Ajaz Mir - Academia.edu (original) (raw)
Papers by Ajaz Mir
International Journal of Information Security
TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON)
Dental biometry has a leading role in forensic human identification. Identifying a person in mass... more Dental biometry has a leading role in forensic human identification. Identifying a person in mass disasters and major catastrophes, which have frequently happened due to airplanes crashes, tsunamis, fire accidents, etc is a challenging problem if conventional biometrics, e.g., face, fingerprint, iris, etc. is not available. Dental characteristics of persons are naturally unique and can be used to identify individuals based on their dental radiographs. In this paper, we present a new and workable method for identifying humans, that extracts the dental mandibular information from panoramic dental radiographs which is used as a biometric identifier. The system segments the mandible from dental panoramic X-ray images to obtain the outer mandibular contour coordinates. Time series is then obtained from the extracted contour coordinates which gives the structural information of the mandible. AR model is then fitted to this time series and the AR coefficients thus obtained form the feature vector representing each mandible. These feature vectors are later used for matching and identification using the Euclidian distance classification criteria. In order to assess the proposed system, we have carried out experiments at three different orders of AR model using a database of 120 ante-mortem and 90 post mortem panoramic dental images, obtained from 30 individuals. The experimental results show that the proposed system is effective in identifying individuals and exhibits better results at order 3 of AR model with a Recognition rate (RR) up to 75.52%, low Equal error rate (EER) of 23% and a rank-1 identification rate of 76.66%.
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018
Internet has been growing tremendously since its beginning and day by day more and more computers... more Internet has been growing tremendously since its beginning and day by day more and more computers are getting added to it. This sets a tremendous pressure on the available bandwidth of links connecting the nodes. With the evolution of Internet Protocol version 6, the header size has almost doubled which again would have considerable effect on bandwidth. Payload Header Suppression is a bandwidth saving technology which removes the redundant packet overhead. Together with MPLS, PHS can be used to optimize the network performance by reducing the traffic congestion. This paper performs a comparison of utilizing PHS in MPLS network over IPv6 and IPv4 networks by sending real time traffic of VoIP. The analysis clearly proved that PHS has a considerable effect in reduction of packet delay, background delay, packet loss and increase in throughput. Also, the performance of IPv6 was better than IPv4 while utilizing suppression mechanisms over MPLS.
Advances in Computational Techniques for Biomedical Image Analysis, 2020
Abstract Segmentation is an important step in many medical applications involving measurements, 3... more Abstract Segmentation is an important step in many medical applications involving measurements, 3D visualization, registration, and computer aided diagnosis (CAD). Selection of the “correct” technique of segmentation for a given application is a difficult task. In many cases a combination of several techniques may be necessary to obtain the segmentation goal. There is a need to do an evaluation of different segmentation methods using different standard protocols that help in selecting methods for particular clinical applications. The segmentation techniques which are easy to compute and have minimal user supervision are the ones that are accepted for clinical purposes. Disc degeneration is considered as a very common spine abnormality resulting in severe pain in the back and legs causing alot of disruption in people’s lives and is considered to be a major reason why patients visit radiologist clinics these days. Besides, it has a great impact on the economy of suffering patients, and there is a concern about shortage of radiologists and hence demand for CAD system. Different methods that have been implemented for vertebral and intervertebral disc disease and degeneration diagnosis, along with the results obtained are discussed in this chapter; the aforementioned disease is still considered an unsolved and somewhat ill-defined problem.
International Journal of Pervasive Computing and Communications, 2021
Purpose Because of the continued use of mobile, cloud and the internet of things, the possibility... more Purpose Because of the continued use of mobile, cloud and the internet of things, the possibility of data breaches is on the increase. A secure authentication and authorization strategy is a must for many of today’s applications. Authentication schemes based on knowledge and tokens, although widely used, lead to most security breaches. While providing various advantages, biometrics are also subject to security threats. Using multiple factors together for authentication provides more certainty about a user’s identity; thus, leading to a more reliable, effective and more difficult for an adversary to intrude. This study aims to propose a novel, secure and highly stable multi-factor one-time password (OTP) authentication solution for mobile environments, which uses all three authentication factors for user authentication. Design/methodology/approach The proposed authentication scheme is implemented as a challenge-response authentication where three factors (username, device number and ...
