Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Mir, Roohie Naaz
- Energy Efficiency Optimization in Wireless Sensor Network Using Proposed Load Balancing Approach
Abstract Views :204 |
PDF Views:2
Authors
Affiliations
1 National Institute of Technology, Srinagar, IN
1 National Institute of Technology, Srinagar, IN
Source
International Journal of Computer Networks and Applications, Vol 3, No 5 (2016), Pagination: 108-117Abstract
Advancement in MEMS technology, networking and embedded microprocessors have led to the development of a new generation of a Wireless Sensor Network (WSN) that can operate in unattended and harsh environment depending upon application. WSN consist of large number of power-conscious devices called sensor nodes that detect and observe any physical phenomenon and can be used in a wide range of applications. Underlying topology plays an important role in the performance of the Wireless Sensor Network. Depending upon the application, deployment is performed either deterministically or randomly. WSN suffers from a lot of issues that includes energy conservation, scalability, latency, computational resources and communication capabilities. Energy efficiency is critical issue in Wireless Sensor Networks as nodes are equipped with limited power supply and nodes that bypass most of the traffic deplete their energy faster that leads to decreased network lifetime. Incorporating clustering in the network improves scalability, increase energy efficiency and reduces redundancy. A new clustering approach for WSN has been discussed that includes load balancing and improves energy efficiency by precise selection of CH's. Analysis and simulation results demonstrate the effectiveness of the proposed approach.Keywords
Wireless Sensor Networks (WSN), Base Station (BS), Clustering, Load Balancing (LB).- Virtualization and IoT Resource Management:A Survey
Abstract Views :234 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, National Institute of Technology, Srinagar, IN
1 Department of Computer Science and Engineering, National Institute of Technology, Srinagar, IN
Source
International Journal of Computer Networks and Applications, Vol 5, No 4 (2018), Pagination: 43-51Abstract
The ubiquitous computing and its applications at different levels of abstraction are possible mainly by virtualization. Most of its applications are becoming pervasive with each passing day and with the growing trend of embedding computational and networking capabilities in everyday objects of use by a common man. Virtualization provides many opportunities for research in IoT since most of the IoT applications are resource constrained. Therefore, there is a need for an approach that shall manage the resources of the IoT ecosystem. Virtualization is one such approach that can play an important role in maximizing resource utilization and managing the resources of IoT applications. This paper presents a survey of Virtualization and the Internet of Things. The paper also discusses the role of virtualization in IoT resource management.Keywords
Virtual Machine, Virtualization, Internet of Things, Fog Computing, Resource Management.References
- Ruest N, Ruest D. Virtualization, A Beginner's Guide. McGraw-Hill, Inc.; 2009 Feb 17.
- Scroggins R. Virtualization technology literature review. Global Journal of Computer Science and Technology. 2013 Feb 14.
- Rosenblum M, Garfinkel T. Virtual machine monitors: Current technology and future trends. Computer. 2005 May;38(5):39-47.
- Menascé DA. Virtualization: Concepts, applications, and performance modeling. InInt. CMG Conference 2005 Dec 4 (pp. 407-414).
- Berl A, Fischer A, de Meer H. Using system virtualization to create virtualized networks. Electronic Communications of the EASST. 2009 Feb 27;17.
- Rose, Robert. "Survey of system virtualization techniques.", 2004.
- Hsieh CT. Strategies for successfully implementing a virtualization project: A case with VMware. Communications of the IIMA. 2008;8(3).
- Hassell J. Server Virtualization: Getting Started. Computerworld. 2007 May 28;41(22).
- Jin Y, Wen Y, Chen Q, Zhu Z. An empirical investigation of the impact of server virtualization on energy efficiency for green data center. The Computer Journal. 2013 Feb 20;56(8):977-90.
- Connor D. Server virtualization is on the rise. Network World Canada. 2004 Dec 24;14(23):18.
- McAllister N. Server virtualization. InfoWorld. 2007;29(7):20-2.
- Yan L. Development and application of desktop virtualization technology. InCommunication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on 2011 May 27 (pp. 326-329). IEEE.
- Kennedy RC. Application and desktop virtualization. InfoWorld. 2007;29(7):28-32.
- Miller K, Pegah M. Virtualization: virtually at the desktop. InProceedings of the 35th annual ACM SIGUCCS fall conference 2007 Oct 7 (pp. 255-260). ACM.
- Chowdhury NM, Boutaba R. A survey of network virtualization. Computer Networks. 2010 Apr 8;54(5):862-76.
