Professional Documents
Culture Documents
Information and Communication Technology For Competitive Strategies Proceedings of Third International Conference On ICTCS 2017 Simon Fong
Information and Communication Technology For Competitive Strategies Proceedings of Third International Conference On ICTCS 2017 Simon Fong
https://textbookfull.com/product/proceedings-of-the-2nd-
international-conference-on-data-engineering-and-communication-
technology-icdect-2017-anand-j-kulkarni/
https://textbookfull.com/product/intelligent-computing-and-
information-and-communication-proceedings-of-2nd-international-
conference-icicc-2017-1st-edition-subhash-bhalla/
https://textbookfull.com/product/proceedings-of-the-sixth-
international-conference-on-green-and-human-information-
technology-seong-oun-hwang/
Information and
Communication
Technology for
Competitive
Strategies
Proceedings of Third International
Conference on ICTCS 2017
Lecture Notes in Networks and Systems
Volume 40
Series editor
Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland
e-mail: kacprzyk@ibspan.waw.pl
The series “Lecture Notes in Networks and Systems” publishes the latest
developments in Networks and Systems—quickly, informally and with high quality.
Original research reported in proceedings and post-proceedings represents the core
of LNNS.
Volumes published in LNNS embrace all aspects and subfields of, as well as
new challenges in, Networks and Systems.
The series contains proceedings and edited volumes in systems and networks,
spanning the areas of Cyber-Physical Systems, Autonomous Systems, Sensor
Networks, Control Systems, Energy Systems, Automotive Systems, Biological
Systems, Vehicular Networking and Connected Vehicles, Aerospace Systems,
Automation, Manufacturing, Smart Grids, Nonlinear Systems, Power Systems,
Robotics, Social Systems, Economic Systems and other. Of particular value to both
the contributors and the readership are the short publication timeframe and the
world-wide distribution and exposure which enable both a wide and rapid
dissemination of research output.
The series covers the theory, applications, and perspectives on the state of the art
and future developments relevant to systems and networks, decision making, control,
complex processes and related areas, as embedded in the fields of interdisciplinary
and applied sciences, engineering, computer science, physics, economics, social, and
life sciences, as well as the paradigms and methodologies behind them.
Advisory Board
Fernando Gomide, Department of Computer Engineering and Automation—DCA, School of
Electrical and Computer Engineering—FEEC, University of Campinas—UNICAMP,
São Paulo, Brazil
e-mail: gomide@dca.fee.unicamp.br
Okyay Kaynak, Department of Electrical and Electronic Engineering, Bogazici University,
Istanbul, Turkey
e-mail: okyay.kaynak@boun.edu.tr
Derong Liu, Department of Electrical and Computer Engineering, University of Illinois
at Chicago, Chicago, USA and Institute of Automation, Chinese Academy of Sciences,
Beijing, China
e-mail: derong@uic.edu
Witold Pedrycz, Department of Electrical and Computer Engineering, University of Alberta,
Alberta, Canada and Systems Research Institute, Polish Academy of Sciences, Warsaw,
Poland
e-mail: wpedrycz@ualberta.ca
Marios M. Polycarpou, KIOS Research Center for Intelligent Systems and Networks,
Department of Electrical and Computer Engineering, University of Cyprus, Nicosia, Cyprus
e-mail: mpolycar@ucy.ac.cy
Imre J. Rudas, Óbuda University, Budapest Hungary
e-mail: rudas@uni-obuda.hu
Jun Wang, Department of Computer Science, City University of Hong Kong,
Kowloon, Hong Kong
e-mail: jwang.cs@cityu.edu.hk
Information
and Communication
Technology for Competitive
Strategies
Proceedings of Third International Conference
on ICTCS 2017
123
Editors
Simon Fong Parikshit N. Mahalle
Department of Computer and Information Smt. Kashibai Navale College of
Science Engineering
University of Macau Pune, India
Macau, People’s Republic of China
Shyam Akashe
Department of Electronics and
Communication Engineering
ITM University
Gwalior, India
This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface
This LNNS volume contains the papers presented at the ICTCS 2017: Second
International Conference on Information and Communication Technology for
Competitive Strategies. The conference was held during 16–17 December 2017,
Udaipur, India, and organized by Association of Computing Machinery, Udaipur
Professional Chapter, in association with The Institution of Engineers (India),
Udaipur Local Center and Global Knowledge Research Foundation. It will target
state-of-the-art as well as emerging topics pertaining to information and commu-
nication technologies (ICTs) and effective strategies for its implementation for
engineering and intelligent applications. The objective of this international con-
ference is to provide opportunities for the researchers, academicians, industry