Applied Mathematical Modelling, 2019
Abstract In this paper fractional Hindmarsh Rose (HR) neuron, which mimics several behaviors of a... more Abstract In this paper fractional Hindmarsh Rose (HR) neuron, which mimics several behaviors of a real biological neuron is implemented on field programmable gate array (FPGA). The results show several differences in the dynamic characteristics of integer and fractional order Hindmarsh Rose neuron models. The integer order model shows only one type of firing characteristics when the parameters of model remains same. The fractional order model depicts several dynamical behaviors even for the same parameters as the order of the fractional operator is varied. The firing frequency increases when the order of the fractional operator decreases. The fractional order is therefore key in determining the firing characteristics of biological neurons. To implement this neuron model first the digital realization of different fractional operator approximations are obtained, then the fractional integrator is used to obtain the low power and low cost hardware realization of fractional HR neuron. The fractional neuron model has been implemented on a low voltage and low power circuit and then compared with its integer counter part. The hardware is used to demonstrate the different dynamical behaviors of fractional HR neuron for different type of approximations obtained for fractional operator in this paper. A coupled network of fractional order HR neurons is also implemented. The results also show that synchronization between neurons increases as long as coupling factor keeps on increasing.
International Journal of Innovative Technology and Exploring Engineering, 2019
The growth of online application used for financial transactions and transferring personal inform... more The growth of online application used for financial transactions and transferring personal information is increasingly common on internet and in mobile communication. These applications require authenticating legitimate users by assigning digital identities. Static passwords are perhaps most common type of credentials used today to authenticate the users. To avoid tedious task of remembering passwords, users often behave less securely by using low entropy and weak passwords, thus presenting security threats to online services. Various solutions have been provided to eliminate the need of users to create and manage passwords’ typical solution is based on generating one time password (OTP) for a single session or transaction. Unfortunately in most of the general mechanisms used for generating one time password (OTP) randomness of OTP system breaks after certain period of time and hence passwords become predictable. To solve this problem, in this paper a novel OTP generation method has...
International Journal of Biometrics, 2018
Dental biometrics is a new and growing area of forensic biometrics that uses the unique features ... more Dental biometrics is a new and growing area of forensic biometrics that uses the unique features of dental structures from dental radiographs to automatically establish a person's identity from their dental remains when the conventional biometric features are not available. In this paper, we present a new and efficient approach for identifying people, by using the structure of mandible from the panoramic dental radiographs as a biometric identifier. The system automatically segments the mandible from dental panoramic images to extract the representative feature vectors for each mandible, which are later used for matching and identification. The experimental results of the proposed system using a database of 120 ante-mortem and 90 post-mortem panoramic dental images show that the system is robust and effective in identifying individuals and exhibits a high recognition rate (RR) up to 98.79%, low equal error rate (EER) of 1.5% and a remarkable identification performance.
International Journal of Signal Processing, Image Processing and Pattern Recognition, 2014
In this paper usefulness of time series based Auto Regressive (AR) modelling technique has been e... more In this paper usefulness of time series based Auto Regressive (AR) modelling technique has been explored for identification of a person. For this purpose, time series is obtained from the contour coordinates of the ear. AR model is fitted to this time series. AR coefficients thus obtained serve as a feature vector. Recognition Rate (RR) has been found by a classifier that is based on Euclidian distance between feature vector of test samples with training samples within itself (intraclass) and with respect to others (interclass). Model has been found invariant to posture, rotation and illumination. RR up to 99% has been obtained. Results have been compared with existing techniques. The results demonstrate the effectiveness of technique for human identification.
