srikanta patnaik editors intelligent computing, … computing, networking, and informatics durga...

30
Advances in Intelligent Systems and Computing 243 Intelligent Computing, Networking, and Informatics Durga Prasad Mohapatra Srikanta Patnaik Editors Proceedings of the International Conference on Advanced Computing, Networking, and Informatics, India, June 2013

Upload: truongbao

Post on 19-Mar-2018

224 views

Category:

Documents


4 download

TRANSCRIPT

Advances in Intelligent Systems and Computing 243

Intelligent Computing, Networking, and Informatics

Durga Prasad MohapatraSrikanta Patnaik Editors

Proceedings of the International Conference on Advanced Computing, Networking, and Informatics, India, June 2013

Advances in Intelligent Systemsand Computing

Volume 243

Series editor

Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, [email protected]

For further volumes:http://www.springer.com/series/11156

About this Series

The series ‘‘Advances in Intelligent Systems and Computing’’ contains publications on theory,applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually alldisciplines such as engineering, natural sciences, computer and information science, ICT, eco-nomics, business, e-commerce, environment, healthcare, life science are covered. The list oftopics spans all the areas of modern intelligent systems and computing.

The publications within ‘‘Advances in Intelligent Systems and Computing’’ are primarilytextbooks and proceedings of important conferences, symposia and congresses. They coversignificant recent developments in the field, both of a foundational and applicable character. Animportant characteristic feature of the series is the short publication time and world-widedistribution. This permits a rapid and broad dissemination of research results.

Advisory Board

Chairman

Nikhil R. Pal, Indian Statistical Institute, Kolkata, Indiae-mail: [email protected]

Members

Emilio S. Corchado, University of Salamanca, Salamanca, Spaine-mail: [email protected]

Hani Hagras, University of Essex, Colchester, UKe-mail: [email protected]

László T. Kóczy, Széchenyi István University, Gy}or, Hungarye-mail: [email protected]

Vladik Kreinovich, University of Texas at El Paso, El Paso, USAe-mail: [email protected]

Chin-Teng Lin, National Chiao Tung University, Hsinchu, Taiwane-mail: [email protected]

Jie Lu, University of Technology, Sydney, Australiae-mail: [email protected]

Patricia Melin, Tijuana Institute of Technology, Tijuana, Mexicoe-mail: [email protected]

Nadia Nedjah, State University of Rio de Janeiro, Rio de Janeiro, Brazile-mail: [email protected]

Ngoc Thanh Nguyen, Wroclaw University of Technology, Wroclaw, Polande-mail: [email protected]

Jun Wang, The Chinese University of Hong Kong, Shatin, Hong Konge-mail: [email protected]

Durga Prasad MohapatraSrikanta PatnaikEditors

Intelligent Computing,Networking, and Informatics

Proceedings of the International Conferenceon Advanced Computing, Networking,and Informatics, India, June 2013

123

EditorsDurga Prasad MohapatraComputer Science and EngineeringNational Institute of Technology RourkelaRourkela, OrissaIndia

Srikanta PatnaikComputer Science and EngineeringSOA UniversityBhubaneswarIndia

ISSN 2194-5357 ISSN 2194-5365 (electronic)ISBN 978-81-322-1664-3 ISBN 978-81-322-1665-0 (eBook)DOI 10.1007/978-81-322-1665-0Springer New Delhi Heidelberg New York Dordrecht London

Library of Congress Control Number: 2013955257

� Springer India 2014This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part ofthe material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission orinformation storage and retrieval, electronic adaptation, computer software, or by similar or dissimilarmethodology now known or hereafter developed. Exempted from this legal reservation are briefexcerpts in connection with reviews or scholarly analysis or material supplied specifically for thepurpose of being entered and executed on a computer system, for exclusive use by the purchaser of thework. Duplication of this publication or parts thereof is permitted only under the provisions ofthe Copyright Law of the Publisher’s location, in its current version, and permission for use mustalways be obtained from Springer. Permissions for use may be obtained through RightsLink at theCopyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law.The use of general descriptive names, registered names, trademarks, service marks, etc. in thispublication does not imply, even in the absence of a specific statement, that such names are exemptfrom the relevant protective laws and regulations and therefore free for general use.While the advice and information in this book are believed to be true and accurate at the date ofpublication, neither the authors nor the editors nor the publisher can accept any legal responsibility forany errors or omissions that may be made. The publisher makes no warranty, express or implied, withrespect to the material contained herein.

Printed on acid-free paper

Springer is part of Springer Science+Business Media (www.springer.com)

Preface

The proceedings of the International Conference on Advanced Computing,Networking, and Informatics (ICACNI 2013), at Central Institute of TechnologyRaipur, Chhattisgarh, India during 12–14 June record scientific and engineeringprogress in both theoretical and applied sections of Computer Science and relatedfields. The proceedings contain technical articles, reports, and case studies oncomputing, networking, and informatics. Along with these main tracks, there weretwo special sessions organized for recording specific advancements in the domainsof image and video processing and biometric security. The conference also sporteda special industrial track to mark the relevant research achievements from theindustry. Out of 458 articles received for consideration for publication, 135 havebeen selected through a single-blind peer review process. Each article has beenreviewed by at least two reviewers. Academicians, scholars, industry profession-als, and practitioners have contributed to this conference by submitting theirvaluable research works, which has led this conference to a success.

A dedicated committee of several professors and academicians from premierinstitutes, such as the IITs and the NITs, has served to manifest the conferencesuccessful. We sincerely thank all our chairs and committees. We are grateful tothe reviewers who, despite their busy schedules, have supported us by providingreview reports within the stipulated time. We would like to thank Central Instituteof Technology Raipur for organizing and providing the venue for the conference.Our hearty thanks go to the Department of Computer Science and Engineering,National Institute of Technology Rourkela for overall support in executing theconference.

