A Review on Methods of Enhancement And Denoising in Retinal Fundus Images
Research Paper | Journal Paper
Vol.8 , Issue.12 , pp.1-9, Dec-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i12.19
Abstract
Diabetic Retinopathy (DR) is a disease caused by abnormalities in blood vessels in the eyes. DR can be detected in the early stages by the Detection of Micro Aneurysms in fundus retinal images. Retinal fundus pictures are commonly used for finding and analysis of DR disease that help ophthalmologists to complete the evaluation of retinal diseases. By reduction in noise level and by enhancing some features in the image pre-processing techniques are adopted. Restoration of images is done to happen by numerous pre-processing techniques. Here in this paper, the comparison of pre-processing in the retinal fundus image is done. For the precise visual view of DR-related highlights, the nature of fundus pictures should be enhanced to a satisfactory level. The difference is a more critical quality than a unique degree of splendor and goals. The main purpose of the pre-processing technique is to increase the diagnostic possibility in fundus images for visual assessment and also for computer-aided segmentation. This paper deals with the comparison of different retinal image denoising technique and their parameters such as MSE, PSNR, Correlation coefficient, RMS values, etc were reviewed and compared with different datasets for retinal images in connection with the identification of DR and Micro Aneurysms (MA).
Key-Words / Index Term
Spatial Domain filtering; Contrast Enhancement; Vessel enhancement
References
[1] Sisodia, D. S, Nair S, & Khobragade, “Diabetic retinal fundus images Preprocessing and feature extraction for early detection of Diabetic Retinopathy”, Biomedical and Pharmacology Journal, Vol.10, Issue.2, pp.615-626, 2017.
[2] Salazar-Gonzalez, A., Kaba, D., Li, Y., & Liu, X. “Segmentation of the blood vessels and optic disk in retinal images“. IEEE Journal of biomedical and health informatics, Vol.18, Issue.6, pp.1874-1886, 2014.
[3] Lazar, I., & Hajdu, A. “Retinal microaneurysm detection through local rotating cross-section profile analysis“. IEEE transactions on medical imaging, Vol.32, No.2, pp.400-407, 2012.
[4] Shetty, P. G., Patil, S. A., & Avadhoot, R. T. “Detection of Microaneurysm and Diabetic Retinopathy Grading in Fundus Retinal Images“. International Journal of Engineering Trends and Technology, Vol.13, No.7, pp.331-336. 2014.
[5] Kajal Patel, Yogesh Kumar, “Glaucoma detection and classification: A Review“. International journal of computer science and engineering. Vol.7, Issue.4, pp 543-547, 2019.
[6] Gokilavani, C., Rajeswaran, N., Karthick, V. J. A., Kumar, R. S., & Thangadurai, N. “Comparative results performance analysis of various filters used to remove noises in retinal images“. Online International Conference on Green Engineering and Technologies, India 2015.
[7] Qureshi, I., Ma, J., & Shaheed, K. “A Hybrid Proposed Fundus Image Enhancement Framework for Diabetic Retinopathy. Algorithms“, Vol.12 No.1, pp. 14, 2019.
[8] Saurabh, Gaurav, “Survey of automatic detection of diabetic retinopathy using digital image processing“. International journal of computer science and engineering. Vol.7, Issue.3, pp 352-355, 2019.
[9] Yavuz, Z., & Köse, C.“Blood vessel extraction in color retinal fundus images with enhancement filtering and unsupervised classification“ Journal of healthcare engineering, Vol.8, Issue.3, 2017.
[10] Rathinam, S., & Selvarajan, S. “Comparison of image preprocessing techniques on fundus images for early diagnosis of glaucoma“. Int J Sci Eng Res, Vol. 4, pp. 1368-1372, 2013.
[11] Zohair, A. A., Shamil, A. A., & Sulong, G. “Latest methods of image enhancement and restoration for computed tomography: a concise review“. Applied Medical Informatics, Vol.36, Issue.1, pp. 1-12. 2015.
[12] Abbas, Q.; Fondon, I.; Sarmiento, A.; Jiménez, S.; Alemany, P.J.M. “Automatic recognition of severity level for diagnosis of diabetic retinopathy using deep visual features“. Med. Biol. Eng. Comput., Vol.55, pp. 1959–1974. 2017
[13] Kumar, S., Kumar, P., Gupta, M., & Nagawat, A. K. (2010). "Performance comparison of median and wiener filter in image de-noising". International Journal of Computer Applications, Vol.12, Issue.4, pp. 27-31, 2010
[14] Vijayalakshmi, A., Titus, C., & Beaulah, H. L. "Image Denoising for different noise models by various filters: A Brief Survey". International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Vol.3, Issue.6, pp. 42-45, 2014.
[15] Qureshi, I., Ma, J., & Abbas, Q. (2019). "Recent development on detection methods for the diagnosis of diabetic retinopathy". Symmetry, Vol.11, No.6, pp. 749. 2019
[16] Fan, L., Zhang, F., Fan, H., & Zhang, C. (2019). "Brief review of image denoising techniques". Visual Computing for Industry, Biomedicine, and Art, Vol.2, No.1, pp. 7-10, 2019.
[17] Borges, V. R. P., dos Santos, D. J., Popovic, B., & Cordeiro, D. F. "Segmentation of blood vessels in retinal images based on nonlinear filtering". In 2015 IEEE 28th International Symposium on Computer-Based Medical Systems IEEE. pp. 95-96, June 2015
[18] Singla, N., & Singh, N. (2017). "Blood Vessel Contrast Enhancement Techniques for Retinal Images". International Journal of Advanced Research in Computer Science, Vol.8, No.5, 2017.
[19] Soorya, M., Issac, A., & Dutta, M. K. "An automated and robust image processing algorithm for glaucoma diagnosis from fundus images using novel blood vessel tracking and bend point detection". International journal of medical informatics, Vol.110, pp. 52-70, 2018.
[20] Elseid, A. A. G., Elmanna, M. E., & Hamza, A. O. "Evaluation of spatial filtering techniques in retinal fundus images". American Journal of Artificial Intelligence, Vol.2, Issue.2, pp. 16, 2018
[21] Jebaseeli, T. J., Durai, C. A. D., & Peter, J. D. "Retinal blood vessel segmentation from diabetic retinopathy images using tandem PCNN model and deep learning-based SVM". Optik, Vol.199, pp.163328, 2018.