2014 International Conference on Communication and Signal Processing, 2014
In this paper, three different segmentation techniques, namely, region growing segmentation techn... more In this paper, three different segmentation techniques, namely, region growing segmentation technique, watershed segmentation and texture segmentation are used to accurately extract the shapes of membranes and nuclei from the inverted microscopic images, taken throughout the monolayer formation of BGM -70 (Baby Grevit Monkey) cell culture. This strategy is a prerequisite for an accurate quantitative analysis of cell shape and morphodynamics during organogenesis and is the basis for an integrated understanding of biological processes. The segmentation of cellular structures is achieved by first normalizing the microscopic images by performing CLAHE operation followed by de-noising by morphological opening and filling of the holes and then applying segmentation algorithm for cell shape reconstruction.
Computer Engineering and Intelligent Systems, 2011
This paper presents a multimodal biometric verification system using multiple fingerprint matcher... more This paper presents a multimodal biometric verification system using multiple fingerprint matchers. Theproposed verification system is based on multiple fingerprint matchers using Spatial Grey LevelDependence Method and Filterbank-based technique. ...
Journal of Network and Systems Management, 2020
Software Defined Networking simplifies design, monitoring and management of next generation netwo... more Software Defined Networking simplifies design, monitoring and management of next generation networks by segregating a legacy network into a centralized control plane and a remotely programmable data plane. The intelligent centralized SDN control plane controls behavior of forwarding devices in processing the incoming packets and provides a bird-eye view of entire network at a single central point. The centralized control provides network programmability and facilitates introduction of adaptive and automatic network control. The SDN control plane can be implemented by using following three deployment models: (i) physically centralized, in which a single SDN controller is configured for a network; (ii) physically distributed but logically centralized, wherein multiple SDN controllers are used to manage a network; and (iii) hybrid, in which both legacy distributed control and centralized SDN control coexist. This manuscript presents all these control plane architectures and discusses various SDN controllers supporting these architectures. We have analyzed more than forty SDN controllers in terms of following performance parameters: scalability, reliability, consistency and security. We have examined the mechanisms used by various SDN controllers to address the said performance parameters and have highlighted the pros and cons associated with each mechanism. In addition to it, this manuscript also highlights number of research challenges and open issues in different SDN control plane architectures.
Abstract–In this paper we propose feature extraction for Telugu handwritten recognition based on ... more Abstract–In this paper we propose feature extraction for Telugu handwritten recognition based on the candidate search and elimination technique. The initial candidates for recognition are found by applying by zoning method on input glyphs. We propose cavities as a structural approach suited specifically for Telugu script, where cavity vectors are used to prune the candidates by zoning. It gives the 100% features and cavity features of the input dataset. Index Terms–DataSet Generation, Feature Extraction, OCR for Telugu Hand- ...
International Journal of Information Technology and Computer Science
As the information put together by the blend of smartphones, the cloud, the IOT, and ubiquitous c... more As the information put together by the blend of smartphones, the cloud, the IOT, and ubiquitous computing continue to expand at an alarming rate, a data breach increases. Today, users' strong authentication and authorization approaches are increasingly important to secure sensitive, confidential, secret information. Possession and knowledge-based authentication techniques for computers, the internet, email accounts, etc., are commonly used to access vital information; they do not link a user to an established identity, resulting in most security vulnerabilities. Biometric authentication, on the other hand, has the privilege of being more reliable than traditional authentication as biometric characteristics of a person can’t be lost; they are tough to distribute, exchange or duplicate; and it requires the user to be present during the authentication process, thereby relating the users to established identities. Biometrics provides a higher level of assurance that the individual a...
