Irene Getzi - Academia.edu (original) (raw)

Papers by Irene Getzi

Research paper thumbnail of Autonomous

The Internet Protocol (IP) is a main protocol using for route information across the Internet. Th... more The Internet Protocol (IP) is a main protocol using for route information across the Internet. The role of IP is to provide best-effort services for the delivery of information to its destination. IP spoofing is a technique used to gain unauthorized access to host computers, so that the intruder can sends messages to another computer with an IP address indicating that the message is coming from a trusted host. IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a source IP address, with the intention of hiding the identity of the sender or impersonating another computing system. In non-blind spoofing the hacker requires information about the sending host like OS, Sequence Number of packets, etc. But in blind spoofing attacker might not care about the source. A good network should have some strong Detection and Prevention methods against IP spoofing. The prevention methods can be classified as Host Based solutions, Router-Based Solutions and Solu...

Research paper thumbnail of Dehazing of Multispectral Satellite Images

International Journal for Research in Applied Science and Engineering Technology

Dehazing multispectral satellite images is a crucial remote sensing activity since it raises the ... more Dehazing multispectral satellite images is a crucial remote sensing activity since it raises the calibre and precision of satellite images. This research paper presents a comparative analysis of two approaches, namely histogram equalization and an algorithm that combines boundary constraint and contextual regularization methods for efficient dehazing of multispectral images. The algorithms successfully eliminates haze from multispectral satellite images, while preserving their features and structural integrity. Experimental results demonstrate that the latter approach outperforms the other dehazing algorithm in terms of both visual quality and quantitative measurements.

Research paper thumbnail of Authentication Using Minutiae Based Fingerprint Matching Scheme for Smart Phones

We live in the era of information explosion and the smartphones are changing the way the informat... more We live in the era of information explosion and the smartphones are changing the way the information are accessed and processed. The Smartphones are used in a wide range of applications and contains vital information regarding personal and business. As more and more security breaches happening all over the world in different forms as a threat to the information industry, the end user should have the protection and privilege of using the information without any doubt in his mind. Hence, the access to data to and from the mobile devices requires secure authentication. Traditional password and PIN number schemes are not adequate to protect the end user from accessing the information as well as it is cumbersome. On other hand, biometric based authentications on are easy to carry out, natural to use, and invulnerable to forgery. The popular biometric used to authenticate a person is fingerprint which is unique and permanent throughout a person’s life. In this paper, a method is proposed ...

Research paper thumbnail of A Dynamic Scheme for Secure Searches over Distributed Massive Datasets in Cloud Environment using Searchable Symmetric Encryption Technique

Cloud computing has produced a paradigm shift in large-scale data outsourcing and computing. As t... more Cloud computing has produced a paradigm shift in large-scale data outsourcing and computing. As the cloud server itself cannot be trusted, it is essential to store the data in encrypted form, which however makes it unsuitable to perform searching, computation or analysis on the data. Searchable Symmetric Encryption (SSE) allows the user to perform keyword search over encrypted data without leaking information to the storage provider. Most of the existing SSE schemes have restrictions on the size and the number of index files, to facilitate efficient search. In this paper, we propose a dynamic SSE scheme that can operate on relatively larger, multiple index files, distributed across several nodes, without the need to explicitly merge them. The experiments have been carried out on the encrypted data stored in Amazon EMR cluster. The secure searchable inverted index is created instantly using Hadoop MapReduce framework during the search process, thus significantly eliminate the need to...

Research paper thumbnail of Privacy-Preserving Content-Based Image Retrieval in Cloud

Cloud storage systems are increasingly being used to host personal or organizational data of crit... more Cloud storage systems are increasingly being used to host personal or organizational data of critical importance, especially for image data that needs more storage space than ordinary data. While bringing in much convenience, existing cloud storage solutions could seriously breach the privacy of users. Encryption before outsourcing images to the cloud helps to protect the privacy of the data, but it also brings challenges to perform image retrieval over encrypted data. In this paper, we propose a framework for the privacy-preserving outsourced storage, search, and retrieval of images in large-scale, dynamically updated repositories. Our framework is composed of two main components: an image encryption component, executed on client devices; and a storage, indexing, and searching component (in the encrypted domain), executed in the outsourcing server (e.g. a cloud provider). We base this framework on a new encryption scheme specifically designed for images, called IES-CBIR.

