Sunday, 1 January 2017

Detecting Hidden Data Using Higher Order Empirical Transition Matrix

Vol. 8  Issue 3
Year:2014
Issue:Apr-Jun
Title:Detecting Hidden Data Using Higher Order Empirical Transition Matrix
Author Name:Swagota Bera and Monisha Sharma
Synopsis:
Steganalysis is the art of detecting the presence of hidden data in any common data. Universal steganalysis is general class of steganalysis techniques which can be implemented with any steganographic embedding algorithm, even an unknown algorithm. In this paper, the detection technique is based on the fact that there occurs variation in the feature vectors in an image before and after hiding. The whole image is divided in blocks of 8x8. There exists interdependency among the pixel values within the image blocks known as intrablock dependency. The statistical feature is calculated on the basis of the transition in the pixel value. The features used here is the transition probability matrix calculated by using the markov statistical process. If the transition probability matrix is found out by considering the transition in the pixel value of second pixel w.r.t to first one and so on, then it is known as one step transition probability matrix. If the transition probability matrix is found out by considering the transition in the pixel value of third pixel w.r.t to first and second one simultaneously and so on then it is known as two step transition probability matrix. Further the values of the quantized DCT pixel is restricted in -4 to 4 values which is known as thresholding. This way a feature set is calculated with optimum dimension for the classification between the cover image and the stego image.

OpenC: Extending C with Computational Reflection

Vol. 8  Issue 3
Year:2014
Issue:Apr-Jun
Title:OpenC: Extending C with Computational Reflection
Author Name:Songqing Yue
Synopsis:
Computational Reflection has shown much promise for improving the quality of software by providing programming language techniques to address issues of modularity, reusability, maintainability, and extensibility. The Meta-Object Protocol (MOP) is a powerful tool to provide the capability of computational reflection by means of object oriented and reflective techniques to organize a meta-level architecture. It provides a set of interfaces for developers to access the underlying implementation of programs in order to automate the source-to-source program translations. In this paper, the author describes how to bring the power of computational reflection to C through a MOP, named OpenC, which offers a framework to build arbitrary source-to-source program transformation libraries for large software systems written in C. The design focus of OpenC is to automate program transformations in a straightforward and transparent way through techniques of code generation, so that client users only need to add a simple annotation to their code to be manipulated, while removing the need to know the details on how the transformations are performed. The paper provides a general motivation for using reflection and explains briefly the design and implementation of the OpenC framework. In addition, this paper will show an example, how OpenC can be used to build a simple profiling library that can be employed to analyse the distribution of execution time among all functions in a project by recording the amount of time spent on executing each function.

Mining business agreements to forecast and categorize service events

Vol. 8  Issue 3
Year:2014
Issue:Jan-Mar
Title:Mining business agreements to forecast and categorize service events
Author Name:A.V.L.N. Sujith
Synopsis:
The authors perform the investigation of the problem of business service, selection and categorization based on an expanded notion of reputation and trust. It is widely recognized now that the collaborative design of the significance of the services is the central principle of computing services. Specifically, the importance of understanding human behavior as a basis for service science is well-recognized, but is not necessarily reflected in the technical approaches. In particular, the quality of a service engagement depends on the mutual anticipations of the participants. In specific, the quality of experience that a customer derives from a service engagement would depend on how the customer potentials are refined and met by the provider during the service engagement. Indeed, this is well-known in marketing theory as the service quality GAPS model, as a basis of customer satisfaction. Here we propose a post mining process for mining business service contract agreements.

