Registered Papers

5
A real time detection of Distributed Denial-of-Service attacks using Cumulative Sum Algorithm and Adaptive Neuro-Fuzzy Inference System
Anitha R, Karthik R, Pravin V and Thirugnanam K, PSG College of Technology, India
35
Implementing Availability State Transition Model to Quantify Risk Factor
Shalini Chandra and Raees Ahmad Khan, BBA University, India.
49
On the Security of Two Certi_cateless Signature Schemes
Young-Ran Lee, National Institute for Mathematical Sciences, Korea
58
Information Security using Chains Matrix Multiplication
Ch. Rupa1 and P. S Avadhani2, 1 VVIT, India and 2 Andhra University, India
60
Formal Security Verification of ECC Based Signcryption Scheme
Atanu Basu1, Indranil Sengupta1 and Jamuna Kanta Sing2, 1 Indian Institute of Technology, India and 2 Jadavpur University, India
66
Universal Steganalysis using Contourlet Transform
V.Natarajan, R.Anitha, PSG College of Technology, India
78
Proposed Clustering Algorithm with Intrusion Detection Using K - Means (modified) & Hashed K - Means Algorithms
M. Varaprasad Rao1, A. Damodaram2 and N Ch Bharta Charyulu3, 1Matrusri Institute of PG Studies, 2JNTU College of Engineering, Hydearabad and 3Osmania University
99
Z Transform based Digital Image Authentication using Quantization Index Modulation (Z-DIAQIM)
Nabin Ghoshal1, Soumit Chowdhury2 and Jyotsna Kumar Mandal1, 1 University of Kalyani,India and 2Govt. College of Engineering & Ceramic Technology, India
100
Secret Data Hiding within Tolerance Level of Embedding in Quality Songs (DHTL)
Uttam Kr. Mondal1 and J.K.Mandal2, 1College of Engg. & Management, India and 2 University of Kalyani, India
101
A Novel DFT Based Information Embedding for Color Image Authentication (DFTIECIA)
J. K. Mandal and S. K.Ghosal, Kalyani University, India
109
Securing Systems after Deployment
David Neal1 and Shawon Rahman2, 1Capella University, USA and 2University of Hawaii-Hilo, USA
138
Encryption of Images based on Genetic algorithm - A New Approach
Jalesh kumar and S. Nirmala, J.N.N.C.E., India
140
Content Based Image Retrieval Using Normalization of Vector Approach to SVM
Sumit Dhariwal, Sandeep Raghuwanshi, and Shailendra Shrivastava, SATI vidisha, India
145
Modified Grøstl: An Efficient Hash Function
Gurpreet Kaur1, Vidyavati S Nayak1, Dhananjoy Dey2, S K Pal2, 1Defence Institute of Advance Technology, India and 2 Scientific Analysis Group, India
166
Fast DOA estimation using wavelet denoising on MIMO fading channel
A.V. Meenakshi , V.Punitham, R.Kayalvizhi and S.Asha, Periyar Maniammai University, India
208
Iris recognition systems with reduced storage and high accuracy using Majority Voting and Haar Transform
V.Anitha, R.Leela Velusamy, National Institute of Technology, India
209
Recovery of Live Evidence from Internet Applications
Ipsita Mohanty, R. Leela Velusamy, National Institute of Technology, India
210
Face Detection Using HMM -SVM Method
Nupur Rajput, Pranita Jain and Shailendra Shrivastava, Smrat Ashok Technological Institute, India
216
High Capacity Lossless Semi-fragile Audio Watermarking in the Time Domain
Sunita V. Dhavale, R. S. Deodhar and L. M. Patnaik, Defence Institute of Advanced Technology, India
226
Key Management Protocol in WIMAX revisited
Noudjoud Kahya1, Nacira Ghoualmi1 and Pascal Lafourcade2, 1Badji Mokhtar University, Algeria and 2Joseph Fourier University, France
231
Image Authentication Technique based on DCT (IATDCT
Nabin Ghosal1, Anirban Goswami2, Jyotsna Kumar Mondal1 and Dipankar Pal2, 1 University of Kalyani, India and 2Techno India -Kolkata, India
233
A Co-operative Multi-agent Based Wireless Intrusion Detection System Using MIBs
Ashvini Vyavhare,Varsharani Bhosale,Mrunal Sawant and Fazila Girkar, College of Engineering - Pune, India
248
A Binary Vote Based Comparison of Simple Majority and Hierarchical Decision for Survivable Networks
Charles A. Kamhoua1, Kevin A. KwiatM1, and Joon S. Park2, 1Air Force Research Laboratory, USA and 2Syracuse University, USA
262
A Novel way of protecting the shared key by using secret sharing and embedding using pseudo random numbers
P Devaki and G Raghavendra Rao, National Institute of Engineering India
264
Security Assurance by Efficient Non-Repudiation Requirements
S. K. Pandey1 and K. Mustafa2, 1The Institute of Chartered Accountants of Noida and 2Jamia Millia Islamia (A Central University), India
267
Poor Quality Watermark Barcodes Image Enhancement
Mohammed A.Atiea, Yousef B.Mahdy and Abdel-Rahman Hedar, Assiut University, Egypt
268
Hiding Data in FLV Video File
Mohammed A.Atiea , Yousef B.Mahdy, Abdel-Rahman Hedar, Assiut University, Egypt
273
Network Layer Attacks Classification and WFJBA ID Technique in Wireless Mesh Network
K. Ganesh Reddy and P. Santhi Thilagam, NITK Surathkal, India