- Carapinha J, Jiménez J. Network virtualization: a view from the bottom. InProceedings of the 1st ACM workshop on Virtualized infrastructure systems and architectures 2009 Aug 17 (pp. 73-80). ACM.
- Norall S. Storage virtualization. InfoWorld. 2007;29(7):24-7.
- Bele R, Desai C. Review on virtualization: In the light of storage and server virtualization technology. Journal of Information and Operations Management. 2012 Jan 1;3(1):245.
- Xia F, Yang LT, Wang L, Vinel A. Internet of things. International Journal of Communication Systems. 2012 Sep 1;25(9):1101.
- Geng H, editor. Internet of Things and Data Analytics Handbook. John Wiley & Sons; 2017 Jan 10.
- Elmangoush A, Coskun H, Wahle S, Magedanz T. Design aspects for a reference M2M communication platform for Smart Cities. InInnovations in Information Technology (IIT), 2013 9th International Conference on 2013 Mar 17 (pp. 204-209). IEEE.
- Blaauw D, Sylvester D, Dutta P, Lee Y, Lee I, Bang S, Kim Y, Kim G, Pannuto P, Kuo YS, Yoon D. IoT design space challenges: Circuits and systems. InVLSI Technology (VLSI-Technology): Digest of Technical Papers, 2014 Symposium on 2014 Jun 9 (pp. 1-2). IEEE.
- Sehgal A, Perelman V, Kuryla S, Schonwalder J. Management of resource constrained devices in the internet of things. IEEE Communications Magazine. 2012 Dec;50(12).
- Miorandi D, Sicari S, De Pellegrini F, Chlamtac I. Internet of things: Vision, applications and research challenges. Ad hoc networks. 2012 Sep 1;10(7):1497-516.
- Kanter T, Rahmani R, Mahmud A. Conceptual framework for internet of things' virtualization via openflow in context-aware networks. arXiv preprint arXiv:1401.7437. 2014 Jan 29.
- Celesti A, Mulfari D, Fazio M, Villari M, Puliafito A. Exploring container virtualization in IoT clouds. InSmart Computing (SMARTCOMP), 2016 IEEE International Conference on 2016 May 18 (pp. 1-6). IEEE.
- Fernando N, Loke SW, Rahayu W. Mobile cloud computing: A survey. Future generation computer systems. 2013 Jan 1;29(1):84-106.
- Satyanarayanan M, Bahl P, Caceres R, Davies N. The case for vm-based cloudlets in mobile computing. IEEE pervasive Computing. 2009 Oct;8(4).
- Kosta S, Aucinas A, Hui P, Mortier R, Zhang X. Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. InInfocom, 2012 Proceedings IEEE 2012 Mar 25 (pp. 945-953). IEEE.
- Khan I, Belqasmi F, Glitho R, Crespi N, Morrow M, Polakos P. Wireless sensor network virtualization: early architecture and research perspectives. IEEE Network. 2015 May;29(3):104-12.
- Omnes N, Bouillon M, Fromentoux G, Le Grand O. A programmable and virtualized network & IT infrastructure for the internet of things: How can NFV & SDN help for facing the upcoming challenges.InIntelligence in Next Generation Networks (ICIN), 2015 18th International Conference on 2015 Feb 17 (pp. 64-69). IEEE.
- Stojmenovic I, Wen S. The fog computing paradigm: Scenarios and security issues. InComputer Science and Information Systems (FedCSIS), 2014 Federated Conference on 2014 Sep 7 (pp. 1-8). IEEE.
- Yi S, Li C, Li Q. A survey of fog computing: concepts, applications and issues. InProceedings of the 2015 Workshop on Mobile Big Data 2015 Jun 21 (pp. 37-42). ACM.