[22] Kumar, H. V., Jayaram, A., Karegowda, A., & Bharathi, P. "A comparative study on filters with special reference to retinal images." Proc Int J Comput Appl, Vol.138, No. (5), pp.81-6, 2016.
[23] Siva Sundhara Raja, D., & Vasuki, S. "Automatic detection of blood vessels in retinal images for diabetic retinopathy diagnosis." Computational and mathematical methods in medicine, 2015.
[24] Lestari, T., & Luthfi, A. "Retinal Blood Vessel Segmentation using Gaussian Filter". In Journal of Physics: Conference Series. IOP Publishing. Vol.1376, No. 1, pp. 012023, November 2019.
[25] Rasta, S. H., Partovi, M. E., Seyedarabi, H., & Javadzadeh, A. "A comparative study on preprocessing techniques in diabetic retinopathy retinal images: illumination correction and contrast enhancement". Journal of Medical signals and sensors, Vol.5, Issue.1, pp. 40, 2015.
[26] Al-amri, S. S., Kalyankar, N. V., & Khamitkar, S. D. "Linear and non-linear contrast enhancement image." International Journal of Computer Science and Network Security, Vol.10(2), pp.139-143, 2010
[27] Singh, K., & Kapoor, R. " Image enhancement using exposure-based sub-image histogram equalization". Pattern Recognition Letters, Vol.36, pp.10-14, 2014.
[28] Rampal, H., Kumar, R. K., Ramanathan, B., & Das, T. P. "Complex shock filtering applied to retinal image enhancement". In World Congress on Medical Physics and Biomedical Engineering, Beijing, China. Springer, Berlin, Heidelberg. Vol.26, No.31, pp. 900-903, May 2012
[29] Azzopardi, G., & Petkov, N. "Automatic detection of vascular bifurcations in segmented retinal images using trainable COSFIRE filters". Pattern Recognition Letters, Vol.34(8), pp.922-933, 2013.
[30] Chakraborti, T., Jha, D. K., Chowdhury, A. S., & Jiang, X. (2015). "A self-adaptive matched filter for retinal blood vessel detection". Machine Vision and Applications, Vol.26, Issue.1, pp.55-68, 2015
[31] Miri, M., Amini, Z., Rabbani, H., & Kafieh, R. "A comprehensive study of retinal vessel classification methods in fundus images". Journal of medical signals and sensors, Vol.7, Issue.2, pp. 59, 2017.
[32] Kande, G. B., Subbaiah, P. V., & Savithri, T. S."Unsupervised fuzzy-based vessel segmentation in pathological digital fundus images". Journal of medical systems, Vol.34, Issue.5, pp.849-858, 2010.
[33] Kondermann, C., Kondermann, D., & Yan, M. "Blood vessel classification into arteries and veins in retinal images". In Medical Imaging 2007: Image Processing International Society for Optics and Photonics. Vol. 6512, pp. 651247, March 2007.
[34] Kande, G. B., Savithri, T. S., & Subbaiah, P. V. "Automatic detection of microaneurysms and hemorrhages in digital fundus images". Journal of digital imaging, Vol.23, Issue.4, pp.430-437, 2010.
Citation
P.S. Bindhya, R. Chitra, V.S. Bibin Raj, "A Review on Methods of Enhancement And Denoising in Retinal Fundus Images," International Journal of Computer Sciences and Engineering, Vol.8, Issue.12, pp.1-9, 2020.
Detection of Cloud Top Height, Cloud Base, Cloud Height and Cloud Temperature Using Ka-Band Radar Data
Research Paper | Journal Paper
Vol.8 , Issue.12 , pp.10-14, Dec-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i12.1014
Abstract
This paper presents a cloud detection based framework for addressing the problem of accurate cloud detection using Ka-band scanning polarimetric radar (Ka-SPR). This framework benefits from Python , which is capable of pixel level labeling of cloud regions and also for identification approach is proposed to identify Cloud Height(CTH), Cloud Base(CB), Cloud Top(CT) and Cloud Temperature (CTemp). Cloud properties detection is an important application of science and technology to detect clouds and measure the amount of water content over a region. The detection is based on various data collection means. Some most recent techniques for weather data collection are based on graphical data from satellite, sensor data collected from different areas, the radar data for cloud parameters, rain gauge which major liquid precipitation for a specific period and disdrometer data which gives drop size distribution. Correlation of CTH, CT, CB is used for calculating reasonable estimation of these parameters. Estimates may also improved somewhat by an observation of cloud types. By using CT data and Cloud pressure the estimation of CTemp is carried out. Different constants were derived from the microscopic properties correlation consistent with each respective cloud type.
Key-Words / Index Term
Cloud detection, Ka-band scanning polarimetric radar (Ka-SPR), Cloud Height, Cloud Base, Cloud Top and Cloud Temperature.
References
[1] D. Atlas,“The estimation of cloud parameters by RADAR”, Journal of meterology ,Air force Cambridge ResearchCentre, Volume 11,No. 10-12, pp. 1103-l 110,Aug 1954.
[2] R. A. Frey, B. A. Baum,“A comparison of cloud top heights computed from airborne lidar and MAS radiance data using CO2 slicing”, journal of geophysical research, vol. 104, no. d20, Pages 24,547–24,555, October 27, 1999.
[3] R. Randriamampianina, J. Nagy,“Determination of Cloud Top Height Using Meteorological Satellite and Radar Data”Phys. Chem. Earth, Division for Numerical Weather Prediction, Hungarian Meteorological Service, Volume 25, No. 10-12, June 2000.
[4] M. Paperine, “Cloud Stuctures”, Hamburg, Germany, Brockmann Consult, pp. 12-14, 2010.
[5] FAA pilot’s handbook of Aeronautical Knowledge, “Weather Theory”, Chapter 12, pp.13-14
[6] Y. Liang, Xuejin Sun,“Cloud Base Height Estimation from ISCCP Cloud-Type Classification Applied to A-Train Data”, Advances in Meteorology, https://doi.org/10.1155/2017/3231719, 14 September 2017.
