i-manager's Journal on Software Engineering (JSE)


Volume 5 Issue 3 January - March 2011

Article

A Review of Color Image Encryption Techniques

Himani Agrawal* , Monisha Sharma**
* Reader in E&TC Department, SSCET, Bhilai, India.
** Professor in E&TC Department, SSCET, Bhilai, India.
Himani Agrawal and Monisha Sharma (2011). A Review of Color Image Encryption Techniques. i-manager’s Journal on Software Engineering, 5(3),. 1-15. https://doi.org/10.26634/jse.5.3.1379

Abstract

With the fast progression of data exchange in electronic way, information security is becoming more important in data storage and transmission. Encryption is one way to ensure good security. Image encryption has applications in Internet communication, multimedia systems, medical imaging, telemedicine, and military communication. This paper surveys various encryption techniques for color images and then tries to suggest some points to improve the color image encryption techniques.

Research Paper

Low Power Mobile Operating Systems with Profiling Hardware Acceleration

Xinwei Niu* , Narueporn Nartasilpa**, Chayapol Chaiyanan ***, Jeffrey Fan****
*-*** Research Scholar, Department of Electrical and Computer Engineering, Florida International University, Miami, USA.
**** Assistant Professor, Department of Electrical and Computer Engineering, Florida International University, Miami, USA.
Xinwei Niu, Narueporn Nartasilpa, Chayapol Chaiyanan and Jeffrey Fan (2011). Low Power Mobile Operating Systems with Profiling Hardware Acceleration. i-manager’s Journal on Software Engineering, 5(3), 16-25. https://doi.org/10.26634/jse.5.3.1380

Abstract

In this paper, a System-on-a-Chip (SoC) based hardware acceleration solution for low power mobile operating systems is proposed. In mobile communication systems, it is very costly to transform the entire software application into a hardware solution. However, some applications may have such a need due to their high performance and low power requirements. These software systems consist of several kinds of functions and some of these functions will be invoked at a very high frequency. The speed and energy consumptions are two major concerns for modern system development, thus it is important for designers to balance the tradeoff between these two factors. If the system can process very high-speed operations and consume less energy, it is an efficient design. The basic idea of this paper is to only transform those highly used functions into hardware by using the proposed profiling and hardware acceleration methodology. The solution that this paper will demonstrate is to convert the system into a cost effective hardware-software co-design. Experimental results show that with the proposed profiling method and hardware acceleration platform, mobile operating systems could solve the same problem within shorter period of time (4.3 times speedup) and lower energy consumption (around 76% reduction).

Research Paper

Retrieval of Flight Data Recorders from Deep Sea using Secured Wireless Networks

Charles C. Castello* , Jeffrey Fan**
* Applied Research Center, Florida International University, Miami, USA.
** Department of Electrical and Computer Engineering, Florida International University, Miami, USA.
Charles C. Castello and Jeffrey Fan (2011). Retrieval of Flight Data Recorders from Deep Sea using Secured Wireless Networks. i-manager’s Journal on Software Engineering, 5(3),26-32. https://doi.org/10.26634/jse.5.3.1381

Abstract

There has been much research in recent years dealing with many crucial interests for flight data recorders (FDR). However, there has been little or no research dealing with the localization of FDRs in the event of a crash. One particular scenario of importance is the localization of FDRs in the ocean, which covers 71% of the Earth’s surface. In order to quickly locate lost FDRs in the ocean, a secured wireless network is utilized where each node is mounted on a buoy with an identification tag. This network of buoys is released at an estimated crash site at random locations within pre-defined vicinity. Each buoy is equipped with an ultrasonic sensor, which is tethered to the bottom of the buoy at a specific depth. MATLAB simulations have been implemented to study the feasibility of the proposed methodology, considering various numbers of buoys, days allowed to drift, and miles traveled per day. The experimental results showed that percentage of success in finding the vicinity of the FDR was between 8.9% and 100% depending upon parameters of buoys, days, and miles, by using the Monte Carlo method.

Research Paper

Secure Electronic Voting System Equipped With Biometric Authentication

Elavarasi Sankaran* , Anand Sukumaran**
* ISTE Department of Information Technology, SSN College of Engineering & Research, Chennai.
** Tata Consultancy Services, Chennai.
Elavarasi Sankaran and Anand Sukumaran (2011). Secure Electronic Voting System Equipped With Biometric Authentication. i-manager’s Journal on Software Engineering, 5(3),33-46. https://doi.org/10.26634/jse.5.3.1382

Abstract

Voting is the prime component in the true notion and the purpose of democracy for many years. The rights of every citizen are preserved in the republics only through elections. As a result nations invest significant amount of efforts and money in conducting the election process. However with the application of the well established Information Technology infrastructure into the election process, a considerable amount of time and cost can be saved. Information technology has offered significant advantages and facilities  to  improve  the  quality  of  many  social  interactions  and  economical  activities in the  modern  society. However until now it has not been attempted to apply its features and to simplify the process of election. Although there are still many security threats associated with the usage of Internet to build an e-voting system, the advantages outweigh the disadvantages. We have developed an electronic voting system E-Voting for a general election which encompasses all the classical features of traditional election system like accuracy, democracy, privacy, verifiability, flexibility and security. E-Voting system employs biometric identification techniques to overcome the security issues in the election process.  In this system voter’s privacy is guaranteed by using a SSL certificate for confidentiality and voter’s biometric finger print, digital signature for voter’s authentication also application level security for fraud detection (like double voting detection) is done.  E-Voting is implemented by employing Advanced Java technology and used visual basic for fingerprint authentication.