Face Recognition by Fuzzy Rule-Based Local Binary Pattern

Vol. 8  Issue 3
Year:2014
Issue:Jan-Mar
Title:Face Recognition by Fuzzy Rule-Based Local Binary Pattern
Author Name:O. Rama Devi, L.S.S Reddy and E.V. Prasad
Synopsis:
A novel efficient and robust methodology for quick face recognition by using Fuzzy Rule based Local Binary Pattern (FRLBP) has been presented. The face image is said to be divided into a number of 3x3 regions, called as micro patterns, indicating the structure of the gray level pixels within a neighborhood to describe the spatial context of the image to reduce the impact of gray level uncertainty representation of images. The gray level pixel is represented as fuzzy number to evaluate the membership degree of the central pixel to the others within a neighborhood. A Local texture distributor for each of the 3x3 neighborhood, called LBP descriptor, is obtained by applying fuzzy Rules from which the FRLBP feature distributions are extracted. Use of fuzzy contributes to more than a single bin in the distribution of LBP values in the feature vector. The recognition is performed using a nearest neighbor classifier in the computed feature space with Chi square as a dissimilarity measure. Experiments clearly show that the use of FRLBP leads to improved reliable face recognition than to the original methods, LBP and Rule Based LBP.

Enhanced Graphical Password Based Authentication Using Persuasive Cued Click-Points

Vol. 8  Issue 3
Year:2014
Issue:Jan-Mar
Title:Enhanced Graphical Password Based Authentication Using Persuasive Cued Click-Points
Author Name:Narayanan Prasanth N, Azarudeen K, Gulam Ahamed Kabeer M, and Gulam Peer Mohamed J
Synopsis:
This paper introduces and presents the result of a systemic study of the persuasive cued click point graphical password scheme, including usability and security evaluation and implementation consideration. An important usability goal for the knowledge-based authentication system is to support user in selecting a better password thus increasing security by expanding the effective password space. They use persuasion to influence user choice in click based graphical password, encouraging users to select more random and hence more difficult to guess click-points.

Design and VLSI Implementation of Multilayered Neural Network Architecture Using Parallel Processing and Pipelining Algorithm for Image Compression

Vol. 8  Issue 3
Year:2014
Issue:Jan-Mar
Title:Design and VLSI Implementation of Multilayered Neural Network Architecture Using Parallel Processing and Pipelining Algorithm for Image Compression
Author Name:Murali Mohan Sriramula and Satyanarayana Pabbisetti
Synopsis:
In this paper, an optimized high speed parallel processing architecture with pipelining for multilayer neural network for image compression and decompression is implemented on FPGA (Field-Programmable Gate Array). The multilayered feed forward neural network architecture is trained using 20 sets of image data based to obtain the appropriate weights and biases that are used to construct the proposed architecture. Verilog code developed is simulated using ModelSim for verification. The FPGA implementation is carried out using Xilinx ISE 10.1. The implementation is performed on Virtex-5 FPGA board. Once interfacing is done, the corresponding programming file for the top module is generated. The target device is then configured, programming file is generated and can be successfully dumped on Virtex-5. The design is then analyzed using Chip Scope Pro. The Chip Scope output is observed. The output is successfully compared with VCS (Verliog Compiler Simulator) simulation output. The design is optimized for power of 1.01485 W and memory of 540916 KB.

Agile Large-Scale Software Development: Success Factors, Challenges and Solutions

Vol. 8  Issue 3
Year:2014
Issue:Jan-Mar
Title:Agile Large-Scale Software Development: Success Factors, Challenges and Solutions
Author Name:Amro Mohammad Hani Al-Said Ahmad
Synopsis:
Many challenges and obstacles have been arising when Agile methods are being used in large-scale projects. But as software engineers, we always try to find ways to overcome the problems and challenges. As Agile has been presented as a very good method that deals with change (that considers a big and serious challenge in traditional SE methodologies) it must not be ignored by project managers and team leaders in large-scale projects. This study presents a number of recommendations and solution that highlights on using modern communications technologies and social media websites in the process of maintaining the element of permanent connection between the team members, and it helps sharing the domain knowledge between team members to deal with social skills, Agile training, documentation, decision making, and testing. The study has been divided into three main subjects: first is how to gain success in largescale projects and how to gain success attributes upon using Agile method, the second is the challenges faced upon using Agile in the global distributed environment project, the third is to suggest a recommendation to overcome each challenge that certainly will help the project manager to deal if any challenge occurs.