Durga Prasad MohapatraSrikanta Patnaik

v

Committee

Advisory Committee

Ajith Abraham, Technical University of Ostrava, Czech RepublicMassimo Tistarelli, University of Sassari, ItalyPhalguni Gupta, Indian Institute of Technology Kanpur, IndiaGeorge A. Tsihrintzis, University of Piraeus, GreeceAtilla Elçi, Aksaray University, TurkeyRajib Mall, Indian Institute of Technology Kharagpur, IndiaManoj Kumar Singh, IIT-Banaras Hindu University, IndiaShobha Lata Sinha, National Institute of Technology Raipur, IndiaSrikanta Patnaik, Institute of Technical Education and Research, IndiaAjita Rattani, University of Cagliari, ItalyR. C. Hansdah, Indian Institute of Science Bangalore, IndiaBadrinath G. S., Samsung Electronics, IndiaPartha Pratim Goswami, Calcutta University, IndiaParesh Kumar Majhi, Institut für Anorganische Chemie, GermanySanjay Kumar Saha, Jadavpur University, IndiaAsim K. Roy, Visva Bharati University, IndiaShambhu Upadhyaya, University at Buffalo, The State University of New York,USAA. P. James, Indian Institute of Information Technology and Management, IndiaRajkumar Buyya, University of Melbourne, AustraliaSanjay Kumar Jena, National Institute of Technology Rourkela, IndiaBanshidhar Majhi, National Institute of Technology Rourkela, IndiaHarish Agarwal, Oracle Apps Supply Chain/Customer Services, UKKrishna Pramanik, National Institute of Technology Rourkela, IndiaSabu M. Thampi, Indian Institute of Information Technology and Management,IndiaVinod P. Narayanan, Evonik Industries, GermanySwati Sanganeria, Oracle Apps, UK

vii

Amulya Ratna Swain, Indian Institute of Science Bangalore, IndiaPankaj K. Sa, National Institute of Technology Rourkela, IndiaBinod K. Pattanayak, Institute of Technical Education and Research, IndiaSidharth Sankar Das, Amdocs Inc., Texas, USA

Chief Patron

Prakash Davara, Chairman, Central Institute of Technology Raipur, India

Patron

Arindam Ray, Director, Central Institute of Technology Raipur, India

General Chairs

Sipi Dubey, Rungta College of Engineering and Technology, IndiaRajib Sarkar, Central Institute of Technology Raipur, India

Programme Chair

Manoj Kumar Singh, DST-CIMS, Banaras Hindu University, India

Programme Co-Chairs

Ashok Kumar Turuk, National Institute of Technology Rourkela, IndiaUmesh Ashok Deshpande, Visvesvaraya National Institute of Technology Nagpur,India

Proceedings Volume Editors

Durga Prasad Mohapatra, National Institute of Technology Rourkela, IndiaSrikanta Patnaik, Institute of Technical Education and Research, India

viii Committee

Technical Track Chairs

Bidyut Kumar Patra, National Institute of Technology Rourkela, IndiaRamjeevan Singh Thakur, Maulana Azad National Institute of TechnologyBhopal, IndiaDebasish Jena, International Institute of Information Technology Bhubaneswar,Odisha, IndiaManmath Narayan Sahoo, National Institute of Technology Rourkela, Odisha,IndiaDebasis Giri, Haldia Institute of Technology, IndiaKorra Sathyababu, National Institute of Technology Rourkela, Odisha, India

Industrial Track Chairs

Bibhudutta Sahoo, National Institute of Technology Rourkela, IndiaK. Sridhar Patnaik, Birla Institute of Technology Mesra, IndiaUmesh Chandra Pati, National Institute of Technology Rourkela, India

Publication Chairs

Anil Kumar Vuppala, International Institute of Information TechnologyHyderabad, IndiaPriyadarshini Sabut, Oracle India Pvt. Ltd., India

Steering Committee Chair

Savita Gupta, National Institute of Technology Rourkela, India

Organising Chairs

Jayanta Pothal, Scientist, Council of Scientific and Industrial Research, IndiaRahul Raman, National Institute of Technology Rourkela, India

Committee ix

Publicity Chair

Sambit Bakshi, National Institute of Technology Rourkela, India

Programme Committee

Parantapa Goswami, University Joseph Fourier, FranceAzadeh Ghandehari, Islamic Azad University, IranA. Vadivel, National Institute of Technology Trichy, IndiaDevesh C. Jinwala, Sardar Vallabhbhai National Institute of Technology, IndiaJitender Kumar Chhabra, National Institute of Technology Kurukshetra, IndiaSuvendu Rup, International Institute of Information Technology, IndiaSnigdha Bakshi, Central Bank of India, IndiaParthasarathi Roop, University of Auckland, New ZealandPriyadarsi Nanda, University of Technology Sydney (UTS), AustraliaJamuna Kanta Sing, Jadavpur University, IndiaSanjay Kumar Jain, National Institute of Technology Kurukshetra, IndiaBinod Mishra, Tata Consultancy Services, IndiaArun Kumar Mishra, UCET, Vinoba Bhave University, IndiaDilip Singh Sisodia, National Institute of Technology Raipur, IndiaArunanshu Mahapatro, National Institute of Science and Technology, IndiaAruna Chakraborty, St. Thomas’ College of Engineering & Technology, IndiaAnil Kumar Vuppala, International Institute of Information TechnologyHyderabad, IndiaDilip Kumar Sharma, Member, Executive Committee, UP Section, IEEEHarish Kumar Sahoo, International Institute of Information Technology, IndiaTrilochan Panigrahy, National Institute of Science and Technology, IndiaHunny Mehrotra, National Institute of Technology Rourkela, IndiaAnup Kawtia, Oracle India Pvt. Ltd., IndiaMukesh A. Zaveri, Sardar Vallabhbhai National Institute of Technology, IndiaSaroj Kr. Panigrahy, Sir Padampat Singhania University, IndiaRaksha Shetty, IBM, IndiaG. R. Gangadharan, Institute for Development and Research in BankingTechnology, IndiaShila Samantaray, Padmanava College of Engineering, IndiaSuraj Sharma, International Institute of Information Technology Bhubaneswar,IndiaPradeep Singh, National Institute of Technology Raipur, IndiaSwati Vipsita, International Institute of Information Technology Bhubaneswar,IndiaRanjan Jana, Department of MCA, RCC Institute of Information Technology,India

x Committee

Amit Trivedi, National Institute of Technology Raipur, IndiaUmakanta Majhi CSIT Durg, Chhattisgarh, IndiaRahul Dubey, Manipal University, Bangalore, IndiaHaider Banka, Indian School of Mines, IndiaSubrajeet Mohapatra, Birla Institute of Technology Mesra, Ranchi, IndiaAnukul Chandra Panda, Centre for Development of Telematics, IndiaJayan Basak, Mahindra Satyam, IndiaSanjay Prasad Kushwaha, Nepal College of Information Technology, NepalTapas Kumar Panigrahi, International Institute of Information TechnologyBhubaneswar, India

