Mariadas Ronnie C P | SCMS-COCHIN (original) (raw)
Papers by Mariadas Ronnie C P
Internet attacks have been increasing in a day to day basis and it causes greatest challenge in t... more Internet attacks have been increasing in a day to day basis and it causes greatest challenge in the data security. Security of data has to be improved and also it must have the power to detect zero-day attack and deploy them. Firewall is one tool that is used to protect the organization from attacks. Intrusion Detection System (IDS) is another tool that is used to discover attacks in an organization. The main disadvantage of these tools is that it produces false alarms; it gathers only less information about the attacker and fails to identify zero-day attacks. Honeypot is a trap for the one who try to attack the system. Honeypot is designed in such a way that it hooks the attacker who tries to attack the system of any organization. In a honeypot network, attacker may not be aware that they are been tracing by gathering all the relevant information.
Today, the most common method used by many intruders to get the personal information about variou... more Today, the most common method used by many intruders to get the personal information about various users is by sending emails. This method is known as phishing. In this, the intruders try to gain vital information about the users. It may include passwords, username, bank account details and so on. Today, there are different kinds of phishing techniques that have been developed which are difficult to trace even for an educated person. One of the main challenging issues in this area is to detect phishing with high accuracy. This is because the phishing website and the corresponding website look so similar in appearance. Some of the features set like text format, text content, CSS, HTML tags, image and so forth are utilized by various phishing techniques based on visual similarity. Keywords-anti-phishing, history, types of phishing, link count checker.
IOSR Journal of Engineering, 2012
This paper proposes a new algorithm by improving and combining S-DES and Back Propagation in neur... more This paper proposes a new algorithm by improving and combining S-DES and Back Propagation in neural networks to identify the stego image in mails. Back propogation is ideal for simple pattern recognition and mapping tasks. This new algorithm checks the mail inbox for JPEG files. As the image is send across the network for transmission, compression is required. Compression is used to minimize the seeking time of the JPEG files. After compression, the files are stored in a large database for further processing. A sample image is taken from the database as cover channel which is used to hide the secret information. For each image, we embedded a random binary stream of different lengths using S-DES algorithm. The proposed research analyses the performance of the improved version of image steganalysis algorithms in corporate mails.
IOSR Journal of Engineering, 2012
This paper targets to reconstruct the original fingerprint image from minutiae information using ... more This paper targets to reconstruct the original fingerprint image from minutiae information using relaxation labeling and Gabor filtering which can reveal substantial details such as the orientation field. The proposed technique utilizes minutiae information to estimate the orientation map of the parent fingerprint. First, the Gabor filter is used to extract the properties of the fingerprint image by using ridge mapping and thinning. Second, Relaxation Labeling uses the Gabor image to predict the orientation and direction of the image to generate the point care index image and singular point image specifications. Finally, the image properties is extracted to produce the minutiae information.
IJCRT, 2018
This paper discusses Honeypot and its applications
IJCRT, 2018
This paper discusses the various anti-phishing techniques
Journal of Chengdu University of Technology, 2021
When a miner or a group of miners attempt to control more than 50% of a network's mining power, c... more When a miner or a group of miners attempt to control more than 50% of a network's mining power, computing power or hash rate, it is called 51% attack. The attackers can block new transactions from taking place or being confirmed. This attack was considered very unlikely for a long period due to the immense attacking cost. However, the attack has befallen at a frequent pace in recent times. These attackers can double-spend the same cryptocoin, restrict transactions, cancel blocks, and even have full control over the value of a cryptocurrency. In this paper, we tend to discuss the protection techniques to prevent this attack and we will have a security-based analysis on each technique.
) International Journal of Computer Science and Information Security, 2011
This paper deals mainly with the performance study and analysis of image retrieval techniques for... more This paper deals mainly with the performance study and analysis of image retrieval techniques for retrieving unrecognized objects from an image using Hyper spectral camera and high-resolution image.
IOSR Journal of Engineering, 2012
This paper proposes a new algorithm by improving and combining S-DES and Back Propagation in neur... more This paper proposes a new algorithm by improving and combining S-DES and Back Propagation in neural networks to identify the stego image in mails. Back propogation is ideal for simple pattern recognition and mapping tasks. This new algorithm checks the mail inbox for JPEG files. As the image is send across the network for transmission, compression is required. Compression is used to minimize the seeking time of the JPEG files. After compression, the files are stored in a large database for
further processing. A sample image is taken from the database as cover channel which is used to hide the secret information. For each image, we embedded a random binary stream of different lengths using SDES algorithm. The proposed research analyses the performance of the improved version of image steganalysis algorithms in corporate mails.
