Professional Documents
Culture Documents
Contemporary Advances in Innovative and Applicable Information Technology Proceedings of ICCAIAIT 2018 Jyotsna Kumar Mandal
Contemporary Advances in Innovative and Applicable Information Technology Proceedings of ICCAIAIT 2018 Jyotsna Kumar Mandal
https://textbookfull.com/product/methodologies-and-application-
issues-of-contemporary-computing-framework-jyotsna-kumar-mandal/
https://textbookfull.com/product/advanced-computing-and-
communication-technologies-jyotsna-kumar-mandal/
https://textbookfull.com/product/applications-of-internet-of-
things-proceedings-of-iccciot-2020-jyotsna-k-mandal/
https://textbookfull.com/product/advances-in-interdisciplinary-
engineering-select-proceedings-of-flame-2018-mukul-kumar/
https://textbookfull.com/product/advances-in-fluid-dynamics-
selected-proceedings-of-icafd-2018-b-rushi-kumar/
https://textbookfull.com/product/advances-in-information-
communication-technology-and-computing-proceedings-of-
aictc-2019-vishal-goar/
Advances in Intelligent Systems and Computing 812
Contemporary
Advances in Innovative
and Applicable
Information
Technology
Proceedings of ICCAIAIT 2018
Advances in Intelligent Systems and Computing
Volume 812
Series editor
Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland
e-mail: kacprzyk@ibspan.waw.pl
The series “Advances in Intelligent Systems and Computing” contains publications on theory,
applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all
disciplines such as engineering, natural sciences, computer and information science, ICT, economics,
business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the
areas of modern intelligent systems and computing such as: computational intelligence, soft computing
including neural networks, fuzzy systems, evolutionary computing and the fusion of these paradigms,
social intelligence, ambient intelligence, computational neuroscience, artificial life, virtual worlds and
society, cognitive science and systems, Perception and Vision, DNA and immune based systems,
self-organizing and adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics including
human-machine teaming, knowledge-based paradigms, learning paradigms, machine ethics, intelligent
data analysis, knowledge management, intelligent agents, intelligent decision making and support,
intelligent network security, trust management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are primarily proceedings
of important conferences, symposia and congresses. They cover significant recent developments in the
field, both of a foundational and applicable character. An important characteristic feature of the series is
the short publication time and world-wide distribution. This permits a rapid and broad dissemination of
research results.
Advisory Board
Chairman
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
e-mail: nikhil@isical.ac.in
Members
Rafael Bello Perez, Universidad Central “Marta Abreu” de Las Villas, Santa Clara, Cuba
e-mail: rbellop@uclv.edu.cu
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
e-mail: escorchado@usal.es
Hani Hagras, University of Essex, Colchester, UK
e-mail: hani@essex.ac.uk
László T. Kóczy, Széchenyi István University, Győr, Hungary
e-mail: koczy@sze.hu
Vladik Kreinovich, University of Texas at El Paso, El Paso, USA
e-mail: vladik@utep.edu
Chin-Teng Lin, National Chiao Tung University, Hsinchu, Taiwan
e-mail: ctlin@mail.nctu.edu.tw
Jie Lu, University of Technology, Sydney, Australia
e-mail: Jie.Lu@uts.edu.au
Patricia Melin, Tijuana Institute of Technology, Tijuana, Mexico
e-mail: epmelin@hafsamx.org
Nadia Nedjah, State University of Rio de Janeiro, Rio de Janeiro, Brazil
e-mail: nadia@eng.uerj.br
Ngoc Thanh Nguyen, Wroclaw University of Technology, Wroclaw, Poland
e-mail: Ngoc-Thanh.Nguyen@pwr.edu.pl
Jun Wang, The Chinese University of Hong Kong, Shatin, Hong Kong
e-mail: jwang@mae.cuhk.edu.hk
J. P. Bandopadhyay
Editors
Contemporary Advances
in Innovative and Applicable
Information Technology
Proceedings of ICCAIAIT 2018
123
Editors
Jyotsna Kumar Mandal J. P. Bandopadhyay
Department Computer Science Institute of Radio Physics
and Engineering and Electronics
University of Kalyani University of Calcutta
Kalyani, West Bengal, India Kolkata, West Bengal, India
Devadatta Sinha
Department Computer Science
and Engineering
University of Calcutta
Kolkata, West Bengal, India
This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface
v
vi Preface
Chief Patron
Smt. Uma Bhattacharjee, Secretary, Kingston Educational Institute, India
Patron
Mr. Tipam Bhattacharjee, President, Kingston Educational Institute, India
General Chair
Prof. Dilip Kumar Sinha, Former Vice Chancellor of Visva Bharati, India
Editorial Board
Dr. Jyotsna Kumar Mandal, University of Kalyani (Corresponding Editor), India
Dr. Devadatta Sinha, Former Professor of CSE, University of Calcutta, India
Prof. J. P. Bandopadhyay, Emeritus Professor, University of Calcutta; Academic
Chairman, Kingston Educational Institute, India
Organizing Chairs
Prof. J. P. Bandopadhyay, Emeritus Professor, University of Calcutta; Academic
Chairman, Kingston Educational Institute, India
Mr. Devaprasanna Sinha, RVP—Region-II, CSI, India
Prof. Asish Mukhopadhyay, Ex-Group Director, SRGI, Jhansi; Advisor, Kingston
Polytechnic College
Organizing Co-chairs
Dr. Manishankar Chakraborty, Advisor, Kingston Educational Institute, India
Prof. Diptarup Bandyopadhyay, Principal, Kingston Polytechnic College, India
Mr. S. C. Rudra, Former Director, All India Radio, Akashvani Bhavan, Kolkata
International Advisory Committee
Dr. Takaaki Goto, Ryutsu Keizai University, Ryugasaki, Japan
Dr. Amlan Chatterjee, California State University, USA
vii
viii List of Committee Members
xvii
xviii Contents
Prof. Dr. Devadatta Sinha graduated from Presidency College with mathematics
honours and did his post-graduation in applied mathematics and then in computer
science. He did his Ph.D. in the field of computer science from Jadavpur University
in 1985. He started his teaching career in the Department of Computer Engineering
at BIT Mesra, Ranchi, then at Jadavpur University and at Calcutta University from
where he retired as Professor in the Department of Computer Science and
Engineering. He also served as Head of the Department of Computer Science and
Engineering. He also served as Convener, Ph.D. Committee in Computer Science
and Engineering and in Information Technology, University of Calcutta. He also
served as Vice-Chairman, Research Committee in Computer Science and
Engineering, West Bengal University of Technology. During his career, he has
written a number of research papers in national and international journals and
conference proceedings. He has also written a number of expository articles in
periodicals, books and monographs. His research interests include software engi-
neering, parallel and distributed algorithms, bioinformatics, computational intelli-
gence, computer education, mathematical ecology, networking. He has guided
xxi
xxii About the Editors
research students for their Ph.D. in computer science and engineering and M.Tech.,
B.Tech. and M.Sc. students for their dissertations. He has a total teaching/research
experience of more than 38 years. He was also in the editorial boards of different
journals and conference proceedings. He also served in different capacities in the
programme committees and organizing committees of different national and
international conferences. He was Sectional President, Section of Computer
Science, Indian Science Congress Association, during the year 1993–1994. He is an
active member of different academic bodies in different institutions. He is Fellow
and Senior Life Member of CSI and has been involved in different activities
including organization of different computer/IT courses since a long time. He is also
adjudged Distinguished Speaker by Computer Society of India.
1 Introduction
S. S. Das (&)
Department of Computer Application, Kalyani Government Engineering College,
Kalyani 741235, India
e-mail: suryasarathi.das@gmail.com
K. Das Sharma J. N. Bera
Department of Applied Physics, University of Calcutta, Kolkata 700009, India
J. K. Chandra
Department of Electrical Engineering, Ram Krishna Mahato Government Engineering
College, Purulia 723103, India
transmission over any public network by curious hackers and secret image can be
revealed by stacking them. Several researches [12, 13] may also be found to
generate meaningful shares or innocent-looking shares to evade hackers. Thus, to
devise a VCS that suits for (a) all kinds of images (b) with no pixel expansion and
that (c) avoids the problem of meaningless share becomes a motivation of the
research work presented in this paper. The authors of this present paper previously
proposed a VCS employing a framework based on quantum signal processing [14].