Steering Committee

Santanu Bakshi, University of Florida, USAManu Kumar Mishra, Bharat Heavy Electrical Ltd., IndiaRam Shringar Raw, AIACTR, IndiaAuroprasad Mohanty, Hindalco—Aditya Birla Management Corporation Pvt. Ltd.,IndiaOm Prakash Pahari, Central Institute of Technology Raipur, IndiaMohit Agarwal, Razorsight Corporation, IndiaAsish Dalai, National Institute of Technology Rourkela, IndiaAlekha Mishra, National Institute of Technology Rourkela, India

Committee xi

Contents

Image and Template Security for Palmprint . . . . . . . . . . . . . . . . . . . 1Munaga V. N. K. Prasad and B. Adinarayana

Extending Network Lifetime by Time-Constrained DataAggregation in Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . 11K. B. Ashwini and G. T. Raju

The Complex Network Analysis of Power Grid: A Case Studyof the West Bengal Power Network . . . . . . . . . . . . . . . . . . . . . . . . . . 17Himansu Das, Gouri Sankar Panda, Bhagaban Muduliand Pradeep Kumar Rath

Comparison and Analysis of Node Deployment for EfficientCoverage in Sensor Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31Ram Shringar Raw, Shailender Kumar, Sonia Mann and Sambit Bakshi

Performance Analysis of Routing Protocols for VANETswith Real Vehicular Traces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45Sanjoy Das, Ram Shringar Raw, Indrani Das and Rajib Sarkar

A Bluetooth-Based Autonomous Mining System . . . . . . . . . . . . . . . . . 57Saikat Roy, Soumalya Sarkar and Avranil Tah

Transistor Representation of a Low-Power Reversible32-Bit Comparator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67A. V. AnanthaLakshmi and G. F. Sudha

Performance Enhancement of Brillouin Distributed TemperatureSensor Using Optimized Fiber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81P. K. Sahu and Himansu Shekhar Pradhan

xiii

To Study the Architectural Designs of a Proposed ComprehensiveSoftware Extractor for Reengineering Tool: A Literature Survey . . . . 91Rashmi Yadav, Abhay Kothari and Ravindra Patel

Detection of Web-Based Attacks by AnalyzingWeb Server Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101Nanhay Singh, Achin Jain, Ram Shringar Raw and Rahul Raman

A Survey of Energy-Aware Routing Protocols and Mechanismsfor Mobile Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111Charu Gandhi and Vivek Arya

Lexical Ontology-Based Computational Model to FindSemantic Similarity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119Jagendra Singh and Aditi Sharan

Energy-Efficient Cluster-Based Aggregation Protocolfor Heterogeneous Wireless Sensor Networks . . . . . . . . . . . . . . . . . . 129Prakashgoud R. Patil and Umakant P. Kulkarni

Digital Watermarking Based on Magic Squareand Ridgelet Transform Techniques. . . . . . . . . . . . . . . . . . . . . . . . . 143Rama Seshagiri Rao Channapragada and Munaga V. N. K. Prasad

Circle of Trust: One-Hop-Trust-Based Security Paradigmfor Resource-Constraint MANET. . . . . . . . . . . . . . . . . . . . . . . . . . . 163K. M. Imtiaz-Ud-Din, Touhid Bhuiyan and Shamim Ripon

Design of a Biometric Security System Using SupportVector Machine Classifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173J. Manikandan, V. K. Agrawal and B. Venkataramani

Impact of Distance Measures on the Performanceof Clustering Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar

Gender Identification Using Gait Biometrics . . . . . . . . . . . . . . . . . . 191Richa Shukla, Reenu Shukla, Anupam Shukla and Nirupama Tiwari

A Survey on Business Context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199Danijel Novakovic and Christian Huemer

xiv Contents

Enhanced Caching for Geocast Routing in VehicularAd Hoc Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213Omprakash Kaiwartya and Sushil Kumar

Cooperation Enforcement and Collaboration Inducementin Mobile Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221Ghyani Umesh Kumar Maurya and Sushil Kumar

Uncoupling of Mobile Cloud Computing Services:An Architectural Perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233Sohini De and Suddhasil De

Non-subsampled Contourlet Transform-Based Image Denoisingin Ultrasound Images Using Elliptical Directional Windowsand Block-Based Noise Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . 241J. Jai Jaganath Babu and Gnanou Florence Sudha

Marathi Parts-of-Speech Tagger Using Supervised Learning. . . . . . . 251Jyoti Singh, Nisheeth Joshi and Iti Mathur

Design and Evaluation of N-Module Reconfigurable Systems . . . . . . 259Kunal Yogeshkumar Parikh, J. Manikandan and V. K. Agrawal

Genre-Based Classification of Song Using Perceptual Features . . . . . 267Arijit Ghosal, Rudrasis Chakraborty, Bibhas Chandra Dharaand Sanjoy Kumar Saha

Novel Distributed Dual Beamforming for Randomly DistributedSensor by Phase Tracking Using Bilateral Probability Function . . . . 277G. Vaikundam and G. F. Sudha

Electrical Network Modeling of Amino Acid Stringand Its Application in Cancer Cell Prediction . . . . . . . . . . . . . . . . . 293T. Roy, S. Das and S. Barman

Generation of AES-like 8-bit Random S-Box and ComparativeStudy on Randomness of Corresponding Ciphertextswith Other 8-bit AES S-Boxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303S. Das

BCube-IP: BCube with IP Address Hierarchy . . . . . . . . . . . . . . . . . 319A. R. Ashok Kumar, S. V. Rao and Diganta Goswami

