Forensic Analysis of WhatsApp Messenger on iOS Smartphones
Research Paper | Journal Paper
Vol.8 , Issue.9 , pp.1-10, Sep-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i9.110
Abstract
Mobile devices, which are used by almost everyone for both private and professional intention, have become an indispensable part of people’s life. Today, one of the most important and primary features for smartphone users is that they communicate with each other through social media applications. Used by billions of people, these applications provide a lot of personal information about its user. Mobile device forensic is a significant subset of digital forensic. It is concerned with the acquisition and analysis of digital evidence on mobile devices. Commonly used by many people for messaging, calling and sharing photos/videos, WhatsApp Messenger contains several evidences for mobile forensic and is an important data mine for forensic professionals. In this study, WhatsApp Messenger, which is the most widely used instant messaging application in the world, was examined in terms of digital forensic by using popular forensic tools Cellebrite UFED and Magnet AXIOM on iPhone 5s (A1457) model smartphone with iOS operating system. Sent, received and deleted data (messages, images, videos, calls, etc.) obtained from WhatsApp Messenger application’s files, databases and logs in the internal memory of the smartphone was analysed. The acquired results were given comparatively with details. The results and comparison of current commercial forensic software will help forensic experts in subsequent data analysis.
Key-Words / Index Term
Mobile Device Forensic, iOS Forensic, Instant Messenger Applications, WhatsApp Messenger, Forensic Tools
References
[1] W. Jansen, R. Ayers, “Guidelines on cell phone forensics”, NIST Special Publication 800-101, Vol.1, No.1, pp.1-104, 2007.
[2] M. G. Noblett, M. M. Pollitt, L. A. Presley, “Recovering and examining computer forensic evidence”, Forensic Science Communications, Vol.2, Issue.4, 2000.
[3] G. Palmer, “A road map for digital forensic research”, In the First Digital Forensic Research Workshop, New York, USA, pp.27-30, 2001.
[4] E. Casey, G. Palmer, “The investigative process”, Digital Evidence and Computer Crime, Elsevier Academic Press, Amsterdam, 2004.
[5] Bhanushree V.K, Minavathi, “Cloud packets forensics through NIDS and NIPS with honeypot”, International Journal of Computer Sciences and Engineering, Vol.8, Issue.4, pp.119-122, 2020.
[6] NIST Cloud Computing Forensic Science Working Group, “NIST cloud computing forensic science challenges”, Draft NISTIR 8006, 2014.
[7] R. Ayers, S. Brothers, W. Jansen, “Guidelines on mobile device forensics”, NIST Special Publication 800-101 Revision 1, Vol.1, No.1, pp.1-85, 2014.
[8] N. Gandhewar, R. Sheikh, “Google Android: An emerging software platform for mobile devices”, International Journal on Computer Science and Engineering, Vol.1, No.1, pp.12-17, 2010.
[9] M. Nosrati, R. Karimi, H. A. Hasanvand, “Mobile computing: principles, devices and operating systems”, World Applied Programming, Vol.2, Issue.7, pp.399-408, 2012.
[10] C. Sgaras, M. Kechadi, N. A. Le-Khac, “Forensics acquisition and analysis of instant messaging and VoIP applications”, In the Computational Forensics, Cham, Switzerland, pp.188-199, 2016.
[11] D. Walnycky, I. Baggili, A. Marrington, J. Moore, F. Breitinger, “Network and device forensic analysis of android social-messaging applications”, Digital Investigation, Vol.14, pp.S77-S84, 2015.
[12] C. Anglano, “Forensic analysis of WhatsApp Messenger on Android smartphones”, Digital Investigation, Vol.11, Issue.3, pp.201-213, 2014.
[13] A. Mahajan, M. S. Dahiya, H. P. Sanghvi, “Forensic analysis of instant messenger applications on android devices”, International Journal of Computer Applications, Vol.68, No.8, pp.38-44, 2013.
[14] Y. C. Tso, S. J. Wang, C. T. Huang, W. J. Wang, “iPhone social networking for evidence investigations using iTunes forensics” In the Proceedings of the 6th International Conference on Ubiquitous information management and Communication, New York, USA, pp.1-7, 2012
[15] Facebook, “Facebook to acquire whatsapp”, Available at: https://newsroom.fb.com/news/2014/02/facebook-to-acquire-whatsapp/ [Accessed on 24 August 2020]
[16] WhatsApp, “About WhatsApp”, Available at: https://www.whatsapp.com/about/?lang=en [Accessed on 24 August 2020]
[17] Statista, “Most popular global mobile messenger apps as of July 2020, based on number of monthly active users (in millions)”, Available at: https://www.statista.com/statistics/258749/most-popular-global-mobile-messenger-apps/ [Accessed on 24 August 2020]
[18] My Assignment Help, “Business performance of iphone 7”, Available at: https://myassignmenthelp.com/free-samples/business-performance-of-iphone-7?cv=1&access-library-email= [Accessed on 24 August 2020]
[19] Statcounter, “Mobile operating system market share worldwide”, Available at: https://gs.statcounter.com/os-market-share/mobile/worldwide/#monthly-202007-202007-bar [Accessed on 24 August 2020]
[20] Statista, “Number of apps available in leading app stores as of 1st quarter 2020”, Available at: https://www.statista.com/statistics/276623/number-of-apps-available-in-leading-app-stores/ [Accessed on 24 August 2020]
[21] Independent, “Apple reveals its best and most popular iPhone apps in 2019” Available at: https://www.independent.co.uk/life-style/gadgets-and tech/news/iphone-best-apps-2019-apple-app-store-most-popular-a9230706.html [Accessed on 24 August 2020]
[22] Wikipedia, “Cellebrite”, Available at: https://en.wikipedia.org/wiki/Cellebrite [Accessed on 24 August 2020]
[23] Magnet AXIOM, “The evolution of IEF”, Available at: https://irp-cdn.multiscreensite.com/ad68eab3/files/uploaded/MagnetAXIOM_e-brochure.pdf [Accessed on 24 August 2020]
Citation
Ziya UYSAL, Ilyas ÇANKAYA, Baha SEN, "Forensic Analysis of WhatsApp Messenger on iOS Smartphones," International Journal of Computer Sciences and Engineering, Vol.8, Issue.9, pp.1-10, 2020.
