S.No. |
|
|
1. |
A Review on Secure Access to Cloud Storage by using ABE Authors: Dinesh Kumar Malviya, Manoj Lipton, Dr. Ravi Verma Abstract-Cloud computing is going to be very famous technology in IT enterprises. For an enterprise, the data stored is huge and it is very precious. All tasks are performed through networks. Hence, it becomes very important to have the secured use of data. In cloud computing, the most important concerns of security are data security and privacy. For access control, being one of the classic research topics, many schemes have been proposed and implemented. In this paper, various schemes for encryption that consist of Attribute based encryption (ABE) and its types KP-ABE, CP-ABE is explored. Public Key Encryption acts as the basic technique for ABE where it provides one to many encryptions, here, the private key of users & the cipher-text both rely on attributes such that, when the set of the attributes of users key matches set of attributes of cipher-text with its corresponding access policy, only then decryption is possible. Keyword- Cloud computing, Data sharing, Data confidentiality, Security, ABE, Access control. References- [1] Maithilee Joshi, Karuna P. Joshi and Tim Finin, ―Attribute Based Encryption for Secure Access to Cloud Based EHR Systems‖, IEEE, International Conference on Cloud Computing, 2018. [2] Priya, A., and Tiwari, R., ―A Survey: Attribute Based Encryption for Secure Cloud‖, IJOSTHE, 5(3), 12, 2018. https://doi.org/https://doi.org/10.24113/ojssports.v5i3.70 . [3] Yong Yu, Yannan Li, Bo Yang, Willy Susilo, Guoming Yang and Jian Bai, ―Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage‖, IEEE Transaction on Emerging Topics in Computing, Vol. 14, No. 8, 2017. [4] Y. Li, Y. Yu, G. Min, W. Susilo, J. Ni, K-K. R. Choo. ―Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems‖. IEEE Transactions on Dependable and Secure Computing, 2017. [5] Ming-quan Hong,Wen-bo Zhao, Peng-yu Wang, ―Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing‖, IEEE, 2016. [6] Yong Yu · Man Ho Au · Yi Mu · Shaohua Tang · Jian Ren · Willy Susilo · Liju Dong, ―Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage‖, Springer, 2014. [7] Sadia Marium, Qamar Nazir, Aftab Ahmed, Saira Ahthasham Mirza Aamir Mehmood,” Implementation of Eap with RSA for Enhancing The Security of Cloud Computing”, International Journal of Basic and Applied Sciences, pp 177 183, 2012. [8] Saira Varghese, S.Maria Celestin Vigila,” A Comparative Analysis on Cloud Data Security”, Proceedings of 2015 Global Conference on Communication Technologies, pp 507 510,IEEE, 2015. [9] Rohini Vidhate, V.D. Shinde,” Secure Role Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI” International Journal of Multidisciplinary Research and Development, Volume: 2, Issue: 7, pp 20 27,July 2015. [10] Cheng Kang Chu, Sherman S.M. Chow, Wen Guey Tzeng, Jianying Zhou, and Robert H. Deng, “Key Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage”, IEEE Transactions On Parallel And Distributed Systems, Vol. 25, No. 2,pp 468 477, February 2014. [11] G. Yamamoto, S. Oda, K. Aoki. ―Fast integrity for large data‖. Proc. ECRYPT workshop Software Performance Enhancement for Encryption and Decryption. Amsterdam, Netherlands 2007, 21-32. [12] V. Goyal, O. Pandey, A.Sahai, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in: Proceedings of the 13th ACM Conference on Computer and Communications Security, ACM, 2006, pp. 89-98. [13] R. Ostrovsky, A. Sahai, B. Waters, Attribute-based encryption with non-monotonic access structures, in: ACM Conference on Computer and Communications Security Computer and communications security, ACM, 2007, pp. 195-203. [14] A. Lewko, A. Sahai, B. Waters, Revocation systems with very small private keys, in: Security and Privacy (SP), IEEE, 2010, pp. 273-285. [15] J. Lai, R. H. Deng, Y. Li, J. Weng, Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption, in: Proceedings of the 9th ACM Symposium on Information Computer and Communications Security, ACM, 2014, pp. 239-248. [16] K. Emura, A. Miyaji, K. Omote, A. Nomura, M. Soshi, A ciphertext-policy attribute-based encryption scheme with constant ciphertext length, Int. J. Applied Cryptography, 2(1) (2010) 46– 59. [17] A. Lewko, B. Waters, Decentralizing attribute-based encryption, in: Theory and Applications of Cryptographic Techniques, vol. 6632, Springer Berlin Heidelberg, 2011, pp. 568-588. [18] T. Nishide, K. Yoneyama, K. Ohta, Attribute-based encryption with partially hidden encryptor specified access structures, in: International Conference on Applied Cryptography and Network Security, Springer Berlin Heidelberg, 2008, pp. 111-129.