- Textual Data Hiding in Digital Images Using Chaotic Maps
Abstract Views :213 |
PDF Views:1
Authors
Affiliations
1 Department of Computer Science & Engineering, National Institute of Technology, Srinagar, IN
1 Department of Computer Science & Engineering, National Institute of Technology, Srinagar, IN
Source
International Journal of Computer Networks and Applications, Vol 5, No 6 (2018), Pagination: 78-86Abstract
In this research paper another methodology for covering up literary information in computerized hued pictures has been proposed. Digital colored pictures will simply be used as a canopy media in steganography as a result of numerous deficiencies rumored in sensory system of mortals. In the proposed system we have utilized two non-subordinate disordered arrangement, for distinguishing the fundamental pixel positions where the bits relating to the mystery message must be inserted in the computerized cover picture. For implanting the message bits in the clamorously chosen pixels a 3-3-2 Least Significant Bit (LSB) addition strategy has been utilized. The proposed technique also provides a sufficient level of security because of the fact that same series of chaotically generated pixel locations for embedding the message bits is very difficult to be reproduced, till and unless the initial conditions of the 2 chaotic maps used for pixel selection method are well known. Additionally, the arranged method gives higher leads as far as PSNR (Peak Signal to noise ratio) and MSE (Mean squared error) values when contrasted, with optional existing strategies, subsequently guaranteeing that meddlers won't have any doubt that there is a message covered up inside the sent cover picture.Keywords
Steganography, LSB, PSNR, MSE, Chaotic Maps, Cover Image, Stego Image, Histogram.References
- William Stallings, (2003) Cryptography and Network Security, Principles & Practices, third edition, Pearson Education, Singapore.
- B. Dunba. (2002). A detailed look at steganographic techniques and their use in an open system environment, Sans institute.
- C. Christian. An Information Theoretic Model for Steganography, Proceedings of 2nd Workshop on information Hiding, MIT laboratory.
- Jhonson, January 2002. Survey of Steganography Software, technical report.
- Krenn, R. “Steganography and Steganalysis”,“http://www.krenn.nl/univ/cry/steg/article.pdf
- Dey, S., Abraham, A., Sanyal, S. (2007, August). An LSB data hiding technique using prime numbers. In Information Assurance and Security, 2007. IAS 2007. Third International Symposium on (pp. 101-108). IEEE.
- Yu, L., Zhao, Y., Ni, R., Li, T. (2010). Improved adaptive LSB steganography based on chaos and genetic algorithm. EURASIP Journal on Advances in Signal Processing, 2010, 32.
- Liao, X., Wen, Q. Y., Zhang, J. (2011). A steganographic method for digital images with four-pixel differencing and modified LSB substitution. Journal of Visual Communication and Image Representation, 22(1), 1-8.
- Kumar, A., Kumari, S., Patro, S., Sh, T., Acharya, A. K. Image Steganography using Index based Chaotic Mapping., IJCA Proceedings on International Conference on Distributed Computing and Internet Technology, ICDCIT 2015(1):1-4, January 2015.
- Zaghbani, S., Rhouma, R. (2013, April). Data hiding in spatial domain image using chaotic map. In Modeling, Simulation and Applied Optimization (ICMSAO), 2013 5th International Conference on (pp. 1-5). IEEE.
- Anees, A., Siddiqui, A. M., Ahmed, J., Hussain, I. (2014). A technique for digital steganography using chaotic maps. Nonlinear Dynamics, 75(4), 807-816.
- Ghebleh, M., Kanso, A. (2014). A robust chaotic algorithm for digital image steganography. Communications in Nonlinear Science and Numerical Simulation, 19(6), 1898-1907.
- Kanso, A. (2012). Steganographic algorithm based on a chaotic map. Communications in Nonlinear Science and Numerical Simulation, 17(8), 3287-3302.
- Juneja, M., Sandhu, P. S. (2013). An improved LSB based steganography technique for RGB color images. International Journal of Computer and Communication Engineering, 2(4), 513.
- Bandyopadhyay, D., Dasgupta, K., Mandal, J. K., Dutta, P. (2014). A novel secure image steganography method based on Chaos theory in spatial domain. International Journal of Security, Privacy and Trust Management (IJSPTM), 3(1), 11-22.
- Dasgupta, K., Mandal, J. K., Dutta, P. (2012). Hash based least significant bit technique for video steganography (HLSB). International Journal of Security, Privacy and Trust Management (IJSPTM), 1(2), 1-11.
- Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal processing, 90(3), 727-752.
- Goel, S., Rana, A., Kaur, M. (2013). A review of comparison techniques of image steganography. Global Journal of Computer Science and Technology, 13(4).
- The USC-SIPI Image Database, University of Southern California, Signal and Image Processing Institute. Available at: http://sipi.usc.edu/database/, last accessed in February 2016.
- Zhou Wang and Alan C. Bovik (2009). Mean Squared Error: Love It or Leave It? A new look at signal fidelity measures. IEEE signal processing Magazine.
- www.merriam-webster.com/dictionary/cryptography.
- Suchi Agarwal, Dr. Jaipal Singh Bhist (2016). Data hiding in digital image processing using cryptography and steganography. IRJET, vol. 03, issue: 05.
