The exponential growth in wireless environment ensures extended mobility to the end-users. Mobility provides different levels of flexibity in operation but induces certain security risks. The security risks exist mainly in the form of unauthorized or fake access points to which end users can connect. The illegitimate connections could lead to eavesdropping on the end users and initiating security attacks (such as evil twins exploit). In this paper, we propose a method which uses label-hopping technique to detect fake wireless Access Point (AP). Once detected, such fake AP could be identified and removed from the wireless environment. We use Wireless Local Area Network (WLAN) based environment, as an example for applying the proposed technique. The proposed technique is extensible to mobile wireless networks such as 4th=5th generation mobile.
Key-Words / Index Term
The concept of mobility for end users has intro-duced both security risk and an exponential growth of base stations and Wireless Access Points
 N. Sathya Narayanan, Milan Patnaik, V. Kamakoti, ProMAC: A proactive model predictive control based MAC protocol for cognitive radio vehicular networks, Computer Commu-nications, Volume 93, 2016, Pages 27-38,ISSN0140-3664, https://doi.org/10.1016/j.comcom.2016.05.012.
 K. Bauer, H. Gonzales and D. McCoy, Mitigating Evil Twin Attacks in 802.11, IEEE International Performance, Com-puting and Communications Conference, Austin, Texas, 2008, pp. 513-516. doi: 10:1109/PCCC.2008.4745081
 M. Martellini, A. Stanislav, S Gaycken, and C. Wilson, Information Security of Highly Critical Wireless Networks, Springer International Publishing, 2017, pp. 11-15. doi: 10.1007=978-3-319-52905-9 4
 D. Pleskonjic, S. Omerovic, and S. Tomazic, Network Sys-tems Intrusion: Concept, Detection, Decision, and Prevention, IPSI BgD Transactions on Internet Research, vol. 3(1), 2007.
 Anik Shah, Animesh Shah, ”A Survey: Wireless Lan Security Protocols”, IJECS, vol. 4, no. 3, pp. 10968-10971, March 2015.
 U. Deshpande, T. Henderson, D. Kotz. Channel sampling strategies for monitoring wireless networks., In: Proceedings of the second workshop on wireless network measurements, Boston, April 2006.
 S Raman, B Venkat, G Raina, Mitigating Some Security Attacks in MPLS-VPN Model “C”, International Journal on Advances in Networks and Services, vol. 5(3 4),2012.
 J.Lawrence Carter, M. N.Wegman, Universal classes of hash functions Elseveir Journal of Computer and System Sciences, vol. 8(2), pp. 143154, 1979.
 V Boyko, P MacKenzie, and S Patel, Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman, Advances in Cryptology — EUROCRYPT 2000, Springer, Ed.B Preneel, pp.156171, 2000.
 D Wang, P Wang, Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards., In: Desmedt Y. (eds) Information Security. Lecture Notes in Computer Science, vol 7807. Springer, 2015.
 T H Cormen, C E Leiserson, R L Rivest, C Stein, Introduction algorithms, MIT press, 2009.
 Ting, M T David, O Hussain, and G LaRoche, Systems and methods for multi-factor authentication, U.S. Patent 9; 118; 656, 2015.
 N Karapanos, M Claudio Marforio, S Claudio and C Srdjan, Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound,In USENIX Security Symposium, pp. 483 498,2015.
 Romero, Francisco Javier Dominguez, Kyriakos Exadactylos, and Andrea De Pasquale. ”Cell barring in a cellular communi-cation network.” U.S. Patent 8,718,655, issued May 6, 2014.
S.P. Meenakshi, Jacintha Thomas, K S Balaji, Sathya Narayanan N, Shankar Raman, V Kamakoti, "Detecting Unauthorized Access Points in Wireless Environment", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.246-250, 2018.
Video data hiding is a very Abstract – Video data hiding is very important research topic. Security of information is major concern of information technology and communication. This paper introduces svd and Least Significant bit substitution technique for hiding data in video file. In this paper data hiding a form of cryptography embeds data into digital media for the purpose of identification, annotation. These algorithms are a basic algorithm of encryption and decryption for data hiding. The framework is tested by all kind of videos such as .mp4, .3gp, .avi etc., and gets successful output for all video data hiding process. The three components Red, Green, Blue of (RGB) space are utilized by this scheme to embed watermark into the cover image. Specifically the combinations of Singular Value Decomposition (SVD) of Blue channel are used to embed the data hiding. The singular values of wavelet subband coefficients of Blue channel are use in different scaling factors to embed the singular values of the data. The SVD increases the security, robustness and imperceptibility of the scheme. The proposed scheme used by security, while hiding the video to provide security for encrypts and decrypt process. The simulation results show that the process of hiding the video by security.
Key-Words / Index Term
Video Data hiding, Encryption, Decryption, Security Data, SVD
Noise models in digital image processing Ajay Kumar Boyat1 and Brijendra Kumar Joshi2-2, April 2015.
 A survey on security issues: digital images Srinivas Koppu1, madhuviswanatham-18-06-2016.
 A Survey on Separable Reversible Data Hiding in Encrypted Image Ganesh Gunjal- 7, July 2015.
 Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation J. W. Zhang-2014.
 A Survey on Data Hiding Techniques in Encrypted Images- Minu Lalitha Madhavu- 1, January 2016.
 Alexandre H. Paqueta, Rabab K. Ward, Ioannis Pitas, Wavelet packets-Based digital watermarking for image Verification and authentication. Signal Processing.2003.
 T. Amornraksa, K. Janthawongwilai. Enhanced images watermarking based on amplitude modulation. Journal Image and Vision Computing.2006.
