efficient Approach for Secure Data Aggregation Method in Wireless Sensor Networks with the impact of Collusion Attacks", International Journal of Scientific Research in Computer Science and Engineering, Vol.4(3), pp.25-28, Jun 2016.
[15] N. Cristianini and J. Shawe-Taylor, “An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods†Cambridge University Press, NY, USA pp. 1360142, 2000. ISBN 0-521-78019-5.
[16] L. Kaufman and P.J. Rousseeuw, “Finding Groups in Data: An Introduction to Cluster Analysisâ€, Wiley Series in Probability and Statistics, New York, USA, pp. 131-146, 1990. ISBN: 9780471878766.
[17]P. Bahl and V. N. Padmanabhan, “RADAR: an in-building RF-based user location and tracking systemâ€, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, Tel Aviv, Israel, pp. 775-784, 2000. ISBN: 0-7803-5880-5
[18] Barapatre M “Spoofing Attack Detection and Localization inAdhoc network using Received Signal Strength (RSS) “ International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 5, pp.6706-6710, May 2014. ISSN: 2278-1021.
[19] M. Bohge and W. Trappe, “An Authentication Framework For Hierarchical Ad Hoc Sensor Networks,†In Proc. ACM Workshop on Wireless Security (WiSe) San Diego, CA, USA, pp. 79–87, 2003. ISBN: 1-58113-769-9
Citation
D. Tuhin, D.C. Sachin , "Identity Based Attack Detection using Spatial Information in Clusters for Wireless Sensor Network," International Journal of Computer Sciences and Engineering, Vol.5, Issue.2, pp.148-153, 2017.
A Novel Approach for Color Image Edge Detection Using Multidirectional Sobel Filter on HSV Color Space
Research Paper | Journal Paper
Vol.5 , Issue.2 , pp.154-159, Feb-2017
Abstract
Edge detection is a very commonly adopted operation in any pattern recognition task like image segmentation as edges are the prominent features which form the outlines in an image. Detecting edges for a color image is a bit difficult than the same in a gray image. In this paper, a novel approach for edge detection in color images is proposed. This approach is based on Multi-directional Sobel filter. For the color arrangement, HSV color space is used. The experimental results demonstrate the efficiency of the proposed approach.
Key-Words / Index Term
Color Image, Color Space, edge detection, HSV, RGB, Sobel Filter, Multi Directions
References
[1] D. Ray, “Edge Detection in Digital Image Processingâ€, Thursday, June 06, 2013.
[2] W. Gao, X. Zhang, L.Yang, H. Liu, "An improved Sobel edge detection," 2010 3rd International Conference on Computer Science and Information Technology, Chengdu, 2010, pp. 67-71, doi: 10.1109/ICCSIT.2010.5563693.
[3] R. C. Gonzalez and R. E. Woods. “Digital Image Processingâ€. 3rd ed. Prentice Hall, 2002.
[4] E. Aybar, “Sobel Edge Dtection Method for Matlab†Anadolu University, Porsuk Vocational School, 26410 Eskisehir.
[5] D. J. Bora, A.K. Gupta, “A New Approach towards Clustering based Color Image Segmentationâ€, International Journal of Computer Applications (0975 – 8887), Volume 107 – No 12, December 2014, pp. 23-30.
[6] D. J. Bora, A.K. Gupta, “A Novel Approach Towards Clustering Based Image Segmentationâ€, International Journal of Emerging Science and Engineering (IJESE),ISSN: 2319–6378, Volume-2 Issue-11, September 2014,pp. 6-10.
[7] S. S. Savant, R. Manza,“Color Image Edge Detection using Gradient Operatorâ€, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS),Volume 4, Issue 1, January-February 2015 ISSN 2278-6856, pp. 55-57.
[8] H. Rami , M. Hamri , L. Masmoudi ,“Color Edge Detector with Sobel-PCAâ€, International Journal of Computer Applications (0975 – 8887), Volume 75– No.6, August 2013, pp. 12-15;
[9] A.K. Gupta, D.J. Bora, “A Novel Color Image Segmentation Approach Based On K-Means Clustering with Proper Determination of the Number of Clusters and Suitable Distance Metricâ€, International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 7 No. 09 Sep 2016,pp. 395-409.
