30
Smart Innovation, Systems and Technologies 77 Smart Computing and Informatics Suresh Chandra Satapathy Vikrant Bhateja Swagatam Das Editors Proceedings of the First International Conference on SCI 2016, Volume 1

Smart Computing and Informatics

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Smart Computing and Informatics

Smart Innovation, Systems and Technologies 77

Smart Computing and Informatics

Suresh Chandra SatapathyVikrant BhatejaSwagatam Das Editors

Proceedings of the First International Conference on SCI 2016, Volume 1

Page 2: Smart Computing and Informatics

Smart Innovation, Systems and Technologies

Volume 77

Series editors

Robert James Howlett, Bournemouth University and KES International,Shoreham-by-sea, UKe-mail: [email protected]

Lakhmi C. Jain, University of Canberra, Canberra, Australia;Bournemouth University, UK;KES International, UKe-mails: [email protected]; [email protected]

Page 3: Smart Computing and Informatics

The Smart Innovation, Systems and Technologies book series encompasses thetopics of knowledge, intelligence, innovation and sustainability. The aim of theseries is to make available a platform for the publication of books on all aspects ofsingle and multi-disciplinary research on these themes in order to make the latestresults available in a readily-accessible form. Volumes on interdisciplinary researchcombining two or more of these areas is particularly sought.The series covers systems and paradigms that employ knowledge and intelligencein a broad sense. Its scope is systems having embedded knowledge and intelligence,which may be applied to the solution of world problems in industry, theenvironment and the community. It also focusses on the knowledge-transfermethodologies and innovation strategies employed to make this happen effectively.The combination of intelligent systems tools and a broad range of applicationsintroduces a need for a synergy of disciplines from science, technology, businessand the humanities. The series will include conference proceedings, editedcollections, monographs, handbooks, reference books, and other relevant types ofbook in areas of science and technology where smart systems and technologies canoffer innovative solutions.

High quality content is an essential feature for all book proposals accepted for theseries. It is expected that editors of all accepted volumes will ensure thatcontributions are subjected to an appropriate level of reviewing process and adhereto KES quality principles.

More information about this series at http://www.springer.com/series/8767

Page 4: Smart Computing and Informatics

Suresh Chandra SatapathyVikrant Bhateja • Swagatam DasEditors

Smart Computingand InformaticsProceedings of the First InternationalConference on SCI 2016, Volume 1

123

Page 5: Smart Computing and Informatics

EditorsSuresh Chandra SatapathyDepartment of Computer Science andEngineering

PVP Siddhartha Institute of TechnologyVijayawada, Andhra PradeshIndia

Vikrant BhatejaDepartment of Electronics andCommunication Engineering

Shri Ramswaroop Memorial Group ofProfessional Colleges

Lucknow, Uttar PradeshIndia

Swagatam DasElectronics and Communication SciencesUnit

Indian Statistical InstituteKolkata, West BengalIndia

ISSN 2190-3018 ISSN 2190-3026 (electronic)Smart Innovation, Systems and TechnologiesISBN 978-981-10-5543-0 ISBN 978-981-10-5544-7 (eBook)https://doi.org/10.1007/978-981-10-5544-7

Library of Congress Control Number: 2017945691

© Springer Nature Singapore Pte Ltd. 2018, corrected publication 2019This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or partof the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmissionor information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilarmethodology now known or hereafter developed.The use of general descriptive names, registered names, trademarks, service marks, etc. in thispublication does not imply, even in the absence of a specific statement, that such names are exempt fromthe relevant protective laws and regulations and therefore free for general use.The publisher, the authors and the editors are safe to assume that the advice and information in thisbook are believed to be true and accurate at the date of publication. Neither the publisher nor theauthors or the editors give a warranty, express or implied, with respect to the material contained herein orfor any errors or omissions that may have been made. The publisher remains neutral with regard tojurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,Singapore

Page 6: Smart Computing and Informatics

Preface

The 1st International Conference on Smart Computing and Informatics (SCI) wasorganized successfully with the excellent support of Department of CSE, ANITS,Visakhapatnam on 3–4 March 2017. The aim of this International Conference wasto present a unified platform for advanced and multi-disciplinary research towardsdesign of smart computing and information systems. The theme was on a broaderfront focused on various innovation paradigms in system knowledge, intelligenceand sustainability that is applied to provide realistic solution to varied problems insociety, environment and industries. The scope was also extended towardsdeployment of emerging computational and knowledge transfer approaches, opti-mizing solutions in varied disciplines of science, technology and health care. Theconference received huge quality submissions in direct track and special sessiontracks. After stringent quality check and review process, only good papers wereaccepted with an acceptance ratio of 0.38. Several eminent researchers and aca-demicians delivered talks addressing the participants in their respective field ofproficiency. Prof. Ganapati Panda, IIT Bhubaneswar; Dr. R. Logeswaran, Malaysia;Dr. C. Krishna Mohan, IIT Hyderabad; Dr. P.S. Grover, KIIT, Group of Colleges,Gurgaon; Dr. A.K. Nayak, Hon. Secretary, Computer Society of India and Director,Indian Institute of Business Management, Patna; Dr. Arunkumar Thangavelu, VITVellore; Dr. Ramchandra V. Pujeri, Director, MIT College of Engineering Pune;Dr. Nilanjan Dey, TICT Kolkota; and Dr. Prashant Kumar Pattnaik, KIITBhubaneswar were the eminent speakers and guests on the occasion.