 Haohao song_, songyu yu, xiaokang yang, li song, Chen wang. Contourlet-Based
 Han-Min Tsai, Long-WenChang. Secure reversible visible mage watermarking with authentication. J Signal Processing: Image Communication.2010.
 YounhoLee, Heeyoul Kim, Yongsu Park. A new data hiding scheme for binary image authentication with small image distortion.J Information Sciences.2009
P.S.S. Akilashri, M.Kannan, "Secure Data Hiding in Encrypted Video Using SVD", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.251-255, 2018.
Sentiment analysis is one of the fastest growing research areas in computer science, which is helpful to analyze people’s opinions, sentiments, evaluations, attitudes and emotions from written language. It is widely studied in data mining, web mining, and text mining. This survey paper presents a comprehensive study on various recently used sentiment analysis techniques. The main target of this survey paper is to give full image of sentimental analysis techniques and the related field with brief details. The cluster of datasets given as a input and the accuracy level is checked by using discourse relations. The limitations and features are also discussed.
Key-Words / Index Term
Sentiment analysis, Discourse relations, Baseline algorithms, Text mining
 Liu. B,"Sentiment analysis and opinion mining", Synthesis Lectures On Human Language Technologies,vol.5,no.1, pp.1-167,2012
 Pang B. Lee, L. and Vaithyanathan, S., ,“Sentiment classification using machine learning techniques”, In Proceedings of The Acl-02 Conference On Empirical Methods In Natural Language Processing,vol.10,no., pp.79-86,July 2002
 Chaovalit P. and Zhou L.,"Movie review mining", A Comparison Between Supervised And Unsupervised Classification Approaches,vol.,no., pp.,January 2005
 Miller G.A,"WordNet a lexical database for english", Communications Of The Acm,vol.38, no.11, pp.39-41,1995  Tripathy A, Agrawal A and Rath S.K,"Classification of Sentimental Reviews Using Machine Learning Techniques", Procedia Computer Science,vol.57,no., pp.821-829,2015
 Shahana P.H. and Omman B,"Evaluation of Features on Sentimental Analysis", Procedia Computer Science,vol.46,no., pp.1585-1592,2015
Jeyapriya A. and Selvi K,"Extracting aspects and mining opinions in product reviews using supervised learning algorithm", In Electronics And Communication Systems,vol.,no., pp.548-552,February 2015
 Kanakaraj M. and Guddeti R.M.R,"Performance analysis of Ensemble methods on Twitter sentiment analysis using NLP techniques", In Semantic Computing., pp.169-170,February 2015
 Mouthami K, Devi K.N. and Bhaskaran V.M,"Sentiment analysis and classification based on textual reviews", In Information Communication And Embedded Systems,pp.271-276,February 2013
Bhadane C., Dalal H. and Doshi H,"Sentiment analysis: Measuring opinions", Procedia Computer Science,vol.45,no., pp.808-814,2015
 Gautam G. and Yadav D,"Sentiment analysis of twitter data using machine learning approaches and semantic analysis", In Contemporary Computing,, pp.437-442,August 2014
Zhou X, Tao X., Yong J and Yang Z,"Sentiment analysis on tweets for social events", In Computer Supported Cooperative Work In Design (Cscwd), pp.557-562,June 2013
Go A, Bhayani R. and Huang L,"Twitter sentiment classification using distant supervision", Cs224N Project Report,vol.1,no., pp.12,2009
Khan F.H., Qamar U. and Javed M.Y,"Sentiview: A visual sentiment analysis framework", In Information Society (I-Society),vol.,no., pp.291-296,November 2014
da Silva N.F., Hruschka E.R. and Hruschka E.R,"Tweet sentiment analysis with classifier ensembles", Decision Support Systems,vol.66,no., pp.170-179,2014
Michael W. Berry,"Soft Computing in Data Science", Communications In Computer And Information Science,vol.,no., pp.,2-3 Sep 2015
Patel S.N. and Choksi M.J.B,"A Survey of Sentiment Classification Techniques", Journal For Research,vol.1,no., pp.1,2015
Heerschop B., Goossen F., Hogenboom A., Frasincar F., Kaymak U. and de Jong F,"Polarity analysis of texts using discourse structure", In Proceedings Of Cimk,vol.,no., pp.1061-1070,2011
Hernault H., Bollegala D. and Ishizuka M,"A semi-supervised approach to improve classification of infrequent discourse relations using feature vector extension", In Proceedings Of The Emnlp,vol.,no., pp.399-409,2010
Joty S Carenini G. and Ng R.T,"A novel discriminative framework for sentence-level discourse analysis", In Proceedings Of Emnlp,vol.,no., pp.904-915,2012
Mann W.C. and Thompson S.A,"Rhetorial structure theory", Towards A Functional Theory Of Text Organization,vol.8,no.3, pp.243-281,1988
Narayanan R., Liu, B. and Choudhary A,"Sentiment analysis of conditional sentences", In Proceedings Of Emnlp,vol.,no., pp.180-189,2009
Pang B. and Lee L,"Opinion mining and sentiment analysis", Information Retrieval,vol.2,no.1, pp.1-135,2008 Polanyi L. and Zaenen A,"Contextual valence shifters", Computing Attitude And Affect In.,vol.,no., pp.,2006
Qiu, L. Zhang, W. Hu C. and Zhao K,""a self-supervised model for sentiment classification"", In Proceedings Of Cikm,vol.,no., pp.929-936,2009"
 Somasundaran S., Namata G. , Wiebe J. and Getoor L,"Supervised and unsupervised methods in employing discourse relations for improving opinion polarity classification", In Proceedings Of The Enmlp,vol.,no.,pp.170-179,2009
M. Kasthuri, V.Lino Fathima Chinna Rani, Solomon Praveen Kumar, "A Survey on Sentimental Analysis Techniques", International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.256-263, 2018.