[7] S. Mohajerani, T. A. Krammer and P. Saeedi,“A Cloud Detection Algorithm for Remote Sensing Images Using Fully Convolutional Neural Networks,” IEEE 20th International Workshop on Multimedia Signal Processing (MMSP), Vancouver, pp. 1-5, doi: 10.1109/MMSP, 2018.
[8] J. R. Probert-Jones,“The radar equation in meteorology”, Quarterly Journal of the Royal Meteorological Society, 88(378), 485–495, doi:10.1002/qj.49708837810, 18 June 1962.
[9] H. K Devisetty, A. K Jha,“A case study on bright band transition from very light to heavy rain using simultaneous observations of collocated X- and Ka-band radars”, Journal of Earth System Science, 128(5), doi:10.1007/s12040-019-1171-0, 14 May 2019.
Citation
Nikita S. Tandale, S.V.Gaikwad, "Detection of Cloud Top Height, Cloud Base, Cloud Height and Cloud Temperature Using Ka-Band Radar Data," International Journal of Computer Sciences and Engineering, Vol.8, Issue.12, pp.10-14, 2020.
DADAR: Duplicate Address Detection using ARP in Mobile Ad Hoc Network (MANET)
Research Paper | Journal Paper
Vol.8 , Issue.12 , pp.15-20, Dec-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i12.1520
Abstract
Mobile Ad Hoc Network (MANET) is infrastructure free, highly dynamic wireless network, where central administration or configuration by an administrator is very difficult. In contrast to infrastructure based network, MANET supports autonomous and spontaneous networking and thus should be capable of self-organization and configuration. This self-configuring network allows the nodes to automatically configure addresses and routes based on ongoing traffic. Due to the distributed and dynamic nature of MANETs, centralized servers like DHCP cannot be used to assign IP address to nodes. In this paper we present a novel approach DADAR, for the efficient duplicate address detection and auto configuration of nodes in a MANET. Special features of DADAR are the support for frequent network partitioning and merging and very low protocol overhead. Nodes choose initial address using random numbers. Duplicate Address Detection (DAD) algorithm resolves the address conflict which can occur due to partitioning or merging. We are devising a novel approach to detect duplicate address using Address Resolution Protocol. ARP messages are sent by nodes to translate IP address to Hardware address. ARP packets contain the IP address and Hardware address pair of the nodes. These packets are analyzed in the background to identify duplicate addresses and conflicts are resolved. This approach does not introduce any new protocol or packet format.
Key-Words / Index Term
DADAR, ARP, Duplicate Address Detection, MANET
References
[1] N.H. Vaidya, “Weak duplicate address detection in mobile ad hoc networks” in the Proceedings of ACM MobiHoc 2002, Lausanne, Switzerland, June 2002
[2] M. Mohsin and R. Prakash, “IP address assignment in a mobile ad hoc network” in the Proceedings of MILCOM 2002, Anaheim, USA, Oct 2002
[3] K. Weniger, “PACMAN: Passive Autoconfiguration for Mobile Ad Hoc Networks”, In the Proceedings of IEEE WCNC 2003, New Orleans – USA (March 2003).
[4] Boudjit S, Adjih C, Muehlethalar P, Laouiti A, “Duplicate Address Detection and Autoconfiguration in OLSR” in Journal of Universal Computer Science, vol. 13, no. 1(2007).
[5] S. Nesargi and R. Prakash, “MANETConf: Configuration of Hosts in a Mobile Ad Hoc Network”, Infocom 2002.
[6] Seung Yi, Jeff Meegan and Jae H. Kim: “Network auto Configuration for Mobile ad Hoc Networks”, In the Proceedings of IEEE 2007.
[7] David C. Plummer, “Ethernet Address Resolution Protocol”. IETF RFC 826, November 1982.
[8] Thomas L., “A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.1-6, 2017.
[9] .GlomoSim: Global mobile information systems simulation library. [Online] http://pcl.cs.ucla.edu/projects/glomosim
[10] S. Tamilarasan, P.K. Sharma, “A Survey on Dynamic Resource Allocation in MIMO Heterogeneous Cognitive Radio Networks based on Priority Scheduling”, International Journal of Computer Sciences and Engineering, Vol.5, No.1, pp.53-59, 2017.
Citation
K. Victor Rajan, V. Rhymend Uthariaraj, "DADAR: Duplicate Address Detection using ARP in Mobile Ad Hoc Network (MANET)," International Journal of Computer Sciences and Engineering, Vol.8, Issue.12, pp.15-20, 2020.
Proposal of a Generative type Travel Chatbot using Seq2Seq model
Research Paper | Journal Paper
Vol.8 , Issue.12 , pp.21-26, Dec-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i12.2126
Abstract
Artificial Intelligence and Machine Learning can be cited as one of the greatest technological advancements in this century. They are revolutionizing the fields of computing, finance, healthcare, agriculture, space, tourism. Powerful models have achieved excellent performance on a myriad of complex learning tasks. One such product of AI is a chatbot. A chatbot is an intelligent software which can simulate a conversation with a user like a real human being. Chatbots have found their use in customer service, recommender systems, smart appliances, etc. Chatbots can be broadly divided into 2 types: Retrieval and Generative. Retrieval type chatbots are trained to provide the best fit answer from a database of predefined responses, whereas, generative type chatbots can generate the final answer from a training corpus. This paper proposes the design and implementation of a generative type travel chatbot using seq2seq model, which can generate answers to the user queries based on Kolkata tourism.
Key-Words / Index Term
Chatbot, Machine Learning, Neural Network, Deep Learning, NLP
References
[1] J. Weizenbaum, “ELIZA - A Computer Program for the study of Natural Language Communication between Man and Machine”, Communications of the ACM, Vol.9, Issue.12, pp.36-45, 1966.
[2] T. Zemcik, “A Brief History of Chatbots”, In the Proceedings of International Conference on Artificial Intelligence, Control and Automation Engineering (AICAE 2019), China, pp.14-18, 2019.
[3] A. Mittal, A. Agarwal, A. Chouksey, R. Sriwas, S. Agrawal, “A Comparative Study of Chatbots and Humans”, International Journal of Advanced Research in Computer and Communication Engineering, Vol.5, Issue.3, pp.1055-1057, 2016.
[4] B. AbuShawar, E. Atwell, “ALICE Chatbot: Trials and Outputs”, Computacion y Sistemas, Vol.19, Issue.4, pp.625-632, 2015.