persons and students to interact and exchange ideas, experience and expertise in the
current trend and strategies for ICT. Besides this, participants will also be
enlightened about vast avenues, current and emerging technological developments
in the field of ICT in this era, and its applications will be thoroughly explored and
discussed. The conference is anticipated to attract a large number of high-quality
submissions, stimulate the cutting-edge research discussions among many academic
pioneering researchers, scientists, industrial engineers, students from all around the
world and provide a forum to researcher; propose new technologies, share their
experiences and discuss future solutions for design infrastructure for ICT; provide a
common platform for academic pioneering researchers, scientists, engineers and
students to share their views and achievements; enrich technocrats and academi-
cians by presenting their innovative and constructive ideas; focus on innovative
issues at international level by bringing together the experts from different coun-
tries. Research submissions in various advanced technology areas were received,
and after a rigorous peer review process with the help of programme committee
members and external reviewer, 74 papers were accepted with an acceptance rate of
21%. The conference featured many distinguished personalities like Dr. Dharm
Singh, Namibia University of Science and Technology, Namibia; Dr. Nilanjan Dey,
Techno India College of Engineering, Kolkata, India; Dr. Poonam Dhaka,
University of Namibia. Separate invited talks were organized in industrial and
academia tracks on both days. We are indebted to all organizing partners for their
v
vi Preface
immense support to make this conference possible in such a grand scale. A total of
eight sessions were organized as a part of ICTCS 2017 including six technical, one
plenary and one inaugural session. A total of 61 papers were presented in the six
technical sessions with high discussion insights. The total number of accepted
submissions was 74 with a focal point on ICT and intelligent systems. Our sincere
thanks to all sponsors, press, print and electronic media for their excellent coverage
of this conference.
vii
viii Contents
xv
xvi Editors and Contributors
than 16 years of teaching and research experience and has authored eight books:
Identity Management for Internet of Things, River Publishers; Identity Management
Framework for Internet of Things, Aalborg University Press; Data Structures and
Algorithms, Cengage Publications; Theory of Computations, Gigatech Publications;
Fundamentals of Programming Languages—I, Gigatech Publications; Funda-
mentals of Programming Languages—II, Gigatech Publications; Design and
Analysis of Algorithms: A Problem Solving Approach (In Process), Cambridge
University Press. He is the recipient of “Best Faculty Award” from Sinhgad
Technical Education Society (STES) and Cognizant Technology Solutions. He has
also delivered an invited talk on “Identity Management in IoT” to Symantec
Research Lab, Mountain View, California. Currently, he is working as a professor
and head of the Department of Computer Engineering at STES’s Smt. Kashibai
Navale College of Engineering, Pune, India. His recent research interests include
algorithms, Internet of things, identity management and security.
Contributors
Pallavi Chavan
1 Introduction
P. Chavan (✉)
Department of Information Technology, Ramrao Adik Institute of Technology,
Nerul, Navi Mumbai, MH, India
e-mail: pallavichavan11@gmail.com
sharing without expansion through number of levels. The basic model of visual
cryptography used as a platform in this paper is visual cryptography, which can be
considered as secret sharing scheme [1]. However, in contrast to the conventional
cryptographic schemes, most visual cryptography algorithms encrypt the visual
information only. It has a great impact on reduction of mathematical computations
while revealing the secret. Any visual cryptography technique argues that the
original secret can be revealed directly through necked eyes without mathematical
computations. The most important advantage of visual cryptography is the simple
reconstruction mechanism [2]. The proposed research work attempts to integrate the
concept of layered encryption with visual cryptography. Multilayer approach is
proposed in two different modes: First mode is proposed as plain mode of multi-
layer visual cryptography. Second mode is proposed as threshold-based approach of
multilayer visual cryptography. It aims to encrypt biometric secrets in gray-level
representation. In this paper, authors follow XOR method for reconstruction. All the
shares produced by multilayer visual encryption are in digital form requires no
transparencies for decoding. The results of multilayer decoding are absolutely
expansionless, eliminating graying effect and reduces delay in reconstruction.