Contents xv

Image Retrieval Using Fuzzy Color Histogram and Fuzzy StringMatching: A Correlation-Based Scheme to Reducethe Semantic Gap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327Nidhi Goel and Priti Sehgal

A Multi-Objective Optimization Approach for Lifetimeand Coverage Problem in Wireless Sensor Network . . . . . . . . . . . . . 343Anil Kumar Sagar and D. K. Lobiyal

Evaluation of English-to-Urdu Machine Translation . . . . . . . . . . . . . 351Vaishali Gupta, Nisheeth Joshi and Iti Mathur

A Novel Edge Detection Technique for Multi-Focus ImagesUsing Image Fusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359Priya Ranjan Muduli and Umesh Chandra Pati

Event Detection Refinement Using External Tagsfor Flickr Collections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369Sheba Selvam, B. Ramadoss and S. R. Balasundaram

Proposed Threshold Based Certificate Revocation in MobileAd Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377Priti Swapnil Rathi and Parikshit N. Mahalle

‘‘Bin SDR’’: Effective Algorithm for WirelessSensor–Actor Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389M. E. Sanap and Rachana A. Satao

An Elliptic-Curve-Based Hierarchical Cluster Key Managementin Wireless Sensor Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397Srikanta Kumar Sahoo and Manmanth Narayan Sahoo

Probabilistic Approach-Based Congestion-Aware Swarm-InspiredLoad-Balancing Multipath Data Routing in MANETs. . . . . . . . . . . . 409Subhankar Joardar, Debasis Giri and Vandana Bhattacherjee

Integration of Eco-Friendly POF-Based Splitter and Optical Filterfor Low-Cost WDM Network Solutions . . . . . . . . . . . . . . . . . . . . . . 423Archana Rathore

Sensor Cloud: The Scalable Architecture for FutureGeneration Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433Subasish Mohapatra, Banshidhar Majhi and Srikanta Patnaik

xvi Contents

Partial Fingerprint Matching Using Minutiae Subset . . . . . . . . . . . . 445S. Asha and C. Chellappan

Genetic Algorithm-Based Approach for Adequate TestData Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453Swagatika Swain and D. P. Mohapatra

ISA: An Intelligent Search Algorithm for Peer-to-Peer Networks . . . 463Mahdi Ghorbani, Mohammad Jooyan and Mostafa Safarpour

Modified Graph-Cut Algorithm with Adaptive Shape Prior . . . . . . . 473Adonu Celestine and J. Dinesh Peter

Analysis on Optimization of Energy Consumption in MobileAd Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481A. Karmel and C. Jayakumar

Accuracy of Atomic Transaction Scenario for HeterogeneousDistributed Column-Oriented Databases . . . . . . . . . . . . . . . . . . . . . 491Ramesh Dharavath, Amit Kumar Jain, Chiranjeev Kumarand Vikas Kumar

Implantable CPW-fed Double-Crossed-Type Triangular SlotAntenna for ISM Band . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503S. Ashok Kumar and T. Shanmuganantham

Training a Feed-Forward Neural Network Using ArtificialBee Colony with Back-Propagation Algorithm . . . . . . . . . . . . . . . . . 511Partha Pratim Sarangi, Abhimanyu Sahu and Madhumita Panda

Navigation of Autonomous Mobile Robot Using AdaptiveNeuro-Fuzzy Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521Prases Kumar Mohanty and Dayal R. Parhi

Performance Estimation of Fuzzy Logic-Based Mobile RelayNodes in Dense Multihop Cellular Networks . . . . . . . . . . . . . . . . . . 531Devendra Gurjar, Ajay Bhardwaj and Ashutosh Singh

Local Binary Pattern as a Texture Feature Descriptorin Object Tracking Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541Prajna Parimita Dash, Dipti Patra and Sudhansu Kumar Mishra

Contents xvii

A Sensor-Based Technique for Speed Invariant HumanGait Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549Anup Nandy, Soumabha Bhowmick, Pavan Chakrabortyand G. C. Nandi

High-Speed 100 Gbps/Channel DWDM System Designand Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557Bijayananda Patnaik and P. K. Sahu

Performance Analysis of Contention-Based Ranging Mechanismfor Idle-Mode Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565Rajesh Anbazhagan and Nakkeeran Rangaswamy

A Novel Approach to Face Detection Using Advanced SupportVector Machine. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573Swastik Mohapatra, Asutosh Kar, Satyanarayan Dash,Sidhant Mohanty and Prasant Swain

Concept Based Clustering of Documents with MissingSemantic Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579E. Anupriya and N. Ch. S. N. Iyengar

Theoretical Validation of New Class Cohesion MetricAgainst Briand Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591Sandip Mal and Kumar Rajnish

RF-SEA-Based Feature Selection for Data Classificationin Medical Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599S. Sasikala, S. Appavu alias Balamurugan and S. Geetha

Optimizing Delay for MAC in Randomly DistributedWireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609Ajay Sikandar, Sushil Kumar and Ghyani Umesh Kumar Maurya

An Ontology-Based Software Development Environment UsingUpgraded Functionalities of Clojure. . . . . . . . . . . . . . . . . . . . . . . . . 619Mary Alias and C. R. Rene Robin

Using a Cluster for Efficient Scalability Evaluationof Multithreaded and Event-Driven Web Servers . . . . . . . . . . . . . . . 627Syed Mutahar Aaqib and Lalitsen Sharma

An Overview of Detection Techniques for Metamorphic Malware . . . 637Pratiksha Natani and Deepti Vidyarthi

xviii Contents

Temporal Forensics of MPEG Video Using Discrete WaveletTransform and Support Vector Machine . . . . . . . . . . . . . . . . . . . . . 645Sunil Jaiswal and Sunita Dhavale

Securing the Root Through SELinux . . . . . . . . . . . . . . . . . . . . . . . . 653Ananya Chatterjee and Arun Mishra

Automatic Ontology Extraction from Heterogeneous Documentsfor E-Learning Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 661J. Jeslin Shanthamalar and C. R. Rene Robin

An Appraisal of Service-Based Virtual Networks and VirtualizationTools Paves the Way Toward Future Internet . . . . . . . . . . . . . . . . . 667Bhisham Sonkar, Devendra Chaphekar and Gupteshwar Gupta