International Journal of Computing and Digital Systems, 2021
Wireless Sensor Network (WSN) is an essential constituent of IoT based smart city applications.WS... more Wireless Sensor Network (WSN) is an essential constituent of IoT based smart city applications.WSN is one of the prominent sensing technologies for data acquisition in smart surveillance and monitoring applications. However, the deployment of a new node in the WSN is a critical security concern. The new node deployment within WSN is inevitable due to the outage of power or nodes getting compromised by adversary attacks. The newly deployed node can be a malicious node that may disrupt and compromise the data acquisition process of IoT based smart applications. Thus for effective and secure new node deployment in WSN, an access control mechanism needs to be enforced. Many schemes have been suggested for access control within WSN, but the practical consideration has been ignored. In this paper, a secure and practical access control mechanism based on Elliptical Curve Cryptography (ECC) has been presented for secure data acquisition using WSN. The proposed access control scheme highlights and address the practical implementation issues, which include scalability and no interdependence on clock synchronization between the nodes in a WSN. A detailed comparative analysis with the existing scheme suggests a better tradeoff in terms of security and functional requirements as compared to the existing relevant schemes. The security strength of the proposed scheme has been formally validated using Scyther. Scyther analysis depicts that the proposed scheme is resistant against various active and passive attacks. The proposed scheme has also been simulated on TinyOS using the TOSSIM simulator to carry out a detailed energy analysis. Based on the simulation analysis, a new node requires only 178 mJ to join the WSN based data acquisition tier. The formal validation and simulation results suggest that the proposed scheme can be used for secure data acquisition using WSN for IoT based smart applications.
Herald of the Russian Academy of Sciences, 2021
Abstract In a multimodal biometric recognition system, the integration of multiple features deriv... more Abstract In a multimodal biometric recognition system, the integration of multiple features derived from various biometric modalities seeks to overcome the several drawbacks found in a unimodal biometric system. In this paper, we have proposed a novel multimodal biometric recognition system based on a multi-level hybrid feature fusion mechanism to compact knowledge from multiple feature vectors. Several pre-trained networks with transfer learning, namely AlexNet, Inceptionv2, Densenet201, Resnet101, and Resnet-Inceptionv2, are employed to extract feature vectors to fuse with handcrafted feature vectors based on HOG feature descriptor. Canonical correlation analysis (CCA) and Discriminant Correlation Analysis (DCA) are utilized at a multi-level hybrid mechanism. To test the proposed framework, we used three biometric features: Ear, Face, and Gait. Numerical results have proved that our model outperformed other state of the art recent variants.
International Journal of Forensic Engineering, 2017
Copy-move detection also known as region duplication detection is a well-recognised and active ar... more Copy-move detection also known as region duplication detection is a well-recognised and active area of research owing to great demand of authenticating genuineness of images. Currently available techniques for copymove detection fail to accurately locate the tampered region and lack robustness against common post-processing operations like compression, blurring and brightness changes. This paper proposes a novel technique for detection and localisation of copy-move regions in image using grey-level run length matrix (GLRLM) features. In the proposed method, we first divide the forged image into overlapping blocks and GLRLM features are calculated for each block. Features calculated for each block form feature vectors. Feature vectors thus obtained are lexicographically sorted. Blocks with similar features are identified using Euclidean feature distances. Post-processing isolates similar blocks. The results demonstrate the effectiveness of the proposed scheme to locate copy-move forgery and robustness against operations like jpeg compression, blurring and contrast adjustments.
Biometric verification refers to an automatic verification of a person based on some specific bio... more Biometric verification refers to an automatic verification of a person based on some specific biometric features derived from his/her physiological and/or behavioral characteristics. A biometric verification system has more capability to reliably distinguish between an authorized person and an imposter than the traditional systems that use a card or a password. In biometrics, a person could be recognized based on who he/she is rather than what he/she has (ID card) or what he/she knows (password). Currently, biometrics finds use in ATMs, computers, security installations, mobile phones, credit cards, health and social services. The future in biometrics seems to belong to the multimodal biometrics (a biometric system using more than one biometric feature) as a unimodal biometric system (biometric system using single biometric feature) has to contend with a number of problems. In this paper, a survey of some of the unimodal biometrics will be presented that are either currently in use ...