The scheme in [14] works for the images of all kind viz. binary, grayscale and color
images and does not involve any pixel expansion. The current paper is firstly
focused to resolve the problem of meaningless shares. Hierarchically, in the first
level, the QSP based VCS is used to generate shares. The meaningless shares are
further encoded, in the next level, using a secret sharing technique derived from
Shamir’s scheme [15]. One of the pioneers of VCS, Adi Shamir [15], proposed in
1979, a (k, m) threshold scheme to share a secret based on a method of polynomial
interpolation. The scheme in [15] divides any secret data into m parts, out of which
minimum k parts are needed to rebuild the secret data. As the pixels of each share
are encoded into m number of pieces, during transmission, even though hackers
capture all the shares, it is not possible to reconstruct the secret image by stacking
them as in VCS. But Shamir’s scheme increases the data volume m-fold after
encryption. This instigates the second objective of this present work to reduce the
data volume overhead during transmission and thus to reduce the transmission
delay. Vector quantization (VQ) [16] is a traditional quantization method mainly
applied in signal processing, image processing and data compression. In the third
level of the proposed scheme, VQ is used to lower the size of the encrypted data
just before the transmission takes place. The complete block diagram of the pro-
posed cryptosystem is shown in Fig. 1.
Thus the proposed scheme designs a image cryptosystems in its three-levels of
hierarchy: (1) meaningless shares are generated using QSP based VCS, (2) to evade
hackers, the meaningless shares are further encoded using Shamir’s Scheme and
finally (3) the encoded data volume is lowered using VQ to reduce transmission
overhead.
The paper is organized as: Sect. 2 describes proposed cryptosystem. The per-
formance indices to evaluate the proposed scheme are described in Sect. 3. Results
and performance analysis of the proposed cryptosystem are given in Sect. 4.
Section 5 concludes the paper.
2 Proposed Cryptosystem
where a0 is the secret s to be secured and p is prime number large enough than s.
Then the value of the function f, say z, for m different values of x is calculated.
These m numbers of z values correspond to the m different pieces in which the
secret data s is encrypted. Out of these m pieces only k pieces suffice the recon-
struction of the secret.
In the reconstruction phase, k pieces are randomly chosen. These k pieces are
used to rebuild the coefficients of the polynomial function f(x). Here, Lagrange
Fig. 2 QSP based (2, 2)-VCS: a Input image. b Share 1. c Share 2. d Resultant image
6 S. S. Das et al.
interpolation method is used find the Lagrange basis polynomial and the formula
used is as follows:
Y k
x xj
li ¼ ð2Þ
x xj
j¼1;i6¼j i
X
k
f ðxÞ ¼ ðli zi Þ mod p ð3Þ
i¼1
3 Performance Indices
Following performance indices are used to evaluate the performance of the pro-
posed cryptosystem:
Correlation Coefficient
The quality of resultant image is calculated here using correlation coefficient (CC)
with respect to input image. The resultant image becomes qualitatively better when
the value of the correlation coefficient is higher.
Information Entropy
How much the system is efficient to defy the security attacks can be measured by a
parameter named Information entropy. Information entropy, introduced by Shannon
in 1949, of an image represents the distribution of intensity levels. A truly random
distribution of encrypted data is indicated by the entropy value near to eight.
Image encryption quality
It is a metric to determine the figure of merit of an image encryption technique.
When an encryption technique is applied to an image, changes take place in pixels
due to encryption process. The irregularity of such change is the measure of
Encryption Quality. Higher value of Encryption Quality indicates greater quality of
the image encryption technique.
Correlation between adjacent pixels
The correlation amongst the pixels in any image signifies the predictability of the
image content. Low correlation value between adjacent pixels indicates random
behavior of image and hence become unable to predict. The pair of adjacent pixels
may be chosen from any orientation-horizontal, vertical or diagonal.
