Sukhdev Singh and Dr. Chander Kant
Biometrics system offers better security and convenience over traditional methods of personal recognition. Many businesses are adopting biometric technology as a critical tool for individual identification in different fields like: automotive, ATM, point of sales, biometric-based border control system, from terrorism and computer viruses etc. Biometrics is also used for workforce management especially timely attendance is a rapidly rising trend not only to accurately identify employee but also modernize the conventional, old management solution, hence increase the transparency, productivity, and help saving costs. Biometric based authentication, the science of using physical or behavioral characteristics for individual’s identity verification is becoming a security foundation in many areas. Biometric system is not foolproof; there are many security flaw and attacks in this system. In this paper we study the major forms of common attacks against biometric systems such as replay attacks, spoofing, Trojan horse attacks and biometric template database attacks. A literature study of the attack points in the biometric system and the various methods to combat the attacks at these points is conducted and analyzed in this paper. With help of face, fingerprints, iris and FKP comparative study has done. The methods covered are Multimodal biometrics, Biometric Steganography, Cancelable biometrics, Liveness detection, Biometric cryptosystem. Each mechanism is explained in detail. Strengthen and weaknesses of the methods are shown and discussed. The results of the study indicate that spoofing attacks are still a major threat to the biometric systems.
Y.Chandra Sekhara Reddy, Dr.M.Kameswara Rao, M.Venkateswara Rao ,C.V.Phaneendra kumar , A. Anil Sai
Abstract: Cyber security is associate necessary issue to tackle. Various user authentication ways are used for this purpose. It helps to avoid misuse or ineligible use of extremely sensitive digital audiotape. Text and graphical passwords are mainly used for authentication purpose. But due to numerous flaws, they area unit not reliable for data security. Text passwords area insecure for reasons and graphical are more secured in comparison however area user vulnerable to shoulder surfing attacks. Hence by victimization graphical positive identification system associated CAPTCHA technology a new security primitive is planned. We call it as CAPTCHA as graphical positive identification (CaRP). CaRP is a combination of each a CAPTCHA and a graphical positive identification scheme. In this paper we tend to conduct a comprehensive city vey of existing CaRP techniques particularly ClickText, ClickAnimal and AnimalGrid. We tend to discuss the strengths and limitations of each method and show analysis direction during these area units.
Pasam Sai Teja, Karanam Venkata Kiran, M.Kameswararao
The growing quality and development of knowledge mining technologies bring serious threat to the security of individual's sensitive data. Associate rising analysis topic in data processing, referred to as privacy preserving data mining (PPDM), has been extensively studied in recent years. the essential plan of PPDM is to modify the information in such how therefore on perform data processing algorithms effectively while not compromising the security of sensitive data contained within the knowledge. Current studies of PPDM chiefly concentrate on however to reduce the privacy risk brought by data processing operations, whereas if truth be told, unwanted revealing of sensitive information may happen within the method assembling, knowledge business enterprise, and data (i.e., the data mining results) delivering. During this paper, we have a tendency to read the privacy problems associated with data processing from a wider perspective and investigate numerous approaches which will facilitate to safeguard sensitive data. Specifically, we determine four differing kinds of users concerned in data processing applications, namely, knowledge supplier, data collector, data miner, and head. for every form of user, we have a tendency to discuss his privacy considerations and also the methods which will be adopted to safeguard sensitive data. we have a tendency to briefly introduce the fundamentals of connected research topics, review progressive approaches, and gift some preliminary thoughts on future analysis directions. Besides exploring the privacy-preserving approaches for every form of user, we have a tendency to additionally review the game theoretical approaches, that area unitprojected for analyzing the interactions among completely different users in an exceedingly data mining situation, every of whom has his own valuation on the sensitive data. By differentiating the responsibilities of various users with relevance security of sensitive data, we might wish to give some helpful insights into the study of PPDM.
