Refine your search
Collections
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Chandra, Sourabh
- Audio Cryptanalysis-An Application of Symmetric Key Cryptography and Audio Steganography
Abstract Views :180 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Technology, Indian Institute of Engineering Science and Technology, IN
2 Department of Computer Science and Engineering, Calcutta Institute of Technology, IN
1 Department of Computer Science and Technology, Indian Institute of Engineering Science and Technology, IN
2 Department of Computer Science and Engineering, Calcutta Institute of Technology, IN
Source
ICTACT Journal on Communication Technology, Vol 7, No 3 (2016), Pagination: 1345-1350Abstract
In the recent trend of network and technology, "Cryptography" and "Steganography" have emerged out as the essential elements of providing network security. Although Cryptography plays a major role in the fabrication and modification of the secret message into an encrypted version yet it has certain drawbacks. Steganography is the art that meets one of the basic limitations of Cryptography. In this paper, a new algorithm has been proposed based on both Symmetric Key Cryptography and Audio Steganography. The combination of a randomly generated Symmetric Key along with LSB technique of Audio Steganography sends a secret message unrecognizable through an insecure medium. The Stego File generated is almost lossless giving a 100 percent recovery of the original message. This paper also presents a detailed experimental analysis of the algorithm with a brief comparison with other existing algorithms and a future scope. The experimental verification and security issues are promising.Keywords
Symmetric Key Cryptography, Audio Steganography, LSB Technique, Cover File, Stego File.- Sentiment Analysis for Product Review
Abstract Views :229 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Calcutta Institute of Technology, IN
2 Department of Computer Science and Technology, Raja Ranajit Kishore Government Polytechnic, IN
1 Department of Computer Science and Engineering, Calcutta Institute of Technology, IN
2 Department of Computer Science and Technology, Raja Ranajit Kishore Government Polytechnic, IN
Source
ICTACT Journal on Soft Computing, Vol 9, No 3 (2019), Pagination: 1913-1919Abstract
Sentiment analysis is defined as the process of mining of data, view, review or sentence to predict the emotion of the sentence through natural language processing (NLP). The sentiment analysis involve classification of text into three phase “Positive”, “Negative” or “Neutral”. It analyzes the data and labels the ‘better’ and ‘worse’ sentiment as positive and negative respectively. Thus, in the past years, the World Wide Web (WWW) has become a huge source of raw data generated custom or user. Using social media, e-commerce website, movies reviews such as Facebook, twitter, Amazon, Flipkart etc. user share their views, feelings in a convenient way. In WWW, where millions of people express their views in their daily interaction, either in the social media or in e-commence which can be their sentiments and opinions about particular thing. These growing raw data are an extremely high source of information for any kind of decision making process either positive or negative. To analysis of such huge data automatically, the field of sentiment analysis has turn up. The main aim of sentiment analysis is to identifying polarity of the data in the Web and classifying them. Sentiment analysis is text based analysis, but there are certain challenges to find the accurate polarity of the sentence. This states that there is need to find the better solution to get much better results than the previous approach or technique used to find polarity of sentence. Therefore, to find polarity or sentiment of, user or customer there is a demand for automated data analysis techniques. In this paper, a detailed survey of different techniques or approach is used in sentiment analysis and a new technique which is proposed in this paper.Keywords
Sentiment Analysis, Naïve Bayes, Mining, Support Vector Machine, Polarity, Semantic.References
- Samaneh Moghaddam and Martin Ester, “Opinion Digger: An Unsupervised Opinion Miner from Unstructured Product Reviews”, Proceedings of 19th ACM International Conference on Information and Knowledge Management, pp. 1825-1828, 2010.
- Aurangzeb Khan, Baharum Baharudin and Khairullah Khan, “Sentiment Classification from Online Customer Reviews using Lexical Contextual Sentence Structure”, Proceedings of International Conference on Software Engineering and Computer Systems, pp. 317-331, 2011.