Multilayer visual cryptography is very different from image steganography and
watermarking. With steganography, in order to hide secret message, cover images
are essentially used. Such cover images are not used with multilayer visual cryp-
tography. Watermarking is another issue seems similar to visual cryptography, but
actually it is not. Multilayer visual cryptography does not emboss the secret pattern
in another cover image [1, 2]. Visual cryptography is the practice that encrypts
visual information. Handwritten text, signatures, and the images are visual infor-
mation of spatial domain. The input information for encryption is known as secret.
Encryption process yields the cipher; unreadable information presented by cipher is
called as share. The part of the secret in scrambled form is known as a share. The
fundamental concept of visual cryptography states the sharing of secret information
among a group of n participants. In order to share particular secret, it is decomposed
into n number of shares. These shares are distributed among the participants. In
order to reconstruct the original secret, each participant has to provide his/her own
share. In some of the VC schemes, complete knowledge of n − 1 shares is unable to
decrypt the secret. Visual cryptography was independently introduced by Shamir
[3] in the form of secret sharing. Shamir divided secret information D, into n
number of pieces (shares) such that D is reconstructable from any k number of
shares [3].
In (2, 2) scheme, the secret image is divided into exactly two shares. Division of the
pixels into shares is random. To reconstruct the original secret, these two shares are
superimposed together [4]. Improved version of visual cryptography is (k, n)
scheme. It is a generalized scheme of visual cryptography which allows dividing a
Multilayer Visual Cryptography with Soft Computing … 3
secret into n number of shares. The secret can be revealed from any k number of
shares among n. Knowledge of any (k − 1) shares do not reveal any information.
The major problem associated with this scheme is that the user needs to maintain
many shares. Maintaining the multiple shares increases memory consumption.
Increased number of shares involves more participants in the scheme [4]. In (n, n)
scheme, secret is divided into n number of shares such that reconstruction of secret
depends upon all n shares. Different types of shares appear with visual cryptog-
raphy [4]. Horizontal Shares: In this type of shares, black and white pixels appear
horizontally as rows. Diagonal Shares: In case of diagonal shares, the combination
of black and white pixels is presented diagonally. Vertical Shares: In case of
vertical shares, a single pixel is represented as a column of pixels in corresponding
shares. Random Shares: In case of random shares, black and white pixels appear as
random collection. Despite of all the share patterns, visual cryptography reflects
some important properties. Some of the properties are listed here: Divide and
Reconstruct, Decoding Computations, Graying Effect, Use of Transparencies.
Youmaran R. et al., in 2006, proposed new concept of hiding the secret information
into multiple color images. These color images are acting as covers to hide the
secret. Encoding of secret message is done in such a way that the decoding is
possible by superimposition of all covers generated out the scheme. The human
visual system is the sufficient condition to reveal the hidden information. No
computations are involved in the decryption process. N number of images partic-
ipates in encoding and decoding process. This method achieves recovery of secret
without any loss [5, 6]. Sagar Kumar Nerella et al., in 2012, proposed a novel
method of secret encryption using wavelet and visual cryptography. The authors
stated that different visual cryptography schemes shall be defined as per the color
model of the secret image. Wavelet transform is used to convert a secret of any
color model to its equivalent gray-level representation. Antoni 9/7 filter is used to
transform color secret to its gray-level representation [7]. Kaur K. et al., in 2013,
presented a secure method encrypting a secret information or image by dividing it
into shares. They focus on distinct properties of visual cryptography of decoding
the information visually. RSA is a public key encryption method used to protect the
shares. Shares are not available in standard form. This approach adds extra layer of
security over visual cryptography. The scheme is secured against denial-of-service
attack (DoS) and dictionary attack [8–10]. The proposed approach of multilayer
visual cryptography reduces all associated factors of VC, including mean square
error, graying effect, and pixel expansion ratio. As the levels of encryption increase,
secrecy of information tends to increase. Varieties of methods have been imple-
mented with visual cryptography. Almost all the method introduces graying effect
during encryption due to which quality of decrypted secret is affected badly. These
methods and existence of graying effect are represented in Table 1.
Another random document with
no related content on Scribd:
UP IN THE MORNING EARLY.
music written for merry’s museum, by geo. j. webb.
1.
Up in the morning early;
Glad spring is here once more;
And nature wears a smiling face:
Cold winter’s reign is o’er.