Comparative Analysis and Research Issues in ClassificationTechniques for Intrusion Detection . . . . . . . . . . . . . . . . . . . . . . . . . 675Himadri Chauhan, Vipin Kumar, Sumit Pundir and Emmanuel S. Pilli

An Apriori-Based Vertical Fragmentation Techniquefor Heterogeneous Distributed Database Transactions . . . . . . . . . . . 687Ramesh Dharavath, Vikas Kumar, Chiranjeev Kumar and Amit Kumar

A Speech Recognition Technique Using MFCC with DWTin Isolated Hindi Words . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 697Neha Baranwal, Ganesh Jaiswal and G. C. Nandi

Mechanism for Preventing Registration Flooding Attack in SIP . . . . 705Bosco Sebastian, Paromita Choudhury and C. D. Jaidhar

A Combined Approach: Proactive and Reactive Failure Handlingfor Efficient Job Execution in Computational Grid . . . . . . . . . . . . . . 713P. Latchoumy and P. Sheik Abdul Khader

A Comparative Analysis of Keyword- and Semantic-BasedSearch Engines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 727Yogender Singh Negi and Suresh Kumar

Slicing MATLAB Simulink/Stateflow Models . . . . . . . . . . . . . . . . . . 737Adepu Sridhar and D. Srinivasulu

Link Mining Using Strength of Frequent Pattern of Interaction . . . . 745Seema Mishra and G. C. Nandi

Contents xix

Integration of HSV Color Histogram and LMEBP JointHistogram for Multimedia Image Retrieval . . . . . . . . . . . . . . . . . . . 753K. Prasanthi Jasmine and P. Rajesh Kumar

DBC Co-occurrence Matrix for Texture Image Indexingand Retrieval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763K. Prasanthi Jasmine and P. Rajesh Kumar

M-Band and Rotated M-Band Dual-Tree Complex WaveletTransform for Texture Image Retrieval . . . . . . . . . . . . . . . . . . . . . . 775K. Prasanthi Jasmine and P. Rajesh Kumar

A Rank-Based Hybrid Algorithm for Scheduling Data-and Computation-Intensive Jobs in Grid Environments . . . . . . . . . . 785Mohsen Abdoli, Reza Entezari-Maleki and Ali Movaghar

Performance Evaluation of Video CommunicationsOver 4G Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 797Gaurav Pande

Online Hybrid Model for Online Fraud Prevention and Detection . . . 805Ankit Mundra and Nitin Rakesh

An Efficient Approach to Analyze Users’ Interest on SignificantWeb Access Patterns with Period Constraint . . . . . . . . . . . . . . . . . . 817M. Thilagu and R. Nadarajan

Efficient Privacy Preserving Distributed Association Rule MiningProtocol Based on Random Number . . . . . . . . . . . . . . . . . . . . . . . . 827Reena Kharat, Madhuri Kumbhar and Preeti Bhamre

Directional Local Quinary Patterns: A New Feature Descriptorfor Image Indexing and Retrieval . . . . . . . . . . . . . . . . . . . . . . . . . . 837Santosh Kumar Vipparthi and S. K. Nagar

Data Mining Approach for Developing Various Models Basedon Types of Attack and Feature Selection as IntrusionDetection Systems (IDS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 845H. S. Hota and Akhilesh Kumar Shrivas

Facial Expression Recognition Using Local Binary Patternswith Different Distance Measures . . . . . . . . . . . . . . . . . . . . . . . . . . . 853Sarika Jain, Sunny Bagga, Ramchand Hablani, Narendra Chaudhariand Sanjay Tanwani

xx Contents

Cluster-Based Routing for Optimal Communicationin Port Logistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 863J. Thejo Kishan, M. M. Manohara Pai and Radhika M. Pai

Secure Adaptive Traffic Lights System for VANETs . . . . . . . . . . . . . 873Kishore Biradar, Radhika M. Pai, M. M. Manohara Paiand Joseph Mouzana

Analysis of Image Segmentation Techniques on Morphologicaland Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 885M. Sivagami and T. Revathi

Performance Impact of TCP and UDP on the Mobility Modelsand Routing Protocols in MANET . . . . . . . . . . . . . . . . . . . . . . . . . . 895Sunil Kumar Singh, Rajesh Duvvuru and Jyoti Prakash Singh

A Survey on Video Segmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . 903Dalton Meitei Thounaojam, Amit Trivedi, Kh. Manglem Singhand Sudipta Roy

A New Paradigm for Open Source Software Development . . . . . . . . 913Sushil Kumar, Ranjeet Ranjan and Amit Kumar Trivedi

A Real-Time Signature Verification Technology Using Clusteringand Statistical Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 919Joshane Kelsy and Rajib Sarkar

Component-Aspect Separation-Based Slicingof Aspect-Oriented Programs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 931Jagannath Singh, Durga Prasad Mohapatra and Pabitra Mohan Khilar

Evaluation of Software Understandability Using Rough Sets . . . . . . . 939D. Srinivasulu, Adepu Sridhar and Durga Prasad Mohapatra

HCDLST: An Indexing Technique for Current and Recent-PastSliding Window Spatio-Temporal Data . . . . . . . . . . . . . . . . . . . . . . 947Kuleshwar Sahu, Sangharatna J. Godboley and S. K. Jain

Solving Planar Graph Coloring Problem Using PSOwith SPV Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 955Vaibhav Bhardwaj and Sudhanshu Prakash Tiwari

Contents xxi

Weather Prediction Using Error Minimization Algorithmon Feedforward Artificial Neural Network . . . . . . . . . . . . . . . . . . . . 967Arti R. Naik, Pathan Mohd. Shafi and Shyamsunder P. Kosbatwar

Mining Association Rules Using Adaptive ParticleSwarm Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 975K. Indira, S. Kanmani, V. Ashwini, B. Rangalakshmi,P. Divya Mary and M. Sumithra

Study of Framework of Mobile IP and MANET Integration . . . . . . . 985Devendra Chaphekar, Bhisham Sonkar and Gupteshwar Gupta