We would like to express our appreciation to the members of the ProgrammeCommittee for their support and cooperation in this publication. We are alsothankful to Team from Springer for providing a meticulous service for the timelyproduction of this volume. Our heartfelt thanks to Chairman, ANITS for the supportprovided. Special thanks to all guests who have honoured us with their presence inthe inaugural day of the conference. Our thanks are due to all special session chairs,track managers and reviewers for their excellent support. Profound thanks toOrganizing Chair Prof. Pritee Parweker, ANITS, Visakhapatnam, for marvelloussupport. Sincere thanks to Honorary Chair, Dr. Lakhmi Jain, Australia, for hisvaluable inputs and support during the conference. Last, but certainly not the least,

v

Page 7: Smart Computing and Informatics

our special thanks go to all the authors who submitted papers and all the attendeesfor their contributions and fruitful discussions that made this conference a greatsuccess.

Vijayawada, India Suresh Chandra SatapathyLucknow, India Vikrant BhatejaKolkata, India Swagatam DasMarch 2017

vi Preface

Page 8: Smart Computing and Informatics

Organizing Committee

Special Session Chairs

Dr. M. Bhanu Sridhar, GVP College of Engineering for Women, Visakhapatnam,AP, IndiaDr. D.N.D. Harini, GVP College of Engineering, Visakhapatnam, AP, IndiaDr. Tusar Kanti Mishra, ANITS, Visakhapatnam, AP, IndiaProf. (Dr.) R. Sireesha, Professor, GITAM University, Visakhapatnam, AP, IndiaProf. (Dr.) R. Sivaranjani, ANITS, Visakhapatnam, AP, IndiaDr. Hari Mohan Pandey, Amity University, Delhi, IndiaAnkit Chaudhary, Truman State University, USAYudong Zhang, Nanjing Normal University, China, Research Scientist, MRI Unit,Columbia University, USATanupriya Choudhury, Amity University, Uttar Pradesh, IndiaPraveen Kumar, Amity University, Uttar Pradesh, IndiaDr. Sai Sabitha, Amity University, Uttar Pradesh, IndiaDr. Suma V., Dean, Research and Industry Incubation Centre, Dayananda SagarCollege of Engineering, Bangalore, India

International Advisory Committee/Programme Committee

S.K. Udgata, UoH, Hyderabad, IndiaC.A. Murthy, ISI Calcutta, Kolkata, IndiaM.K. Tiwari, IIT Kharagpur, IndiaC. Chandra Sekhar, IIT Madras, Chennai, IndiaSuresh Sundaram, NTU, SingaporeLipo Wang, NTU, SingaporeAmit Mitra, IIT Kanpur, IndiaAruna Tiwari, IIT Indore, India

vii

Page 9: Smart Computing and Informatics

D. Nagesh Kumar, IISc, Bangalore, IndiaV. Sushila Devi, IISc, Bangalore, IndiaC. Hota, BITS Pilani, Hyderabad, IndiaChilukuri Mohan, Syracuse University, Syracuse, USADebjani Chakraborty, IIT Kharagpur, IndiaP.K. Kalra, IIT Kanpur, IndiaVasant Pandian, University Putra Malaysia, MalaysiaOscar Castillo, Tijuana Institute of Technology, Chula Vista, CA, USAIndranil Bose, IIM Calcutta, Kolkata, IndiaS. Bapi Raju, IIIT Hyderabad, IndiaBrijesh Verma, CQ University, Brisbane, AustraliaC.R. Rao, UOHYD, Hyderabad, IndiaB.L. Deekshatulu, IDRBT, Hyderabad, IndiaArun Agarwal, UOHYD, Hyderabad, IndiaArnab Laha, IIM Ahmedabad, IndiaBiplav Srivastava, IBM Research, New Delhi, IndiaB.K. Mohanty, IIM Lucknow, IndiaM. Janga Reddy, IIT Bombay, Mumbai, IndiaM.C. Deo, IIT Bombay, Mumbai, IndiaPankaj Dutta, IIT Bombay, Mumbai, IndiaUsha Anantha Kumar, IIT Bombay, Mumbai, IndiaFaiz Hamid, IIT Kanpur, IndiaS. Chakraverty, NIT Rourkela, RourkelaH. Fujita, Iwate Prefectural University, Iwate, JapanDries Benoit, Ghent University, Ghent, BelgiumS.A. Arul, Philips Electronics Singapore, SingaporePawan Lingars, Saint Mary's University, Halifax, CanadaAmuelson Hong, Oriental Institute of Technology, TaiwanZhihua Cui, Taiyuan University of Science and Technology, Taiyuan, ChinaBalasubramaniam Jayaram, IIT Hyderabad, IndiaK. Saman Halgamuge, The University of Melbourne, Melbourne, AustraliaNischal Verma, IIT Kanpur, IndiaLaxmidhar Behera, IIT Kanpur, IndiaProf. YaoChuJin, University of Surrey, Guildford, EnglandVineeth Balasubramian, IIT Hyderabad, IndiaAtul Negi, Professor, University of Hyderabad, IndiaM. Naresh Kumar, NRSC, Hyderabad, IndiaMaurice Clerc, Franch Roderich Gross, EnglandDr. Syed Basha, IndiaKalyanmoy Deb, IIT Kanpur, IndiaSaman Halgamuge, AustraliaJeng-Shyang Pan, Talwan Peng Shi, UK Javier Del Ser, SpainLeandro Dos Santos Coelho, BrazilS Pattanaik, IndiaGerardo Beni, USA