Research Paper

Advanced Key Management Scheme based on ECC to defend Non-Differential side channel attack for HSN

Shoba Bindu C* , CH. Suman**
* Associate Professor, JNTUACE, Anantapur, Andhra Pradesh.
** JNTUACE, Anantapur, Andhra Pradesh.
Shoba Bindu C and CH. Suman (2011). Advanced Key Management Scheme based on ECC to defend Non-Differential side channel attack for HSN. i-manager’s Journal on Software Engineering, 5(3),47-54. https://doi.org/10.26634/jse.5.3.1383

Abstract

In Elliptic Curve Cryptography (ECC)-based Key management Scheme, the pair of ECC public and private keys is generated for all nodes in Heterogeneous Sensor Network and each node forms a shared key with their communication neighbors to establish secured connection. In Elliptic Curve Cryptography, by using a Simple power Analysis (SPA), an attacker is able to recover some secret data. This type of attack is called Non-Differential side channel attack. We propose an efficient Key Management Scheme which prevents non-differential side channel attack by including the unified addition formula for point doubling and point addition to perform point multiplication in ECC.  The performance evaluation show that our key management scheme can achieve significant reduction on power consumption and Storage space requirement than previous schemes. It also minimizes communication overhead and provides reliability against node failures.

Research Paper

Colour Image Registration and Template Matching using Hypercomplex Phase Correlation

Venkatramana Reddy B.D* , T. Jaya Chandra Prasad**
* Department of ECE, Madanapalle Institute of Technology & Science, Andhra Pradesh, India
** Department of ECE, RGM College of Engineering & Technology, Andhra Pradesh, India.
Venkatramana Reddy B.D and T. Jaya Chandra Prasad (2011). Colour Image Registration and Template Matching using Hypercomplex Phase Correlation.i-manager’s Journal on Software Engineering, 5(3), 55-60. https://doi.org/10.26634/jse.5.3.1384

Abstract

In this paper,we propose a new algorithm for colour image registration and template matching using hypercomplex phase correlation also known as quaternion phase correlation(QPC). Conventional phase correlation(CPC) technique can only be applied to grayscale images or at most complex images due to some mathematical limitations. A full colour image must be first converted to a grayscale image before performing the phase correlation, during which the chrominance information has been wasted. This new technique can make full use of the luminance as well as the chrominance information in colour images.

Research Paper

Greedy Resource Allocation Algorithm for OFDMA Based Wireless Network

Dhananjay Kumar* , P. Subramanian**
* Department of Information Technology, Anna University, MIT Campus.
** Cognizant Technology Solutions, Chennai.
Dhananjay Kumar and P. Subramanian (2011). Greedy Resource Allocation Algorithm for OFDMA Based Wireless Network. i-manager’s Journal on Software Engineering, 5(3), 61-67. https://doi.org/10.26634/jse.5.3.1385

Abstract

A dynamic channel allocation algorithm for an Orthogonal Frequency Division Multiple Access (OFDMA) network is presented in this paper. The main objective is to perform variable resource allocation based on channel state information that optimizes the system capacity. It is assumed that the base stations have the perfect knowledge of the channel state information based on the feedback given by the mobile station. An algorithm based on the greedy approach is used to allocate the resources such as power, bandwidth and sub-channels. The sub-carrier allocation algorithm (SAA) consists of two stages. The first stage estimates the number of sub-carriers that a user needs and the second stage deals with the assignment of bit loading and power on each sub-carriers to satisfy user rate requirements. Two variations of SAA have been proposed here with respect to the sub-carriers and their transmission power. These two schemes are simulated and compared with respect to the total power allocated and allocated data rate with fairness. The average un-coded bit error rate (BER) performances of both schemes are the same and it falls below 10-3 for an SNR of 12dB under simulated channel conditions.

Research Paper

Enhancement of SCTP Performance during Handoff Process

B. Jaiganesh* , R. Ramachandran**
* Research Scholar, Sathyabama University, Chennai.
* Research Scholar, Sathyabama University, Chennai.
B. Jaiganesh and R. Ramachandran (2011). Enhancement of SCTP Performance during Handoff Process. i-manager’s Journal on Software Engineering, 5(3),68-72. https://doi.org/10.26634/jse.5.3.1386

Abstract

Efficiency enhancement is important for new transport layer protocols. Stream Control Transmission Protocol (SCTP), proposed by IETF, is to improve the efficiency and security of the transport layer. SCTP is featured by Multi-homing and Multi-streaming. Though the source and destination nodes exchange the available address list after four-way handshake in the initial stage, the quality of each available link is unknown. Hence, the chosen primary path may not be the best path which implies inefficiency. In this paper, we propose a scheme to add two new Chunks which carry the status of each alternative path during the four-way handshake of SCTP. Hence, the path of the best quality will be selected as the primary path. The simulation, by NS2, results show when the best path is selected to transmit data, the throughput could be improved up to 85% as compared with the worst case.