srikanta patnaik editors intelligent computing, … computing, networking, and informatics durga...
TRANSCRIPT
Advances in Intelligent Systems and Computing 243
Intelligent Computing, Networking, and Informatics
Durga Prasad MohapatraSrikanta Patnaik Editors
Proceedings of the International Conference on Advanced Computing, Networking, and Informatics, India, June 2013
Advances in Intelligent Systemsand Computing
Volume 243
Series editor
Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, [email protected]
For further volumes:http://www.springer.com/series/11156
About this Series
The series ‘‘Advances in Intelligent Systems and Computing’’ contains publications on theory,applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually alldisciplines such as engineering, natural sciences, computer and information science, ICT, eco-nomics, business, e-commerce, environment, healthcare, life science are covered. The list oftopics spans all the areas of modern intelligent systems and computing.
The publications within ‘‘Advances in Intelligent Systems and Computing’’ are primarilytextbooks and proceedings of important conferences, symposia and congresses. They coversignificant recent developments in the field, both of a foundational and applicable character. Animportant characteristic feature of the series is the short publication time and world-widedistribution. This permits a rapid and broad dissemination of research results.
Advisory Board
Chairman
Nikhil R. Pal, Indian Statistical Institute, Kolkata, Indiae-mail: [email protected]
Members
Emilio S. Corchado, University of Salamanca, Salamanca, Spaine-mail: [email protected]
Hani Hagras, University of Essex, Colchester, UKe-mail: [email protected]
László T. Kóczy, Széchenyi István University, Gy}or, Hungarye-mail: [email protected]
Vladik Kreinovich, University of Texas at El Paso, El Paso, USAe-mail: [email protected]
Chin-Teng Lin, National Chiao Tung University, Hsinchu, Taiwane-mail: [email protected]
Jie Lu, University of Technology, Sydney, Australiae-mail: [email protected]
Patricia Melin, Tijuana Institute of Technology, Tijuana, Mexicoe-mail: [email protected]
Nadia Nedjah, State University of Rio de Janeiro, Rio de Janeiro, Brazile-mail: [email protected]
Ngoc Thanh Nguyen, Wroclaw University of Technology, Wroclaw, Polande-mail: [email protected]
Jun Wang, The Chinese University of Hong Kong, Shatin, Hong Konge-mail: [email protected]
Durga Prasad MohapatraSrikanta PatnaikEditors
Intelligent Computing,Networking, and Informatics
Proceedings of the International Conferenceon Advanced Computing, Networking,and Informatics, India, June 2013
123
EditorsDurga Prasad MohapatraComputer Science and EngineeringNational Institute of Technology RourkelaRourkela, OrissaIndia
Srikanta PatnaikComputer Science and EngineeringSOA UniversityBhubaneswarIndia
ISSN 2194-5357 ISSN 2194-5365 (electronic)ISBN 978-81-322-1664-3 ISBN 978-81-322-1665-0 (eBook)DOI 10.1007/978-81-322-1665-0Springer New Delhi Heidelberg New York Dordrecht London
Library of Congress Control Number: 2013955257
� Springer India 2014This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part ofthe material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission orinformation storage and retrieval, electronic adaptation, computer software, or by similar or dissimilarmethodology now known or hereafter developed. Exempted from this legal reservation are briefexcerpts in connection with reviews or scholarly analysis or material supplied specifically for thepurpose of being entered and executed on a computer system, for exclusive use by the purchaser of thework. Duplication of this publication or parts thereof is permitted only under the provisions ofthe Copyright Law of the Publisher’s location, in its current version, and permission for use mustalways be obtained from Springer. Permissions for use may be obtained through RightsLink at theCopyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law.The use of general descriptive names, registered names, trademarks, service marks, etc. in thispublication does not imply, even in the absence of a specific statement, that such names are exemptfrom the relevant protective laws and regulations and therefore free for general use.While the advice and information in this book are believed to be true and accurate at the date ofpublication, neither the authors nor the editors nor the publisher can accept any legal responsibility forany errors or omissions that may be made. The publisher makes no warranty, express or implied, withrespect to the material contained herein.
Printed on acid-free paper
Springer is part of Springer Science+Business Media (www.springer.com)
Preface
The proceedings of the International Conference on Advanced Computing,Networking, and Informatics (ICACNI 2013), at Central Institute of TechnologyRaipur, Chhattisgarh, India during 12–14 June record scientific and engineeringprogress in both theoretical and applied sections of Computer Science and relatedfields. The proceedings contain technical articles, reports, and case studies oncomputing, networking, and informatics. Along with these main tracks, there weretwo special sessions organized for recording specific advancements in the domainsof image and video processing and biometric security. The conference also sporteda special industrial track to mark the relevant research achievements from theindustry. Out of 458 articles received for consideration for publication, 135 havebeen selected through a single-blind peer review process. Each article has beenreviewed by at least two reviewers. Academicians, scholars, industry profession-als, and practitioners have contributed to this conference by submitting theirvaluable research works, which has led this conference to a success.
A dedicated committee of several professors and academicians from premierinstitutes, such as the IITs and the NITs, has served to manifest the conferencesuccessful. We sincerely thank all our chairs and committees. We are grateful tothe reviewers who, despite their busy schedules, have supported us by providingreview reports within the stipulated time. We would like to thank Central Instituteof Technology Raipur for organizing and providing the venue for the conference.Our hearty thanks go to the Department of Computer Science and Engineering,National Institute of Technology Rourkela for overall support in executing theconference.