viii Organizing Committee

Page 10: Smart Computing and Informatics

K. Parsopoulos, GreeceLingfeng Wang, ChinaAthanasios V. Vasilakos, SwedenAthens Pei-Chann Chang, TaiwanChilukuri K. Mohan, USASaeidNahavandi, AustraliaAbbas Khosravi, AustraliaAlmoataz Youssef Abdelaziz, EgyptK.T. Chaturvedi, IndiaM.K. Tiwari, IndiaYuhui Shi, ChinaDipankar Dasgupta, USALakhmi Jain, AustraliaX.Z. Gao, FinlandJuan Luis Fernandez Martinez, SpainOscar Castillo, MexicoHeitor Silverio Lopes, BrazilS.K. Udgata, IndiaNamrata Khemka, USAG.K. Venayagamoorty, USAZong Woo Geem, USAYing Tan, ChinaS.G. Ponnambalam, MalaysiaHalina Kwasnicka, PolandM.A. Abido, Saudi ArabiaRicha Singh, IndiaManjaree Pandit, IndiaHai Bin Duan, ChinaDelin Luo, ChinaV. Ravi, IndiaS. Basker, IndiaM. Rammohan, South KoreaMunesh Chandra Trivedi, ABES Engineering College, Ghaziabad, IndiaAlok Aggarwal, Professor & Director, JP Institute of Engineering and Technology,Meerut, IndiaDilip Kumar Sharma, Institute of Engineering and Technology, GLA University,Mathura, IndiaK. Srujan Raju, CMR Technical Campus, Hyderabad, IndiaB.N. Biswal, BEC, Bhubaneswar, IndiaSanjay Sengupta, CSIR, New Delhi, IndiaNaeemHanoon, MalaysiaCirag Arora, IndiaSteven Fernades, IndiaKailash C. Patidar, South AfricaK. Srujan Raju, CMR Group, Hyderabad

Organizing Committee ix

Page 11: Smart Computing and Informatics

Ramakrishna Murthy, ANITS, Visakhapatnam, IndiaCh. Suresh, ANITS, Visakhapatnam, IndiaS. Mishra, ANITS, Visakhapatnam, IndiaProf. Chintan Bhatt, Chandubhai S. Patel Institute of Technology, Gujarat, IndiaV. Suma, Bangalore, IndiaSrinivas Sethi, IGIT, Odisha, IndiaH. Behera, Sambalpur, IndiaSachi Dehuri, Balasore, IndiaSiressha Rodda, GITAM, Visakhapatnam, IndiaLalitha Bhaskari, Andhra University, Visakhapatnam, IndiaJ.V.R. Murthy, JNTU Kakinada, IndiaA. Govardhan, JNTU Hyderabad, IndiaKuda Nageswar Rao, Andhra University, Visakhapatnam, IndiaP. Sanjeevi kumar, IndiaSuresh Limkar, Pune, IndiaSuberna Kumar, MVGR, Vizayanagaram, IndiaB. Tirumala Rao, JNTU Vizayanagaram, IndiaDr. Debabrata Samanta, Dayananda Sagar College of Arts, Science and Commerce,Bangalore, IndiaDr. Divakar Yadav, Associate Professor, MMMUT, Gorakhpur, IndiaDr. Anuja Arora, Jaypee Institute of Information Technology, Noida, India

x Organizing Committee

Page 12: Smart Computing and Informatics

Contents

Analysis of Existing Text Hiding Algorithms for Image SteganographyUsing TLNUS and AES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1Jagadish Gurrala and P. Sanyasi Naidu

Automated System for Detection of White Blood Cells in HumanBlood Sample . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13Siddhartha Banerjee, Bibek Ranjan Ghosh, Surajit Giri and Dipayan Ghosh

A Multiobjective Ideal Design of Rolling Element Bearing UsingMetaheuristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21S. N. Panda, S. Panda and P. Mishra

Predicting Binding Affinity Based on Docking Measures forSpinocerebellar Ataxia: A Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33P. R. Asha and M. S. Vijaya

A Novel Image Hiding Technique Based on StratifiedSteganography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45M. Radhika Mani and G. Suryakala Eswari

Efficient System for Color Logo Recognition Based on Self-OrganizingMap and Relevance Feedback Technique . . . . . . . . . . . . . . . . . . . . . . . . 53Latika Pinjarkar, Manisha Sharma and Smita Selot

Congestion-Aware Opportunistic Routing Protocol in Wireless SensorNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63Maya Shelke, Akshay Malhotra and Parikshit N. Mahalle

A Multi-level Secured Approach Using LBP and Spiral Scan Path . . . . 73N. Subramanyan, S. Kiran, R. Pradeep Kumar Reddy and P. Manju Yadav

A Diametrical Association to SkipCloud for Consistent MatchingServices in Publishing/Subscribing Framework . . . . . . . . . . . . . . . . . . . 83Yerininti Venkata Narayana and Dalli Varun Prasad

xi

Page 13: Smart Computing and Informatics

Multiple Images Defending Process by Leaning Techniques . . . . . . . . . 95Yerininti Venkata Narayana, Atmakuri Prashant, Dalli Varun Prasadand Chitturi Satya Pavan Kumar

Implementing Decision Tree in Air Pollution ReductionFramework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105Anindita Desarkar and Ajanta Das

Identification of Subgroups in a Directed Social Network Using EdgeBetweenness and Random Walks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115K. Sathiyakumari and M. S. Vijaya