[5] M. Qiu, F. Li, S. Wang, X. Gao, Y. Chen, W. Zhao, H. Chen, J. Huang, W. Chu, “AliMe Chat: A Sequence to Sequence and Rerank based Chatbot Engine”, In the Proceedings of the 55th Annual Meeting of the Association of Computational Linguistics, Canada, pp.498-503, 2017.
[6] M. Bandyopadhyay, M. Sahoo, M.L. Rangani, J.K. Mirji, “goTripper Chatbot for Tourism”, International Journal of Computer Sciences and Engineering, Vol.7, Special Issue.14, pp.36-40, 2019.
[7] B. Li, N. Jiang, J. Sham, H. Shi, H. Fazal, “Real-world Conversational AI for Hotel Bookings”, In the Proceedings of 2nd International Conference on Artificial Intelligence for Industries (AI4I 2019), USA, pp.58-62, 2019.
[8] S. Santhanam, S. Shaik, “A Survey of Natural Language Generation Techniques with a focus on Dialogue Systems – Past, Present and Future Directions”, CoRR, Vol.abs/1906.00500, 2019.
[9] F.S. Al-Anzi, D.M. AbuZeina, “A Survey of Markov Chain models in Linguistics Applications”, In the Proceedings of the 5th International Conference on Advanced Information Technologies and Applications (ICAITA 2016), UAE, pp.53-62, 2016.
[10] A. Sherstinsky, “Fundamentals of Recurrent Neural Network (RNN) and Long Short Term Memory (LSTM) Network”, CoRR, Vol.abs/1808.03314, 2018.
[11] D. Varshney, A. Ekbal, G.P. Nagaraja, M. Tiwari, A.A.M. Gopinath, P. Bhattacharya, “Natural Language Generation using Transformer in an Open Domain Setting”, In the Proceedings of the 25th International Conference on Natural Language & Information Systems, Germany, pp.82-93, 2020.
[12] K. Cho, B.V. Merrienboer, C. Gulcehre, D. Bahdanau, F. Bougares, H. Schwenk, Y. Bengio, “Learning Phrase Representations using RNN Encoder-Decoder for Statistical Machine Translation”, In the Proceedings of Conference on Empirical Methods in Natural Language Processing (EMNLP 2014), Qatar, pp.1724-1734, 2014.
[13] M. Dwarampudi, N.V. SubbaReddy, “Effects of padding on LSTMs and CNNs”, CoRR, Vol.abs/1903.07288, 2019.
[14] P. Mazare, S. Humeau, M. Raison, A. Bordes, “Training Millions of Personalized Dialogue Agents”, In the Proceedings of Conference on Empirical Methods in Natural Language Processing (EMNLP 2018), Belgium, pp.2775-2779, 2018.
[15] P. Jayachandran, K. Nawas, C. Jackson, S. Ramanath, R. Prabhakaran, “Towards building a Neural Conversation Chatbot through Seq2Seq model”, International Journal of Scientific and Technology Research, Vol. 9, Issue.3, pp.1219-1222, 2020.
[16] G. Gnanaguru, “Programming a Chatbot in Python using Emotional Cognitive Conversational Agent Architecture (ECCAA)”, International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.510-516, 2019.
[17] Z.C. Lipton, J. Berkowitz, C. Elkan, “A critical review of Recurrent Neural Networks for sequence learning”, CoRR, Vol.abs/1506.00019, 2015.
[18] I. Sutskever, O. Vinyals, Q.V. Le, “Sequence to Sequence Learning with Neural Networks”, In the Proceedings of 28th International Conference on Neural Information Processing Systems (NeurIPS 2014), Canada, pp.3104-3112, 2014.
[19] S. Bengio, O. Vinyals, N. Jaitly, N. Shazeer, “A Scheduled Sampling for Sequence prediction with Recurrent Neural Networks”, In the Proceedings of 29th International Conference on Neural Information Processing Systems (NeurIPS 2015), Canada, pp.1171-1179, 2015.
[20] A. Lamb, A. Goyal, Y. Zhang, S. Zhang, A. Courville, and Y. Bengio, “Professor Forcing: A New Algorithm for training Recurrent Networks”, In the Proceedings of 30th International Conference on Neural Information Processing Systems (NeurIPS 2016), Spain, pp.4608-4616, 2016.
Citation
Subhadeep Jana, Souradeep Ghosh, "Proposal of a Generative type Travel Chatbot using Seq2Seq model," International Journal of Computer Sciences and Engineering, Vol.8, Issue.12, pp.21-26, 2020.
MIMO-OFDM System Using Bit Error Rate LS & MSE Analysis in Pilot Based Channel Estimation
Research Paper | Journal Paper
Vol.8 , Issue.12 , pp.27-32, Dec-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i12.2732
Abstract
With the expanding data moving over the remote frameworks, the channel capacity is lessening on a fast rate. To empower high piece rate information move we need wide channel capacity. This can be actualized by utilizing Multiple Input-Multiple Output (MIMO) that is, executing various sending recieving wires and numerous accepting radio wires. Symmetrical Frequency Division Multiplexing (OFDM) when utilized with MIMO improves the nature of the sending data and limit of the communicating channel. In this examination, MIMO and OFDM are applied together so as to decrease Signal-to-Noise Ratio (SNR) and improve the blunders experienced. Here, different channel assessment methods are dissected and executed, for example, (LS) Least Squares and (MMSE) Minimum Mean Square Error for MIMO-OFDM System. The Bit Error Rate, Mean Square Error (MSE) execution attributes of channel are examined for Quadrature Amplitude Modulation (QAM) conspire over the Additive White Gaussian clamor (AWGN). The general presentation of the proposed strategy and existing procedure is estimated utilizing BER and MSE.
Key-Words / Index Term
MIMO (Multiple input multiple output), OFDM (Orthogonal frequency division multiplexing), SNR (signal to noise ratio), MSE (Mean square Error), QAM (quadrature amplitude modulation), AWGN (additive white Gaussian noise)
References
[1] S. Alamouti “A simple transmit diversity technique for wireless communications”, IEEE Journal on selected Areas in Communication, Volume 16, Pages1451-14588, 1998.
[2] Li Y “Simplified channel estimation for OFDM systems with multiple transmits antennas”, IEEE Transactions on Wireless Communications, Volume 1, Pages Jan; 1(1):67-75, 2002.