|
1-7
|
2. |
A Study on Invisible Digital Image and Video Watermarking Techniques Authors: Farha Khan, M. Sarwar Raeen Abstract- Digital watermarking was introduced as a result of rapid advancement of networked multimedia systems. It had been developed to enforce copyright technologies for cover of copyright possession. This technology is first used for still images however recently they need been developed for different multimedia objects like audio, video etc. Watermarking, that belong to the information hiding field, has seen plenty of research interest. There's a lot of work begin conducted in numerous branches in this field. The image watermarking techniques might divide on the idea of domain like spatial domain or transform domain or on the basis of wavelets. The copyright protection, capacity, security, strength etc are a number of the necessary factors that are taken in account whereas the watermarking system is intended. This paper aims to produce a detailed survey of all watermarking techniques specially focuses on image watermarking types and its applications in today’s world. Keywords: Digital watermarking, Spatial Domain, Transform Domain, LSB, DWT, DCT, SVD. References- [1] Imane Assini, Abdelmajid Badri, Khadija Safi, Aicha Sahel, Abdennaceur Baghdad, “Hybrid multiple watermarking technique for securing medical image using DWT-FWHT-SVD”, IEEE, 2017. [2] Divjot Kaur Thind, Sonika Jindal, “A Semi Blind DWT-SVD Video Watermarking”, Procedia Computer Science, Vol. 46, pp. 1661-1667, 2015. [3] Aparna J R, Sonal Ayyappan, “Image Watermarking using Diffie Hellman Key Exchange Algorithm”, International Conference on Information and Communication Technologies, 2014. [4] Bhargava, G., & Jhapate, A., “A Study on Digital Watermarking Techniques”, International Journal Online of Science, 4(3), 2018. https://doi.org/10.24113/ijoscience.v4i3.130 . [5] Lamia Rzouga Haddada, Bernadette Dorizzi, Najoua Essoukri Ben Amara, “A combined watermarking approach for securing biometric data”, Image Communication, 2017. [6] Rohit Thanki, Vedvyas Dwivedi, Komal Borisagar, “A hybrid watermarking scheme with CS theory for security of multimedia data”, Journal of King Saud University – Computer and Information Sciences, 2017. [7] Venugopala P S, Dr. Sarojadevi H, Dr.Niranjan.N.Chiplunkar, “An Approach to Embed Image in Video as Watermark Using a Mobile Device”, Elsevier, 2017. [8] Makbol, nasrin m., khoo, bee, rassem, taha. “Block-based Discrete wavelet transform-singular value decomposition image Watermarking scheme using human visual system characteristics”, IET Image processing, vol. 10, pp. 34-52, 2016. [9] Zear, aditi, singh, amit kumar, pardeep kumar, “Multiple Watermarking for healthcare applications”, Journal of intelligent Systems, 2016. [10] Gunja, baisa. Et mali, suresh, “Comparative performance Analysis of digital image watermarking scheme in dwt and DWT-FWHT-SVD domains”, IEEE, 2014. [11] Emon Dey, Sharmin Majumder, Arnab Neelim Mazumder, “New Approach to Color Image Watermarking Based On Joint DWT-SVD Domain In YIQ Color Space”, IEEE, 2017. [12] Dimple Bansal and Manish Mathuria, “Color Image Dual Watermarking using DCT and DWT Combine Approach”, IEEE, 2017. [13] Swagata Mawande, Hemlata Dakhore, “Video Watermarking using DWT-DCT-SVD Algorithms”, IEEE, 2017. [14] Jayprakash Upadhyay, Bharat Mishra, Prabhat Patel, “A modified approach of video watermarking using DWT-BP based LSB algorithm”, IEEE, 2017. [15] Hannes Mareen, Johan De Praeter, Glenn Van Wallendael, “Peter Lambert A novel video watermarking approach based on implicit distortions”, IEEE, 2018. [16] Jantana Panyavaraporn and Paramate Horkaew, „DWT/DCT-based Invisible Digital Watermarking Scheme for Video Stream”, IEEE, 2018. [17] Manoj Kumar, Arnold Hensman, “Robust Digital video