IOSR Journal of Engineering, 2012
This paper targets to reconstruct the original fingerprint image from minutiae information using ... more This paper targets to reconstruct the original fingerprint image from minutiae information using relaxation labeling and Gabor filtering which can reveal substantial details such as the orientation field. The proposed technique utilizes minutiae information to estimate the orientation map of the parent fingerprint. First, the Gabor filter is used to extract the properties of the fingerprint image by using ridge mapping and thinning. Second, Relaxation Labeling uses the Gabor image to predict the orientation and direction of the image to generate the point care index image and singular point image specifications. Finally, the image properties is extracted to produce the minutiae information.
IJCSMA, 2018
This paper deals with the analysis for retrieving unrecognized objects from an image using Hyper ... more This paper deals with the analysis for retrieving unrecognized objects from an image using Hyper spectral camera and high-resolution image. Retrieving unrecognized objects from an image is made possible using spectral analysis and spatial analysis. The method proposed to retrieve unrecognized object from a high-resolution image is more efficient in comparison with the other image retrieval techniques. To identify objects in an image, it should be detected and the detection technique to identify objects in an image is accomplished in two steps: anomaly detection based on the spectral data and the classification phase, based on spatial analysis. During the classification phase, the detected points of the searched object are projected on to the high-resolution images through registration algorithms. After that, each detected point is classified using linear discrimination functions and decision surfaces based on spatial features. The two detection steps possess spectral and spatial information. In order to overcome the problems associated with the smoothness of the edges of an image, transcoding technique is used using filter arrays.
International Journal of Mechanical Engineering, 2021
Data Science is a combination of multiple disciplines such as statistics, data analysis and machi... more Data Science is a combination of multiple disciplines such as statistics, data analysis and machine learning that are used to perform data analysis and to extract knowledge from it. It is used to find patterns of data through data analysis and thereby make decisions. Through data science, organizations are able to make better decisions, predictive analysis and pattern discoveries. In this paper, some of the data science applications created through pycharm software are explained of about how each application would read data from csv, excel, json and mongodb to produce patterns of data and an explanation of several applications of data science has been provided.
Journal of the Maharaja Sayajirao University of Baroda, 2020
Ruby on Rails(RoR) or Rails is a server-side open source web application framework written in Rub... more Ruby on Rails(RoR) or Rails is a server-side open source web application framework written in Ruby. It is an MVC framework owned by David Heinemeier Hansson. It helps you build websites by providing a default structure to build a web page, web service and a database application. In this paper, an introduction is given based on the characteristics and features of Ruby. This paper also discusses about why RoR is evolving as a new trend in web technologies based on the information provided in various articles and websites.
Hyper spectral video is of interest in a large number of remote sensing applications, such as geo... more Hyper spectral video is of interest in a large number of remote sensing applications, such as geology and pollution monitoring, in order to detect and analyze surface and atmospheric composition. The processing of these video, called spectral analysis, allows for the identification of the specific mineralogical and agricultural elements which compose an image. The research presented in this paper takes advantage of details specific to this processing in order to maximize the ability of compression algorithms to operate on the video with minimal loss in image utility. The research begins with the recommendation of new error determination utilities which incorporate spectral analysis techniques in order to model real usage, and then compares the results from others with the commonly used PSNR. Then, it continues by building on the results of these utilities with the recommendation of a dynamic frame skipping depending upon frame variation of each group of picture.
The Ultimate goal of video coding techniques is to store or transmit a video with less space or b... more The Ultimate goal of video coding techniques is to store or transmit a video with less space or bandwidth. Video coding attempts to code each frame of the video which is temporally and spatially sampled. Thus video coding techniques are oriented towards construction of frames from the video, then code each frame and combine the coded frame to form a single video file. Video coding scheme could be used to video conferencing, mobile multimedia applications and for standard definition television and DVD video. Depending On the application, the compression algorithm is preferred. In particular, a novel approach that performs joint spatial and temporal prediction simultaneously is introduced. It bypasses the complex H.26x inter frame techniques and it is less computationally intensive. Because of the advantage of the effective joint prediction, the proposed approach is demonstrated experimentally to consistently lead to improved video quality, and in many cases to better compression rate...