International Journal of Information Security
TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON)
Dental biometry has a leading role in forensic human identification. Identifying a person in mass... more Dental biometry has a leading role in forensic human identification. Identifying a person in mass disasters and major catastrophes, which have frequently happened due to airplanes crashes, tsunamis, fire accidents, etc is a challenging problem if conventional biometrics, e.g., face, fingerprint, iris, etc. is not available. Dental characteristics of persons are naturally unique and can be used to identify individuals based on their dental radiographs. In this paper, we present a new and workable method for identifying humans, that extracts the dental mandibular information from panoramic dental radiographs which is used as a biometric identifier. The system segments the mandible from dental panoramic X-ray images to obtain the outer mandibular contour coordinates. Time series is then obtained from the extracted contour coordinates which gives the structural information of the mandible. AR model is then fitted to this time series and the AR coefficients thus obtained form the feature vector representing each mandible. These feature vectors are later used for matching and identification using the Euclidian distance classification criteria. In order to assess the proposed system, we have carried out experiments at three different orders of AR model using a database of 120 ante-mortem and 90 post mortem panoramic dental images, obtained from 30 individuals. The experimental results show that the proposed system is effective in identifying individuals and exhibits better results at order 3 of AR model with a Recognition rate (RR) up to 75.52%, low Equal error rate (EER) of 23% and a rank-1 identification rate of 76.66%.
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018
Internet has been growing tremendously since its beginning and day by day more and more computers... more Internet has been growing tremendously since its beginning and day by day more and more computers are getting added to it. This sets a tremendous pressure on the available bandwidth of links connecting the nodes. With the evolution of Internet Protocol version 6, the header size has almost doubled which again would have considerable effect on bandwidth. Payload Header Suppression is a bandwidth saving technology which removes the redundant packet overhead. Together with MPLS, PHS can be used to optimize the network performance by reducing the traffic congestion. This paper performs a comparison of utilizing PHS in MPLS network over IPv6 and IPv4 networks by sending real time traffic of VoIP. The analysis clearly proved that PHS has a considerable effect in reduction of packet delay, background delay, packet loss and increase in throughput. Also, the performance of IPv6 was better than IPv4 while utilizing suppression mechanisms over MPLS.
Advances in Computational Techniques for Biomedical Image Analysis, 2020
Abstract Segmentation is an important step in many medical applications involving measurements, 3... more Abstract Segmentation is an important step in many medical applications involving measurements, 3D visualization, registration, and computer aided diagnosis (CAD). Selection of the “correct” technique of segmentation for a given application is a difficult task. In many cases a combination of several techniques may be necessary to obtain the segmentation goal. There is a need to do an evaluation of different segmentation methods using different standard protocols that help in selecting methods for particular clinical applications. The segmentation techniques which are easy to compute and have minimal user supervision are the ones that are accepted for clinical purposes. Disc degeneration is considered as a very common spine abnormality resulting in severe pain in the back and legs causing alot of disruption in people’s lives and is considered to be a major reason why patients visit radiologist clinics these days. Besides, it has a great impact on the economy of suffering patients, and there is a concern about shortage of radiologists and hence demand for CAD system. Different methods that have been implemented for vertebral and intervertebral disc disease and degeneration diagnosis, along with the results obtained are discussed in this chapter; the aforementioned disease is still considered an unsolved and somewhat ill-defined problem.
International Journal of Pervasive Computing and Communications, 2021
Purpose Because of the continued use of mobile, cloud and the internet of things, the possibility... more Purpose Because of the continued use of mobile, cloud and the internet of things, the possibility of data breaches is on the increase. A secure authentication and authorization strategy is a must for many of today’s applications. Authentication schemes based on knowledge and tokens, although widely used, lead to most security breaches. While providing various advantages, biometrics are also subject to security threats. Using multiple factors together for authentication provides more certainty about a user’s identity; thus, leading to a more reliable, effective and more difficult for an adversary to intrude. This study aims to propose a novel, secure and highly stable multi-factor one-time password (OTP) authentication solution for mobile environments, which uses all three authentication factors for user authentication. Design/methodology/approach The proposed authentication scheme is implemented as a challenge-response authentication where three factors (username, device number and ...