Delay Analysis of Various Links Using OPNET Simulator . . . . . . . . 993Pooja Singh, Chitosia Anamika, C. K. Jha and Anup Bhola

GenSeeK: A Novel Parallel Multiple Pattern Recognition Algorithmfor DNA Sequences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1001Kaliuday Balleda, D. Satyanvesh and P. K. Baruah

Improvement of PAPR in OFDM Systems Using SLM Techniqueand Digital Modulation Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . 1007Srinu Pyla, K. Padma Raju and N. BalaSubrahmanyam

Radioactive Pollution Monitoring Using Triangular Deploymentin Wireless Sensor Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1019Ankit Khare and Nitin Nitin

Securing Networks Using Situation-Based FirewallPolicy Computations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1029Vijender Kumar Solanki, Kumar Pal Singh, M. Venkatesanand Sudhanshu Raghuwanshi

Color Image Quantization Scheme Using DBSCANwith K-Means Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1037Kumar Rahul, Rohit Agrawal and Arup Kumar Pal

A Novel Approach to Text Steganography Using Font Sizeof Invisible Space Characters in Microsoft Word Document . . . . . . . 1047Susmita Mahato, Dilip Kumar Yadav and Danish Ali Khan

Personalizing News Documents Using Modified PageRank Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1055S. Akhilan and S. R. Balasundaram

xxii Contents

Understanding Query Vulnerabilities for Various SQLInjection Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1063U. Chandrasekhar and Digvijay Singh

Effective Ontology Alignment: An Approach for Resolvingthe Ontology Heterogeneity Problem for SemanticInformation Retrieval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1077Ankita Kandpal, R. H. Goudar, Rashmi Chauhan,Shalini Garg and Kajal Joshi

Classification Technique for Improving User Accesson Web Log Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1089Bina Kotiyal, Ankit Kumar, Bhaskar Pant and R. H. Goudar

A Review on Methods for Query Personalization . . . . . . . . . . . . . . . 1099Shivangi Sharma and Prachi Gupta

A Wideband Compact Microstrip Antennafor DCS/PCS/WLAN Applications . . . . . . . . . . . . . . . . . . . . . . . . . . 1107Vinod Kumar Singh, Zakir Ali, Ashutosh Kumar Singhand Shahanaz Ayub

Analysis of Type-2 Fuzzy Systems for WSN: A Survey . . . . . . . . . . . 1115Megha Sharma and Ashutosh Kumar Singh

Fusion of Entropy-Based Color Space Selection and StatisticalColor Features for Ripeness Classification of Guavas . . . . . . . . . . . . 1125Suchitra Khoje and S. K. Bodhe

Optimal Positioning of Base Station in Wireless SensorNetworks: A Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1135Prerna Meena, Devendra Gurjar, Ashutosh Kumar Singhand Shekhar Verma

Testing and Implementation Process in Automationof a University . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1145Vaibhav Sharma, Jyoti Singh and A. S. Zadgaonkar

Performance of Spectral Efficiency and Blocking ProbabilityUsing Distributed Dynamic Channel Allocation . . . . . . . . . . . . . . . . 1153Y. S. V. Raman, S. Sri Gowri and B. Prabhakara Rao

Contents xxiii

An Effective Content-Based Image Retrieval Using Color,Texture and Shape Feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1163Milind V. Lande, Praveen Bhanodiya and Pritesh Jain

Underwater Communication with IDMA Scheme . . . . . . . . . . . . . . . 1171Tanuja Pande, Kulbhushan Gupta, M. Shukla, Prachi Tripathiand Ashutosh Singh

M-ARY PSK Modulation Technique for IDMA Scheme . . . . . . . . . . 1179Pratibha Verma, Sanjiv Mishra, M. Shukla and Ashutosh Singh

A Novel Approach for Eye Gaze and Tilt Estimation . . . . . . . . . . . . 1187Sambit Bakshi, Rahul Raman and Pankaj K. Sa

Enhanced Single-Pass Algorithm for Efficient Indexing UsingHashing in Map Reduce Paradigm. . . . . . . . . . . . . . . . . . . . . . . . . . 1195Piyush Kumar Sinha, Prashant Joshi, Pooja Pundir, Manisha Negiand R. H. Goudar

Data Structures for IP Lookups, A Comparative Analysiswith Scalability to IPV6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1201Soumyadeep Ghosh, Oaindrila Das and Arindam Majumdar

Multiobjective Clustering Using Support Vector Machine:Application to Microarray Cancer Data . . . . . . . . . . . . . . . . . . . . . . 1209Anita Bai

Prediction of Warning Level in Aircraft Accidents usingClassification Techniques: An Empirical Study. . . . . . . . . . . . . . . . . 1217A. B. Arockia Christopher and S. Appavu Alias Balamurugan

Fuzzy TOPSIS Method Applied for Ranking of Teacherin Higher Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1225H. S. Hota, L. K. Sharma and S. Pavani

Performance Analysis of Transformation Methodsin Multi-Label Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1233P. K. A. Chitra and S. Appavu Alias Balamurugan

Predictive Data Mining Techniques for Forecasting Tamil NaduElectricity Board (TNEB) Load Demand: An Empirical Study . . . . . 1241T. M. Usha and S. Appavu Alias Balamurugan

xxiv Contents

Novel Approach for Finding Patterns in Product-BasedEnhancement Using Labeling Technique . . . . . . . . . . . . . . . . . . . . . 1249Hemant Palivela, H. K. Yogish, N. Shalini and S. N. Raghavendra

Optimal Path and Best-Effort Delivery in WirelessSensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1257Vipin Kumar and Sushil Kumar

Spanning-Tree-Based Position-Based Routing in WSNs. . . . . . . . . . . 1267Vipin Kumar and Sushil Kumar

Feature Extraction and Classification of Microarray CancerData Using Intelligent Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . 1277Anita Bai and Anima Pradhan

Survey of Route Choice Models in Transportation Networks . . . . . . 1285Madhavi Sharma, Jitendra Kumar Gupta and Archana Lala

Secure Routing Technique in MANET: A Review. . . . . . . . . . . . . . . 1291Aartika Chandrakar and Rajib Sarkar

About the Editors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1309

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1311

Contents xxv

Image and Template Securityfor Palmprint

Munaga V. N. K. Prasad and B. Adinarayana

Abstract The wide spread use of biometrics in real world causes more securityand privacy concerns to be raised, because conventional biometric systems storebiometric templates as it is in database without any security, and this may lead tothe possibility of tracking personal information stored in database; moreover,biometric templates are not revocable and are unusable throughout their life timeonce they are lost or stolen. To overcome this non-revocability of biometrics, weproposed two methods for image security and template security in this paper (thesemethods are also applicable for some of the biometric traits); for image security,we used chaotic mixing with watermarking technique; first chaotic mixing isapplied to the host image, and then, this resultant image is embedded in a sample(cover or carrier) image, and if the intruder gets the chaotic mixed image, he/shecannot get back the original host image, and for template security, we shuffledthe palmprint template according to the input random number. This shufflingscheme increases the imposter matching score leaving genuine matching score.