Handover Techniques in New Generation Wireless Networks . . . . . . . . 127Vinodini Gupta and Padma Bonde

Defected Ground Structure Switchable Notch Band Antenna for UWBApplications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139Vamseekrishna Allam and B. T. P. Madhav

IoT-Based Multimodal Biometric Identification for AutomationRailway Engine Pilot Security System . . . . . . . . . . . . . . . . . . . . . . . . . . 147K. Sujatha, R. S. Ponmagal, K. Senthil Kumar, R. Shoba Raniand Golda Dilip

Architectural Outline of GIS-Based Decision Support System for CropSelection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155Preetam Tamsekar, Nilesh Deshmukh, Parag Bhalchandra,Govind Kulkarni, Vijendra Kamble, Kailas Hambarde and Vijay Bahuguna

PROMETHEE-Based Analysis of HCWM Challenges in HealthcareSector of Odisha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163Sasanka Sekhar Mishra, Kamalakanta Muduli, Manoranjan Dashand Devendra K. Yadav

Performance Analysis of NSL_KDD Data Set Using Neural Networkswith Logistic Sigmoid Activation Unit . . . . . . . . . . . . . . . . . . . . . . . . . . 171Vignendra Jannela, Sireesha Rodda, Shyam Nandan Reddy Uppuluru,Sai Charan Koratala and G. V. S. S. S. Chandra Mouli

Distributed Task Scheduling in Cloud Platform: A Survey . . . . . . . . . . 183Debojyoti Hazra, Asmita Roy, Sadip Midya and Koushik Majumder

Fuzzy Current Control of Grid Interactive Voltage Source Converterwith Solar Energy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193R. S. Ravi Sankar and S. V. Jaya Ram Kumar

Improving the Map and Shuffle Phases in Hadoop MapReduce . . . . . . . 203J. V. N. Lakshmi

xii Contents

Page 14: Smart Computing and Informatics

Improved Decision Making Through IFSS . . . . . . . . . . . . . . . . . . . . . . . 213T. R. Sooraj, R. K. Mohanty and B. K. Tripathy

Design and Analysis of Compact Circular Half-Ring MonopoleAntenna with DGS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221S. S. Mohan Reddy, P. Mallikarjuna Rao, B. Prudhvi Nadh,B. T. P. Madhav and K. Aruna Kumari

Developing Higher Education Ontology Using Protégé Tool:Reasoning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233Ch. V. S. Satyamurty, J. V. R. Murthy and M. Raghava

A New Approach to Interval-Valued Intuitionistic Hesitant Fuzzy SoftSets and Their Application in Decision Making . . . . . . . . . . . . . . . . . . . 243T. R. Sooraj, R. K. Mohanty and B. K. Tripathy

Design of Rivalize and Software Development to ConvertRDB to RDF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255Syed Umar, P. Gayathri, Ch. Anil, N. Priya and R. Srikanth

An IoT-Based Low-Cost Weather Monitoring and Alert System UsingNode MCU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265P. Siva Nagendra Reddy, D. Vishnu Vardhan, K. Tharun Kumar Reddyand P. Ajay Kumar Reddy

Energy Efficient Secure Data Transmission in Wireless SensorNetwork . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275Venu Madhav Kuthadi, Rajalakshmi Selvaraj and Tshilidzi Marwala

Significant Rule Power Factor: An Algorithm for New InterestMeasure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289Ochin Sharma, Suresh Kumar and Nisheeth Joshi

Covering-Based Pessimistic Multigranular Approximate RoughEquivalences and Approximate Reasoning . . . . . . . . . . . . . . . . . . . . . . . 299B. K. Tripathy and Suvendu K. Parida

RETRACTED CHAPTER: Real-Life Facial Expression RecognitionSystems: A Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311Samta Jain Goyal, Arvind K. Upadhyay, R. S. Jadon and Rajeev Goyal

Graphical Structure of Bayesian Networks by Eliciting Mental Modelsof Experts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333Udai Kumar Kudikyala, Mounika Bugudapu and Manasa Jakkula

Signal Monitoring in a Telemedicine System for Emergency MedicalServices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343S. T. Aarthy and S. Kolangiammal

Contents xiii

Page 15: Smart Computing and Informatics

Evolving the Efficiency of Searching Technique Using Map-ReduceHashing Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353Shivendra Kumar Pandey and Priyanka Tripathi

Automatic Recognition of Bird Species Using Human Factor CepstralCoefficients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363Arti V. Bang and Priti P. Rege

A Novel Meta Crawling Algorithm for Terrorist Network KnowledgeAggregation from the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375R. D. Gaharwar and D. B. Shah

Password Security Using Bcrypt with AES Encryption Algorithm . . . . . 385Narander Kumar and Priyanka Chaudhary

A Novel Cost Minimization Approach for Data Transaction in theContext of IoT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393Ranjit K. Behera, Nicky Kumari, Avinash Mahala and K. Hemant Reddy

Comparison between Genetic Algorithm and PSO for Wireless SensorNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403Pritee Parwekar, Sireesha Rodda and S. Vani Mounika

Secure Text Dissemination in Delay Tolerant Networks . . . . . . . . . . . . . 413Afreen Fatimah and Rahul Johari

Automated Diagnosis of Tachycardia Beats . . . . . . . . . . . . . . . . . . . . . . 421Usha Desai, C. Gurudas Nayak, G. Seshikala, Roshan J. Martisand Steven L. Fernandes

State-of-the-Art Object-Oriented Metrics and Its Reusability:A Decade Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431Neelamadhab Padhy, Suresh Satapathy and R. P. Singh