Compressing Graphs Using Quadtrees for Efficient Computation on GPUS
Research Paper | Journal Paper
Vol.8 , Issue.9 , pp.11-18, Sep-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i9.1118
Abstract
Exploiting the computation potential of multi-core Graphics Processing Units (GPUs) requires reducing memory access latency and memory transfer overheads. Although the GPUs provide fast processing capabilities, the memory on such devices is significantly less. Though the memory hierarchy of GPUs provide certain fast levels, these are limited in terms of storage. Also, in order to use the GPUs for computation, the data must be transferred into the memory of the same; hence, in order to reduce the memory latency for large volume of data transfer, efficient techniques are required. Analysis of graph data on GPUs have many practical applications, and has been studied by both academia and industry. The graph data must be stored on the GPU memory to perform computation and analysis on the same. There are different data structures that can be used to store graphs in the GPU memory. Employing compression techniques to reduce the size required by the data is useful; however, the computation must be performed on the compressed data itself since decompressing the data would not be feasible. In addition to saving space on the device, using compressed data structures also reduces the memory transfer overheads both between the CPU & GPU, and between the various levels in the memory hierarchy of the GPU, thereby compensating for some of the additional time to retrieve information from the compressed data. Storing data using efficient compression techniques and operating on the compressed data is therefore useful. Quadtree data structures are generally used for storing and representing images for various applications. However, graphs when represented as adjacency matrix are comparable to images; hence, using recursive partitioning techniques, the data can be effectively compressed. In this paper, we show techniques based on quadtrees to efficiently compress graph data for storing and computation on GPUs. Additional techniques are also introduced which result in hybrid data structures that perform better for specific cases. Empirical results show 80-90% decrease in the space requirements to store graphs with real-world properties.
Key-Words / Index Term
Compression, Quadtree, Graph Compression, GPUs
References
[1] A. Chatterjee, S. Radhakrishnan, and John K. Antonio. Counting Problems on Graphs: GPU Storage and Parallel Computing Techniques. In Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), 2012 IEEE 26th International, pages 804–812. IEEE, 2012.
[2] P. Harish and P. J. Narayanan. Accelerating Large Graph Algorithms on the GPU Using CUDA. In Proc. of the IEEE Intl Conf. on High Performance Computing, LNCS 4873, pages 197–208, 2007.
[3] H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilGuard: Defending Against Sybil Attacks via Social Networks. In Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM ’06, pages 267– 278, New York, NY, USA, 2006. ACM.
[4] Amin Rezaeipanah, Mousa Mojarad, Link Prediction in Social Networks Using the Extraction of Graph Topological Features, International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.5, pp.1-7, 2019
[5] A. Chatterjee, S. Radhakrishnan, and J. K. Antonio. Data Structures and Algorithms for Counting Problems on Graphs using GPU. International Journal of Networking and Computing (IJNC), Vol. 3(2):pages 264–288, 2013.
[6] A. Chatterjee, S. Radhakrishnan, and J. K. Antonio. On Analyzing Large Graphs Using GPUs. In Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), 2013 IEEE 27th International, pages 751–760. IEEE, 2013.
[7] L. Becchetti, P. Boldi, C. Castillo, and A. Gionis. Efficient semi-streaming algorithms for local triangle counting in massive graphs. In Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD ’08, pages 16–24, New York, NY, USA, 2008. ACM.
[8] K. Parimala, G. Rajkumar, A. Ruba, S. Vijayalakshmi, Challenges and Opportunities with Big Data, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.5, pp.16-20, 2017
[9] Tomás Feder and Rajeev Motwani. Clique Partitions, Graph Compression and Speeding-up Algorithms. In Proceedings of the Twenty-third Annual ACM Symposium on Theory of Computing, STOC ’91, pages 123–133, New York, NY, USA, 1991. ACM.
[10] Gregory Buehrer and Kumar Chellapilla. A scalable pattern mining approach to web graph compression with communities. In Proceedings of the 2008 International Conference on Web Search and Data Mining, WSDM ’08, pages 95–106, New York, NY, USA, 2008. ACM.
[11] Keith H. Randall, Raymie Stata, Janet L. Wiener, and Rajiv G. Wickremesinghe. The link database: Fast access to graphs of the web. In Proceedings of the Data Compression Conference, DCC ’02, pages 122– , Washington, DC, USA, 2002. IEEE Computer Society.
[12] P. Boldi and S. Vigna. The webgraph framework i: Compression techniques. In Proceedings of the 13th International Conference on World Wide Web, WWW ’04, pages 595–602, New York, NY, USA, 2004. ACM.
[13] Flavio Chierichetti, Ravi Kumar, Silvio Lattanzi, Michael Mitzenmacher, Alessandro Panconesi, and Prabhakar Raghavan. On compressing social networks. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’09, pages 219–228, New York, NY, USA, 2009. ACM.
[14] Narsingh Deo and Bruce Litow. A structural approach to graph compression. In In MFCS Workshop on Communications, pages 91– 101, 1998.
[15] Morihiro Hayashida and Tatsuya Akutsu. Comparing biological networks via graph compression. BMC Systems Biology, 4(Suppl 2), 2010.
[16] A. Chatterjee, S. Radhakrishnan, and C. N. Sekharan. Connecting the dots: Triangle completion and related problems on large data sets using GPUs. In 2014 IEEE International Big Data Workshop on High Performance Big Graph Data Management, Analysis, and Mining, pages 1–8. IEEE, 2014.