Applied Mathematical Modelling, 2019
Abstract In this paper fractional Hindmarsh Rose (HR) neuron, which mimics several behaviors of a... more Abstract In this paper fractional Hindmarsh Rose (HR) neuron, which mimics several behaviors of a real biological neuron is implemented on field programmable gate array (FPGA). The results show several differences in the dynamic characteristics of integer and fractional order Hindmarsh Rose neuron models. The integer order model shows only one type of firing characteristics when the parameters of model remains same. The fractional order model depicts several dynamical behaviors even for the same parameters as the order of the fractional operator is varied. The firing frequency increases when the order of the fractional operator decreases. The fractional order is therefore key in determining the firing characteristics of biological neurons. To implement this neuron model first the digital realization of different fractional operator approximations are obtained, then the fractional integrator is used to obtain the low power and low cost hardware realization of fractional HR neuron. The fractional neuron model has been implemented on a low voltage and low power circuit and then compared with its integer counter part. The hardware is used to demonstrate the different dynamical behaviors of fractional HR neuron for different type of approximations obtained for fractional operator in this paper. A coupled network of fractional order HR neurons is also implemented. The results also show that synchronization between neurons increases as long as coupling factor keeps on increasing.
International Journal of Innovative Technology and Exploring Engineering, 2019
The growth of online application used for financial transactions and transferring personal inform... more The growth of online application used for financial transactions and transferring personal information is increasingly common on internet and in mobile communication. These applications require authenticating legitimate users by assigning digital identities. Static passwords are perhaps most common type of credentials used today to authenticate the users. To avoid tedious task of remembering passwords, users often behave less securely by using low entropy and weak passwords, thus presenting security threats to online services. Various solutions have been provided to eliminate the need of users to create and manage passwords’ typical solution is based on generating one time password (OTP) for a single session or transaction. Unfortunately in most of the general mechanisms used for generating one time password (OTP) randomness of OTP system breaks after certain period of time and hence passwords become predictable. To solve this problem, in this paper a novel OTP generation method has...
International Journal of Biometrics, 2018
Dental biometrics is a new and growing area of forensic biometrics that uses the unique features ... more Dental biometrics is a new and growing area of forensic biometrics that uses the unique features of dental structures from dental radiographs to automatically establish a person's identity from their dental remains when the conventional biometric features are not available. In this paper, we present a new and efficient approach for identifying people, by using the structure of mandible from the panoramic dental radiographs as a biometric identifier. The system automatically segments the mandible from dental panoramic images to extract the representative feature vectors for each mandible, which are later used for matching and identification. The experimental results of the proposed system using a database of 120 ante-mortem and 90 post-mortem panoramic dental images show that the system is robust and effective in identifying individuals and exhibits a high recognition rate (RR) up to 98.79%, low equal error rate (EER) of 1.5% and a remarkable identification performance.
International Journal of Signal Processing, Image Processing and Pattern Recognition, 2014
In this paper usefulness of time series based Auto Regressive (AR) modelling technique has been e... more In this paper usefulness of time series based Auto Regressive (AR) modelling technique has been explored for identification of a person. For this purpose, time series is obtained from the contour coordinates of the ear. AR model is fitted to this time series. AR coefficients thus obtained serve as a feature vector. Recognition Rate (RR) has been found by a classifier that is based on Euclidian distance between feature vector of test samples with training samples within itself (intraclass) and with respect to others (interclass). Model has been found invariant to posture, rotation and illumination. RR up to 99% has been obtained. Results have been compared with existing techniques. The results demonstrate the effectiveness of technique for human identification.