[3] M.Debbah, W.Hachem, P.Loubaton. M.De Courville. MMSE analysis of certain large isometric random precoded systems. IEEE Transactions on Information theory. 49(5):1293-311, May 2003.
[4] Li Y. Pilot-symbol-aided channel estimation for OFDM in wireless systems. IEEE transactions on vehicular technology. 49(4):1207-15, Jul 2000.
[5] Coleri S, Ergen M, Puri A, Bahai A. Channel estimation techniques based on pilot arrangement in OFDM systems. IEEE Transactions on broadcasting. 48(3):223-9, Sep 2002.
[6] Bolcskei H, Borgmann M, Paulraj AJ. Impact of the propagation environment on the performance of space-frequency coded MIMO-OFDM. IEEE Journal on Selected Areas in Communications. 21(3):427-39, Apr 2003.
[7] Tarighat A, Sayed AH. MIMO OFDM receivers for systems with IQ imbalances. IEEE Transactions on Signal Processing. 53(9):3583-96. Sep 2005.
[8] Stuber GL, Barry JR, Mclaughlin SW, Li Y, Ingram MA, Pratt TG. Broadband MIMO-OFDM wireless communications. Proceedings of the IEEE. 92(2):271-94, Feb 2004.
[9] Tang X, Alouini MS, Goldsmith AJ. Effect of channel estimation error on M-QAM BER performance in Rayleigh fading. IEEE Transactions on Communications. 47(12):1856-64, Dec 1999.
[10] Colieri S, Ergen M, Puri A, Bahai A. A study of channel estimation in OFDM systems. In Vehicular Technology Conference, 2002. Proceedings. VTC 2002-Fall. 2002 IEEE 56th. Vol. 2, pp. 894-898, 2002.
[11] Van De Beek JJ, Edfors O, Sandell M, Wilson SK, Borjesson PO. On channel estimation in OFDM systems. In Vehicular Technology Conference, 1995 IEEE 45th 1995 Jul 25 (Vol. 2, pp. 815-819, 1995). IEEE.
[12] Kaur N, Kansal L. Performance comparison of MIMO systems over AWGN and Rician channels with zero forcing receivers. International Journal of Wireless & Mobile Networks. 1; 5(1):73, Feb 2013.
[13] Kansal L, Kansal A, Singh K. BER analysis of MIMO-OFDM system using OSTBC code structure for M-PSK under different fading channels. International Journal of Scientific & Engineering Research. 2(11):1-2. Nov 2011.
[14] Paris JF, Aguayo-Torres MC, Entrambasaguas JT. Impact of channel estimation error on adaptive modulation performance in flat fading. IEEE transactions on communications. 52(5):716-20, May 2004.
[15] Raju M, Reddy KA. Mean square error analysis in MIMO-OFDM system using pilot based channel estimation. In Signal Processing, Communication, Power and Embedded System (SCOPES), 2016 International Conference on 2016 Oct 3 (pp. 1631-1636, 2016). IEEE.
[16] A. Kakadiya, M.M. Solanki, Analysis of adaptive channel estimation techniques in MIMO OFDM System, International Journal of Advancement in Research and Technology 2,4,April 2013.
Citation
Randeep Kaur, Sarabjeet Kaur, "MIMO-OFDM System Using Bit Error Rate LS & MSE Analysis in Pilot Based Channel Estimation," International Journal of Computer Sciences and Engineering, Vol.8, Issue.12, pp.27-32, 2020.
Privacy Preserving Search Over Encrypted Data with Secure and Dynamic Operation in Cloud Computing
Research Paper | Journal Paper
Vol.8 , Issue.12 , pp.33-38, Dec-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i12.3338
Abstract
— Due to the increasing significance of cloud computing, additional and tremendous information of data owners are made to outsource their information to cloud servers for excellent convenience and to lessen cost in information management. However, sensitive information ought to be encrypted before outsourcing for privacy needs that obsoletes information utilization like keyword-based document retrieval. In this paper, a secure multi-keyword search method over encrypted cloud data is described. At the same time it also supports dynamic update operations like deletion and insertion of documents. For index construction and query generation, the vector space model and widely-used TF_IDF model both are combined. A special tree- based index structure is constructed and a “Greedy Depth-first Search” method is proposed to produce economical multi-keyword ranked search. The secure KNN is used to encrypt the index and vectors. It also guarantees about correctness in appropriate score calculation between encrypted index and query vectors. In order to stop statistical attacks, phantom terms are intercalary to the index vector for accurate search results. As special tree-based index structure is used, the proposed method is able to do sub- linear search time and also handle the deletion and insertion of documents flexibly.
Key-Words / Index Term
Searchable encryption, multi-keyword ranked search, dynamic update, cloud computing
References
[1]. K. Ren, C.Wang, Q.Wang et al., “Security challenges for the public cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69–73, 2012.
[2]. B. Wang, S. Yu, W. Lou, and Y. T. Hou, “Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud,” in IEEE INFOCOM, 2014.
[3]. S. Kamara and K. Lauter, “Cryptographic cloud storage,” in Financial Cryptography and Data Security. Springer, pp. 136– 149. 2010.
[4]. C. Gentry, “A fully homomorphic encryption scheme,” Ph.D.dissertation, Stanford University, 2009.
[5]. E. Shen, E. Shi, and B. Waters, “Predicate privacy in encryption systems,” in Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography. Springer-Verlag, pp. 457–473, 2009.
[6]. D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Advances in Cryptology- Eurocrypt 2004. Springer, pp. 506–522, 2004.
[7]. D. Boneh, E. Kushilevitz, R. Ostrovsky, and W. E. Skeith III,“Public key encryption that allows pir queries,” in Advances in Cryptology-CRYPTO 2007. Springer, pp. 50–67, 2007.
[8]. D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on. IEEE, 2000, pp. 44– 55.
[9]. B. Wang, S. Yu, W. Lou, and Y. T. Hou, “Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud,” in IEEE INFOCOM, 2014.
[10]. Y. H. Hwang and P. J. Lee, “Public key encryption with conjunctive keyword search and its extension to a multi-user system,” in Proceedings of the First international conference on Pairing-Based Cryptography. Springer-Verlag, pp. 2–22, 2007.