[17] Hanan Samet. Using quadtrees to represent spatial data. In Herbert Freeman and GoffredoG. Pieroni, editors, Computer Architectures for Spatially Distributed Data, volume 18 of NATO ASI Series, pages 229– 247. Springer Berlin Heidelberg, 1985.
[18] J. Leskovec, K. Lang, A. Dasgupta, and M. Mahoney. Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters. Internet Mathematics, Vol. 6(1):29–123, 2009.
[19] Leskovec, Jure, and Rok Sosi?. SNAP: A General-Purpose Network Analysis and Graph-Mining Library. ACM Transactions on Intelligent Systems and Technology (TIST) 8.1 (2016): 1-20.
[20] Deepayan Chakrabarti and Christos Faloutsos. Graph Mining: Laws, Generators, and Algorithms. ACM Computing Surveys, 38(1), June 2006.
[21] J.M.Kleinberg, R.Kumar, P.Raghavan, S.Rajagopalan, and A.S.Tomkins. The web as a graph: measurements, models, and methods. In Proceedings of the 5th annual international conference on Computing and combinatorics, COCOON’99, pages 1–17, Berlin, Heidelberg, 1999. Springer-Verlag.
Citation
Amlan Chatterjee, "Compressing Graphs Using Quadtrees for Efficient Computation on GPUS," International Journal of Computer Sciences and Engineering, Vol.8, Issue.9, pp.11-18, 2020.
Java Based Intrinsic Multiple Mail Service Application Using Simple Mail Transfer Protocol and Post Office Protocol
Research Paper | Journal Paper
Vol.8 , Issue.9 , pp.19-23, Sep-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i9.1923
Abstract
Intrinsic Multiple Email Service Full MIME (Multi-Purpose Purpose Extension) is a pure Java implementation of the email application. Allows the user to access, manage and compose email using a web browser. It is POP3 (Post Office Protocol) and SMTP (Exchange Reverse Protocol). It is a multi-protocol web-protocol that contains various features. It is intended to fulfil the need for a stable, fully integrated messaging app in the Java world. This project describes the necessary analysis using a program called Intrinsic Multiple Mail Service that is designed to provide a flexibility to provide users flexibility, networking platforms built that are accessible by the browser.
Key-Words / Index Term
SMTP, POP, Java script, API, GUI
References
[1] T. Berners-Lee, R. Cailliau, J. Groff, and B. Pollermann, “World-Wide Web: The Information Universe”, Journal of Electronic Networking, Vol. 1, Issue.2, pp. 52-58, Spring 1992.
[2] Spafford EH, “The Internet worm program: An analysis”, ACM SIGCOMM Computer Communication Review, Vol.19, Issue.1, pp.17-57, Jan 1989.
[3] Marshall T. Rose, “The Open Book: A Practical Perspective on OSI”, Prentice-Hall Publisher, 1990.
[4] Case J, Fedor M, Schoffstall M, Davin C. “Simple Network Management Protocol (SNMP). Internet Protocol Specification RFC 1157”. Network Information Center, SRI International. 1990 May.
[5] Arnold K, Gosling J, Holmes D, Holmes D. The Java programming language, Reading: Addison-wesley Publishers, Jun 2000.
[6] T. Ramesh and S.Sumithra, OPKNOT – Schemata Method for Mutation Testing Experimented on Event Driven Web Applications”, International Journal of Innovativ Research in Computer and Communication Engineering, ISSN 2320-9798,Vol 5, Issue 1, PP 761-770, January 2017.
[7] J. W. Hong, J. Y. Kong, T. H. Yun, J. S. Kim, J. T. Park and J. W. Baek, “Web-based Intranet Services and Network Management", IEEE Communications Magazine, Vol. 35, No. 10 , pp. 100-110. October 1997.
[8] T. Ramesh and S.Sumithra, “A Review on Different Approaches of Mutation Cost Reduction Techniques”, International Journal of Innovative Research in Computer and Communication Engineering, Vol.5, Issue.1, pp.771-775, January 2017.
[9] Black UD. “Network Management Standards: SNMP, CMIP, TMN, MIBs and Object Libraries”. McGraw-Hill Publishers, Oct 1994.
[10] David Perkins and Evan McGinnis, “Understanding SNMP MIBs”, Prentice Hall Publishers, 1997.
[11] Case J, McCloghrie K, Rose M, Waldbusser S. “Structure of management information for version 2 of the simple network management protocol (SNMPv2)”. RFC 1442, SNMP Research, Inc., Hughes LAN Systems, Dover Beach Consulting, Inc., Carnegie Mellon University; Apr 1993.
[12] Shahanawaj Ahamad, “Study on Web Services Architectural Operations and Performance”, International Journal of Scientific Research in Computer Science and Engineering, Vol.8, Issue.4, pp.01-13, Aug 2020.
[13] Poreddy Jayaraju, Vijay Prakash, “Web Based Interface Implementation”, International Journal of Scientific Research in Com c Research in Computer Science and Engineering, Vol. 3, Issue.5, pp. 6-11, Oct 2015.
Citation
M. Arul Pandy, R. Vadivel, "Java Based Intrinsic Multiple Mail Service Application Using Simple Mail Transfer Protocol and Post Office Protocol," International Journal of Computer Sciences and Engineering, Vol.8, Issue.9, pp.19-23, 2020.