Keywords Chaotic mixing � Watermarking � Cryptography � Log-Gabor filter �Pearson correlation coefficient

1 Introduction

Use of biometrics in today’s networked world increased drastically over lastdecades. Palmprint is one of the biometric traits; a lot of work have been done onpalmprint identification and verification [1, 2], compared to the security on the

M. V. N. K. Prasad (&) � B. AdinarayanaIDRBT, Castle Hills, Road No 1, MasabTank, Hyderabad, Indiae-mail: [email protected]

B. Adinarayanae-mail: [email protected]

D. P. Mohapatra and S. Patnaik (eds.), Intelligent Computing, Networking,and Informatics, Advances in Intelligent Systems and Computing 243,DOI: 10.1007/978-81-322-1665-0_1, � Springer India 2014

1

palmprint data (i.e., template and image). Security of the biometric data must beprovided in order to increase the widespread utilization of biometric traits.

According to Ratha et al. [3], there are eight basic types of attacks on thebiometric system. Kong et al. proposed different security methods to avoid replayand database attacks [4] in palmprint recognition system, Lifang Wu et al. pro-posed fuzzy vault scheme to provide the template protection online authenticationon the face database [5], Zhifang Wang et al. developed a secure face recognitionsystem using principle component analysis (PCA) [6], Brenden Chen et al. usedhigher-order spectral (HOS) transform applied to biometric data as a secure hashfunction [7], Feng Hao et al. proposed combining crypto with biometricseffectively [8] using different coding techniques like Hadamard code and Reed-Solomon code, Mayank Vatsa et al. developed a multimodal biometrics systemusing watermarking [9], Thian Song Ong et al. used fuzzy commitment scheme forbiometric template protection [10], and Shenglin Yang et al. developed a secureiris verification system based on error correcting code (ECC) cryptographictechnique [11].

Encryption and watermarking are two widely used techniques to achievesecurity in biometrics. Encryption system does not give complete solution to theproblem, because once the password is known, everything is gone. With the helpof watermarking technique in biometric systems is good way to solve the prob-lems. Watermarking [12–14] is simply known as embedding the watermark intocover image in order to protect the copyright and authorization.

The rest of the paper is organized as follows: Sect. 2 explains about imagesecurity with chaotic mixing and watermarking. Template security and proposedsystem are explained in Sect. 3. Conclusion is given in Sect. 4.

2 Image Protection

Proposed approach uses both chaotic mixing and watermarking for image security.Many researches have been done in watermarking and chaotic mixing for copy-right protection. Voyatizis G et al. used strong chaotic mixing-based watermarkingalgorithm for embedding logo; the security of the system lies in the strongparameters of the chaotic mixing system [15]. Tefas et al. proposed a novelapproach for image authentication with chaotic mixing system because it increasesthe security of the proposed method [16].

2.1 Chaotic Mixing

A two-dimensional chaotic mixing can be given as spatial transformation of planarregions. The chaotic mixed images with different iteration (n) values are shown inFig. 1. It can be represented by map:

2 M. V. N. K. Prasad and B. Adinarayana

A : U ! U;U ¼ 0; 1½ Þ � 0; 1½ Þ � R2 ð1Þ

and the formula for the above equation is

r0 ¼ Ar mod 1ð Þ ð2Þ

xnþ1

ynþ1

� �¼ a11 a12

a21 a22

� �xn

yn

� �mod 1ð Þ ð3Þ

where aij € Z, det A = 1, and A1, 2 {-1, 0, 1} are the eigenvalues of A. Iteratedactions of A on a point r0 € U from a dynamic system A(n):U ? U, given by theiterative process:

Where n = 0, 1, 2,… The set of points hðr0Þ ¼ r0; r1; r3; . . .f g is an orbit ofthe system. Roughly speaking, if V0 is a dense subset of U, then its image Vn underthe map A(n) spreads chaotically over the entire space of U while preserving itsarea, because det A = 1.

Equation (4) strongly explains about chaotic mixing, and it possesses a denseset of periodic orbits. An orbit h r0ð Þ ¼ r0; r1; r3; . . .f g is periodic; if it is finite,i.e., there exists a number ‘T’ of iterations such that r0 = rT. The necessary andsufficient condition for an orbit to be periodic is that the initial position r0 hasrational coordinates. The inverse chaotic mixing is applied to get the

rnþ1 ¼ Anr0 mod 1ð Þ or rnþ1 ¼ Arn mod 1ð Þ ð4Þ

original image from the chaotic mixed image; in our proposed method, weembedded this chaotic mixed image into cover image for enhancing security.

2.2 Watermarking

Watermarking is mainly used in copyright protection and to hide the intendedinformation into a digital image, etc., and this must be performed in such a waythat the added information does not cause degradation of the perceptual quality

Fig. 1 a Binary palmprint image and b chaotic mixed image after n = 3, c n = 5, and d n = 15

Image and Template Security for Palmprint 3

and cannot be removed [16]. Basically, image watermarking techniques can beclassified into two groups with respect to the domain of application of water-marking. First, in spatial domain methods, the pixel values in the image channel(s)are changed, whereas in spectral-transform domain method, a signal is added to thehost image in a transform domain such as the full-frame DCT domain. Manyalgorithms are proposed for watermarking purpose [16–19].