Durga Prasad MohapatraSrikanta Patnaik
v
Committee
Advisory Committee
Ajith Abraham, Technical University of Ostrava, Czech RepublicMassimo Tistarelli, University of Sassari, ItalyPhalguni Gupta, Indian Institute of Technology Kanpur, IndiaGeorge A. Tsihrintzis, University of Piraeus, GreeceAtilla Elçi, Aksaray University, TurkeyRajib Mall, Indian Institute of Technology Kharagpur, IndiaManoj Kumar Singh, IIT-Banaras Hindu University, IndiaShobha Lata Sinha, National Institute of Technology Raipur, IndiaSrikanta Patnaik, Institute of Technical Education and Research, IndiaAjita Rattani, University of Cagliari, ItalyR. C. Hansdah, Indian Institute of Science Bangalore, IndiaBadrinath G. S., Samsung Electronics, IndiaPartha Pratim Goswami, Calcutta University, IndiaParesh Kumar Majhi, Institut für Anorganische Chemie, GermanySanjay Kumar Saha, Jadavpur University, IndiaAsim K. Roy, Visva Bharati University, IndiaShambhu Upadhyaya, University at Buffalo, The State University of New York,USAA. P. James, Indian Institute of Information Technology and Management, IndiaRajkumar Buyya, University of Melbourne, AustraliaSanjay Kumar Jena, National Institute of Technology Rourkela, IndiaBanshidhar Majhi, National Institute of Technology Rourkela, IndiaHarish Agarwal, Oracle Apps Supply Chain/Customer Services, UKKrishna Pramanik, National Institute of Technology Rourkela, IndiaSabu M. Thampi, Indian Institute of Information Technology and Management,IndiaVinod P. Narayanan, Evonik Industries, GermanySwati Sanganeria, Oracle Apps, UK
vii
Amulya Ratna Swain, Indian Institute of Science Bangalore, IndiaPankaj K. Sa, National Institute of Technology Rourkela, IndiaBinod K. Pattanayak, Institute of Technical Education and Research, IndiaSidharth Sankar Das, Amdocs Inc., Texas, USA
Chief Patron
Prakash Davara, Chairman, Central Institute of Technology Raipur, India
Patron
Arindam Ray, Director, Central Institute of Technology Raipur, India
General Chairs
Sipi Dubey, Rungta College of Engineering and Technology, IndiaRajib Sarkar, Central Institute of Technology Raipur, India
Programme Chair
Manoj Kumar Singh, DST-CIMS, Banaras Hindu University, India
Programme Co-Chairs
Ashok Kumar Turuk, National Institute of Technology Rourkela, IndiaUmesh Ashok Deshpande, Visvesvaraya National Institute of Technology Nagpur,India
Proceedings Volume Editors
Durga Prasad Mohapatra, National Institute of Technology Rourkela, IndiaSrikanta Patnaik, Institute of Technical Education and Research, India
viii Committee
Technical Track Chairs
Bidyut Kumar Patra, National Institute of Technology Rourkela, IndiaRamjeevan Singh Thakur, Maulana Azad National Institute of TechnologyBhopal, IndiaDebasish Jena, International Institute of Information Technology Bhubaneswar,Odisha, IndiaManmath Narayan Sahoo, National Institute of Technology Rourkela, Odisha,IndiaDebasis Giri, Haldia Institute of Technology, IndiaKorra Sathyababu, National Institute of Technology Rourkela, Odisha, India
Industrial Track Chairs
Bibhudutta Sahoo, National Institute of Technology Rourkela, IndiaK. Sridhar Patnaik, Birla Institute of Technology Mesra, IndiaUmesh Chandra Pati, National Institute of Technology Rourkela, India
Publication Chairs
Anil Kumar Vuppala, International Institute of Information TechnologyHyderabad, IndiaPriyadarshini Sabut, Oracle India Pvt. Ltd., India
Steering Committee Chair
Savita Gupta, National Institute of Technology Rourkela, India
Organising Chairs
Jayanta Pothal, Scientist, Council of Scientific and Industrial Research, IndiaRahul Raman, National Institute of Technology Rourkela, India
Committee ix
Publicity Chair
Sambit Bakshi, National Institute of Technology Rourkela, India
Programme Committee
Parantapa Goswami, University Joseph Fourier, FranceAzadeh Ghandehari, Islamic Azad University, IranA. Vadivel, National Institute of Technology Trichy, IndiaDevesh C. Jinwala, Sardar Vallabhbhai National Institute of Technology, IndiaJitender Kumar Chhabra, National Institute of Technology Kurukshetra, IndiaSuvendu Rup, International Institute of Information Technology, IndiaSnigdha Bakshi, Central Bank of India, IndiaParthasarathi Roop, University of Auckland, New ZealandPriyadarsi Nanda, University of Technology Sydney (UTS), AustraliaJamuna Kanta Sing, Jadavpur University, IndiaSanjay Kumar Jain, National Institute of Technology Kurukshetra, IndiaBinod Mishra, Tata Consultancy Services, IndiaArun Kumar Mishra, UCET, Vinoba Bhave University, IndiaDilip Singh Sisodia, National Institute of Technology Raipur, IndiaArunanshu Mahapatro, National Institute of Science and Technology, IndiaAruna Chakraborty, St. Thomas’ College of Engineering & Technology, IndiaAnil Kumar Vuppala, International Institute of Information TechnologyHyderabad, IndiaDilip Kumar Sharma, Member, Executive Committee, UP Section, IEEEHarish Kumar Sahoo, International Institute of Information Technology, IndiaTrilochan Panigrahy, National Institute of Science and Technology, IndiaHunny Mehrotra, National Institute of Technology Rourkela, IndiaAnup Kawtia, Oracle India Pvt. Ltd., IndiaMukesh A. Zaveri, Sardar Vallabhbhai National Institute of Technology, IndiaSaroj Kr. Panigrahy, Sir Padampat Singhania University, IndiaRaksha Shetty, IBM, IndiaG. R. Gangadharan, Institute for Development and Research in BankingTechnology, IndiaShila Samantaray, Padmanava College of Engineering, IndiaSuraj Sharma, International Institute of Information Technology Bhubaneswar,IndiaPradeep Singh, National Institute of Technology Raipur, IndiaSwati Vipsita, International Institute of Information Technology Bhubaneswar,IndiaRanjan Jana, Department of MCA, RCC Institute of Information Technology,India
x Committee
Amit Trivedi, National Institute of Technology Raipur, IndiaUmakanta Majhi CSIT Durg, Chhattisgarh, IndiaRahul Dubey, Manipal University, Bangalore, IndiaHaider Banka, Indian School of Mines, IndiaSubrajeet Mohapatra, Birla Institute of Technology Mesra, Ranchi, IndiaAnukul Chandra Panda, Centre for Development of Telematics, IndiaJayan Basak, Mahindra Satyam, IndiaSanjay Prasad Kushwaha, Nepal College of Information Technology, NepalTapas Kumar Panigrahi, International Institute of Information TechnologyBhubaneswar, India