[10] J. Scharcanski , A. N. Venetsanopoulos, “Edge Detection of Color Images Using Directional Operatorsâ€, IEEE Transactions On Circuits And Systems For Video Technology, Vol. 7, No. 2, April 1997,pp.397-401.
[11] G. Rakesh V, T. S. Reddy, “YCoCg color Image Edge detectionâ€, International Journal of EngineeringResearch and Applications (IJERA) ISSN: 2248-9622 ,Vol. 2, Issue 2,Mar-Apr 2012, pp.152-156.
[12] S. Dutta , B. B. Chaudhuri, "A Color Edge Detection Algorithm in RGB Color Space," 2009 International Conference on Advances in Recent Technologies in Communication and Computing, Kottayam, Kerala, 2009, pp. 337-340.doi: 10.1109/ARTCom.2009.72
[13] Irwin Sobel, 2014, History and Definition of the Sobel Operator.
[14] L. Sun, E. Zhao, L. Ma, L. Zheng, “An Edge Detection Method Based on Improved Sobel Operatorâ€, Advanced Materials Research Vols. 971-973 (2014), pp. 1529-1532.
[15] A. Nosrat, Y. S. Kavian, “Hardware Description of Multi-Directional Fast Sobel Edge Detection Processor by VHDL for Implementing on FPGAâ€, International Journal of Computer Applications (0975 – 8887) Volume 47– No.25, June 2012, pp. 1-7.
[16] S. Al-Dossary, K. Al-Garni, “Fault detection and characterization using a 3D multidirectional Sobel filter†, Saudi Arabia Section Technical Symposium and Exhibition, Society of Petroleum Engineers, SPE-168061-MS, 2013,pp. 1-5.
[17] A.Singhal, "Modern Information Retrieval: A Brief Overview",Bulletin of the IEEE Computer Society Technical Committee on Data Engineering 24 (4), 2001, pp. 35–43.
[18] D.J. Bora, A.K. Gupta, “AERASCIS: An Efficient and Robust Approach for Satellite Color Image Segmentationâ€, IEEE International Conference on Electrical Power and Energy Systems (ICEPES),Maulana Azad National Institute of Technology, Bhopal, India. Dec 14-16, 2016.
[19] Stephen Johnson, “Stephen Johnson on Digital Photographyâ€. O`Reilly, 2006, ISBN 0-596-52370-X.
[20] A. Koschan, M. Abidi, “Digital Color Image Processingâ€, Wiley-Interscience New York, NY, USA ©2008 , ISBN:0470147083 9780470147085.
[21] D.J. Bora, A.K. Gupta, “A New Efficient Color Image Segmentation Approach Based on Combination of Histogram Equalization with Watershed Algorithmâ€, International Journal of Computer Sciences and Engineering Vol.-4(6), Jun 2016, E-ISSN: 2347-2693,pp. 156-167.
[22] P. Arbelaez, M. Maire, C. Fowlkes,J. Malik. “Contour Detection and Hierarchical Image Segmentationâ€, IEEE TPAMI, Vol. 33, No. 5, May 2011, pp. 898-916.
[23] Image Courtesy United States Geological Survey; Image source: Earth Science World Image Bank.
[24] Allan G. Weber. “The usc-sipi image databse: Version 5â€, Singal and Image Processing Institute at the University of Southern California, October 1997.
[25] G. Xin, C. Ke, H. Xiaoguang, "An improved Canny edge detection algorithm for color image," IEEE 10th International Conference on Industrial Informatics, Beijing, 2012, pp. 113-117.doi: 10.1109/INDIN.2012.6301061.
Citation
J.B. Dibya , "A Novel Approach for Color Image Edge Detection Using Multidirectional Sobel Filter on HSV Color Space," International Journal of Computer Sciences and Engineering, Vol.5, Issue.2, pp.154-159, 2017.