[11]. D. Boneh and B. Waters, “Conjunctive, subset, and range queries on encrypted data,” in Proceedings of the 4th conference on Theory of cryptography. Springer-Verlag, pp. 535–554, 2007.
[12]. B. Zhang and F. Zhang, “An efficient public key encryption with conjunctive-subset keywords search,” Journal of Network and Computer Applications, vol. 34, no. 1, pp. 262–267, 2011.
[13]. J. Katz, A. Sahai, and B. Waters, “Predicate encryption supporting disjunctions, polynomial equations, and inner products,” in Advances in Cryptology–EUROCRYPT 2008. Springer, pp. 146–162, 2008.
[14]. E. Shen, E. Shi, and B. Waters, “Predicate privacy in encryption systems,” in Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography. Springer-Verlag, pp. 457–473, 2009.
[15]. A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, “Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption,” in Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques. Springer-Verlag, pp. 62–91, 2010.
[16]. A. Swaminathan, Y. Mao, G.-M. Su, H. Gou, A. L. Varna, S. He, M.Wu, and D.W. Oard, “Confidentiality-reserving rank-ordered search,” in Proceedings of the 2007 ACM workshop on Storage security and survivability. ACM, pp. 7–12, 2007.
Citation
Poonam Patil, Seema Mane, "Privacy Preserving Search Over Encrypted Data with Secure and Dynamic Operation in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.8, Issue.12, pp.33-38, 2020.
Online Intrusion and Security Measures in Social Networking Environment – A Survey
Survey Paper | Journal Paper
Vol.8 , Issue.12 , pp.39-45, Dec-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i12.3945
Abstract
Social networking has become the topmost application among users to share and communicate information. With the advancement in communication and smartphone capabilities increasing number of users are connected to social network. News items, memes and marketing campaigns are all hosted on social network. Enterprises are also using social network to reach to more customer bases. The popular online social networking platforms such as Twitter, Facebook, Instagram etc. have attracted public helping them connected to family, friends, and relatives. People share videos, texts, pictures, and some confidential information knowingly or unknowingly through these sites and thus, OSNs have become the main source of targets for cyber attackers. Cyberattacks have been increasing for the last few decades throwing a serious threat to the internet world. Security of personal data on social network user is important. In this survey, the various methods of intrusion of social networks for gaining access to private information and the countermeasures are studied. The goal of study is to identify open issues, so that a more secure solution can be designed to solve the problem and discuss about various OSN threats such as misuse of identity, malware, phishing attacks etc. and recommends some of the threat’s preventive measures.
Key-Words / Index Term
Online Social Networks, Cyberattack, Identity theft, Security
References
[1] Shin, D., R. Lopes, W. Claycomb, G. Ahn, “A Framework for Enabling User-controlled Persona in Online Social Networks,” in 33rd Annual IEEE International Computer Software and Applications Conference, pp. 292–297, 2009.
[2] Luo, W., Q. Xie, and U. Hengartner, “FaceCloak: An Architecture for User Privacy on Social Networking Sites,” in Proc. of PASSAT-09, pp. 26-33, August 2009.
[3] Carminati, B., E. Ferrari, R. Heatherly, M. Kantarcioglu, B. Thurainsingham, “A Semantic Web Based Framework for Social Network Access Control” in Proc. SACMAT’09, pp. 177-186, June 2009
[4] Bo Feng, Qiang Li, Xiaowen Pan GroupFound: “An effective approach to detect suspicious accounts in online social networks”, International journal of distributed sensors 19 February 2017.
[5] Viswanath B, Bashir MA, Crovella M, et al. Towards detecting anomalous user behavior in online social networks. In: Proceedings of the 23rd USENIX security symposium (USENIX security 14), San Diego, CA, 20–22 pp.223–238, August 2014. USENIX Association
[6] K. Singh, S. Bhola, and W. Lee, “XBook: Redesigning Privacy Control in Social Networking Platforms,” Proc. 18th Usenix Security Symp. (SSYM 09), Usenix Assoc., pp. 249–266, 2009.
[7] LinqingLiu, YaoLu, YeLuo "Detecting Smart spammers On Socia lNetwork: A Topic Model Approach" Proceedings of NAACL-HLT 2016
[8] L., Molva, R., Strufe, T.: Safebook: A privacy-preserving online social network leveraging on real-life trust. IEEE Communications Magazine 47(12), 94–101, 2009.
[9] Claudia Wagner "When social bots attack: Modeling susceptibility of users in online social networks" 1012 Proceedings on International conference on World Wide Web
[10] Jack Lindamood, Raymond Heatherly "Inferring Private Information Using Social Network Data" WWW 2009, April 20–24, 2009
[11] Richmond Hill "A trust-based approach for protecting user data in social networks" CASCON `07 Proceedings of the 2007 conference of the center for advanced studies on Collaborative research
[12] Bo Luo; Lee, D., "On Protecting Private Information in Social Networks: A Proposal," Data Engineering, 2009. ICDE `09. IEEE 25th International Conference on, vol., no., pp.1603,1606, March 29, 2009-April 2, 2009
[13] M. Fire, G. Katz, and Y. Elovici," Strangers Intrusion Detection Detecting Spammers and Fake Profiles in Social Networks Based on Topology Anomalies", HUMAN, 1(1), pp: 26-39, 2012.
[14] Hua Shen, Xinyue Liu "Detecting Spammers on Twitter Based on Content and Social Interaction” International Conference on Network and Information Systems for Computers 2015
[15] Lee K, Caverlee J, Webb S. Uncovering social spammers: social honeypots+ machine learning. Proceeding of the 33rd international ACM (SIGIR) conference on Research and development in information retrieval, Geneva, Switzerland, 2010:435-442.
[16] Shareen Irshad1 and Tariq Rahim Soomro "Identity Theft and Social Media" IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.1, January 2018.
[17] Michael Fire, Dima Kagan, Aviad Elishar, and Yuval Elovici "Social Privacy Protector - Protecting Users’ Privacy in Social Networks" The Second International Conference on Social Eco-Informatics SOTICS 2012.
[18] M. Egele, A. Moser, C. Kruegel, and E. Kirda, “Pox: Protecting users from malicious facebook applications,” in Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on. IEEE, pp. 288–294, 2011.