Ajit R. Parmar, Kirit R. Rathod, Viral D. Sanghvi
Scheduling is one of the important tasks of Operating System. It helps in selecting and executing processes when number of multiple processes waiting for execution. Optimum Scheduling policy is very important for the performance of any computer system. To achieve it, there are many scheduling algorithm available such as First-Come-First-Serve (FCFS), Shortest Job First (SJF), Priority Scheduling, Round Robin Scheduling algorithm etc. Output of these Scheduling algorithms depend on mainly three parameters, average waiting time, average turnaround time and number of context switch. In this paper, we focus on Round Robin Scheduling algorithm which has two techniques, first one is RR with static time quantum and another second is RR with dynamic time quantum. In this paper we compare the results of different RR Scheduling algorithm techniques those having dynamic time quantum and we show that average mid-max scheduling is the best scheduling technique compare to simple RR, Efficient Dynamic RR and Improved Mean RR.
Venkadesh S, Mr. K. Palnivel
People enjoy the convenience of on-line services, however on-line environments might bring several risks. In the on-line communication, the password has a crucial role to secure user personal details. These passwords are taken to be secure and it should be retain in person. The third person might take a password without knowledge of original user and they might do any dishonest activities on the victim‟s account. The passwords are taken by using anyone of the attack mechanism like Phishing attack, password Stealing Program Attack and etc… The user may use personal details in on-line setting. These personal details should be secured. There are many types of mechanisms are available to secure the password and user‟s information. In this paper we focus on the problem of securing user passwords from attackers. We follow an approach of protecting password using virtual password and proposed a scheme involving change of virtual password functions based on the user behavior.
Piyush Gupta, Pardeep Kumar Mittal, Girdhar Gopal
Today a large amount of data is generated every second by the users in the form of blog posts, status messages, photographs and audio/video files. To manage this big data, which can be structured, unstructured or semi-structured, new techniques, algorithms and analytics are required. Hadoop is a processing framework designed for structuring big data that can be tens or hundreds of terabytes and even petabytes in size. Hadoop has two main components - HDFS and Map Reduce. The data is loaded into the Hadoop Distributed File System (HDFS) and this massive data is operated by doing horizontal scaling across very large number of servers through an approach called Map Reduce.
Prashant Sharma, Ravi mishra
Digital images in their uncompressed form require an enormous amount of storage capacity. Such uncompressed data needs large transmission bandwidth for the transmission over the network. The development of Digital image processing technology there are several applications. A study of the performance difference of different transform coding techniques This paper focuses important features of transform coding in compression of still images, including the extent to which the quality of image is degraded by the process of compression and decompression. Motivation of the analysis is to encourage the amateur researcher in the field of image compression, so that they can understand easily the concept of image compression and can contribute in developing more efficient compression algorithm.
Sangeeta kumari, Girdhar Gopal
The behavior of genetic algorithm is determined by exploration and exploitation relationship kept throughout the run of algorithm. The reason for developing adaptive genetic algorithm is to build a relation between exploitation/exploration to avoid the premature convergence and to improve the final results. Widely used approach for adaptation in genetic algorithm is adaptive parameter setting techniques. This paper describes an adaptive mechanism to control the use of control parameters of GA. We believes that the AGA is the first step in realizing a class of self organizing GAs that are capable of adapting themselves in locating the global optima in multimodal landscape.
Ranjana Jhala, Kamaljit I. Lakhtaria and Sanjay Gaur
In the age of information technology data is prime concern because data are base of information. Database management system is requirement for manage the data in efficient way. With the rapidly increasing database size the amount of transactions in the database get increased. In the distributed database it becomes more critical. There is an escalating demand for higher throughputs in transaction processing systems which directly result into higher degrees of transaction concurrency. Concurrency control in Database management systems make sure that transactions which are performed on database concurrently are of without violating the data integrity. Therefore concurrency control is vital factor for correctness in any system where two or more transactions are executed with time overlap, can access the same data. Such circumstances are cause of origin of Deadlock and Livelock kind of situations. To overcome such problems several techniques have been anticipated for managing concurrent execution of transactions in database systems. Here a technique for concurrency control in distributed database management system is explained which will look up system performance by plummeting the probability of deadlock and livelock.