Performance Analysis and Comparison of Various Channel DecodingTechniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443Gupta Akanksha, Jain Anjana and Vyavahare Prakash

A Non-unit Protection Scheme for Series-Compensated TransmissionSystem Using Fuzzy Inference System . . . . . . . . . . . . . . . . . . . . . . . . . . 453Praveen Kumar Mishra and Anamika Yadav

Intelligent System for Team Selection and Decision Making in theGame of Cricket . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467Narendra Siripurapu, Ayush Mittal, Raghuveer P. Mukku and Ritu Tiwari

A Study of Clustering Techniques for Wireless Sensor Networks . . . . . 475Neeharika Kalla and Pritee Parwekar

xiv Contents

Page 16: Smart Computing and Informatics

Intensifying the Security of Information by the Fusion of RandomSubstitution Technique and Enhanced DES . . . . . . . . . . . . . . . . . . . . . . 487Rayi Sailaja, Ch. Rupa and A. S. N. Chakravarthy

Voter Authentication Using Modified Elliptic Curve Cryptography . . . . 497K. Sujatha, A. Arjuna Rao, Prathyusha Yejarla and K. J. Sruthi

Sensor-based Dam Gate Control System and Alert Using Zigbee . . . . . . 505S. Shivani, R. Dharani, J. Annush J. Sharon and S. Mrudhula

Prolonged Network Lifetime to Reduce Energy Consumption UsingCluster-Based Wireless Sensor Network . . . . . . . . . . . . . . . . . . . . . . . . . 513Sagargouda S. Patil and Anand Gudnavar

Energy-Efficient Hybrid Protocol for Routing Based on Mobile DataCollectors in Wireless Sensor Network . . . . . . . . . . . . . . . . . . . . . . . . . . 523B. A. Mohan and H. Sarojadevi

Enrichment of UML by Introjection of Functional Model . . . . . . . . . . . 533Shivanand M. Handigund, B. N. Arunakumari and Ajeet Chikkamannur

Fault Detection and Classification on Distribution Line withPenetration of DFIG-Driven Wind Farm Using Fuzzy System . . . . . . . . 543Anamika Yadav and Chitrarth Rangari

Text Summarization with Automatic Keyword Extraction in Telugue-Newspapers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555Reddy Naidu, Santosh Kumar Bharti, Korra Sathya Babuand Ramesh Kumar Mohapatra

Analysis and Implementation of Reliable Spectrum Sensing in OFDMBased Cognitive Radio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565P. Vijayakumar, Jeswin George, S. Malarvizhi and A. Sriram

List Colouring of Graphs Using a Genetic Algorithm . . . . . . . . . . . . . . 573Aditi Khandelwal, Pallavi Jain and Gur Saran

Waveform Generation and Reception of IEEE 802.11p Standard forCR-VANET Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583Ponnusamy Vijayakumar, Ravi Ranjan and S. Malarvizhi

Mutual Correlation-based Optimal Slicing for Preserving Privacy inData Publishing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593K. Ashoka and B. Poornima

Contents xv

Page 17: Smart Computing and Informatics

Scale Space-based Capillary Detection to Determine Capillary Densityand Avascular in Nailfold Capillary Images Using USB DigitalMicroscope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603H. S. Ajaya, H. R. Shreyas, Vikram Manikandan, K. V. Sumaand Bheemsain Rao

Augmenting Non-verbal Communication Using a Tangible UserInterface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613Suraksha Devi and Suman Deb

An Approach to En Route Environmentally Sustainable FutureThrough Green Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 621Bhubaneswari Bisoyi and Biswajit Das

Energy Aware Task Scheduling Algorithms in Cloud Environment:A Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 631Debojyoti Hazra, Asmita Roy, Sadip Midya and Koushik Majumder

Design of Jitter Spectral Shaping as Robust with VariousOversampling Techniques in OFDM . . . . . . . . . . . . . . . . . . . . . . . . . . . 641Syed Umar, N. Priya, P. Gayathri, T. Subba Reddyand Azeem Mohammed Abdul

Architecture for the Strategy-Planning Techniques Using Big DataAnalytics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649Puja Shrivastava, Laxman Sahoo and Manjusha Pandey

Indian Classical Dance Mudra Classification Using HOG Features andSVM Classifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659K. V. V. Kumar and P. V. V. Kishore

Feature Extraction Model for Social Images . . . . . . . . . . . . . . . . . . . . . 669Seema Wazarkar and Bettahally N. Keshavamurthy

Study of Dimensionality Reduction Techniques for EffectiveInvestment Portfolio Data Management . . . . . . . . . . . . . . . . . . . . . . . . . 679Swapnaja Gadre-Patwardhan, Vivek Katdare and Manish Joshi

Automatic Text Recognition Using Difference Ratio . . . . . . . . . . . . . . . . 691Shamama Anwar

Sign Language Conversion Tool (SLCTooL) Between 30 World SignLanguages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 701A. S. C. S. Sastry, P. V. V. Kishore, D. Anil Kumar and E. Kiran Kumar

xvi Contents

Page 18: Smart Computing and Informatics

Hybrid ITLBO-DE Optimized Fuzzy PI Controller for Multi-areaAutomatic Generation Control with Generation Rate Constraint . . . . . . 713Aurobindo Behera, Tapas Ku Panigrahi, Arun Ku Sahooand Prakash Ku Ray

Data Analysis of Weather Data Using Hadoop Technology . . . . . . . . . . 723Diallo Thierno Mamadou Oury and Archana Singh