- Mervat Mikhail, Yasmine Abouelseoud, Galal Elkobrosy. “Text Hiding in a Digital Cover Image using Two Dimensional Indexing based on Chaotic Maps” International Journal of Computer Applications (0975 - 8887) Volume 138 - No.12, March 2016.
- Vipul Sharma, Madhusudan (2015). “Two new approaches for image steganography using cryptography”, 2015 Third international conference on image information processing (ICIIP), 2015.
- Vipul Sharma, Sunny Kumar (2013). “A new approach to hide text in images using steganography”. IJARCSSE (2013).
- Hassan Elkamchouchi, Wessam M. Salama, Yasmine Abouelseoud. “Data hiding in a digital cover image using chaotic maps & LSB technique”, 2017 12th International Conference on Computer Engineering and Systems (ICCES), 2017
- Goel, Stuti, Arun Rana, and Manpreet Kaur. “ADCT-based Robust Methodology for Image Steganography”, International Journal of Image Graphics and Signal Processing, 2013.
- Sharif, Ami, Majid Mollaeefar, and Mahboubeh Nazari. “A novel method for digital image steganography based on a new three-dimensional chaotic map”, Multimedia Tools & Applications, 2016.
- J.K. Mandal, A. Khamrui. “A Genetic Algorithm based steganography in frequency domain (GASFD)”, 2011 International Conference on Communication and Industrial Application, 2011.
- preview-springerplus.springeropen.com
- Abid Yahya. “Steanography Techniques for Digital Images”, Springer Nature, 2019.
- Nadeem Akhtar, Pragati Johri, Shahbaaz Khan. “Enhancing the Security and Quality of LSB Based Image Steganography”, 2013 5th International Conference on Computational Intelligence and Communication Networks, 2013.
- Reddy, Velagalapalli Lokeswara, Arige Subramanyam, and Pakanati CHenna Reddy. “A novel technique for JPEG image steganography and its performance evaluation”, International Journal of Advanced Media and Communication, 2014.
- Jiang, Nan, Na Zhao, and Luo Wang. “LSB Based Quantum Image Steganography Algorithm”, International Journal of Theoretical Physics, 2015.
- H. Nabaee, K.Faez. “An efficient steganography method based on reducing changes”, 2010 25th International Conference of Image and Vision Computing New Zealand, 2010.
- Shabir A. Parah, Javaid A. Sheikh, Abdul M. Hafiz, G.M. Bhat. “Data hiding in scrambled images: A new double layer security data hiding technique”, Computers & Electrical Engineering, 2014.
- Dadgostar, H., and F. Afsari. “Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB”, Journal of Information Security and Applications, 2016.
- Prabira Kumar Sethy, Kamal Pradhan, Santi Kumar Behera. “A security enhanced approach for video Steganography using K-Means clustering and direct mapping”, 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 2016.
- Tamer Rabie, Mohammed Baziyad, Ibrahim Kamel. “Enhanced high capacity image steganography using discrete wavelet transform and the laplacian pyramid”, Multimedia Tools & Applications, 2018.
- Maheshwari, S.Uma, and D.Jude Hemanth. “Different methodology for image steganography-based data hiding: review paper”, International Journal of Information and Communication technology, 2015.
- Sajasi, Sara, and Amir-Masoud Eftekhari Moghadam. “An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method’, Applied Soft Computing, 2015.
- Vinsa Varghese. “A secure method for hiding data on cubism image using hybrid feature detection method”, International Journal of Research in Engineering and Technology, 2014.
- Omar Banimelhem, Lo’ai Tawalbeh, Moad Mowafi, Mohammed Al-Batati. “A more secure image hiding scheme using pixel adjustment and genetic algorithm”, International Journal of Information Security and Privacy, 2013.
- M.Ghebleh, A. Kanso. “A robust chaotic algorithm for digital image steganography”, Communications in Nonlinear Science and Numerical Simulation, 2014 [45] “Intelligent Systems Design and Applications”, Springer Nature, 2018
- Dogan, Sengul. “A new data hiding method based on chaos embedded genetic algorithm for color image”, Artificial Intelligence Review, 2016.
- Advances in Intelligent Systems and Computing, 2016.
- Sarosh K. Dastoor. “Comparative Analysis of Steganographic algorithms intacting the information in the speech signal for enhancing the message security in next generation mobile devices”, 2011 World Congress on Information and Communication Technologies, 2011.