Deep Learning Approach Towards T-Rex Game
Research Paper | Journal Paper
Vol.8 , Issue.9 , pp.24-27, Sep-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i9.2427
Abstract
In this project, we enforce both feature-extraction based totally algorithms and an end-to-cease deep reinforcement mastering technique to discover ways to control Chrome offline dinosaur recreation directly from high-dimensional sport display input. Results display that as compared with the pixel function based totally algorithms, deep reinforcement learning is more effective and effective. It leverages the high-dimensional sensory input immediately and avoids capability errors in characteristic extraction. Finally, we recommend special schooling strategies to address class imbalance issues due to the boom in game velocity. A simple and smooth GUI is supplied for smooth gameplay. The gameplay layout is so simple that user won’t discover it tough to use and understand. Different images are used within the development of this easy recreation project, the gaming environment is similar to the authentic T-Rex Dino Run sport. In order to run the project, you need to have set up python and pygame in your PC. This might be a new word for many however each and every one of us has learned to stroll the usage of the idea of Reinforcement Learning (RL) and this is how our brain still works. A reward gadget is a foundation for any RL algorithm.
Key-Words / Index Term
Deep reinforcement, Sensory input
References
[1]https://thenextweb.com/dd/2018/09/07/4-years-later-google finally-explains-the-origins-ofits-chrome-dinosaur-game/
[2]V. Mnih, K. Kavukcuoglu, D. Silver, A. Graves, IAntonoglou, D. Riedmiller. Playing Atari with deep reinforcement learning. arXiv preprint arXiv:1312.5602, 2013.
[3] V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G. Bellemare, A. Graves, M.Riedmiller, A. K. Fidjeland, G. Ostrovski, et al. Human-level control through deep reinforcementlearning. Nature, 518(7540):529–533, 2015.
[4] G. Tesauro. Temporal difference learning and td-gammon. Communications of the ACM,38(3):58–68, 1995.
[5] G. Bradski et al. The opencv library. Doctor Dobb Journal, 25(11):120–126, 2000.
[6] Koray Kayabol, Member, IEEE ”Histogram-Based Contextual Classification of SAR Images”, IEEE geoscience and remote sensing letters, vol. 12, no. 1, January 2015.
[7] Xin Su, Chu He, Member, IEEE, Qian Feng, Xinping Deng, and Hong Sun, Member, IEEE "A Supervised Classification Method Based on Conditional Random Fields With Multiscale Region Connection Calculus Model for SAR Image",IEEE geoscience and remote sensing letters, vol. 8, no. 3, May 2011.
[8] Mery Picco and Gabriela Palacio "Unsupervised Classification of SAR Images Using Markov Random Fields and G0 I Model",IEEE geoscience and remote sensing letters, vol. 8, no. 2, March 2011.
[9] A. Sharma, P.K. Misra, “Aspects of enhancing security in software development life cycle,” Advances in Computational Sciences and Technology, Vol. 10, Issue. 2, pp. 203-210.
[10] Jr. Padal, C.M. Salado, L. Mary Jean May, N.P. Sobejana, “SPAMAST Smart Garbage Bin Monitoring System Using Wireless Sensor Network,” Journal of Engineering Research and Reports, pp. 1-16, 2019.
[11] D. Goel, R. Upadhyay, “Effectiveness of use of Animation in Advertising: A Literature Review,” International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue. 3, pp. 146-159, 2017.
Citation
Abujar Shaikh, A.K. Sampath, Anupam Choudhary, "Deep Learning Approach Towards T-Rex Game," International Journal of Computer Sciences and Engineering, Vol.8, Issue.9, pp.24-27, 2020.
Automated Visa Dispensation Application System to Maintain a Repository of Information about Visa Applicants
Research Paper | Journal Paper
Vol.8 , Issue.9 , pp.28-32, Sep-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i9.2832
Abstract
Project "Online Visa Processing System" is an automated program. It describes the process of applying for a visa. There are many types of visas granted by the government such as H1-visa, Dependent visa. Obtaining a Visa, issuing a Visa is a very meaningful decision, and it is not a contestant. Each visa officer has a list of requirements for which an applicant is applying for a visa. If met, the applicant issues a visa. Otherwise, the applicant does not. It is how these requirements are met that make the visa decision look good. In this paper the proposed system is a web-based system, using one that can store all information in an efficient and efficient way. The system allows storing aggregated data that has the properties to insert, edit and delete data as needed. The program is useful for the organization`s Human Resources department to track staff details and their visits abroad. The program is proposed to consist of the following modules: Study Director, Visa Performance Module, Onsite Communication Module and Reporting Module.
Key-Words / Index Term
Visa Preparation, Administrative Management System, Decision Making, Web Use, Graphical User Interface
References
[1] Cay S. Horstmann, “Core Java™, Volume I—Fundamentals” (8th Edition), Prentice Hall, Sun Microsystems Press Publisher, India, April 18, 2008.
[2] Joshua Bloch, “Effective Java (2nd Edition)”, 2 edition, Addison-Wesley Professional Publisher, ISBN: 9780137150021, May 28, 2008.
[3] Schildt, Herbert, “Java The Complete Reference”, 8th Edition, McGraw-Hill Osborne Media Publisher, June 22, 2011.
[4] Debu Panda, Reza Rahman, Derek Lane, “EJB 3 in Action”, 1st edition, Manning Publications, April 16, 2007.
[5] Neal Ford, “Art of Java Web Development: Struts, Tapestry, Commons, Velocity, JUnit, Axis, Cocoon, InternetBeans, WebWork”, Manning Publications, November 1, 2003.
[6] Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin, “Enterprise Java™ Security: Building Secure J2EE™ Applications”, 1 st edition, Addison-Wesley Professional Publishers, February 27, 2004.
[7] Apanapudor, J.S., Njoseh, I.N., Ogini, N.O., and Omede, G.C. “Introduction to computer science and data processing [A Practical Approach]”, Reprinted. Krisbec Publications, Agbor – Nigeria, 2006.
[8] T. Ramesh and S.Sumithra, “OPKNOT – Schemata Method for Mutation Testing Experimented on Event Driven Web Applications”, International Journal of Innovative Research in Computer and Communication Engineering, Vol 5, Issue 1, pp. 761-770, January 2017.