- M. Hu and B. Liu, “Mining and Summarizing Customer Reviews”, Proceedings of 10th ACM International Conference on Knowledge Discovery and Data Mining, pp. 166-177, 2005.
- A.M. Popescu and O. Etzioni, “Extracting Product Features and Opinions from Reviews”, Proceedings of International Conference on Human Language Technology and Empirical Methods in Natural Language Processing, pp. 339-346, 2005.
- G. Vinodhini and R.M. Chandrasekaram, “Sentiment Analysis and opinion Mining: A Survey”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, No. 6, pp. 28-35, 2012.
- A. Collomb, C. Costea, D. Joyeux, O. Hasan and L. Brunie, “A Study and Comparison of Sentiment Analysis Methods for Reputation Evaluation”, Available at: https://liris.cnrs.fr/Documents/Liris-6508.pdf.
- Mika V. Mantyla, Daniel Graziotin and Miikka Kuutila, “The Evolution of Sentiment Analysis-A Review of Research Topics”, Computer Science Review, Vol. 27, No. 1, pp. 16-32, 2018.
- F. Benamara, C. Cesarano and D. Reforgiato, “Sentiment Analysis: Adjectives and Adverbs are better than Adjectives Alone”, Proceedings of International Conference on Weblogs and Social Media, pp. 1-7, 2006.
- R.A. Hummel and S.W. Zucker, “On the Foundations of Relaxation Labeling Processes”, Proceedings of International Conference on Computer Vision: Issues, Problems, Principles, and Paradigms, pp. 585-605, 1987.
- Samaneh Moghaddam and Martin Ester, “ILDA: Interdependent LDA Model for Learning Latent Aspects and their Ratings from Online Product Reviews”, Proceedings of 34th International ACM Conference on Research and Development in Information Retrieval, pp. 665-674, 2011.
- Jorge Carrillo De Albornoz, Laura Plaza, Pablo Gervas and Alberto Diaz, “A Joint Model of Feature Mining and Sentiment Analysis for Product Review Rating”, Proceedings of International Conference on Advances in Information Retrieval, pp. 55-66, 2011.
- Sentiment Analysis, Available at: https://insightsatlas.com/sentiment-analysis/
- Andrew L. Maas, Raymond E. Daly, Peter T. Pham, Dan Huang, Andrew Y. Ng and Christopher Potts, “Learning Word Vectors for Sentiment Analysis”, Proceedings of 49th Annual Meeting of the Association for Computational Linguistics, pp. 1-7, 2011.
- Understanding Sentiment Analysis: What It Is and Why It’s Used Understanding Sentiment Analysis: What It Is and Why It’s Used, Available at: https://www.brandwatch.com/blog/understanding-sentiment-analysis/
- Sentiment Analysis Explained, Available at: https://www.lexalytics.com/technology/sentiment-analysis
- Secure Transmission of Data using Image Steganography
Abstract Views :245 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Calcutta Institute of Technology, IN
2 Department of Computer Science and Technology, Indian Institute of Engineering Science and Technology, IN
1 Department of Computer Science and Engineering, Calcutta Institute of Technology, IN
2 Department of Computer Science and Technology, Indian Institute of Engineering Science and Technology, IN
Source
ICTACT Journal on Image and Video Processing, Vol 10, No 1 (2019), Pagination: 2049-2053Abstract
Data is one of the most relevant and important term from the ancient Greek age to modern science and business. The amount of data and use of data transformation for organizational work is increasing. So, for the sake of security and to avoid data loss and unauthorized access of data we have designed an image Steganographic algorithm implementing both Cryptography and Steganography. This algorithm imposed a cipher text within a cover image to conceal the existence of the cipher text and the stego-image is transferred from sender to intended receiver by invoking a distributed connection among them to achieve the data authenticity.Keywords
Cryptography, Steganography, RSA, RMI Architecture, Distributed connection, JPEG image.References
- Behrouz A. Forouzan, “Cryptography and Network Security”, McGraw Hill, 2007.