Comparative Analysis of Coherent Routing Using Machine LearningApproach in MANET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 731Ayushree and G. N. Balaji

Constrained Level Validation of Serial Peripheral Interface Protocol . . . 743Avinash Yadlapati and Hari Kishore Kakarla

Retraction Note to: Real-Life Facial ExpressionRecognition Systems: A Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C1Samta Jain Goyal, Arvind K. Upadhyay, R. S. Jadon and Rajeev Goyal

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753

Contents xvii

Page 19: Smart Computing and Informatics

About the Editors

Suresh Chandra Satapathy is currently working as Professor and Head,Department of Computer Science and Engineering at PVP Siddhartha Institute ofTechnology, Andhra Pradesh, India. He obtained his Ph.D. in Computer Scienceand Engineering from JNTU Hyderabad and M.Tech. in CSE from NIT, Rourkela,Odisha, India. He has 26 years of teaching experience. His research interests aredata mining, machine intelligence and swarm intelligence. He has acted as pro-gramme chair of many international conferences and edited six volumes of pro-ceedings from Springer LNCS and AISC series. He is currently guiding eightscholars for Ph.D. Dr. Satapathy is also a Senior Member of IEEE.

Vikrant Bhateja is a Professor, Department of Electronics & CommunicationEngineering, Shri Ramswaroop Memorial Group of Professional Colleges(SRMGPC), Lucknow, and also the Head (Academics & Quality Control) in thesame college. His area of research includes digital image and video processing,computer vision, medical imaging, machine learning, pattern analysis and recog-nition, neural networks, soft computing and bio-inspired computing techniques. Hehas more than 90 quality publications in various international journals and con-ference proceedings. Prof. Bhateja has been on TPC and chaired various sessionsfrom the above domain in international conferences of IEEE and Springer. He hasbeen the track chair and served in the core-technical/editorial teams for internationalconferences: FICTA 2014, CSI 2014 and INDIA 2015 under Springer-ASIC Seriesand INDIACom-2015, ICACCI-2015 under IEEE. He is associate editor inInternational Journal of Convergence Computing (IJConvC) and also serving in theeditorial board of International Journal of Image Mining (IJIM) under IndersciencePublishers. At present, he is guest editors for two special issues floated inInternational Journal of Rough Sets and Data Analysis (IJRSDA) and InternationalJournal of System Dynamics Applications (IJSDA) under IGI Global publications.

Swagatam Das received the B.E. Tel. E., M.E. Tel. E. (Control Engineeringspecialization) and Ph.D. degrees, all from Jadavpur University, India, in 2003,

xix

Page 20: Smart Computing and Informatics

2005 and 2009, respectively. Currently, he is serving as an Assistant Professor atthe Electronics and Communication Sciences Unit of Indian Statistical Institute,Kolkata. His research interests include evolutionary computing, pattern recognition,multi-agent systems and wireless communication. Dr. Das has published oneresearch monograph, one edited volume and more than 150 research articles inpeer-reviewed journals and international conferences. He is the foundingco-editor-in-chief of “Swarm and Evolutionary Computation”, an internationaljournal from Elsevier. He serves as associate editors of the IEEE Trans. on Systems,Man, and Cybernetics: Systems and Information Sciences (Elsevier). He is aneditorial board member of Progress in Artificial Intelligence (Springer),Mathematical Problems in Engineering, International Journal of ArtificialIntelligence and Soft Computing and International Journal of Adaptive andAutonomous Communication Systems. He is the recipient of the 2012 YoungEngineer Award from the Indian National Academy of Engineering (INAE).

xx About the Editors

Page 21: Smart Computing and Informatics

Analysis of Existing Text HidingAlgorithms for Image SteganographyUsing TLNUS and AES

Jagadish Gurrala and P. Sanyasi Naidu

Abstract In the last few years, many researchers putting many efforts for gettinggood data hiding algorithms which was complex in design and undergo rigorousinvestigation on starting from secret text sizes ranges from 4 kB to 1 MB file hasbeen embedded in it so far for the sake of more secure communication amongmobile nodes and local area networks. As of now, several steganographic conceptswere conceived on data hiding approaches deployed in insecure channel. In thispaper, authors designed new data hiding algorithm approach proposed based onthree protection layers has been used to maintain secrecy of the embedded messagein a true color image. Here, the data is embedded randomly instead of sequentiallyby an image segmentation algorithm that uses two-level non-uniform segmentation.Advanced encryption standard algorithm has been used to encrypt the secret text.Different performance measures from the experimental results have shown thereasonable prototype of the proposed steganography algorithm. The result aftercomparing the proposed algorithm and the wide spectrum of steganographicschemes confirm that the stego image with medium perception ratio has beenreached even if the stego image holds a large amount of data with good visualquality and working under jpeg and gray-scale images and also resistant to statis-tical and visual problems.

Keywords Steganography � AES � Data hiding process

J. Gurrala (&)Department of CSE, Anil Neerukonda Institute of Technology and Sciences,Visakhapatnam, Indiae-mail: [email protected]

P. Sanyasi NaiduDepartment of CSE, GITAM Institute of Technology GITAM University,Visakhapatnam, India

© Springer Nature Singapore Pte Ltd. 2018S. C. Satapathy et al. (eds.), Smart Computing and Informatics, Smart Innovation,Systems and Technologies 77, https://doi.org/10.1007/978-981-10-5544-7_1

1

Page 22: Smart Computing and Informatics

1 Introduction

Steganography is the branch of data hiding process inside carrier image that enableshiding encrypted secret text in cover image to produce stego image. The secret textcannot be observed in the stego image over computer networks. Because, theentropy difference between cover image and stegao image is equal to zero. Thenonly intruder cannot anticipate the secret details in and around stego image. Theprofusion of our digital media (image, video, and audio) in our modern life has ledto a rapid technological development of steganography with digital media filesbeing the carrier contents (camouflage). In the few years, enormous papers arepublished on steganalysis of new data hiding algorithms, and their contribution isfor embedding secret data in grayscale [1].