There have been few published papers on watermarking on biometric traits(palmprint, fingerprint, face, etc.). Jain et al. proposed a biometric data-hidingtechnique in which they have selected to use one type of biometric data to secureanother type of biometric data to increase the overall security of the system [20].Changjiang et al. proposed a watermarking approach based on the concept ofdiscrete stationary wavelet transform (DSWT) for the copyright protectionapplication, and they used Arnold and inverse Arnold transform for the watermarkscrambling and reconstruction [19]. Mayank Vatsa et al. proposed a digital imagewatermarking for secure multimodal biometric system in which two phases ofsecurity are proposed for simultaneously verifying any individual and protectingthe biometric template; first, the iris code (template) generated by 1D Log-Gabor iswatermarked in face image [9], such that the face is visible for verification, and thewatermarked iris is used to cross-authenticate the individual and securing thebiometrics data (face) is also possible. For watermarking, they used two algorithmsnamely modified correlation-based algorithm (MCBA) and modified 2D discretecosine transform-based algorithm (M2DCT). Cao et al. [21] developed a multiplewatermarking scheme for GIS vector data to improve the robustness and combinethe advantages of single watermarking scheme; finally, they concluded that theirtechnique increases the robustness and this technique plays an increasing role incopyright protection.

In this paper, we used watermarking along with chaotic mixing technique, andwe applied watermarking on the image which is obtained after applying chaoticmixing. The whole process is explained in Fig. 2, first take binary palmprint image(of size 150 9 150) as a host image because our main intension is to hide this hostimage into another sample(cover or carrier) image, then apply the chaotic mixingon the host image i.e., palm image after chaotic mixing the images as shown inFig. 2. Here, chaotic mixing is dependent on the ‘n’ value; if ‘n’ value changes, theresulting image is varied so here ‘n’ value is confidential. This can be clearlyobserved from the Fig. 1. Then, take a sample gray scale image as a cover orcarrier image (of size 150 9 150). Here, we have taken person as a cover image.Then, we embedded the host image in the cover image. For this, we used the well-known LSB technique. Take each pixel value from the host image (i.e., here, hostimage is binary image so ‘0’ and ‘1’ will be the possible values), and replace theleast significant bit pixel value in the cover image with the appropriate value inthe host image pixel value, so the resultant image is the watermarked image(of size 150 9 150); these images are stored in the database, even intruder cannotobserve the palmprint image with naked eye, and if he came to know that thewatermarking is applied, he cannot get the original palmprint image; instead,

4 M. V. N. K. Prasad and B. Adinarayana

he will get the chaotic mixed palmprint image. With this, he cannot roll back to theoriginal palmprint image without knowing the ‘n’ value. To get back originalimage, we used the reverse chaotic mixing.

3 Template Security

Biometrics authentication systems are to authenticate a person depending upon hisphysical and behavioral characteristics, but unfortunately, these biometric-basedauthentication systems are facing new challenges related to personal data pro-tection, because of these security and privacy issues, many researchers came upwith new techniques toward protecting the biometric templates against possibleattacks. In today’s biometric systems, biometrics data are not protected, and if it iscompromised or lost or stolen at any phase in the authentication process, it cannotbe used again (difficult to revoke or replace) as an identity, because of its per-manence nature since they should remain stable over the life time of an individual.Secure storage of user data is not a new problem, basically in UNIX basedsystems, where user credential are stored in a shadow password file, there thepasswords are hashed using a one-way hash function and computed hash valuesare stored in database. When user enters a password to enter into the system,password is hashed and matched against the stored hash value; user is consideredas a legitimate user if and only if both hash values are same. But, these techniquescannot be adapted thoroughly to protect biometric template because biometric

Water-

MarkingChaotic

Mixing

Fig. 2 Watermarking procedure

Image and Template Security for Palmprint 5

image is dependent on many factors like capturing device, rotation, etc., but tra-ditional cryptographic techniques do not allow even a single bit of error. So,storage of biometric template in a secure way has become an increasing importantissue in biometric authentication systems; to address these types of problems,several methods have been proposed in the literature, and these methods can beclassified into biocryptosystems and cancellable systems. Biocryptosystems meansintegration of biometrics with cryptography, and numerous advantages can beobtained by this combination. Cancellable biometrics have been introduced inKanade et al. [22], where the template protection has been achieved by trans-forming the template into other domain, where data cannot be reverted back to itsoriginal form; for recognition, the input template is also transformed and thenmatched. If the data are lost, then biometric template can be reissued with can-cellable systems.

3.1 Proposed System

The main objective of this method is to enhance security to the palmprint templatewhich is stored in the database. First is template construction then security; well-defined methods are used for template construction. Log-Gabor filter is used forfeature extraction in palmprint images. This filter is already used for textureextraction in iris images [23]. For all our experiments, we used IIT-Delhi database[24]; local features as for template construction for that palmprint image aredivided into 25 (5 9 5) non-overlapping sub-blocks (images). Then, computestandard deviation on each sub-block that gives the feature vector (FV) of theparticular image. FV = [SD(1), SD(2),…SD(n)] where SD(i) is the standarddeviation of the ith block and ‘n’ is 25, so that here every template consists of25 values.

First generate random number range in 1–25, then arrange the generated tem-plate according to the input random number as shown in Fig. 3. If our first randomnumber is 10, then get tenth standard deviation value from original template andstore it in the first position in the new template and so on, but in this approach, theconstraint is duplicate random numbers are not allowed. If it is allowed, there ispossibility of losing some features. Then for every template, store both shuffledtemplate and random numbers in the database, but an intruder can access therandom numbers, and he can reshuffle the transformed template to the originalform with this random number. So, to avoid such problems, here we encrypted therandom numbers and stored the encrypted form (cipher text) of random numbers inthe database instead of storing them as it is in the database. The password forencryption of random numbers is with the administrator of the database so thatnobody else cannot access the template; here, it is very difficult to the attacker tofind the original template from the shuffled template because the number ofpossibilities is around 25. It is computationally infeasible. Figure 4 shows theprocedure for matching input template to the enrolled template. Here, first decrypt

6 M. V. N. K. Prasad and B. Adinarayana