2014 International Conference on Communication and Signal Processing, 2014
In this paper, three different segmentation techniques, namely, region growing segmentation techn... more In this paper, three different segmentation techniques, namely, region growing segmentation technique, watershed segmentation and texture segmentation are used to accurately extract the shapes of membranes and nuclei from the inverted microscopic images, taken throughout the monolayer formation of BGM -70 (Baby Grevit Monkey) cell culture. This strategy is a prerequisite for an accurate quantitative analysis of cell shape and morphodynamics during organogenesis and is the basis for an integrated understanding of biological processes. The segmentation of cellular structures is achieved by first normalizing the microscopic images by performing CLAHE operation followed by de-noising by morphological opening and filling of the holes and then applying segmentation algorithm for cell shape reconstruction.
Computer Engineering and Intelligent Systems, 2011
This paper presents a multimodal biometric verification system using multiple fingerprint matcher... more This paper presents a multimodal biometric verification system using multiple fingerprint matchers. Theproposed verification system is based on multiple fingerprint matchers using Spatial Grey LevelDependence Method and Filterbank-based technique. ...
Journal of Network and Systems Management, 2020
Software Defined Networking simplifies design, monitoring and management of next generation netwo... more Software Defined Networking simplifies design, monitoring and management of next generation networks by segregating a legacy network into a centralized control plane and a remotely programmable data plane. The intelligent centralized SDN control plane controls behavior of forwarding devices in processing the incoming packets and provides a bird-eye view of entire network at a single central point. The centralized control provides network programmability and facilitates introduction of adaptive and automatic network control. The SDN control plane can be implemented by using following three deployment models: (i) physically centralized, in which a single SDN controller is configured for a network; (ii) physically distributed but logically centralized, wherein multiple SDN controllers are used to manage a network; and (iii) hybrid, in which both legacy distributed control and centralized SDN control coexist. This manuscript presents all these control plane architectures and discusses various SDN controllers supporting these architectures. We have analyzed more than forty SDN controllers in terms of following performance parameters: scalability, reliability, consistency and security. We have examined the mechanisms used by various SDN controllers to address the said performance parameters and have highlighted the pros and cons associated with each mechanism. In addition to it, this manuscript also highlights number of research challenges and open issues in different SDN control plane architectures.
Abstract–In this paper we propose feature extraction for Telugu handwritten recognition based on ... more Abstract–In this paper we propose feature extraction for Telugu handwritten recognition based on the candidate search and elimination technique. The initial candidates for recognition are found by applying by zoning method on input glyphs. We propose cavities as a structural approach suited specifically for Telugu script, where cavity vectors are used to prune the candidates by zoning. It gives the 100% features and cavity features of the input dataset. Index Terms–DataSet Generation, Feature Extraction, OCR for Telugu Hand- ...
International Journal of Information Technology and Computer Science
As the information put together by the blend of smartphones, the cloud, the IOT, and ubiquitous c... more As the information put together by the blend of smartphones, the cloud, the IOT, and ubiquitous computing continue to expand at an alarming rate, a data breach increases. Today, users' strong authentication and authorization approaches are increasingly important to secure sensitive, confidential, secret information. Possession and knowledge-based authentication techniques for computers, the internet, email accounts, etc., are commonly used to access vital information; they do not link a user to an established identity, resulting in most security vulnerabilities. Biometric authentication, on the other hand, has the privilege of being more reliable than traditional authentication as biometric characteristics of a person can’t be lost; they are tough to distribute, exchange or duplicate; and it requires the user to be present during the authentication process, thereby relating the users to established identities. Biometrics provides a higher level of assurance that the individual a...