[19] Y. Liu, K. Gummadi, B. Krishnamurthy, and A. Mislove, “Analyzing facebook privacy settings: User expectations vs. reality,” in Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. ACM, pp. 61–70, 2011.
Citation
Jamuna Rani S., Vagdevi S., "Online Intrusion and Security Measures in Social Networking Environment – A Survey," International Journal of Computer Sciences and Engineering, Vol.8, Issue.12, pp.39-45, 2020.
Insurance Approval Analysis using Machine Learning Algorithms
Survey Paper | Journal Paper
Vol.8 , Issue.12 , pp.46-50, Dec-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i12.4650
Abstract
Risk Management is important for insurance industry to ensure the eligibility of a new customer for approval. Insurance companies need to analyze the existing customer’s information such as income, assets, occupation, premium payment records to decide whether a new customer is qualified for an insurance policy. This paper focuses on forecasting the eligibility of the new customers for insurance approval by performing classification on a real time insurance company dataset using three Machine Learning algorithms such as Decision Tree Induction, Naive Bayes Classification and K-Nearest Neighbor algorithms. These algorithms are examined against their classifier accuracy after implementation and the algorithm that demonstrates the best accuracy is chosen for predicting the new customers.
Key-Words / Index Term
Insurance, Machine Learning, Decision Tree Induction, Naive Bayes Classification and K-Nearest Neighbor, Classifier
References
[1] Bhalla A. Enhancement in predictive model for insurance underwriting. Int J Comput Sci Eng Technol 3:160–165, 2012.
[2] Sagar S. Nikam,2015. “A Comparative Study of Classification Techniques in Data Mining Algorithms”. Oriental Journal of Computer Science & Technology, Vol. 8, April 2015.
[3] Mamun DMZ, Ali K, Bhuiyan P, Khan S, Hossain S, Ibrahim M, Huda K. Problems and prospects of insurance business in Bangladesh from the companies’ perspective. Insur J Bangladesh Insurance Acad 62:5–164, 2016.
[4] Fang K, Jiang Y, Song M. Customer profitability forecasting using Big Data analytics: a case study of the insurance industry. Comput Ind Eng 101:554–564, 2016.
[5] Cummins J, Smith B, Vance R, Vanderhel J. “Risk classificaition in Life Insurance”. 1st edn. Springer, New York, 2013.
[6] S.Archana and Dr. K. Elangovan, 2014. “Survey of Classification Techniques in Data Mining”. International Journal of Computer Science and Mobile Applications, Vol. 2 Issue. 2, February 2014.
[7] Bhavesh Patankar and Dr. Vijay Chavda, 2014. “A Comparative Study of Decision Tree, Naive Bayesian and k-nn Classifiers in Data Mining”. International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, Issue 12, December 2014.
[8] K. P. Soman, 2006 . “Insight into Data Mining Theory and Practice”, New Delhi: PHI, 2006.
[9] S. B. Kotsiantis, 2007. “Supervised Machine Learning: A Review of Classification Techniques”. Informatica, vol. 31, pp. 249-268, 2007.
[10] H. Bhavsar and A. Ganatra, 2012. “A Comparative Study of Training Algorithms for Supervised Machine Learning”. International Journal of Soft Computing and Engineering (IJSCE), Vol. 2, Issue. 4, September 2012.
[11] Brijain R. Patel and Kushik K.Rana, 2014. “A Survey on Decision Tree Algorithm for Classification”. International Journal of Engineering Development and Research, 2014.
[12] Matthew N. Anyanwu and Sajjan G. Shiva, 2009. “Comparative Analysis of Serial Decision Tree Classification Algorithms”. Researchgate, January 2009.
[13] Saurav Singla , Vikash Kumar, 2020. Multi-Class Sentiment Classification using Machine Learning and Deep Learning Techniques. International Journal of Computer Sciences and Engineering (IJCSE). Vol. 8, Issue.11, November 2020 E-ISSN: 2347-2693. DOI: https://doi.org/10.26438/ijcse/v8i11.1420.
Citation
CH. Lakshman Vinay, G. Vijay Sagar, M. Ajay, SK. Hussain, Bh Padma, "Insurance Approval Analysis using Machine Learning Algorithms," International Journal of Computer Sciences and Engineering, Vol.8, Issue.12, pp.46-50, 2020.
Apply Canny Detector and Hough Transform For Lane Tracking by Autonomous Type Vehicles
Research Paper | Journal Paper
Vol.8 , Issue.12 , pp.51-54, Dec-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i12.5154
Abstract
In this Research we are using canny detector and Hough Transform algorithm for Lane detection. In this research Hough Transformation is use for Find all the edge points in the image using any suitable edge detection scheme and Canny detector for is to detect sharp changes in luminosity (large gradients), such as a shift from white to black, and defines them as edges, given a set of thresholds.
Key-Words / Index Term
edge detection, histogram, time complexity, accuracy, lane detection
References
[1]Dr Narapareddy Ramarao 1 B Vivek Bhat 2 Kartik Kulkarni3 Ashley4 Raban Akbary5 1 2 3 4 5 Department of Electrical and Electronics, BMSIT&M, Banglore-64 Corresponding Author; Dr Narapareddy Ramarao, ISSN : 2248-9622 Vol. 9, Issue 3 (Series -VI), pp 28-35, March 2019.
[2]Farid Bounini, Denis Gingras LIV – Université de Sherbrooke Sherbrooke, Canada farid.bounini@usherbrooke.ca denis.gingras@usherbrooke.ca Vincent Lapointe, Herve Pollart Opal-RT Technologies Inc, Montreal, Canada vincent.lapointe@opal-rt.com herve.pollart@opal-rt.com
[3]Proceedings of the International Conference on Computer and Communication Engineering 2008 Kuala Lumpur, Malaysia 978-1-4244-1692-9/08/$25.00 ©2008 IEEE “Real Time Lane Detection for Autonomous Vehicles” Abdulhakam.AM. Assidiq, Othman O. Khalifa, Md. Rafiqul Islam, Sheroz Khan, Department of Electrical & Computer Faculty of Engineering, International Islamic University Malaysia, Jalan Gombak, 53100 K.L., Malaysia. E-mail: khalifa@iiu.edu.my, May 13-15, 2008.