[9] T. Ramesh and S.Sumithra, “A Review on Different Approaches of Mutation Cost Reduction Techniques”, International Journal of Innovative Research in Computer and Communication Engineering, Vol.5, Issue.1, pp.771-775, January 2017.
[10] Gottfried, Byron S, “Schaum’s Outline of Theroy and Problems of Programming with visual basic”, McGraw-Hill Publichers, USA, 2006.
[11] Anandi Mahajan, Pankaj Sharma, “Object Oriented Requirement management Tools for maintaining of status of requirements”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue. 6, pp.27-30, December (2018).
[12] Kumari Seema Rani, “Open Source Software: A Prominent Requirement of Information Technology”, International Journal of Scientific Reseach in Network Security and Communication, Vol.6, Issue.2, pp. 24-29, April 2018.
Citation
M. Saravanan, R. Vadivel, "Automated Visa Dispensation Application System to Maintain a Repository of Information about Visa Applicants," International Journal of Computer Sciences and Engineering, Vol.8, Issue.9, pp.28-32, 2020.
A Systematic Literature Review of Various Digital Signature Techniques
Review Paper | Journal Paper
Vol.8 , Issue.9 , pp.33-37, Sep-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i9.3337
Abstract
Network is a node collection. The network`s basic aim is to transfer information from one location to another. This information must obviously be secured from access by third parties. The cryptography concept was based upon the necessity to secure critical data exchanged across an unsecured network. While using encryption the transmitter encrypts or encodes the information with a secret key so that only the tender recipient will understand it. Cryptanalysis, however, means unwanted access without the secret information key. The cryptography uses various techniques such as Diffie Hellman, AES, RSA, DES, IDEA, BLOWFISH, x.509, PKI, digital signatures to convert plain texts into the respective chipper text. In different circumstances all these algorithms are important. RSA`s most productive computerized signature calculation. This article presents a precise writing review of different computerized signature frameworks dependent on RSA. A basic report is completed on the key age, the creation of marks and the mark check of different computerized signature approaches.
Key-Words / Index Term
Digital Signature, RSA, Cryptography, Key Generation, signature creation, signature verification
References
[1] William Stallings “Network Security Essentials (Applications and Standards)”, Pearson Education, 2004.
[2] National Bureau of Standards, “Data Encryption Standard,” FIPS Publication 46, 1977.
[3] Dr. Mahmoud T. El-Hadidi, Dr. N. H. Hegazi and H. K Aslan, "Implementation of a Hybrid Encryption Scheme for Ethernet," in Proceedings of Computers and Communications IEEE Symposium, pp. 150-156, 1995.
[4] R. Cramer and V. Shoup, "A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack," in Advances in Cryptology - {CRYPTO} `98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, 23-27 pp. 13-25, August 1998.
[5] Louis Granboulan, "RSA hybrid encryption schemes," IACR Cryptology ePrint Archive, p. 110, 2001, [Online].
[6] Kaoru Kurosawa and Yvo Desmedt, "A New Paradigm of Hybrid Encryption Scheme," in Advances in Cryptology - {CRYPTO} 2004, Proceedings of 24th Annual International Cryptology Conference, Santa Barbara, California, USA, 15-19 pp. 426-442, August, 2004.
[7] "ISO/IEC 18033-1, Information technology - Security techniques - Encryption Algorithms - Part1: General," International Organization for Standardization, 2003.
[8] M. Ayoub Khan and Y.P.Singh, "On the security of Joint Signature and Hybrid Encryption," in Networks ,13th IEEE International Conference (Volume:1 ), 2005.
[9] Y. Wang and M. Hu, "Timing evaluation of the known cryptographic algorithms," in International Conference on Computational Intelligence and Security, pp. 233-237, 2009.
[10] Colin D. Walter, "Exponentiation Using Division Chains," IEEE transactions on Computers, vol. 47, no. 7, 1998.
[11] Noboru Kunihiro and Hirosuke Yamamoto, "New Methods for Generation of Short Addition Chains," IEICE Trans. Fundamental, vol. 83, no. 1, 2000.
[12] C. K. Koc, "High-speed RSA implementations," Technical notes TR 201, RSA Security Inc., Nov. 1994.
[13] C. K. Koc, "RSA hardware implementation," Technical Notes TR 801, RSA Security Inc., Aug. 1995.
[14] R. L. Rivest, A. Shamir and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
[15] Dorothy E. Denning, "Digital signature with RSA and other Publickey cryptosystems," Comm. of the ACM, vol. 27, no. 4, pp. 388-392, Apr. 1984.
[16] Burton S. Kaliski, "RSA Digital Signatures," Dr. Dobb`s Journal, May 2001, [Online]. http://www.drdobbs.com/rsa-digitalsignatures/184404605.
[17] Erfaneh Noorouzi1, Amir Reza Estakhrian Haghighi, Farzad Peyravi and Ahmad, "A new digital signature algorithm," in International Conference on Machine Learning and Computing, vol. 3, Singapore, pp. 141-146, 2011.
[18] Prakash Kuppuswamy, Peer Mohammad Appa and Saeed Q Y AlKhalidi, "A New Efficient Digital Signature Scheme Algorithm based on Block cipher," IOSR Journal of Computer Engineering, vol. 7, no. 1, pp. 47-52, Nov. 2012.
[19] Hemant Kumar, Ajit Singh, "An Efficient Implementation of Digital Signature Algorithm with SRNN Public Key Cryptography," International Journal of Research Review in Engineering Science and Technology, vol. 1, no. 1, pp. 54-57, Jun. 2012.
Citation
Namrata Vijay, Kaptan Singh, Amit saxena, "A Systematic Literature Review of Various Digital Signature Techniques," International Journal of Computer Sciences and Engineering, Vol.8, Issue.9, pp.33-37, 2020.