Steering Committee
Santanu Bakshi, University of Florida, USAManu Kumar Mishra, Bharat Heavy Electrical Ltd., IndiaRam Shringar Raw, AIACTR, IndiaAuroprasad Mohanty, Hindalco—Aditya Birla Management Corporation Pvt. Ltd.,IndiaOm Prakash Pahari, Central Institute of Technology Raipur, IndiaMohit Agarwal, Razorsight Corporation, IndiaAsish Dalai, National Institute of Technology Rourkela, IndiaAlekha Mishra, National Institute of Technology Rourkela, India
Committee xi
Contents
Image and Template Security for Palmprint . . . . . . . . . . . . . . . . . . . 1Munaga V. N. K. Prasad and B. Adinarayana
Extending Network Lifetime by Time-Constrained DataAggregation in Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . 11K. B. Ashwini and G. T. Raju
The Complex Network Analysis of Power Grid: A Case Studyof the West Bengal Power Network . . . . . . . . . . . . . . . . . . . . . . . . . . 17Himansu Das, Gouri Sankar Panda, Bhagaban Muduliand Pradeep Kumar Rath
Comparison and Analysis of Node Deployment for EfficientCoverage in Sensor Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31Ram Shringar Raw, Shailender Kumar, Sonia Mann and Sambit Bakshi
Performance Analysis of Routing Protocols for VANETswith Real Vehicular Traces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45Sanjoy Das, Ram Shringar Raw, Indrani Das and Rajib Sarkar
A Bluetooth-Based Autonomous Mining System . . . . . . . . . . . . . . . . . 57Saikat Roy, Soumalya Sarkar and Avranil Tah
Transistor Representation of a Low-Power Reversible32-Bit Comparator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67A. V. AnanthaLakshmi and G. F. Sudha
Performance Enhancement of Brillouin Distributed TemperatureSensor Using Optimized Fiber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81P. K. Sahu and Himansu Shekhar Pradhan
xiii
To Study the Architectural Designs of a Proposed ComprehensiveSoftware Extractor for Reengineering Tool: A Literature Survey . . . . 91Rashmi Yadav, Abhay Kothari and Ravindra Patel
Detection of Web-Based Attacks by AnalyzingWeb Server Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101Nanhay Singh, Achin Jain, Ram Shringar Raw and Rahul Raman
A Survey of Energy-Aware Routing Protocols and Mechanismsfor Mobile Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111Charu Gandhi and Vivek Arya
Lexical Ontology-Based Computational Model to FindSemantic Similarity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119Jagendra Singh and Aditi Sharan
Energy-Efficient Cluster-Based Aggregation Protocolfor Heterogeneous Wireless Sensor Networks . . . . . . . . . . . . . . . . . . 129Prakashgoud R. Patil and Umakant P. Kulkarni
Digital Watermarking Based on Magic Squareand Ridgelet Transform Techniques. . . . . . . . . . . . . . . . . . . . . . . . . 143Rama Seshagiri Rao Channapragada and Munaga V. N. K. Prasad
Circle of Trust: One-Hop-Trust-Based Security Paradigmfor Resource-Constraint MANET. . . . . . . . . . . . . . . . . . . . . . . . . . . 163K. M. Imtiaz-Ud-Din, Touhid Bhuiyan and Shamim Ripon
Design of a Biometric Security System Using SupportVector Machine Classifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173J. Manikandan, V. K. Agrawal and B. Venkataramani
Impact of Distance Measures on the Performanceof Clustering Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar
Gender Identification Using Gait Biometrics . . . . . . . . . . . . . . . . . . 191Richa Shukla, Reenu Shukla, Anupam Shukla and Nirupama Tiwari
A Survey on Business Context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199Danijel Novakovic and Christian Huemer
xiv Contents
Enhanced Caching for Geocast Routing in VehicularAd Hoc Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213Omprakash Kaiwartya and Sushil Kumar
Cooperation Enforcement and Collaboration Inducementin Mobile Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221Ghyani Umesh Kumar Maurya and Sushil Kumar
Uncoupling of Mobile Cloud Computing Services:An Architectural Perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233Sohini De and Suddhasil De
Non-subsampled Contourlet Transform-Based Image Denoisingin Ultrasound Images Using Elliptical Directional Windowsand Block-Based Noise Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . 241J. Jai Jaganath Babu and Gnanou Florence Sudha
Marathi Parts-of-Speech Tagger Using Supervised Learning. . . . . . . 251Jyoti Singh, Nisheeth Joshi and Iti Mathur
Design and Evaluation of N-Module Reconfigurable Systems . . . . . . 259Kunal Yogeshkumar Parikh, J. Manikandan and V. K. Agrawal
Genre-Based Classification of Song Using Perceptual Features . . . . . 267Arijit Ghosal, Rudrasis Chakraborty, Bibhas Chandra Dharaand Sanjoy Kumar Saha
Novel Distributed Dual Beamforming for Randomly DistributedSensor by Phase Tracking Using Bilateral Probability Function . . . . 277G. Vaikundam and G. F. Sudha
Electrical Network Modeling of Amino Acid Stringand Its Application in Cancer Cell Prediction . . . . . . . . . . . . . . . . . 293T. Roy, S. Das and S. Barman
Generation of AES-like 8-bit Random S-Box and ComparativeStudy on Randomness of Corresponding Ciphertextswith Other 8-bit AES S-Boxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303S. Das
BCube-IP: BCube with IP Address Hierarchy . . . . . . . . . . . . . . . . . 319A. R. Ashok Kumar, S. V. Rao and Diganta Goswami
Contents xv
Image Retrieval Using Fuzzy Color Histogram and Fuzzy StringMatching: A Correlation-Based Scheme to Reducethe Semantic Gap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327Nidhi Goel and Priti Sehgal
A Multi-Objective Optimization Approach for Lifetimeand Coverage Problem in Wireless Sensor Network . . . . . . . . . . . . . 343Anil Kumar Sagar and D. K. Lobiyal
Evaluation of English-to-Urdu Machine Translation . . . . . . . . . . . . . 351Vaishali Gupta, Nisheeth Joshi and Iti Mathur