NPCR and UACI: parameters to evaluate the influence of differential attack
A good cryptosystem must be very sensitive to a small change made to the original
image. An attacker may change plain image slightly, preferably one pixel change,
to observe the changes in the encrypted image and thus to find a meaningful
transition from original image to encrypted image. The influence of this differential
attack can be quantified and parameters used for that are: Number of Pixel Change
Rate (NPCR) and Unified Average Changing Intensity (UACI). NPCR measures
the rate of change of number of pixels in encrypted image and UACI finds the
average of intensity differences between two encrypted images. Higher value of
NPCR indicates better randomization in the pixel distribution of the encrypted
image.
8 S. S. Das et al.
a. Transmitting. b. Receiving.
Fig. 33.—Diagram of simple Wireless Transmitting and Receiving
Apparatus.
If a stone is dropped into a pond, little waves are set in motion,
and these spread outwards in ever-widening rings. Electric waves
also are propagated outwards in widening rings, but instead of
travelling in one plane only, like the water waves, they proceed in
every plane; and when they arrive at the receiving aerial they set up
in it oscillations of the same nature as those which produced the
waves. Let us suppose electric waves to reach the aerial wire of Fig.
33b. The resistance of the coherer H is at once lowered so that
current from battery N flows and operates the relay F, which closes
the circuit of battery M. This battery has a twofold task. It operates
the sounder E, and it energizes the electro-magnet of the de-coherer
K, as shown by the dotted lines. This de-coherer is simply an electric
bell without the gong, arranged so that the hammer strikes the
coherer tube; and its purpose is to tap the tube automatically and
much more rapidly than is possible by hand. The sounder therefore
gives a click, and the de-coherer taps the tube, restoring the
resistance of the filings. The circuit of battery N is then broken, and
the relay therefore interrupts the circuit of battery M. If waves
continue to arrive, the circuits are again closed, another click is
given, and again the hammer taps the tube. As long as waves are
falling upon the aerial, the alternate makings and breakings of the
circuits follow one another very rapidly and the sounder goes on
working. When the waves cease, the hammer of the de-coherer has
the last word, and the circuits of both batteries remain broken. To
confine the electric waves to their proper sphere two coils of wire,
LL, called choking coils, are inserted as shown.
In this simple apparatus we have all the really essential features
of a wireless installation for short distances. For long distance work
various modifications are necessary, but the principle remains
exactly the same. In land wireless stations the single vertical aerial
wire becomes an elaborate arrangement of wires carried on huge
masts and towers. The distance over which signals can be
transmitted and received depends to a considerable extent upon the
height of the aerial, and consequently land stations have the
supporting masts or towers from one to several hundred feet in
height, according to the range over which it is desired to work. As a
rule the same aerial is used both for transmitting and receiving, but
some stations have a separate aerial for each purpose. A good idea
of the appearance of commercial aerials for long distance working
may be obtained from the frontispiece, which shows the Marconi
station at Glace Bay, Nova Scotia, from which wireless
communication is held with the Marconi station at Clifden, in Galway,
Ireland.
In the first wireless stations what is called a “plain aerial”
transmitter was used, and this was almost the same as the
transmitting apparatus in Fig. 33a, except, of course, that it was on a
larger scale. This arrangement had many serious drawbacks,
including that of a very limited range, and it has been abandoned in
favour of the “coupled” transmitter, a sketch of which is shown in Fig.
34. In this transmitter there are two separate circuits, having the
same rate of oscillation. A is an induction coil, supplied with current
from the battery B, and C is a condenser. A condenser is simply an
apparatus for storing up charges of electricity. It may take a variety of
forms, but in every case it must consist of two conducting layers
separated by a non-conducting layer, the latter being called the
“dielectric.” The Leyden jar is a condenser, with conducting layers of
tinfoil and a dielectric of glass, but the condensers used for wireless
purposes generally consist of a number of parallel sheets of metal
separated by glass or mica, or in some cases by air only. The
induction coil charges up the condenser with high tension electricity,
until the pressure becomes so great that the electricity is discharged
in the form of a spark between the brass balls of the spark gap D.
The accumulated electric energy in the condenser then surges
violently backwards and forwards, and by induction corresponding
surgings are produced in the aerial circuit, these latter surgings
setting up electric waves in the ether.
Fig. 34.—Wireless “Coupled” Transmitter.