Implementation of Automated Criminal Face Detection System Using Facial Recognition Approach
Research Paper | Journal Paper
Vol.8 , Issue.9 , pp.38-42, Sep-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i9.3842
Abstract
Criminal records usually contain personal information about a particular person and image. To identify any criminal, require an identity document in person, provided by eyewitnesses. In many cases the quality and resolution of parts of the recorded images is poor and difficult to detect. Identification can be done in many ways such as finger print, eyes, DNA etc. One of the programs is facial recognition. Although the ability to use intelligence or character in suspicious facial expressions, one`s ability to recognize faces is amazing. Criminal records usually contain personal information about a particular person and image. The identification of any criminal requires specific identification in relation to a particular person or persons, provided by eyewitnesses. Based on the information provided by eyewitnesses, this investigation will be conducted. In many cases the quality and resolution of parts of the recorded images is poor and difficult to detect. In this paper, it is divided into the performance of graphical images in three stages; low, medium and high level to process and analyze a given face. This paper demonstrates better results than the conventional methods associated with the face recognition process used in crime detection.
Key-Words / Index Term
Biometrics, Face recognition, Digitization, Preprocessing, Restoration, Compression
References
[1] Murray I. Cole, “Algorithmic skeletons: structured management of parallel computations,” in Research Monographs in Parallel and Distributed Computing. London:Pitman, MIT Press, 1989.
[2] Jain AK, Bolle R, Pankanti S, editors. “Biometrics: personal identification in networked society”. Springer Science & Business Media; Apr 2006.
[3] D. Serot and J. Derutin, “Skipper: A skeleton-based programming environment for image processing applications,” in Proceeding of the Fifth International Conference on Parallel Computing Technologies, 1999.
[4] C. Nicolescu and P. Jonker, “A data and task parallel image processing environment,” Lecture Notes in Computer Science, vol. 2131, pp. 393–408, 2001.
[5] J. Haddadnia, K. Faez, and P. Moallem, “Human face recognition with moment invariants based on shape information,” in Proceedings of the International Conference on Information Systems, Analysis and Synthesis, vol. 20, (Orlando, Florida USA), International Institute of Informatics and Systemics (ISAS), 2001.
[6] T. Ramesh and S.Sumithra, “OPKNOT – Schemata Method for Mutation Testing Experimented on Event Driven Web Applications”, International Journal of Innovative Research in Computer and Communication Engineering, ISSN 2320-9798,Vol 5, Issue 1, PP 761-770, January 2017.
[7] Wagner A, Wright J, Ganesh A, Zhou Z, Mobahi H, Ma Y. “Toward a practical face recognition system: Robust alignment and illumination by sparse representation”. IEEE transactions on pattern analysis and machine intelligence, Vol.34, Issue.2, pp. 372-386, Jun 2011.
[8] T. Ramesh and S.Sumithra, “A Review on Different Approaches of Mutation Cost Reduction Techniques”, International Journal of Innovative Research in Computer and Communication Engineering, Vol.5, Issue.1, pp.771-775, January 2017.
[9] Cai, D., He, X., Han, J. and Zhang, H.J, “Orthogonal laplacianfaces for face recognition”. IEEE transactions on image processing, Vol.15, Issue.11, pp.3608-3614. 2006.
[10] H. Fatemi, H. E. Malek, R. Kleihorst, H. Corporaal, and P. Jonker, “Real-time face recognition on a mixed SIMD VLIW architecture,” 4th seminar on embedded systems, Proceedings, (NieuUsergein, The Netherlands), 22 October 2008.
[11] S.Anila&Dr.N.Devarajan, “Preprocessing Technique for Face Recognition Applications under Varying Illumination Conditions”, Global Journal of Computer Science and Technology Graphics & Vision, pp.13-18, 2012.
[12] Boya Akhila1 , Burgubai Jyothi, “Face Identification through Learned Image High Feature Video Frame Works”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.4, pp.24-29, August 2018.
[13] Ratnesh Kumar Shukla1, Ajay Agarwal , Anil Kumar Malviya, “An Introduction of Face Recognition and Face Detection for Blurred and Noisy Images”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.39-43 , June 2018.
Citation
V. Jebasheeli, R. Vadivel, "Implementation of Automated Criminal Face Detection System Using Facial Recognition Approach," International Journal of Computer Sciences and Engineering, Vol.8, Issue.9, pp.38-42, 2020.
Cyber Threats in Artificial Intelligence
Research Paper | Journal Paper
Vol.8 , Issue.9 , pp.43-47, Sep-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i9.4347
Abstract
In the state of affairs of Digital Security there has been an alternate from the vicinity of Digital Guiltiness to the part of Digital War in the route of the most present day couple of years. As indicated by the new difficulties, the master network has two principle draws near to embrace the way of thinking and techniques for Military Insight, and to utilize Man-made brainpower strategies for balance of Digital Assaults. This paper portrays a portion of the outcomes got at Specialized the American College of Sofia in the usage of undertaking identified with the use of insightful techniques for expanding the security in PC systems. The investigation of the achieve ability of different Man-made reasoning strategies has demonstrated that a technique that is similarly successful for all phases of the Digital Knowledge can`t be distinguished. While for Strategic Digital Dangers Knowledge has been chosen and examined a Multi-Specialist Framework, the Repetitive Neural Systems are presented for the necessities of Operational Cyber Threats Artificial Intelligence.
Key-Words / Index Term
Remote Network Monitoring, Artificial Intelligence, Sequential Feature Selection, Behavioral Assessment, Cyber Threats Intelligence Neural Networks
References
[1] Elike Hodo, Xavier Bellekens, Ephraim Iorkyase, Andrew Hamilton, Christos Tachtatzis and Robert Atkinson. Machine Learning Approach for Detection of nonTor Traffic. Journal of Cyber Security, Vol. 6.2, pp 171–194, November 2017. doi: 10.13052/jcsm2245- 1439.624
[2] [RFC 1757] Remote Network Monitoring Management Information Base, Carnegie Mellon University, 1995
[3] Brian P. Kime Threat Intelligence: Planning and Direction, SANS Institute, 2015
[4] Hammon P.S. and Sa V.R. de, Preprocessing and meta- classification for brain-computer interfaces, IEEE Transactions on Biomedical Engineering, 54(3), 2007.