Research paper thumbnail of Enhancing Image Security using Chaotic Map and Block Cipher

We live in the era of information explosion and have witnessed the trend of leveraging cloud-base... more We live in the era of information explosion and have witnessed the trend of leveraging cloud-based services for large scale content storage, processing, and distribution. Data security and privacy are among top concerns for any business environments. As more and more security breaches happening all over the world in different forms as a threat to the information industry, the end user should have the protection and privilege of secured access. Chaos possesses many interesting properties, such as deterministic but random like complex behavior, high sensitivity to initial conditions and system parameters and long term unpredictability. This paper introduces a cellular automata based chaotic encryption scheme and the results are comparable with well-known AES block cipher algorithm.

Research paper thumbnail of Image Captioning using Deep Learning

International Journal for Research in Applied Science and Engineering Technology, 2020

Research paper thumbnail of Liveness Detection using Fingerprint Pores

International journal of engineering research and technology, 2018

The demand for accurate and fast user identification and authentication has increased with the tr... more The demand for accurate and fast user identification and authentication has increased with the tremendous increase in the growth of electronic transactions. Distributed system such as the ATM systems require high level of security. The level of security has advanced from PIN (Personal Identification Number) to Smart Card to Biometrics. With the advance in security level, the fraudulent activities too have advanced to match with them. The uniqueness of a biometrics is that it has intrinsic features that does not change throughout the life time of and most suitable miniaturization. But recent studies on biometric systems have proved that they are not as foolproof as once thought. There are cheap and easily accessible materials available to fool or spoof the fingerprint authentication. To overcome these hacking activities, the proposed work is developed to provide protection to the biometric templates and to enhance the security in the ATM systems using liveliness detection in fingerpr...

Research paper thumbnail of Efficient Image Retrieval approach for Large-scale Chest X Ray data using Hand-Crafted Features and Machine Learning Algorithms

International Journal of Computer Sciences and Engineering

Research paper thumbnail of Autonomous

The Internet Protocol (IP) is a main protocol using for route information across the Internet. Th... more The Internet Protocol (IP) is a main protocol using for route information across the Internet. The role of IP is to provide best-effort services for the delivery of information to its destination. IP spoofing is a technique used to gain unauthorized access to host computers, so that the intruder can sends messages to another computer with an IP address indicating that the message is coming from a trusted host. IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a source IP address, with the intention of hiding the identity of the sender or impersonating another computing system. In non-blind spoofing the hacker requires information about the sending host like OS, Sequence Number of packets, etc. But in blind spoofing attacker might not care about the source. A good network should have some strong Detection and Prevention methods against IP spoofing. The prevention methods can be classified as Host Based solutions, Router-Based Solutions and Solu...

Research paper thumbnail of Dehazing of Multispectral Satellite Images

International Journal for Research in Applied Science and Engineering Technology

Dehazing multispectral satellite images is a crucial remote sensing activity since it raises the ... more Dehazing multispectral satellite images is a crucial remote sensing activity since it raises the calibre and precision of satellite images. This research paper presents a comparative analysis of two approaches, namely histogram equalization and an algorithm that combines boundary constraint and contextual regularization methods for efficient dehazing of multispectral images. The algorithms successfully eliminates haze from multispectral satellite images, while preserving their features and structural integrity. Experimental results demonstrate that the latter approach outperforms the other dehazing algorithm in terms of both visual quality and quantitative measurements.

Research paper thumbnail of Authentication Using Minutiae Based Fingerprint Matching Scheme for Smart Phones

We live in the era of information explosion and the smartphones are changing the way the informat... more We live in the era of information explosion and the smartphones are changing the way the information are accessed and processed. The Smartphones are used in a wide range of applications and contains vital information regarding personal and business. As more and more security breaches happening all over the world in different forms as a threat to the information industry, the end user should have the protection and privilege of using the information without any doubt in his mind. Hence, the access to data to and from the mobile devices requires secure authentication. Traditional password and PIN number schemes are not adequate to protect the end user from accessing the information as well as it is cumbersome. On other hand, biometric based authentications on are easy to carry out, natural to use, and invulnerable to forgery. The popular biometric used to authenticate a person is fingerprint which is unique and permanent throughout a person’s life. In this paper, a method is proposed ...