Now a day, web services are becoming mandatory for human life applications. Many techniques have been used to protect the personal details from the anonymous persons. In this paper, digital clock widget is embedded in web pages, to protect the web pages from vulnerable attacks like SQL Injection, X-Path Injection, Denial of Service, and Distributed Denial of Service from the web applications like ASP, PHP, and HTML. It is created using the JSON objects in order to embed easily within the source code. Hence, it provides high scalability and modularity. It is stand-alone applications that can be used into the third party web sites where the individual have the access rights
T.Manikandan, Kalaivanan.S, Aiswaryalakshmi.K, Pradheeba Ulaganathan, Jayashree Baskaran
Geographic addressing of packets within MANETs enables novel applications, including hard real-time engagement simulation in military training systems, geographic command and control functions in training and emergency communications, and commercial messaging applications as well. This system defines geocast heuristic, with the Center Distance with Priority (CD-P) heuristic which improves both existing scalable geocasts and also remains scalable in complex environments.
Seenia Francis, Anjitha Chandran, Delmate Thomas and Haritha RB
Home Power Monitoring System automatically calculates the energy usage and sends it to the user when the user request for energy consumption details. It gives the method for extracting the series numbers in the electrical meter. Initially the meter reading is captured by placing the camera in a fixed position in front of the meter. The meter image is captured in particular time. Meter reading is obtained using the principle of image processing. Calculation of meter readings is performed using Raspberry pi module. User can check his consumption and will be informed by a message via mobile application. This reduces the effect of manual data collection. Energy consumption could be obtained regardless of place and time.
Janmejai Kumar, Amit Doegar, Shivani Chauhan,Kuldeep Kumar
One of the main causes of accident is Fog. It is the natural phenomenon which degrades the image on object results into poor visibility. The poor visibility brings great difficulty in driving, identification of objects, tracking of object and monitoring of outdoor images. The solution to these problems is proposed algorithm which uses an integrated approach which contains two steps. In first step the contrast of the image is enhanced using CLAHE and in second step, the visibility of the scene is upgraded using NBPC. The proposed approach gives better results and opens future scope for use in advanced driver Assistance system. Vehicle navigation and traffic monitoring us bad weather condition arises due to fog. In this paper we purposed an integrated approach for solved this problem.
Intrusion detection system is device or software applications that monitor network or system activities for malicious activities or policy violation. Two types of Intrusion detection systems are network based and host based. This paper is only discussed about network based intrusion system. Three methodologies are used for detect intrusion on the Network, signature based, anomaly based and state-ful protocol analysis. This paper is based on intrusion detection using pattern matching algorithms. Brute force and Knuth-Morris-Pratt are two single keyword pattern matching algorithms and detect the payload part intrusion. String matching consists in finding one or more occurrences of a pattern in a text (input).
As Security is major concern in all the applications, passwords and PINs are used for secure transactions and authentication. Remembering those passwords and PINs are considered as inconvenient by the user. The alternative considered is the biometrics. Biometrics is the emerging field of technology devoted to the identification of individuals on the basis of their biological traits. Biometric authentication is a modern and reliable technique, because physical human characteristics are much more difficult to attack when compared to security codes and passwords. This paper will summarize the overview of biometrics and biometric system, concept of crypto-biometrics and an algorithm for session key generation for secure communication of data
Abin Roy , Anna Varghese,Joel Raju and Shaiju Paul
This project describes the design and implementation of radio streaming on the Raspberry Pi. Internet radio services are usually accessible from anywhere in the world and the quality of these services do not degrade over distance. These features have made Internet radio service popular among radio providers. Audio streaming is a continuous data transferring and receiving. Internet radio involves streaming media, presenting listeners with a continuous stream of audio that typically cannot be paused or replayed, much like traditional broadcast media. There is also a provision for the listener to playback the saved content in the system. The broadcaster can also add audio advertisement in between the live stream. This opens up a new medium for advertisement. The tracks can be sorted according to a genere and viewed accordingly. A speaker is enabled with wifi using raspberry pi.