[5] Koprinkova-Hristova P., Bozhkov L. and Georgieva P., Echo State Networks for feature selection in affectivecomputing
[6] Republic of Bulgaria: National Cyber Security Strategy “Cyber Resilient Bulgaria 2020”, 2016-03 NCSS Bulgaria final draft v 5 3, Bulgarian government, 2016
[7] Cyber Intelligence: Setting the Landscape for an emerging Discipline, Intelligence and National Security Alliance, INSA, 2011
[8] Operational Level of Cyber Intelligence, INSA, 2013
[9] Operational Cyber Intelligence, INSA, 2014
[10] Liu Y., Sourina O. and Nguyen M. K., Real-time EEG-based human emotion recognition and visualization, in Proceedings of the International Conference on Cyberworlds (CW ’10), 2010, Singapore
[11] L. Bozhkov, P. Georgieva Classification models of emotional bio signals evoked while viewing affective pictures
[12] Erik Hjelmvik, Passive Network Security Analysis with Network Miner, (IN)SECURE Magazine, no. 18, pp. 18–21,2008.
[13] Lukosevicius M. and Jaeger H., Reservoir computing approaches to recurrent neural network training, Computer Science Review, vol. 3, 2009
[14] ENISA Threats Landscape Report 2016: 15 Top Cyber-Threats and Trends, ENISA, 2017
[15] Guyon I. and Elisseeff A. An Introduction to Variable and Feature Selection, Journal of Machine Learning Research, vol. 3, 2003
Citation
Mangoldip Saha, Anirbit Sengupta, Abhijit Das, "Cyber Threats in Artificial Intelligence," International Journal of Computer Sciences and Engineering, Vol.8, Issue.9, pp.43-47, 2020.
Automatic on-Demand Selection of Suitable Wireless Scheduling Algorithm to Minimize Queue Overflow Probability
Research Paper | Journal Paper
Vol.8 , Issue.9 , pp.48-53, Sep-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i9.4853
Abstract
In this paper, it is been studied the robustness of light traffic obtained by the tuning algorithm for various traffic networks. Since processing the programming algorithm is unaffected using the standard mathematical tool, the aim is to reduce the maximum likelihood of saturation obtained by the algorithm. In large deviation settings, this problem is equivalent to increasing the amount of asymptotic decomposition of the maximum possible. It is start by getting more of the decaying level of the fullness of the line as the line`s fullness decays closer to infinity. Subsequently, made study several structural properties of the low-cost method of linear saturation in a large length, which is an approximation to the decay rate of the largest saturation point. Given these properties, proven that the line with the largest length follows the sample path that extends through the line. At a certain parameter value, the sorting algorithm is very good at reducing the length of the largest line. For numerical results, it is have shown the large-scale deviation properties of the line lengths that are commonly used while varying one algorithm parameter.
Key-Words / Index Term
Line saturation, wireless algorithms, Round Robin programming, Scheduling greed
References
[1] Venkataramanan VJ, Lin X, “Structural properties of LDP for queue-length based wireless scheduling algorithms”. InProceedings of Allerton 2007 Sep 25.
[2] X. Lin, N. B. Shroff, and R. Srikant, “A tutorial on cross-layer optimization in wireless networks,” IEEE J. Sel. Areas Communication., vol. 24, no. 8, pp. 1452–1463, Aug. 2006.
[3] L. Tassiulas and A. Ephremides, “Stability properties of constrained queuing systems and scheduling policies for maximum throughput in multihop radio networks,” IEEE Transactions Automatic Control, vol. 37, no. 12, pp. 1936–1948, Dec. 1992.
[4] M. J. Neely, E. Modiano, and C. E. Rohrs, “Dynamic power allocation and routing for time-varying wireless networks,” in Proc. IEEE INFOCOM, San Francisco, CA, vol. 1, pp. 745–755. Apr. 2003,
[5] A. Eryilmaz, R. Srikant, and J. Perkins, “Stable scheduling policies for fading wireless channels,” IEEE/ACM Trans. Netw., vol. 13, no. 2, pp. 411–424, Apr. 2005.
[6] T. Ramesh and S.Sumithra, OPKNOT – Schemata Method for Mutation Testing Experimented on Event Driven Web Applications”, International Journal of Innovative Research in Computer and Communication Engineering, ISSN 2320-9798,Vol 5, Issue 1, , PP 761-770, January 2017
[7] A. L. Stolyar, “MaxWeight scheduling in a generalized switch: State space collapse and workload minimization in heavy traffic,” Ann. Appl. Probab., vol. 14, no. 1, pp. 1–53, 2004.
[8] T. Ramesh and S.Sumithra, “A Review on Different Approaches of Mutation Cost Reduction Techniques”, International Journal of Innovative Research in Computer and Communication Engineering, Vol.5, Issue.1, pp.771-775, January 2017.
[9] D. Shah and D. Wischik, “Optimal scheduling algorithms for inputqueued switches,” in Proceedings IEEE INFOCOM, Barcelona, Spain, Apr. 2006.
[10] S. P. Meyn, “Stability and asymptotic optimality of generalized MaxWeight policies,” SIAM J. Control Optimization., vol. 47, no. 6, pp. 3259–3294, Jan. 2009.
[11] M. J. Neely, “Order optimal delay for opportunistic scheduling in multi-user wireless uplinks and downlinks,” IEEE/ACM Transactions Networks., vol. 16, no. 5, pp. 1188–1199, Oct. 2008.