PC-Based Real Time Data Processing System for Doppler Sodar Applications
Research Paper | Journal Paper
Vol.5 , Issue.2 , pp.160-167, Feb-2017
Abstract
SODAR, an acoustic pulse radar, provides detailed information on dynamic properties of air turbulence in the lower part of the atmosphere. The speed of the transmitted sound wave is responsive to changes in wind swift, due to high rate of susceptibility to temperature variations. The velocity of the transmitted sound wave propagation is much lower when comparing to velocity of electromagnetic waves. Due to this fact the processing of sodar information is significantly simplified and reached better spatial resolution and dead zone. Sophisticated model of tri-static sodar has developed to using general purpose PC to study the properties of sound wave at see breeze.
Key-Words / Index Term
Scattering, Turbulence, Facsimile, Echo, SODAR, Homogeneous, Wind profile
References
[1]. Obukhov A.M., “Scattering of sound in turbulent flowâ€; Doklady Akademii Nuak SSSR Vol:30, Pg: 611-614,1941.
[2]. Obukhov A.M., “On sound propagation in vertical flow†Doklady Akademii Nuak SSSR Vol:39, Pg:46-49,1943.
[3]. Agarwala. K.S, 1953: The diurnal and seasonal variation of the surface wind at Visakhapatnam, Indian J. Meteorol Geophysics, Vol: 4, Pg: 76-81.
[4]. Aggarwal. SK, Singal SP, Kapoor RK, and Adiga BB, 1980: A study of atmospheric structures using sodar in relation to land and sea breezes, Boundary-Layer Meteorol, Vol:18, Pg: 361-371.
[5]. Benerjee AK, Choudhury A, and Bhattacharjee TH, 1975: On deep inland penetration of sea breeze, Indian J Meteorol Hydrol-Geophys, Vol:26, Pg: 501-505.
[6]. Blokhintzev, D., 1946a: The propagation of sound in an inhomogeneous and moving medium I, II, Acoustic. Soc. Amer., Vol:18, Pg:322-334.
[7]. Hareesh Babu.M and et.all “Scattering of Sodar Signal by Turbulence in Homogenous, Isotopic and other Mediumsâ€, IJCSE,Vol:2,Issue-4,page1-5;April2014.E-ISSN:2347-2693.
[8]. Hareesh Babu, M., Bhushanamu, M.B.N., Raju D.S.S.N., Benarji, B., and Rao, M.P., 2014: ‘A novel mathematical computing simulation methodology for acoustic phased array antenna of sodar system’, Int. J. Current Engg. Tech. Vol:4, Issue:2;Pg:1064-1067.
[9]. Hareesh Babu, M., Bhushanamu, M.B.N., Raju, D.S.S.N., and Rao, M.P., 2014: ‘Generation of 2KHz sodar signal using PC based sound Cardâ€, Int. J. Advanced Tech. Engg. Sci. Vol:2;Issue:12, Pg:612-617.
[10]. Hareesh Babu, M., Raju, D.S.S.N., and Purnachandra Rao, M., 2016: ‘Development of gray scale image processing computing technique to remove the unwanted frequency patches on sodar facsimiles’, Int. J. Comp. Sci. engg. Vol:4, 65-71.
[11]. Hareesh Babu, M., Bhushanamu, M.B.N., Raju D.S.S.N., Benarji, B., and Rao, M.P., 2016: ‘Scattering of sodar signal through rough circular bodies’, Microelectronics, Electromagnetics and Telecommunications (Eds: S.C. Satapathy) Lecture Notes in Electrical Engineering; Vol:37(2), 277-290
[12]. Tatarskii. V.I, “The Effect of the Turbulent Atmosphere on wave propagationâ€, Moscow,1967, National Technical Information Service, Spring field, Va.
[13]. McAllister L.G., “ Acoustic sounding of the lower troposphereâ€, J. Atmos. Terr. Phys.,Vol:30, Pg:1439-1440,1968.
[14]. Tyndall. J, “On the atmosphere as a vehicle of soundâ€, Phill. Trans. Roy. Soc. London, Ser.A, Vol:164, Pg:183-244,1874.
Citation
D. Sreedevi, N.V. RamanaMurty, D.S.S.N. Raju, M.H. Babu, M.P. Rao, "PC-Based Real Time Data Processing System for Doppler Sodar Applications," International Journal of Computer Sciences and Engineering, Vol.5, Issue.2, pp.160-167, 2017.