[4] Benefits of V2V Communication for Autonomous and Connected Vehicles, Swaroop Darbha, Shyamprasad Konduri, Prabhakar R. Pagilla
[5]web.ipac.caltech.edu/staff/fmasci/home/astro_refs/HoughTrans_lines_09.pdf
Citation
Gurpreet Kaur, Deepinder Kaur, "Apply Canny Detector and Hough Transform For Lane Tracking by Autonomous Type Vehicles," International Journal of Computer Sciences and Engineering, Vol.8, Issue.12, pp.51-54, 2020.
3-D Digital Signature based on SHA-AES-ECC Scheme using Galois Field over GF(2n)
Research Paper | Journal Paper
Vol.8 , Issue.12 , pp.55-61, Dec-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i12.5561
Abstract
Approaches of handwritten signatures is no longer adequate for protection with the development of Internet technology, so the modern technique called digital signature has emerged. Digital signature is more typically used as term encompassing only cryptographic signatures. Digital signatures are mainly used in the delivery of financial transfers, certificates and applications, where the prevention of forgery or tampering of data is crucial. But even within digital signature, there are cryptographic techniques like AES, SHA and asymmetric enciphering mechanism such as ECC combined together to make it highly secure, used three steps mechanism of generation and verification called as 3-D signature. This research paper discusses the combination of all three modes of security such as Symmetrical, Hashing and Asymmetrical cryptography to make the digital signature more secure and invulnerable to attack. The simulation results shows that the proposed 3-D digital signature scheme along with Galois Field is suitable for used in real time environment like IoT, WSN, Cloud computing and low memory devices such as smart cards. The proposed technique is based on mathematical model used in SHA-AES-ECC with Galois Field GF(2n) with irreducible polynomial. Python Programming language is used to grasp the method used.
Key-Words / Index Term
Digital Signatures, AES, ECC, SHA, Galois Field, 3-D, ECDSA, Encryption using symmetrical and asymmetric cryptography, Hash function, Irreducible Polynomial.
References
[1] Roy A., Banik S., Karforma S., “Object Oriented Modelling of RSA Digital Signature in E-Governance Security”, International Journal of Computer Engineering and Information Technology (IJCEIT), Vol. 26, Issue No. 01, pp. 24-33, 2011.
[2] Kain K, Smith SW, Asokan R., “Digital signatures and electronic documents: a cautionary tale”. In the proceeding of 2002 International Conferences in advanced communications and multimedia security, Springer USA, 2002, pp. 293-307, 2002.
[3] D. Boneh, H. Shacham, “Group signatures with verifier-local revocation”, 11th ACM Conference on Computer and Communications Security CCS, Washington DC USA, pp.168–177, 2004
[4] Sergei G. Chernyi, Aslamin A. Ali, Vycheslav V. Veselkov, Ivan L. Titov and Vlad Yu. Budnik, "Security of Electronic Digital Signature in Maritime Industry", IEEE International Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Russia, pp. 29-32, 2017.
[5] Joppe W. Bos, Craig Costello, Patrick Longa, Michael Naehrig, “Selecting elliptic curves for cryptography: An efficiency and security analysis”, Journal of cryptographic Engineering Springer, Volume 6, issue 4, pp. 259-286, 2016.
[6] S. M. C. Vigila and K. Muneeswaran, "Implementation of text based cryptosystem using Elliptic Curve Cryptography," IEEE International Conference on Advanced Computing, Chennai, pp. 82-85, 2009.
[7] T. Ebanesar, G. Suganthi, "Improving Login Process by Salted Hashing Password Using SHA-256 Algorithm in Web Applications," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.27-32, 2019.
[8] Laiphrakpam, Dolendro Singh and Khumanthem Manglem Singh, “Image Encryption using Elliptic Curve Cryptography”, Elsevier, Procedia Computer Science,11th Int. Multi-Conference on Information Processing-2015 (IMCIP-2015), Bangalore, pp. 472-481, 2015.
[9] Li, Ahmed A. Abd El-Latif , Xiamu Niu, “Elliptic Curve ElGamal based homomorphic image encryption scheme for sharing secret images”, Elsevier Signal Processing, (2012), Vol.92, Issue-4, pp. 1069-1078, 2012.
[10] D.S. Kumar, CH. Suneetha A, Chandrasekh A R, "Encryption of Data Using Elliptic Curve Over Finite Fields," International Journal of Distributed and Parallel Systems, vol. 3, Issue 01, pp. 103-108, 2012.
[11] R. Singh, R. Chauhan, V. K. Gunjan, P. Singh, "Implementation of Elliptic Curve Cryptography for Audio Based Application," International Journal of Engineering Research & Technology (IJERT), vol. 3, Issue no. 01, pp. 2210-2214, 2014.
[12] Parthajit Roy, "A Tripartite Zero Knowledge Authentication Protocol based on Elliptic Curve Weil Pairing," International Journal of Computer Sciences and Engineering, Vol.5, Issue.9, pp.27-31, 2017.
[13] P. S. Yadav, P. Sharma, K. P. Yadav, "Implementation of RSA Algorithm Using Elliptic Curve Algorithm for Security and Performance Enhancement," International Journal of Scientific & Technology Research, vol. 1, Issue no. 4, pp. 102-105, 2012.
[14] L. Tawalbeh, M. Mowafi, W. Aljoby, "Use of Elliptic Curve Cryptography for Multimedia Encryption," IET Information Security, Volume-07, Issue-02, pp. 67-74, 2012.
[15] William Stallings, “Cryptography and Network Security”, Prentice Hall, India, 5th Edition, Pages 285-296, 2010.
[16] Kaufman, c., Perlman, R., and Speciner, M., “Network Security, Private Communication in a public world”, India, 3rd Edition. Prentice Hall Print, pp. 283-290, 2015.
[17] Behrouz A Forouzan, “Cryptography and Network Security”, McGraw Hill, Inida, 2nd Edition, pp. 290-297, 2010.
[18] Bruce Schneier, “Applied Cryptography: Protocols, Algorithms and source code in C”, Wiley publishing Inc., India, 2nd Edition, pp. 201-235, 2015.
Citation
Mohammad Amjad, Aman Arora, "3-D Digital Signature based on SHA-AES-ECC Scheme using Galois Field over GF(2n)," International Journal of Computer Sciences and Engineering, Vol.8, Issue.12, pp.55-61, 2020.