A Novel Edge Detection Technique for Multi-Focus ImagesUsing Image Fusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359Priya Ranjan Muduli and Umesh Chandra Pati
Event Detection Refinement Using External Tagsfor Flickr Collections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369Sheba Selvam, B. Ramadoss and S. R. Balasundaram
Proposed Threshold Based Certificate Revocation in MobileAd Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377Priti Swapnil Rathi and Parikshit N. Mahalle
‘‘Bin SDR’’: Effective Algorithm for WirelessSensor–Actor Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389M. E. Sanap and Rachana A. Satao
An Elliptic-Curve-Based Hierarchical Cluster Key Managementin Wireless Sensor Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397Srikanta Kumar Sahoo and Manmanth Narayan Sahoo
Probabilistic Approach-Based Congestion-Aware Swarm-InspiredLoad-Balancing Multipath Data Routing in MANETs. . . . . . . . . . . . 409Subhankar Joardar, Debasis Giri and Vandana Bhattacherjee
Integration of Eco-Friendly POF-Based Splitter and Optical Filterfor Low-Cost WDM Network Solutions . . . . . . . . . . . . . . . . . . . . . . 423Archana Rathore
Sensor Cloud: The Scalable Architecture for FutureGeneration Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433Subasish Mohapatra, Banshidhar Majhi and Srikanta Patnaik
xvi Contents
Partial Fingerprint Matching Using Minutiae Subset . . . . . . . . . . . . 445S. Asha and C. Chellappan
Genetic Algorithm-Based Approach for Adequate TestData Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453Swagatika Swain and D. P. Mohapatra
ISA: An Intelligent Search Algorithm for Peer-to-Peer Networks . . . 463Mahdi Ghorbani, Mohammad Jooyan and Mostafa Safarpour
Modified Graph-Cut Algorithm with Adaptive Shape Prior . . . . . . . 473Adonu Celestine and J. Dinesh Peter
Analysis on Optimization of Energy Consumption in MobileAd Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481A. Karmel and C. Jayakumar
Accuracy of Atomic Transaction Scenario for HeterogeneousDistributed Column-Oriented Databases . . . . . . . . . . . . . . . . . . . . . 491Ramesh Dharavath, Amit Kumar Jain, Chiranjeev Kumarand Vikas Kumar
Implantable CPW-fed Double-Crossed-Type Triangular SlotAntenna for ISM Band . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503S. Ashok Kumar and T. Shanmuganantham
Training a Feed-Forward Neural Network Using ArtificialBee Colony with Back-Propagation Algorithm . . . . . . . . . . . . . . . . . 511Partha Pratim Sarangi, Abhimanyu Sahu and Madhumita Panda
Navigation of Autonomous Mobile Robot Using AdaptiveNeuro-Fuzzy Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521Prases Kumar Mohanty and Dayal R. Parhi
Performance Estimation of Fuzzy Logic-Based Mobile RelayNodes in Dense Multihop Cellular Networks . . . . . . . . . . . . . . . . . . 531Devendra Gurjar, Ajay Bhardwaj and Ashutosh Singh
Local Binary Pattern as a Texture Feature Descriptorin Object Tracking Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541Prajna Parimita Dash, Dipti Patra and Sudhansu Kumar Mishra
Contents xvii
A Sensor-Based Technique for Speed Invariant HumanGait Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549Anup Nandy, Soumabha Bhowmick, Pavan Chakrabortyand G. C. Nandi
High-Speed 100 Gbps/Channel DWDM System Designand Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557Bijayananda Patnaik and P. K. Sahu
Performance Analysis of Contention-Based Ranging Mechanismfor Idle-Mode Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565Rajesh Anbazhagan and Nakkeeran Rangaswamy
A Novel Approach to Face Detection Using Advanced SupportVector Machine. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573Swastik Mohapatra, Asutosh Kar, Satyanarayan Dash,Sidhant Mohanty and Prasant Swain
Concept Based Clustering of Documents with MissingSemantic Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579E. Anupriya and N. Ch. S. N. Iyengar
Theoretical Validation of New Class Cohesion MetricAgainst Briand Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591Sandip Mal and Kumar Rajnish
RF-SEA-Based Feature Selection for Data Classificationin Medical Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599S. Sasikala, S. Appavu alias Balamurugan and S. Geetha
Optimizing Delay for MAC in Randomly DistributedWireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609Ajay Sikandar, Sushil Kumar and Ghyani Umesh Kumar Maurya
An Ontology-Based Software Development Environment UsingUpgraded Functionalities of Clojure. . . . . . . . . . . . . . . . . . . . . . . . . 619Mary Alias and C. R. Rene Robin
Using a Cluster for Efficient Scalability Evaluationof Multithreaded and Event-Driven Web Servers . . . . . . . . . . . . . . . 627Syed Mutahar Aaqib and Lalitsen Sharma
An Overview of Detection Techniques for Metamorphic Malware . . . 637Pratiksha Natani and Deepti Vidyarthi
xviii Contents
Temporal Forensics of MPEG Video Using Discrete WaveletTransform and Support Vector Machine . . . . . . . . . . . . . . . . . . . . . 645Sunil Jaiswal and Sunita Dhavale
Securing the Root Through SELinux . . . . . . . . . . . . . . . . . . . . . . . . 653Ananya Chatterjee and Arun Mishra
Automatic Ontology Extraction from Heterogeneous Documentsfor E-Learning Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 661J. Jeslin Shanthamalar and C. R. Rene Robin
An Appraisal of Service-Based Virtual Networks and VirtualizationTools Paves the Way Toward Future Internet . . . . . . . . . . . . . . . . . 667Bhisham Sonkar, Devendra Chaphekar and Gupteshwar Gupta
Comparative Analysis and Research Issues in ClassificationTechniques for Intrusion Detection . . . . . . . . . . . . . . . . . . . . . . . . . 675Himadri Chauhan, Vipin Kumar, Sumit Pundir and Emmanuel S. Pilli
An Apriori-Based Vertical Fragmentation Techniquefor Heterogeneous Distributed Database Transactions . . . . . . . . . . . 687Ramesh Dharavath, Vikas Kumar, Chiranjeev Kumar and Amit Kumar
A Speech Recognition Technique Using MFCC with DWTin Isolated Hindi Words . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 697Neha Baranwal, Ganesh Jaiswal and G. C. Nandi