International Journal of Computing and Digital Systems, 2021
Wireless Sensor Network (WSN) is an essential constituent of IoT based smart city applications.WS... more Wireless Sensor Network (WSN) is an essential constituent of IoT based smart city applications.WSN is one of the prominent sensing technologies for data acquisition in smart surveillance and monitoring applications. However, the deployment of a new node in the WSN is a critical security concern. The new node deployment within WSN is inevitable due to the outage of power or nodes getting compromised by adversary attacks. The newly deployed node can be a malicious node that may disrupt and compromise the data acquisition process of IoT based smart applications. Thus for effective and secure new node deployment in WSN, an access control mechanism needs to be enforced. Many schemes have been suggested for access control within WSN, but the practical consideration has been ignored. In this paper, a secure and practical access control mechanism based on Elliptical Curve Cryptography (ECC) has been presented for secure data acquisition using WSN. The proposed access control scheme highlights and address the practical implementation issues, which include scalability and no interdependence on clock synchronization between the nodes in a WSN. A detailed comparative analysis with the existing scheme suggests a better tradeoff in terms of security and functional requirements as compared to the existing relevant schemes. The security strength of the proposed scheme has been formally validated using Scyther. Scyther analysis depicts that the proposed scheme is resistant against various active and passive attacks. The proposed scheme has also been simulated on TinyOS using the TOSSIM simulator to carry out a detailed energy analysis. Based on the simulation analysis, a new node requires only 178 mJ to join the WSN based data acquisition tier. The formal validation and simulation results suggest that the proposed scheme can be used for secure data acquisition using WSN for IoT based smart applications.
Herald of the Russian Academy of Sciences, 2021
Abstract In a multimodal biometric recognition system, the integration of multiple features deriv... more Abstract In a multimodal biometric recognition system, the integration of multiple features derived from various biometric modalities seeks to overcome the several drawbacks found in a unimodal biometric system. In this paper, we have proposed a novel multimodal biometric recognition system based on a multi-level hybrid feature fusion mechanism to compact knowledge from multiple feature vectors. Several pre-trained networks with transfer learning, namely AlexNet, Inceptionv2, Densenet201, Resnet101, and Resnet-Inceptionv2, are employed to extract feature vectors to fuse with handcrafted feature vectors based on HOG feature descriptor. Canonical correlation analysis (CCA) and Discriminant Correlation Analysis (DCA) are utilized at a multi-level hybrid mechanism. To test the proposed framework, we used three biometric features: Ear, Face, and Gait. Numerical results have proved that our model outperformed other state of the art recent variants.
International Journal of Forensic Engineering, 2017
Copy-move detection also known as region duplication detection is a well-recognised and active ar... more Copy-move detection also known as region duplication detection is a well-recognised and active area of research owing to great demand of authenticating genuineness of images. Currently available techniques for copymove detection fail to accurately locate the tampered region and lack robustness against common post-processing operations like compression, blurring and brightness changes. This paper proposes a novel technique for detection and localisation of copy-move regions in image using grey-level run length matrix (GLRLM) features. In the proposed method, we first divide the forged image into overlapping blocks and GLRLM features are calculated for each block. Features calculated for each block form feature vectors. Feature vectors thus obtained are lexicographically sorted. Blocks with similar features are identified using Euclidean feature distances. Post-processing isolates similar blocks. The results demonstrate the effectiveness of the proposed scheme to locate copy-move forgery and robustness against operations like jpeg compression, blurring and contrast adjustments.
Biometric verification refers to an automatic verification of a person based on some specific bio... more Biometric verification refers to an automatic verification of a person based on some specific biometric features derived from his/her physiological and/or behavioral characteristics. A biometric verification system has more capability to reliably distinguish between an authorized person and an imposter than the traditional systems that use a card or a password. In biometrics, a person could be recognized based on who he/she is rather than what he/she has (ID card) or what he/she knows (password). Currently, biometrics finds use in ATMs, computers, security installations, mobile phones, credit cards, health and social services. The future in biometrics seems to belong to the multimodal biometrics (a biometric system using more than one biometric feature) as a unimodal biometric system (biometric system using single biometric feature) has to contend with a number of problems. In this paper, a survey of some of the unimodal biometrics will be presented that are either currently in use ...