[12] M. J. Neely, “Delay analysis for maximal scheduling in wireless networks with bursty traffic,” in Proceedings IEEE INFOCOM, Phoenix, AZ, April pp. 6–10. 2008.
[13] R. Kumari1 , P. Nand, “Performance Analysis of Existing Routing Protocols”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.5, pp.47-50, October 2017.
[14] S.D.N. Hayath Ali , M. Giri, “A Study on Current Challenging Issues and Optimal Methods for Video Streaming over Heterogenous Wireless Network”, International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, April 2018.
Citation
S. Vineeth, R. Vadivel, "Automatic on-Demand Selection of Suitable Wireless Scheduling Algorithm to Minimize Queue Overflow Probability," International Journal of Computer Sciences and Engineering, Vol.8, Issue.9, pp.48-53, 2020.
Indian Sign Language Recognition for Static and Dynamic Hand Gestures
Research Paper | Journal Paper
Vol.8 , Issue.9 , pp.54-58, Sep-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i9.5458
Abstract
Humans are called as social animals and because of that communication becomes a very integral part of a human being. Humans use verbal and non-verbal forms of speech for communication purposes, but not all humans are capable of verbal speech, for e.g. Deaf and Mute people. Hence, Sign Languages are developed for them, but still there is a hindrance in the communication for them. So, using the hand gestures, this paper presents a system where CNN network is used to for the classification of Alphabets and Numbers. CNN is used because alphabets and number gestures are static gestures in Indian Sign Language and CNNs give very good results for image classification. This uses hand-masked (skin-segmentation) images for training the model. For the dynamic hand gestures, the system uses LSTM network for the classification task. LSTM are well known for accurately predicting the data which is distributed in time-frame. This paper presents two models, CNN and LSTM for predicting different type of hand gestures i.e. static as well as dynamic.
Key-Words / Index Term
Indian Sign Language, CNN, Skin-segmentation, LSTM
References
[1] M. Mohandes, M. Deriche, J. Liu, "Image-Based and Sensor-Based Approaches to Arabic Sign Language Recognition", IEEE Transactions on Human-Machine Systems, Vol.44, Issue.4, pp. 551-557, 2014.
[2] C. Zhu, W. Sheng, "Wearable Sensor-Based Hand Gesture and Daily Activity Recognition for Robot-Assisted Living", IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, Vol.41, Issue.3, pp.569-573, 2011.
[3] T. Jaya, and V. Rajendran, “Hand-Talk Assistive Technology for the Dumb”, International Journal of Scientific Research in Network Security and Communication (IJSRNSC), Vol.6, Issue.5, pp.27-31, 2018.
[4] L. K. Ramkumar, S. Premchand, G. K. Vijayakumar, “Sign Language Recognition using Depth Data and CNN”, SSRG International Journal of Computer Sciences and Engineering (SSRG - IJCSE), Vol.6, Issue.1, pp.9-14, 2019.
[5] P. Gupta, A. K. Agrawal, S. Fatima, “Sign Language Problem and Solutions for Deaf and Dumb People”, In the Proceedings of the International Conference on System Modeling & Advancement in Research Trends (SMART), Moradabad, India, 2014.
[6] A. S. Nikam, A. G. Ambekar, "Sign Language Recognition Using Image Based Hand Gesture Recognition Techniques", In the Proceedings of the Online International Conference on Green Engineering and Technologies (IC-GET), Coimbatore, India, pp.1-5, 2016.
[7] N. S. Lele, “Image Classification Using Convolutional Neural Network”, International Journal of Scientific Research in Computer Science and Engineering (IJSRCSE), Vol.6, Issue.3, pp.22-26, 2018.
[8] J. L. Raheja, A. Mishra, and A. Chaudhary, "Indian Sign Language Recognition Using SVM", Pattern Recognition and Image Analysis, Vol.26, Issue.2, pp.434-441, 2016.
[9] A. S. Ghotkar, G. K. Kharate, “Study of Vision Based Hand Gesture Recognition Using Indian Sign Language”, International Journal on Smart Sensing and Intelligent Systems, Vol.7, Issue.1, 2014.
[10] K. Simonyan, A. Zisserman, “Two-stream Convolutional Networks for Action Recognition in Videos”, Advances in Neural Information Processing Systems, pp.568-576, 2014.
[11] L. Wang, Y. Xiong, Z. Wang, Y. Qiao, D Lin, X. Tang, and L. Van Gool, "Temporal Segment Networks: Towards Good Practices for Deep Action Recognition", In the Proceedings of the European conference on Computer Vision, pp.20-36. Springer, Cham, 2016.
[12] A. Karpathy, G. Toderici, S. Shetty, T. Leung, R. Sukthankar and L. Fei-Fei, “Large-scale Video Classification with Convolutional Neural Networks”, In the Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp.1725-1732, 2014.
[13] J. Sun, J. Wang, T. C. Yeh, “Video understanding: from video classification to captioning”. In the Proceedings of the Computer Vision and Pattern Recognition, pp.1-9, Stanford University, 2017.
[14] J. Rege, A. Naikdalal, K. Nagar, R. Karani, “Interpretation of Indian Sign Language through Video Streaming”, International Journal of Computer Science and Engineering (IJCSE), Vol.3, Issue.11, pp.58-62, 2015.
[15] Pradip Patel, Narendra Patel, “Vision Based Real-time Recognition of Hand Gestures for Indian Sign Language using Histogram of Oriented Gradients Features”, in International Journal of Next-Generation Computing, Vol. 10, No. 2, July 2019.
Citation
Manav Prajapati, Mitesh Makawana, Sahil Hada, "Indian Sign Language Recognition for Static and Dynamic Hand Gestures," International Journal of Computer Sciences and Engineering, Vol.8, Issue.9, pp.54-58, 2020.