Internet attacks have been increasing in a day to day basis and it causes greatest challenge in t... more Internet attacks have been increasing in a day to day basis and it causes greatest challenge in the data security. Security of data has to be improved and also it must have the power to detect zero-day attack and deploy them. Firewall is one tool that is used to protect the organization from attacks. Intrusion Detection System (IDS) is another tool that is used to discover attacks in an organization. The main disadvantage of these tools is that it produces false alarms; it gathers only less information about the attacker and fails to identify zero-day attacks. Honeypot is a trap for the one who try to attack the system. Honeypot is designed in such a way that it hooks the attacker who tries to attack the system of any organization. In a honeypot network, attacker may not be aware that they are been tracing by gathering all the relevant information.
Today, the most common method used by many intruders to get the personal information about variou... more Today, the most common method used by many intruders to get the personal information about various users is by sending emails. This method is known as phishing. In this, the intruders try to gain vital information about the users. It may include passwords, username, bank account details and so on. Today, there are different kinds of phishing techniques that have been developed which are difficult to trace even for an educated person. One of the main challenging issues in this area is to detect phishing with high accuracy. This is because the phishing website and the corresponding website look so similar in appearance. Some of the features set like text format, text content, CSS, HTML tags, image and so forth are utilized by various phishing techniques based on visual similarity. Keywords-anti-phishing, history, types of phishing, link count checker.
IOSR Journal of Engineering, 2012
This paper proposes a new algorithm by improving and combining S-DES and Back Propagation in neur... more This paper proposes a new algorithm by improving and combining S-DES and Back Propagation in neural networks to identify the stego image in mails. Back propogation is ideal for simple pattern recognition and mapping tasks. This new algorithm checks the mail inbox for JPEG files. As the image is send across the network for transmission, compression is required. Compression is used to minimize the seeking time of the JPEG files. After compression, the files are stored in a large database for further processing. A sample image is taken from the database as cover channel which is used to hide the secret information. For each image, we embedded a random binary stream of different lengths using S-DES algorithm. The proposed research analyses the performance of the improved version of image steganalysis algorithms in corporate mails.
IOSR Journal of Engineering, 2012
This paper targets to reconstruct the original fingerprint image from minutiae information using ... more This paper targets to reconstruct the original fingerprint image from minutiae information using relaxation labeling and Gabor filtering which can reveal substantial details such as the orientation field. The proposed technique utilizes minutiae information to estimate the orientation map of the parent fingerprint. First, the Gabor filter is used to extract the properties of the fingerprint image by using ridge mapping and thinning. Second, Relaxation Labeling uses the Gabor image to predict the orientation and direction of the image to generate the point care index image and singular point image specifications. Finally, the image properties is extracted to produce the minutiae information.
IJCRT, 2018
This paper discusses Honeypot and its applications
IJCRT, 2018
This paper discusses the various anti-phishing techniques
Journal of Chengdu University of Technology, 2021
When a miner or a group of miners attempt to control more than 50% of a network's mining power, c... more When a miner or a group of miners attempt to control more than 50% of a network's mining power, computing power or hash rate, it is called 51% attack. The attackers can block new transactions from taking place or being confirmed. This attack was considered very unlikely for a long period due to the immense attacking cost. However, the attack has befallen at a frequent pace in recent times. These attackers can double-spend the same cryptocoin, restrict transactions, cancel blocks, and even have full control over the value of a cryptocurrency. In this paper, we tend to discuss the protection techniques to prevent this attack and we will have a security-based analysis on each technique.
) International Journal of Computer Science and Information Security, 2011
This paper deals mainly with the performance study and analysis of image retrieval techniques for... more This paper deals mainly with the performance study and analysis of image retrieval techniques for retrieving unrecognized objects from an image using Hyper spectral camera and high-resolution image.
IOSR Journal of Engineering, 2012
This paper proposes a new algorithm by improving and combining S-DES and Back Propagation in neur... more This paper proposes a new algorithm by improving and combining S-DES and Back Propagation in neural networks to identify the stego image in mails. Back propogation is ideal for simple pattern recognition and mapping tasks. This new algorithm checks the mail inbox for JPEG files. As the image is send across the network for transmission, compression is required. Compression is used to minimize the seeking time of the JPEG files. After compression, the files are stored in a large database for
further processing. A sample image is taken from the database as cover channel which is used to hide the secret information. For each image, we embedded a random binary stream of different lengths using SDES algorithm. The proposed research analyses the performance of the improved version of image steganalysis algorithms in corporate mails.