Mechanism for Preventing Registration Flooding Attack in SIP . . . . 705Bosco Sebastian, Paromita Choudhury and C. D. Jaidhar
A Combined Approach: Proactive and Reactive Failure Handlingfor Efficient Job Execution in Computational Grid . . . . . . . . . . . . . . 713P. Latchoumy and P. Sheik Abdul Khader
A Comparative Analysis of Keyword- and Semantic-BasedSearch Engines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 727Yogender Singh Negi and Suresh Kumar
Slicing MATLAB Simulink/Stateflow Models . . . . . . . . . . . . . . . . . . 737Adepu Sridhar and D. Srinivasulu
Link Mining Using Strength of Frequent Pattern of Interaction . . . . 745Seema Mishra and G. C. Nandi
Contents xix
Integration of HSV Color Histogram and LMEBP JointHistogram for Multimedia Image Retrieval . . . . . . . . . . . . . . . . . . . 753K. Prasanthi Jasmine and P. Rajesh Kumar
DBC Co-occurrence Matrix for Texture Image Indexingand Retrieval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763K. Prasanthi Jasmine and P. Rajesh Kumar
M-Band and Rotated M-Band Dual-Tree Complex WaveletTransform for Texture Image Retrieval . . . . . . . . . . . . . . . . . . . . . . 775K. Prasanthi Jasmine and P. Rajesh Kumar
A Rank-Based Hybrid Algorithm for Scheduling Data-and Computation-Intensive Jobs in Grid Environments . . . . . . . . . . 785Mohsen Abdoli, Reza Entezari-Maleki and Ali Movaghar
Performance Evaluation of Video CommunicationsOver 4G Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 797Gaurav Pande
Online Hybrid Model for Online Fraud Prevention and Detection . . . 805Ankit Mundra and Nitin Rakesh
An Efficient Approach to Analyze Users’ Interest on SignificantWeb Access Patterns with Period Constraint . . . . . . . . . . . . . . . . . . 817M. Thilagu and R. Nadarajan
Efficient Privacy Preserving Distributed Association Rule MiningProtocol Based on Random Number . . . . . . . . . . . . . . . . . . . . . . . . 827Reena Kharat, Madhuri Kumbhar and Preeti Bhamre
Directional Local Quinary Patterns: A New Feature Descriptorfor Image Indexing and Retrieval . . . . . . . . . . . . . . . . . . . . . . . . . . 837Santosh Kumar Vipparthi and S. K. Nagar
Data Mining Approach for Developing Various Models Basedon Types of Attack and Feature Selection as IntrusionDetection Systems (IDS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 845H. S. Hota and Akhilesh Kumar Shrivas
Facial Expression Recognition Using Local Binary Patternswith Different Distance Measures . . . . . . . . . . . . . . . . . . . . . . . . . . . 853Sarika Jain, Sunny Bagga, Ramchand Hablani, Narendra Chaudhariand Sanjay Tanwani
xx Contents
Cluster-Based Routing for Optimal Communicationin Port Logistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 863J. Thejo Kishan, M. M. Manohara Pai and Radhika M. Pai
Secure Adaptive Traffic Lights System for VANETs . . . . . . . . . . . . . 873Kishore Biradar, Radhika M. Pai, M. M. Manohara Paiand Joseph Mouzana
Analysis of Image Segmentation Techniques on Morphologicaland Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 885M. Sivagami and T. Revathi
Performance Impact of TCP and UDP on the Mobility Modelsand Routing Protocols in MANET . . . . . . . . . . . . . . . . . . . . . . . . . . 895Sunil Kumar Singh, Rajesh Duvvuru and Jyoti Prakash Singh
A Survey on Video Segmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . 903Dalton Meitei Thounaojam, Amit Trivedi, Kh. Manglem Singhand Sudipta Roy
A New Paradigm for Open Source Software Development . . . . . . . . 913Sushil Kumar, Ranjeet Ranjan and Amit Kumar Trivedi
A Real-Time Signature Verification Technology Using Clusteringand Statistical Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 919Joshane Kelsy and Rajib Sarkar
Component-Aspect Separation-Based Slicingof Aspect-Oriented Programs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 931Jagannath Singh, Durga Prasad Mohapatra and Pabitra Mohan Khilar
Evaluation of Software Understandability Using Rough Sets . . . . . . . 939D. Srinivasulu, Adepu Sridhar and Durga Prasad Mohapatra
HCDLST: An Indexing Technique for Current and Recent-PastSliding Window Spatio-Temporal Data . . . . . . . . . . . . . . . . . . . . . . 947Kuleshwar Sahu, Sangharatna J. Godboley and S. K. Jain
Solving Planar Graph Coloring Problem Using PSOwith SPV Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 955Vaibhav Bhardwaj and Sudhanshu Prakash Tiwari
Contents xxi
Weather Prediction Using Error Minimization Algorithmon Feedforward Artificial Neural Network . . . . . . . . . . . . . . . . . . . . 967Arti R. Naik, Pathan Mohd. Shafi and Shyamsunder P. Kosbatwar
Mining Association Rules Using Adaptive ParticleSwarm Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 975K. Indira, S. Kanmani, V. Ashwini, B. Rangalakshmi,P. Divya Mary and M. Sumithra
Study of Framework of Mobile IP and MANET Integration . . . . . . . 985Devendra Chaphekar, Bhisham Sonkar and Gupteshwar Gupta
Delay Analysis of Various Links Using OPNET Simulator . . . . . . . . 993Pooja Singh, Chitosia Anamika, C. K. Jha and Anup Bhola
GenSeeK: A Novel Parallel Multiple Pattern Recognition Algorithmfor DNA Sequences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1001Kaliuday Balleda, D. Satyanvesh and P. K. Baruah
Improvement of PAPR in OFDM Systems Using SLM Techniqueand Digital Modulation Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . 1007Srinu Pyla, K. Padma Raju and N. BalaSubrahmanyam
Radioactive Pollution Monitoring Using Triangular Deploymentin Wireless Sensor Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1019Ankit Khare and Nitin Nitin
Securing Networks Using Situation-Based FirewallPolicy Computations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1029Vijender Kumar Solanki, Kumar Pal Singh, M. Venkatesanand Sudhanshu Raghuwanshi
Color Image Quantization Scheme Using DBSCANwith K-Means Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1037Kumar Rahul, Rohit Agrawal and Arup Kumar Pal