watermarking using reversible data hiding and visual cryptography,” Proceedings of 24th IET Irish Conference on Signals and Systems (ISSC 2013), pp: 1–6, 2013. [18] M. Jeni, S. Srinivasan, “Reversible Data Hiding in Videos Using Low Distortion Transform” Proceeding of IEEE conference on Information Communication and Embedded Systems (ICICES), pp. 121–124, 2013. [19] Vladimír BÁNOCI, Martin BRODA, Gabriel BUGÁR, Dušan LEVICKÝ, “2D - Spread Spectrum Watermark Framework for Multimedia Copyright Protection,” Proceeding of 24th IEEE Conference on Radioelektronika (RADIOELEKTRONIKA), pp. 1–4, 2014. [20] Venugopala P S, H. Sarojadevi, Niranjan N. Chiplunkar, Vani Bhat, “Video Watermarking by Adjusting the Pixel Values and Using Scene Change Detection,” Proceeding of IEEE fifth International Conference on Signals and Image Processing, pp. 259–264, 2014. [21] Sonjoy Deb Roy, Xin Li, Yonatan Shoshan, Alexander Fish, “Hardware Implementation of digital watermarking system for video authentication,” IEEE transactions on circuits and systems for video technology, vol 23, no. 2, pp. 289–301, Feb. 2013. [22] Dawen Xu, Rangding Wang, and Yun Q. Shi, “Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution,” IEEE transactions on information forensics and security, vol. 9, no. 4, pp. 596–606, April 2014. [23] Thomos Stutz, Florent Autrusseau, Andreas Uhl, “Non blind structure preserving substitution watermarking of H.264/CAVLC inter frames,” Proceedings of IEEE on multimedia, vol. 16, no. 5, pp. 1337–1349, August 2014. [24] Zong, T., “Robust histogram shape based method for image watermarking”, 2014. [25] Cheung, W., “Digital image watermarking in spatial and transform domains”, In Proceedings of the TENCON, IEEE, 2000. [26] Li, J., “An adaptive secure watermarking scheme for images in spatial domain using fresnel transform”, In Information science and engineering (ICISE). IEEE, 2009. [27] Wang, Y., and A. Pearmain, “Blind MPEG-2 video watermarking in DCT domain robust against scaling”, IEEE Proceedings-Vision, Image and Signal Processing 153(5): 581–588, 2006. [28] Ma, B., “Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking”, Multimedia Tools and Applications 72(1): 637–666, 2014. [29] Ghazy, R.A., “Block-based SVD image watermarking in spatial and transform domains”, International Journal of Electronics 102(7): 1091–1113, 2015. [30] Navas, K., “DWT-DCT-SVD based watermarking”, International conference on communication systems software and middleware and workshops, IEEE, 2008. [31] Huai-Yu, Z., L. Ying, and W. Cheng-Ke., “A blind spatial-temporal algorithm based on 3D wavelet for video watermarking”, IEEE international conference on multimedia and expo, 2004. [32] Li, X., and R. Wang., “A video watermarking scheme based on 3D-DWT and neural network”, IEEE international symposium on multimedia workshops, IEEE, 2007. |
8 - 12
|
3. |
Ricci Semi-Symmetric P-Sasakian Manifold Author: M. K. Pandey Abstract- In this paper, we have extended the study of projective semi-symmetric connections on the para-contact manifold. We study the curvature conditions of Ricci semi-symmetric type on a P-Sasakian manifold admitting a projective semi-symmetric non metric connection Keywords:Projective semi-symmetric connection, P-Sasakian manifold, Einstein manifold, curvature tensor, para-contact manifold Mathematics Subject Classification (2010): 53B15, 53C15, 53C25. References- [1] Adati, T. and Miyazava, T.(1977), Some properties of P-Sasakian manifolds, Tru Math., 13, 33-42. [2] Adati, T. and Miyazava, T. (1977), On Para-Contact Riemannian manifolds, Tru Math., 13(2), 27-39. [3] Bartolotti, E.(1930), Sulla geometria della variata a connection affine, Ann. di Mat., 4(8), 53-101. [4] Chaubey, S.K. and Ojha, R.H.(2012), On semi-symmetric non-metric connection, Filomat, 26(2), 269-275. [5] De, U.C.