2.
Up in the morning early,
And seek the gay, green bowers;
Before the sun drinks up the dew,
That glitters on the flowers.
3.
Up in the morning early;
The birds are on the wing;
The air is full of music sweet;
How merrily they sing.
4.
Up in the morning early;
There’s balm in every breeze;
It comes from every vine-clad bower,
From blossoms of the trees.
5.
Up in the morning early;
O, haste to leave your bed;
Before above the eastern wave
The sun shall peep his head.
MERRY’S MUSEUM.
VOLUME II.—No. 5.
Story of Philip Brusque.
CHAPTER VIII.
London, the largest city in the world, and the capital of Great
Britain, contains nearly as many people as the six New England
States. It is about thirty miles in circuit. The river Thames runs
through it; and across this river there are seven or eight bridges.
That called London Bridge is pictured at the head of this article.
There are a multitude of interesting things in this vast city. There
are the Zoological Gardens, in which may be seen quadrupeds,
birds, reptiles, and fishes, all living somewhat according to their
natural habits. Among these creatures, there are two giraffes,
elephants, a rhinoceros, antelopes, tigers, lions, leopards, panthers,
monkeys, &c., &c.
In London there are several beautiful parks, which are fine grassy
fields with groups of shrubbery and trees, and paths winding about,
and in them you see thousands of people taking the air in fine
weather.
In London there are splendid edifices, called palaces, in which the
royal family resides.
The museums of London are numerous and on a scale of great
magnificence. It would take a large volume to describe the curiosities
of this mighty city. There are many people living in it, who have never
been out of it, and who seem to think that having seen London, they
have seen enough.
aurelia and the spider.
The muslin torn, from tears of grief
In vain Aurelia sought relief;
In sighs and tears she passed the day,
The tattered robe neglected lay.
The damask rose was first introduced into England by the learned
Linacre, on his return from Italy, about 1500. Thomas, Lord
Cromwell, in the reign of Henry VIII., enriched the fruit-gardens there
with three different kinds of plums, introduced from foreign lands.
The first orange tree appears to have been taken into England by
one of the Carew family; for a century afterwards they flourished at
the family seat in Surrey. The cherry orchards of Kent were first
planted by a gardener of Henry VIII., and the currant bush was
introduced when the commerce with Zante was first opened, in the
same reign.
Sir Walter Raleigh introduced the potato and the tobacco-plant
from America, where they were first found. Sir Anthony Ashly first
reared cabbages in England, and in his monument a cabbage is
carved at his feet. The figs planted by Cardinal Pole, at Lambeth, in
the reign of Henry VIII., are said to be still remaining there. Spilman,
who set up the first paper-mill in England, in 1590, is said to have
brought over from the continent, in his portmanteau, the two first
lime-trees, which he planted at Dartford, and which are still growing
there. The first mulberry trees planted in England are yet standing.
Benevolence of the Deity.
Let us consider the faculties of man, and see how many and how
exquisite the pleasures are which we derive from them. What
enjoyment do parents find in the love and care they bestow upon
their children! How sweet and blissful is the affection which children
return to parents! How pleasant is the love of brothers and sisters—
of relations and friends!
And then, let us reflect upon the beauty that is spread over the
face of nature. Why are flowers so beautiful, and so infinitely varied,
if not to bestow pleasure upon man? Why, if God is not benevolent,
has he made hills and valleys, and rolling waves, and rushing
waters, so beautiful? Why has he made the forms and motions of
birds so charming, if not to give pleasure? If the Creator did not
intend to delight us, why did he spread sublimity over the mountains,
and teach man to feel it? Why did he robe the heavens in azure, and
make a myriad race of beings to feel their mingled majesty and
beauty? Why did he clothe all vegetable nature in green, and make
human beings with eyes to relish it above all other hues? Why did he
teach the birds to sing, the waters to murmur forth melody, the trees
to bend in beauty and grace to the pressure of the breeze? Why, if
God is not a beneficent Being, did he make this world so pleasant—
endow it with light, and color, and music, and perfumes, and place
beings here adapted to the appreciation and enjoyment of these
things?
CHAPTER IX.
Almagro attempts to conquer Chili.—His misfortunes.—Cruelty to the
natives.—Battle with the Promancians.—Almagro retires to
Peru.—His death.