A Novel Approach to Text Steganography Using Font Sizeof Invisible Space Characters in Microsoft Word Document . . . . . . . 1047Susmita Mahato, Dilip Kumar Yadav and Danish Ali Khan
Personalizing News Documents Using Modified PageRank Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1055S. Akhilan and S. R. Balasundaram
xxii Contents
Understanding Query Vulnerabilities for Various SQLInjection Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1063U. Chandrasekhar and Digvijay Singh
Effective Ontology Alignment: An Approach for Resolvingthe Ontology Heterogeneity Problem for SemanticInformation Retrieval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1077Ankita Kandpal, R. H. Goudar, Rashmi Chauhan,Shalini Garg and Kajal Joshi
Classification Technique for Improving User Accesson Web Log Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1089Bina Kotiyal, Ankit Kumar, Bhaskar Pant and R. H. Goudar
A Review on Methods for Query Personalization . . . . . . . . . . . . . . . 1099Shivangi Sharma and Prachi Gupta
A Wideband Compact Microstrip Antennafor DCS/PCS/WLAN Applications . . . . . . . . . . . . . . . . . . . . . . . . . . 1107Vinod Kumar Singh, Zakir Ali, Ashutosh Kumar Singhand Shahanaz Ayub
Analysis of Type-2 Fuzzy Systems for WSN: A Survey . . . . . . . . . . . 1115Megha Sharma and Ashutosh Kumar Singh
Fusion of Entropy-Based Color Space Selection and StatisticalColor Features for Ripeness Classification of Guavas . . . . . . . . . . . . 1125Suchitra Khoje and S. K. Bodhe
Optimal Positioning of Base Station in Wireless SensorNetworks: A Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1135Prerna Meena, Devendra Gurjar, Ashutosh Kumar Singhand Shekhar Verma
Testing and Implementation Process in Automationof a University . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1145Vaibhav Sharma, Jyoti Singh and A. S. Zadgaonkar
Performance of Spectral Efficiency and Blocking ProbabilityUsing Distributed Dynamic Channel Allocation . . . . . . . . . . . . . . . . 1153Y. S. V. Raman, S. Sri Gowri and B. Prabhakara Rao
Contents xxiii
An Effective Content-Based Image Retrieval Using Color,Texture and Shape Feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1163Milind V. Lande, Praveen Bhanodiya and Pritesh Jain
Underwater Communication with IDMA Scheme . . . . . . . . . . . . . . . 1171Tanuja Pande, Kulbhushan Gupta, M. Shukla, Prachi Tripathiand Ashutosh Singh
M-ARY PSK Modulation Technique for IDMA Scheme . . . . . . . . . . 1179Pratibha Verma, Sanjiv Mishra, M. Shukla and Ashutosh Singh
A Novel Approach for Eye Gaze and Tilt Estimation . . . . . . . . . . . . 1187Sambit Bakshi, Rahul Raman and Pankaj K. Sa
Enhanced Single-Pass Algorithm for Efficient Indexing UsingHashing in Map Reduce Paradigm. . . . . . . . . . . . . . . . . . . . . . . . . . 1195Piyush Kumar Sinha, Prashant Joshi, Pooja Pundir, Manisha Negiand R. H. Goudar
Data Structures for IP Lookups, A Comparative Analysiswith Scalability to IPV6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1201Soumyadeep Ghosh, Oaindrila Das and Arindam Majumdar
Multiobjective Clustering Using Support Vector Machine:Application to Microarray Cancer Data . . . . . . . . . . . . . . . . . . . . . . 1209Anita Bai
Prediction of Warning Level in Aircraft Accidents usingClassification Techniques: An Empirical Study. . . . . . . . . . . . . . . . . 1217A. B. Arockia Christopher and S. Appavu Alias Balamurugan
Fuzzy TOPSIS Method Applied for Ranking of Teacherin Higher Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1225H. S. Hota, L. K. Sharma and S. Pavani
Performance Analysis of Transformation Methodsin Multi-Label Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1233P. K. A. Chitra and S. Appavu Alias Balamurugan
Predictive Data Mining Techniques for Forecasting Tamil NaduElectricity Board (TNEB) Load Demand: An Empirical Study . . . . . 1241T. M. Usha and S. Appavu Alias Balamurugan
xxiv Contents
Novel Approach for Finding Patterns in Product-BasedEnhancement Using Labeling Technique . . . . . . . . . . . . . . . . . . . . . 1249Hemant Palivela, H. K. Yogish, N. Shalini and S. N. Raghavendra
Optimal Path and Best-Effort Delivery in WirelessSensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1257Vipin Kumar and Sushil Kumar
Spanning-Tree-Based Position-Based Routing in WSNs. . . . . . . . . . . 1267Vipin Kumar and Sushil Kumar
Feature Extraction and Classification of Microarray CancerData Using Intelligent Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . 1277Anita Bai and Anima Pradhan
Survey of Route Choice Models in Transportation Networks . . . . . . 1285Madhavi Sharma, Jitendra Kumar Gupta and Archana Lala
Secure Routing Technique in MANET: A Review. . . . . . . . . . . . . . . 1291Aartika Chandrakar and Rajib Sarkar
About the Editors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1309
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1311
Contents xxv
Image and Template Securityfor Palmprint
Munaga V. N. K. Prasad and B. Adinarayana
Abstract The wide spread use of biometrics in real world causes more securityand privacy concerns to be raised, because conventional biometric systems storebiometric templates as it is in database without any security, and this may lead tothe possibility of tracking personal information stored in database; moreover,biometric templates are not revocable and are unusable throughout their life timeonce they are lost or stolen. To overcome this non-revocability of biometrics, weproposed two methods for image security and template security in this paper (thesemethods are also applicable for some of the biometric traits); for image security,we used chaotic mixing with watermarking technique; first chaotic mixing isapplied to the host image, and then, this resultant image is embedded in a sample(cover or carrier) image, and if the intruder gets the chaotic mixed image, he/shecannot get back the original host image, and for template security, we shuffledthe palmprint template according to the input random number. This shufflingscheme increases the imposter matching score leaving genuine matching score.