(1990), On a type of semi-symmetric connection on a Riemannian manifold, Indian J. Pure Appl. Math., 21(4), 334-338. [6] Friedmann, A. and Schouten, J. A.(1924), Uber die geometric der halbsymmetrischen Ubertragung, Math. Zeitschr., 21, 211-223. [7] Hayden, H.A.(1932), Subspaces of a space with torsion, Proc. London Math. Soc., 34, 27-50. [8] Imai, T.(1972), Notes on semi-symmetric metric connections, Tensor, N.S., 24, 293-296. [9] Majhi, P. and De, U.C.(2015), Classification of N(k)-contact metric manifolds satisfying certain curvature conditions, Acta Math. Univ. Comenianae, LXXXIV, 167-178. [10] Mishra, R.S. and Pandey, S.N.(1978), Semi-symmetric metric connections in an almost contact manifold, Indian J. Pure Appl. Math.,9(6), 570-580. [11] Pal, S.K., Pandey, M.K. and Singh, R.N.(2015), On a type of projective semi-symmetric connection, Int. J. of Anal. and Appl., (N.S.), 7(2), 153-161. [12] Sato, I.(1976), On a structure similar to the almost contact structure, Tensor, (N.S.), 30, 219-224. [13] Szabo, Z.I.(1982), Structure theorem on Riemannian space satisfying R(X,Y).R=0. I. The local version, J, Diff.Geom., 17, 531-582. [14] Singh, R.N., Pandey, Shravan K. and Pandey Giteshwari (2012), On semi-symmetric non-metric connections in a Co-Symplectic manifold, Journal of International Academy of Physical Sciences, 16(1), 1-16. [15] Singh, R.N., Pandey, M.K. and D.Gautam (2011), On Nearly Quasi Einstein Manifold, Int. Journal of Math. Analysis, 5(36), 1767-1773. |
13 - 17
|
4. |
Fuzzified SVM based Support for Impaired People for Categorize Clothes Patterns and Colors Authors: Mekala Sheshank, D.Sai Akshith Reddy, Shruti Bhargava Choubey Abstract- Digital picture quality evaluation has been a source of worry for decades, and there are two widely accepted techniques to evaluating image quality: subjective quality evaluation and objective quality evaluation, both of which are recognized as standard procedures by the International Telecom Union (ITU). The traditional reported efforts based on these acclaimed standard procedures have been found to be ineffective. For partially or fully blind persons, recognising clothing patterns is a difficult task. The significant intra-pattern variances are putting machine-based methods to the test. With this in mind, we're working on a MATLAB algorithm that recognises clothing patterns and improves picture characteristics such as contrast and brightness. With the current codes, it is possible to discern the pattern of clothing. The current work model comprises of a mathworks code and training visual datasets. For picture modifications such as luminance, sharpness, and so on, we build our unique fuzzy rules. The picture is then passed via fuzzification, with the result as seen in electronic format. Keywords:Fuzzy, ANN, MATLAB, SVM References- [1] American Foundation for the Blind. [Retrieved October 30, 2004] Statistics and sources for professionals. 2004. from www.afb.org/info_document_view.asp?documentid=1367 [2] Hasanuzzaman, X. Yang, and Y. Tian, “Robust and effective component-based banknote recognition for the blind,” IEEE Trans. Syst., Man,Cybern.C, vol. 42, no. 6, pp. 1021–1030, Nov. 2012. [3] Dakopoulos and N. G. Bourbakis, “Wearable obstacle avoidance electronic travel aids for the blind: A survey,” IEEE Trans. Syst., Man,Cybern. C, vol. 40, no. 1, pp. 25–35, Jan. 20104. [4] Xiaodong Yang, Shuai Yuan, and Ying Li Tian, “Assistive Clothing Pattern Recognition for Visually Impaired People,” IEEE transactions onhuman machine systems, vol. 44, NO. 2, APRIL 20145. [5] Hasanuzzaman, X. Yang, and Y. Tian, “Robust and effective component-based banknote recognition for the blind,” IEEE Trans. Syst., Man,Cybern.C, vol. 42, no. 6, pp. 1021–1030, Nov. 2012. |
18 - 27
|