- Herbert Schidlt, “Java the Complete Reference”, 8th Edition, McGraw Hill, 2011.
- N.F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen”, Computer, Vol. 31, No. 2, pp. 26-34, 1998.
- S. Song, J. Zhang, X. Liao, J. Du and Q. Wen, “A Novel Secure Communication Protocol Combining Steganography and Cryptography”, Procedia Engineering, Vol. 15, pp. 2767-2772, 2011.
- A.J. Raphael and V. Sundaram, “Cryptography and Steganography-A Survey”, International Journal of Computer Technology and Applications, Vol. 2, No. 3, pp. 626-630, 2016.
- S.A. Laskar and K. Hemachandran, “An Analysis of Steganography and Steganalysis Techniques”, Assam University Journal of Science and Technology, Vol. 9, No. 2, pp. 83-103, 2012.
- F.A.P. Petitcolas, R.J. Anderson and M.G. Kuhn, “Information Hiding-A Survey”, Proceedings of International Conference on Protection of Multimedia, pp. 1062-1078, 1999.
- Y.S. Huang, Y.P. Huang, K.N. Huang and M.S. Young, “The Assessment System of Human Visual Spectral Sensitivity Curve by Frequency Modulated Light”, Proceedings of IEEE International Conference on Engineering in Medicine and Biology, pp. 263-265, 2005.
- T. Morkel, J.H.P. Eloff and M.S. Oliver, “An Overview of Image Steganography”, Proceedings of 5th Annual Conference on Information Security, pp. 111-116, 2005.
- T. Handel and M. Sandford, “Hiding Data in the OSI Network Model”, Proceedings of 1st International Workshop on Information Hiding, pp. 1-7, 1996
- R. Doshi, P. Jain and L. Gupta, “Steganography and its Applications in Security”, International Journal of Modern Engineering Research, Vol. 2, No. 6, pp. 4634-4638, 2012.
- M. Rouse, “Steganography”, Available at: https://searchsecurity.techtarget.com/definition/steganography
- Jing-Ming Guo and Thanh Nam Le, “Secret Communication using JPEG Double Compression”, IEEE Signal Processing Letters, Vol. 17, No. 10, pp. 879-882, 2010.
- Kamaldeep Joshi and Rajkumar Yadav, “A New LSB-S Image Steganography Method Blend with Cryptography for Secret Communication”, Proceedings of 3rd International Conference on Image Processing, pp. 86-90, 2015.
- K.S. Seethalakshmi, B.A. Usha and K.N. Sangeetha, “Security Enhancement in Image Steganography using Neural Networks and Visual Cryptography”, Proceedings of International Conference on Computational Systems and Information Systems for Sustainable Solutions, pp. 396-403, 2016.
- Nikhil Patel and Shweta Meena, “LSB Based Image Steganography using Dynamic Key Cryptography”, Proceedings of International Conference on Emerging Trends in Communication Technologies, pp. 448-457, 2016.
- May H. Abood, “An Efficient Image Cryptography using Hash-LSB Steganography with RC4 and Pixel Shuffling Encryption Algorithms”, Proceedings of Annual Conference on New Trends in Information and Communications Technology Applications, pp. 86-90, 2017.
- A.A.A. El-Latif, B. Abd El Atty, M.S. Hossain, M.D. A. Rahman, A. Alamri and B.B. Gupta, “Efficient Quantum Information Hiding for Remote Medical Image Sharing”, IEEE Access, Vol. 6, pp. 21075-21083, 2018.
- Z. Qu, Z. Cheng and X. Wang, “Matrix Coding-Based Quantum Image Steganography Algorithm”, IEEE Access, Vol. 7, pp. 35684-35698, 2019.
- SQL_NL - A Parser that Converts SQL Query to Natural Language
Abstract Views :153 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Technology, Indian Institute of Engineering Science and Technology, Shibpur, IN
1 Department of Computer Science and Technology, Indian Institute of Engineering Science and Technology, Shibpur, IN