Keywords Chaotic mixing � Watermarking � Cryptography � Log-Gabor filter �Pearson correlation coefficient
1 Introduction
Use of biometrics in today’s networked world increased drastically over lastdecades. Palmprint is one of the biometric traits; a lot of work have been done onpalmprint identification and verification [1, 2], compared to the security on the
M. V. N. K. Prasad (&) � B. AdinarayanaIDRBT, Castle Hills, Road No 1, MasabTank, Hyderabad, Indiae-mail: [email protected]
B. Adinarayanae-mail: [email protected]
D. P. Mohapatra and S. Patnaik (eds.), Intelligent Computing, Networking,and Informatics, Advances in Intelligent Systems and Computing 243,DOI: 10.1007/978-81-322-1665-0_1, � Springer India 2014
1
palmprint data (i.e., template and image). Security of the biometric data must beprovided in order to increase the widespread utilization of biometric traits.
According to Ratha et al. [3], there are eight basic types of attacks on thebiometric system. Kong et al. proposed different security methods to avoid replayand database attacks [4] in palmprint recognition system, Lifang Wu et al. pro-posed fuzzy vault scheme to provide the template protection online authenticationon the face database [5], Zhifang Wang et al. developed a secure face recognitionsystem using principle component analysis (PCA) [6], Brenden Chen et al. usedhigher-order spectral (HOS) transform applied to biometric data as a secure hashfunction [7], Feng Hao et al. proposed combining crypto with biometricseffectively [8] using different coding techniques like Hadamard code and Reed-Solomon code, Mayank Vatsa et al. developed a multimodal biometrics systemusing watermarking [9], Thian Song Ong et al. used fuzzy commitment scheme forbiometric template protection [10], and Shenglin Yang et al. developed a secureiris verification system based on error correcting code (ECC) cryptographictechnique [11].
Encryption and watermarking are two widely used techniques to achievesecurity in biometrics. Encryption system does not give complete solution to theproblem, because once the password is known, everything is gone. With the helpof watermarking technique in biometric systems is good way to solve the prob-lems. Watermarking [12–14] is simply known as embedding the watermark intocover image in order to protect the copyright and authorization.
The rest of the paper is organized as follows: Sect. 2 explains about imagesecurity with chaotic mixing and watermarking. Template security and proposedsystem are explained in Sect. 3. Conclusion is given in Sect. 4.
2 Image Protection
Proposed approach uses both chaotic mixing and watermarking for image security.Many researches have been done in watermarking and chaotic mixing for copy-right protection. Voyatizis G et al. used strong chaotic mixing-based watermarkingalgorithm for embedding logo; the security of the system lies in the strongparameters of the chaotic mixing system [15]. Tefas et al. proposed a novelapproach for image authentication with chaotic mixing system because it increasesthe security of the proposed method [16].
2.1 Chaotic Mixing
A two-dimensional chaotic mixing can be given as spatial transformation of planarregions. The chaotic mixed images with different iteration (n) values are shown inFig. 1. It can be represented by map:
2 M. V. N. K. Prasad and B. Adinarayana
A : U ! U;U ¼ 0; 1½ Þ � 0; 1½ Þ � R2 ð1Þ
and the formula for the above equation is
r0 ¼ Ar mod 1ð Þ ð2Þ
xnþ1
ynþ1
� �¼ a11 a12
a21 a22
� �xn
yn
� �mod 1ð Þ ð3Þ
where aij € Z, det A = 1, and A1, 2 {-1, 0, 1} are the eigenvalues of A. Iteratedactions of A on a point r0 € U from a dynamic system A(n):U ? U, given by theiterative process:
Where n = 0, 1, 2,… The set of points hðr0Þ ¼ r0; r1; r3; . . .f g is an orbit ofthe system. Roughly speaking, if V0 is a dense subset of U, then its image Vn underthe map A(n) spreads chaotically over the entire space of U while preserving itsarea, because det A = 1.
Equation (4) strongly explains about chaotic mixing, and it possesses a denseset of periodic orbits. An orbit h r0ð Þ ¼ r0; r1; r3; . . .f g is periodic; if it is finite,i.e., there exists a number ‘T’ of iterations such that r0 = rT. The necessary andsufficient condition for an orbit to be periodic is that the initial position r0 hasrational coordinates. The inverse chaotic mixing is applied to get the
rnþ1 ¼ Anr0 mod 1ð Þ or rnþ1 ¼ Arn mod 1ð Þ ð4Þ
original image from the chaotic mixed image; in our proposed method, weembedded this chaotic mixed image into cover image for enhancing security.
2.2 Watermarking
Watermarking is mainly used in copyright protection and to hide the intendedinformation into a digital image, etc., and this must be performed in such a waythat the added information does not cause degradation of the perceptual quality
Fig. 1 a Binary palmprint image and b chaotic mixed image after n = 3, c n = 5, and d n = 15
Image and Template Security for Palmprint 3
and cannot be removed [16]. Basically, image watermarking techniques can beclassified into two groups with respect to the domain of application of water-marking. First, in spatial domain methods, the pixel values in the image channel(s)are changed, whereas in spectral-transform domain method, a signal is added to thehost image in a transform domain such as the full-frame DCT domain. Manyalgorithms are proposed for watermarking purpose [16–19].