K.T.Preethi and P.Karunakaran
Single core processors have high flexibility but lack in performance. In order to compensate the lack of performance multi-core processors that can manage network packet in parallel are used. The processing load and the network traffic must be properly balanced to make the best inter core communication and to capably utilize multi-core architectures. The performance of the Linux Bridge networking device is verified and the traffic distribution is analysed packet wise and based on flow. The packet based and flow based traffic distributions are combined by a proposed method called traffic-distribution method. Two test cases are used for the experimental validation such as worst case and the backbone link. In worst case, with one dominant flow, the performance in traffic throughput is improved by a factor of 2.8 by appealing four processing cores. In backbone link, with a large number of flows that have a similar packet rate, the performance remains same to the existing flow based methods. DPDK Open switch is used in the future technique to reduce the IRQ overhead and the scalability is increased with the help of polling based network traffic reception and transmission. Clustering and hashing techniques are used to increase the fast packet transmission.
Shanmugam. R. and Karunmoorthi .R.
An Intrusion detection System (IDS) is defined as “The problem of identifying individuals who are using a computer system without authorization (i.e., ‘crackers’) and those who have legitimate access to the system but are abusing their privileges. The goal of IDS is to detect malicious traffic. Many IDS has been designed and implemented using various techniques like Data Mining, Fuzzy Logic, and Neural Network etc. In this project, myself investigates the problem of existing normal Data Mining Techniques like association rule mining, classification, clustering which is not efficient enough for the IDS performance. The main drawback of implementing intrusion detection in data mining is that it is not effective while handling huge, heterogenetic and dimensional dataset. In my project, Stream Data Mining and Drift Detection Method which is more suitable for Machine learning technique to model efficient Intrusion Detection Systems is proposed. By implementing Stream Data Mining ensemble with intrusion detection, the major drawbacks are overcome by detecting the types of denial-of-service attack.
Pravin M. Sonsare and Khushbu R. Khandai
With certificates becoming massive nowadays, anti-counterfeit of certificates turns into an urgent task. The emergence of 2D code provides a kind of effective method for anti-counterfeit. Encoding biologic feature (fingerprint) and individual information into QR code. Through real-time collection of the certificate holder's fingerprint and QR code, deciphering the information to authenticate the validity of the holder, the function of dual anti-counterfeit is realized. Using universal equipment like mobile phones to acquire QR code pictures is facile and practical. The user of the system first needs to register to the central server. On successful registration the user can login and can buy airline tickets. On confirm reservation the system converts the ticket data into a 2D QR code format. This code is in the image form. The customer simply has to download the ticket and should store it in his mobile phones and should carry ticket while travelling.
C. Bala Saravanan, R. Abbymathy and S. Ramya
These dissertations nearby tale software gibbet for the extension and inspect in the surrounding area of multimodal human workstation line (MHWI) system. The wished-for software gallows, which is called the HCI∧2 Gallows, is erect upon distribute/promise (D/P) architecture. It apparatus combined recall-based statistics ship etiquette for memorandum relief and a TCP-base organism running etiquette. The concluding ensures that the truthfulness of organism structure is maintained at runtime. With the inclusion of bridging modules, the HCI∧2 Gallows is interoperable with other software gallows including P cyclone and Active. In accumulation to the core e-mail middle ware, we also in crowd the integrated enlargement milieu (IDE) of the HCI∧2 Gallows. It affords an inclusive graphical milieu to sustain all tread in a emblematic MHWI system enlargement course of action, as well as element expansion, debugging, covering, and supervision, as well as the whole system Management and testing.