Research paper thumbnail of A Dynamic Scheme for Secure Searches over Distributed Massive Datasets in Cloud Environment using Searchable Symmetric Encryption Technique

Cloud computing has produced a paradigm shift in large-scale data outsourcing and computing. As t... more Cloud computing has produced a paradigm shift in large-scale data outsourcing and computing. As the cloud server itself cannot be trusted, it is essential to store the data in encrypted form, which however makes it unsuitable to perform searching, computation or analysis on the data. Searchable Symmetric Encryption (SSE) allows the user to perform keyword search over encrypted data without leaking information to the storage provider. Most of the existing SSE schemes have restrictions on the size and the number of index files, to facilitate efficient search. In this paper, we propose a dynamic SSE scheme that can operate on relatively larger, multiple index files, distributed across several nodes, without the need to explicitly merge them. The experiments have been carried out on the encrypted data stored in Amazon EMR cluster. The secure searchable inverted index is created instantly using Hadoop MapReduce framework during the search process, thus significantly eliminate the need to...

Research paper thumbnail of Privacy-Preserving Content-Based Image Retrieval in Cloud

Cloud storage systems are increasingly being used to host personal or organizational data of crit... more Cloud storage systems are increasingly being used to host personal or organizational data of critical importance, especially for image data that needs more storage space than ordinary data. While bringing in much convenience, existing cloud storage solutions could seriously breach the privacy of users. Encryption before outsourcing images to the cloud helps to protect the privacy of the data, but it also brings challenges to perform image retrieval over encrypted data. In this paper, we propose a framework for the privacy-preserving outsourced storage, search, and retrieval of images in large-scale, dynamically updated repositories. Our framework is composed of two main components: an image encryption component, executed on client devices; and a storage, indexing, and searching component (in the encrypted domain), executed in the outsourcing server (e.g. a cloud provider). We base this framework on a new encryption scheme specifically designed for images, called IES-CBIR.

Research paper thumbnail of Enhancing Image Security using Chaotic Map and Block Cipher

We live in the era of information explosion and have witnessed the trend of leveraging cloud-base... more We live in the era of information explosion and have witnessed the trend of leveraging cloud-based services for large scale content storage, processing, and distribution. Data security and privacy are among top concerns for any business environments. As more and more security breaches happening all over the world in different forms as a threat to the information industry, the end user should have the protection and privilege of secured access. Chaos possesses many interesting properties, such as deterministic but random like complex behavior, high sensitivity to initial conditions and system parameters and long term unpredictability. This paper introduces a cellular automata based chaotic encryption scheme and the results are comparable with well-known AES block cipher algorithm.

Research paper thumbnail of Image Captioning using Deep Learning

International Journal for Research in Applied Science and Engineering Technology, 2020

Research paper thumbnail of Liveness Detection using Fingerprint Pores

International journal of engineering research and technology, 2018

The demand for accurate and fast user identification and authentication has increased with the tr... more The demand for accurate and fast user identification and authentication has increased with the tremendous increase in the growth of electronic transactions. Distributed system such as the ATM systems require high level of security. The level of security has advanced from PIN (Personal Identification Number) to Smart Card to Biometrics. With the advance in security level, the fraudulent activities too have advanced to match with them. The uniqueness of a biometrics is that it has intrinsic features that does not change throughout the life time of and most suitable miniaturization. But recent studies on biometric systems have proved that they are not as foolproof as once thought. There are cheap and easily accessible materials available to fool or spoof the fingerprint authentication. To overcome these hacking activities, the proposed work is developed to provide protection to the biometric templates and to enhance the security in the ATM systems using liveliness detection in fingerpr...

Research paper thumbnail of Efficient Image Retrieval approach for Large-scale Chest X Ray data using Hand-Crafted Features and Machine Learning Algorithms

International Journal of Computer Sciences and Engineering