1.1 Importance of Steganography in Transmission

Steganography is derived from the Greek origin and means “to hide in plain sight.”Steganography is an art and science of hiding the existence of information in animage file. The main goal of steganography is to hide information well enough suchthat the unintended recipients do not suspect the steganographic medium of con-taining hidden data. Simple steganographic techniques have been in use for hun-dreds of years. Most Steganography jobs have been carried out on different coverimages like text, image, audio, or video.

Steganography has a vital role to put various secret messages (M) inside coverimage (CI) using function FK to calculate the places where secret message keptinside CI to transmit stego image across networks. In the best case, no one can seethat the secret message by both the parties are able to communicate message to stayhidden until it received by destination. Image Steganography is a process thatinvolves hiding a message in an appropriate carrier file such as an image file. Unlikecryptography, which simply conceals the content or meaning of a message,steganography conceals the very existence of a message. The carrier can then besent to a receiver without anyone else knowing that it contains a hidden message.Hence image steganography provides better security than cryptography (Fig. 1).

1.2 Importance of Cryptography over Steganographic BasedCommunication

Cryptography is having an important role in improving security standard acrossnetworks to make them non-readable form of given cover image against third-partyvendors. It takes place between the sender and receiver for hiding text. The sendersends the message to the receiver through the communication channel. Encryption

2 J. Gurrala and P. Sanyasi Naidu

Page 23: Smart Computing and Informatics

is a process where the ordinary information also called as plain text is coded intosome unrecognizable form, which is usually called cipher text, which is in theunrecognizable form of ordinary information that is plain text. The entire process isdone for the sole purpose of protecting the message from being used or manipulatedby the intruder who is the third person.

Crytography only allows the authenticated users to prevent secret data fromunauthorized access by supplying a private/public key to the end user to read theproper information. Cryptography does enciphering/deciphering mechanism thatprotects our valuable information such as your documents, pictures, or onlinetransactions from unwanted people accessing or changing it. Encryption works byusing a mathematical formula called a cipher and a key to convert readable data(plain text) into a form that others cannot understand (cipher text). The cipher is thegeneral recipe for encryption and the key makes the encrypted data images.

Cryptography alone could not solve the problem about access control to enduser. Thus, authors are thinking to merge the different concepts of steganographyand cryptography methods together to form and claiming that the secret data whichis received to the end user is solely. An authorized user can only decrypt databecause decryption requires a secret key or password. So cryptography alonecannot supplement security aspects. However, steganography alone cannot solvethe issue regarding security. Therefore, we are thinking to solve the problem raisedto correlate these ideas of steganography and cryptography to produce bettersecurity results what the secure image transmission demands.

In this paper, the remaining related work was discussed in second section,analysis of apply TLNUS and AES algorithms on steganography and their math-ematical proofs were discussed in third section, the results and comparisons ofgiven inputs were discussed in fourth section, and summary and conclusion andfuture direction in fifth section.

Function (Fk=CI XOR M)

Cover Image (CI)Stego- image transit

Secret text(M)

Stego key

Finding Stego image

Embedding Process Extraction Process

Embedding Process

Fig. 1 Model for the data hiding algorithm on cover image for image steganography

Analysis of Existing Text Hiding Algorithms for Image … 3

Page 24: Smart Computing and Informatics

2 Analysis on Existing Algorithms

The two-level non uniform segmentation algorithm is to hide secret information inan image to transfer from source mobile to destination mobile and to carry out thetask more effectively against statistical attacks while producing a high-qualityimage. The aim of present paper is to delivery the cover image in terms of stegoimage i.e., hide the data over an image using steganographic algorithms and ensurethe quality of concealing data to the destination. However, the paper could try toapply method for embedding and encrypting the text in an image for normaltransmission of stego image. The current process [2] provided successful deliveryof the stego image to allow the services only to the authorized destination userswithout any copy right violation. The proposed method will help to secure thecontent with in the image and to make the personal information much securebecause even though if the unauthorized person succeeds in being able to interceptthe stego image, the intruder will not able to read the message as well as acquire theinformation during transit.

Whenever the data is encrypted using steganographic algorithms with in image,neither data nor the image is embedded in it should lose its originality. The mainaim is to embed sufficient data in a gray image to make it invisible to end user.

2.1 Refined Model of Data Hiding Algorithm from ExistingApproach

In this paper, the authors have given refined model of the algorithm process in paper[3, 4],which have given detailed information about 5 layers. From this five-layermodel, authors reviewed the algorithm to shorten it into simple 3 layers (Fig. 2).

3 Steganography Implementation

In the steganography process discussed so far is in theoretical aspect. Hence, now ithas been implemented in step process, an implementation through C++environment.

3.1 TLNUS Algorithm

In this algorithm, image segmentation process is defined in this work; it is based ondifferent sizes of segments of a CI.