There have been few published papers on watermarking on biometric traits(palmprint, fingerprint, face, etc.). Jain et al. proposed a biometric data-hidingtechnique in which they have selected to use one type of biometric data to secureanother type of biometric data to increase the overall security of the system [20].Changjiang et al. proposed a watermarking approach based on the concept ofdiscrete stationary wavelet transform (DSWT) for the copyright protectionapplication, and they used Arnold and inverse Arnold transform for the watermarkscrambling and reconstruction [19]. Mayank Vatsa et al. proposed a digital imagewatermarking for secure multimodal biometric system in which two phases ofsecurity are proposed for simultaneously verifying any individual and protectingthe biometric template; first, the iris code (template) generated by 1D Log-Gabor iswatermarked in face image [9], such that the face is visible for verification, and thewatermarked iris is used to cross-authenticate the individual and securing thebiometrics data (face) is also possible. For watermarking, they used two algorithmsnamely modified correlation-based algorithm (MCBA) and modified 2D discretecosine transform-based algorithm (M2DCT). Cao et al. [21] developed a multiplewatermarking scheme for GIS vector data to improve the robustness and combinethe advantages of single watermarking scheme; finally, they concluded that theirtechnique increases the robustness and this technique plays an increasing role incopyright protection.
In this paper, we used watermarking along with chaotic mixing technique, andwe applied watermarking on the image which is obtained after applying chaoticmixing. The whole process is explained in Fig. 2, first take binary palmprint image(of size 150 9 150) as a host image because our main intension is to hide this hostimage into another sample(cover or carrier) image, then apply the chaotic mixingon the host image i.e., palm image after chaotic mixing the images as shown inFig. 2. Here, chaotic mixing is dependent on the ‘n’ value; if ‘n’ value changes, theresulting image is varied so here ‘n’ value is confidential. This can be clearlyobserved from the Fig. 1. Then, take a sample gray scale image as a cover orcarrier image (of size 150 9 150). Here, we have taken person as a cover image.Then, we embedded the host image in the cover image. For this, we used the well-known LSB technique. Take each pixel value from the host image (i.e., here, hostimage is binary image so ‘0’ and ‘1’ will be the possible values), and replace theleast significant bit pixel value in the cover image with the appropriate value inthe host image pixel value, so the resultant image is the watermarked image(of size 150 9 150); these images are stored in the database, even intruder cannotobserve the palmprint image with naked eye, and if he came to know that thewatermarking is applied, he cannot get the original palmprint image; instead,
4 M. V. N. K. Prasad and B. Adinarayana
he will get the chaotic mixed palmprint image. With this, he cannot roll back to theoriginal palmprint image without knowing the ‘n’ value. To get back originalimage, we used the reverse chaotic mixing.
3 Template Security
Biometrics authentication systems are to authenticate a person depending upon hisphysical and behavioral characteristics, but unfortunately, these biometric-basedauthentication systems are facing new challenges related to personal data pro-tection, because of these security and privacy issues, many researchers came upwith new techniques toward protecting the biometric templates against possibleattacks. In today’s biometric systems, biometrics data are not protected, and if it iscompromised or lost or stolen at any phase in the authentication process, it cannotbe used again (difficult to revoke or replace) as an identity, because of its per-manence nature since they should remain stable over the life time of an individual.Secure storage of user data is not a new problem, basically in UNIX basedsystems, where user credential are stored in a shadow password file, there thepasswords are hashed using a one-way hash function and computed hash valuesare stored in database. When user enters a password to enter into the system,password is hashed and matched against the stored hash value; user is consideredas a legitimate user if and only if both hash values are same. But, these techniquescannot be adapted thoroughly to protect biometric template because biometric
Water-
MarkingChaotic
Mixing
Fig. 2 Watermarking procedure
Image and Template Security for Palmprint 5
image is dependent on many factors like capturing device, rotation, etc., but tra-ditional cryptographic techniques do not allow even a single bit of error. So,storage of biometric template in a secure way has become an increasing importantissue in biometric authentication systems; to address these types of problems,several methods have been proposed in the literature, and these methods can beclassified into biocryptosystems and cancellable systems. Biocryptosystems meansintegration of biometrics with cryptography, and numerous advantages can beobtained by this combination. Cancellable biometrics have been introduced inKanade et al. [22], where the template protection has been achieved by trans-forming the template into other domain, where data cannot be reverted back to itsoriginal form; for recognition, the input template is also transformed and thenmatched. If the data are lost, then biometric template can be reissued with can-cellable systems.
3.1 Proposed System
The main objective of this method is to enhance security to the palmprint templatewhich is stored in the database. First is template construction then security; well-defined methods are used for template construction. Log-Gabor filter is used forfeature extraction in palmprint images. This filter is already used for textureextraction in iris images [23]. For all our experiments, we used IIT-Delhi database[24]; local features as for template construction for that palmprint image aredivided into 25 (5 9 5) non-overlapping sub-blocks (images). Then, computestandard deviation on each sub-block that gives the feature vector (FV) of theparticular image. FV = [SD(1), SD(2),…SD(n)] where SD(i) is the standarddeviation of the ith block and ‘n’ is 25, so that here every template consists of25 values.
First generate random number range in 1–25, then arrange the generated tem-plate according to the input random number as shown in Fig. 3. If our first randomnumber is 10, then get tenth standard deviation value from original template andstore it in the first position in the new template and so on, but in this approach, theconstraint is duplicate random numbers are not allowed. If it is allowed, there ispossibility of losing some features. Then for every template, store both shuffledtemplate and random numbers in the database, but an intruder can access therandom numbers, and he can reshuffle the transformed template to the originalform with this random number. So, to avoid such problems, here we encrypted therandom numbers and stored the encrypted form (cipher text) of random numbers inthe database instead of storing them as it is in the database. The password forencryption of random numbers is with the administrator of the database so thatnobody else cannot access the template; here, it is very difficult to the attacker tofind the original template from the shuffled template because the number ofpossibilities is around 25. It is computationally infeasible. Figure 4 shows theprocedure for matching input template to the enrolled template. Here, first decrypt
6 M. V. N. K. Prasad and B. Adinarayana