IOSR Journal of Engineering, 2012
This paper targets to reconstruct the original fingerprint image from minutiae information using ... more This paper targets to reconstruct the original fingerprint image from minutiae information using relaxation labeling and Gabor filtering which can reveal substantial details such as the orientation field. The proposed technique utilizes minutiae information to estimate the orientation map of the parent fingerprint. First, the Gabor filter is used to extract the properties of the fingerprint image by using ridge mapping and thinning. Second, Relaxation Labeling uses the Gabor image to predict the orientation and direction of the image to generate the point care index image and singular point image specifications. Finally, the image properties is extracted to produce the minutiae information.
IJCSMA, 2018
This paper deals with the analysis for retrieving unrecognized objects from an image using Hyper ... more This paper deals with the analysis for retrieving unrecognized objects from an image using Hyper spectral camera and high-resolution image. Retrieving unrecognized objects from an image is made possible using spectral analysis and spatial analysis. The method proposed to retrieve unrecognized object from a high-resolution image is more efficient in comparison with the other image retrieval techniques. To identify objects in an image, it should be detected and the detection technique to identify objects in an image is accomplished in two steps: anomaly detection based on the spectral data and the classification phase, based on spatial analysis. During the classification phase, the detected points of the searched object are projected on to the high-resolution images through registration algorithms. After that, each detected point is classified using linear discrimination functions and decision surfaces based on spatial features. The two detection steps possess spectral and spatial information. In order to overcome the problems associated with the smoothness of the edges of an image, transcoding technique is used using filter arrays.
International Journal of Mechanical Engineering, 2021
Data Science is a combination of multiple disciplines such as statistics, data analysis and machi... more Data Science is a combination of multiple disciplines such as statistics, data analysis and machine learning that are used to perform data analysis and to extract knowledge from it. It is used to find patterns of data through data analysis and thereby make decisions. Through data science, organizations are able to make better decisions, predictive analysis and pattern discoveries. In this paper, some of the data science applications created through pycharm software are explained of about how each application would read data from csv, excel, json and mongodb to produce patterns of data and an explanation of several applications of data science has been provided.
Journal of the Maharaja Sayajirao University of Baroda, 2020
Ruby on Rails(RoR) or Rails is a server-side open source web application framework written in Rub... more Ruby on Rails(RoR) or Rails is a server-side open source web application framework written in Ruby. It is an MVC framework owned by David Heinemeier Hansson. It helps you build websites by providing a default structure to build a web page, web service and a database application. In this paper, an introduction is given based on the characteristics and features of Ruby. This paper also discusses about why RoR is evolving as a new trend in web technologies based on the information provided in various articles and websites.
Hyper spectral video is of interest in a large number of remote sensing applications, such as geo... more Hyper spectral video is of interest in a large number of remote sensing applications, such as geology and pollution monitoring, in order to detect and analyze surface and atmospheric composition. The processing of these video, called spectral analysis, allows for the identification of the specific mineralogical and agricultural elements which compose an image. The research presented in this paper takes advantage of details specific to this processing in order to maximize the ability of compression algorithms to operate on the video with minimal loss in image utility. The research begins with the recommendation of new error determination utilities which incorporate spectral analysis techniques in order to model real usage, and then compares the results from others with the commonly used PSNR. Then, it continues by building on the results of these utilities with the recommendation of a dynamic frame skipping depending upon frame variation of each group of picture.
The Ultimate goal of video coding techniques is to store or transmit a video with less space or b... more The Ultimate goal of video coding techniques is to store or transmit a video with less space or bandwidth. Video coding attempts to code each frame of the video which is temporally and spatially sampled. Thus video coding techniques are oriented towards construction of frames from the video, then code each frame and combine the coded frame to form a single video file. Video coding scheme could be used to video conferencing, mobile multimedia applications and for standard definition television and DVD video. Depending On the application, the compression algorithm is preferred. In particular, a novel approach that performs joint spatial and temporal prediction simultaneously is introduced. It bypasses the complex H.26x inter frame techniques and it is less computationally intensive. Because of the advantage of the effective joint prediction, the proposed approach is demonstrated experimentally to consistently lead to improved video quality, and in many cases to better compression rate...