The following steps are applied to display the proposed image segmentation:

4 J. Gurrala and P. Sanyasi Naidu

Page 25: Smart Computing and Informatics

Step 1: Let S be the key size cipher key of AES (cipher key generated fromrandom generator) in Eq. 1.

S ¼ ckj j ð1Þ

Step 2: In the Eq. 2, first level of segmentation process is used that horizontalsegment length (SHS) and vertical segment length(SVS) is formulated;

Fig. 2 Stages involved in the reviewed model

Analysis of Existing Text Hiding Algorithms for Image … 5

Page 26: Smart Computing and Informatics

SHS ¼ WCI=S and SVS ¼ HCI=S ð2Þ

//where cover image breath is represented as WCI and cover image heightis represented as HCI, respectively.

Step 3: For the second level of segmentation defined in Eq. 3.Given the length of the different lengths of segments for both the verticaland horizontal directions (Ver, Hor) according to the values of theswitching index (k);

K ¼ iþ jð Þmod Sð Þþ 1 ð3Þ

where i,j are two points in the different lengths of next-levelsegmentation of whole image.

Step 4: If partition the whole block into small block contains different sizes ofchunks whenk is odd parity, then compute Ver, Hor in Eq. 4;

Veri;jh;v ¼valðckiÞ � SVSPs

m¼1 valðckmÞ� �

ð4Þ

8i ¼ 1; . . .; S; 8j ¼ 1; . . .; s; 8h ¼ 1; . . .; s; 8v ¼ 1; . . .; s

ElseCompute Veri;jh;v, Hor

i;jh;v in Eq. 5;

Veri;jh;v ¼valðckkÞ � SVSPs

m¼1 valðckmÞ� �

; Hori;jh;v ¼valðckjÞ � SHSPs

m¼1 valðckmÞ� �

ð5Þ

8i ¼ 1; . . .; S; 8j ¼ 1; . . .; s; 8h ¼ 1; . . .; s; 8v ¼ 1; . . .; s

When block segmentation is completed.//where Val(ckk) represents the ASCII value of the every sth character inthe cipher key such that s{k, j, m}. The (h) and (v) are the height and thebreath of the cover image, respectively.

Step 5: Start reading of each pixel [5] on each segment at the first and secondlevels of segmentation in Eq. 5;

Step 6: End of the main block.

3.2 Encryption and Decryption in AES

AES Encryption Process:

6 J. Gurrala and P. Sanyasi Naidu

Page 27: Smart Computing and Informatics

Here, we were using AES algorithm for better encryption algorithm in mobileplatforms.

The AES cipher is almost identical to symmetric enciphering techniques wherelow-consuming mobile devices works. It does encryption on multiple bits of inputplain text with 128 bits. It contains 10 rounds to mangled the input text into ciphertext with random key size (Fig. 3).

3.3 Image Segmentation Algorithm Using TLNUS

In this paper, authors initiated selection of locations [2] over patches promptly forembedding secret messages randomly to achieve a promising solution in the pro-posed steganography algorithm; this approach is based on two-level non-uniformsegmentation (TLNUS) [3] (Fig. 4).

4 Simulation and Testing

For cover image BMP file has been taken for data hiding process. This paper haschosen as 115 � 145 dimension matrix pixel image in Planet Gray, scale image forhiding simple text “hai” in cover image where we apply TLNUS and AES andapply these algorithms in Dev C++ for getting better results in this paper.

Test 1: Gray scale image before segmentation:This is the input sky image contains all values ranges from 0 to 255, most of the

pixels are black in nature given to AES process when cipher key given (Fig. 5).Test 2: Gray scale image after segmentation:This is the output sky image contains all values ranges from 0 to 7 only (Fig. 6).

Fig. 3 Encryption process

Analysis of Existing Text Hiding Algorithms for Image … 7

Page 28: Smart Computing and Informatics

4.1 Results for TLNUS

After simulation, the images get matrix representation, which contains most of thevalues are occupied with 0’s and 255 only (Fig. 7).

4.2 Output for Plain Text to Binary File

After encryption, the key size shared the cipher key with secret information inbinary form (Fig. 8).

Fig. 4 Image segmentationprocess using two-leveladaptive non-uniform imagesegmentation

Fig. 5 BMP raw imagebefore TLNUS

Fig. 6 Screenshot imageafter segmentation

8 J. Gurrala and P. Sanyasi Naidu

Page 29: Smart Computing and Informatics

4.3 AES Keys for Encryption

After stego image, all secret information is about to insert into plain text fortransmission (Fig. 9).

4.4 Stego Image Matrix

After embedding secret text binary information into Plain text using process ofTLNUS (Fig. 10).

Fig. 7 Screen shot of pixel information from gray scale using TLNUS

Fig. 8 Screen shot pixel information from BMP

Analysis of Existing Text Hiding Algorithms for Image … 9

Page 30: Smart Computing and Informatics

5 Conclusion

This paper contributed on the way of hiding the secret data in the image usingsteganography and encrypting the steganographic part of the image through anal-ysis. After surveying the concept, it involves in sending the image along with thedata embedded in it, authors having ability to transfer it in reduced bandwidth, sincethere is no need to use other bandwidth to send the secret message we want to share.This paper has simulated exiting algorithm, which divide the image into sub blocksby using TLNUS; instead of selecting the whole image, a part of the image has beenselected and the secret message is in embedding process. Encryption process using

Fig. 9 Screen shot pixel information after adding AES keys

Fig. 10 Screen shot pixel information of Stego image

10 J. Gurrala and P. Sanyasi Naidu