Cyber security, privacy and networking : Proceedings of ICSPN 2021 / Dharma P. Agrawal, Nadia Nedjah, B. B. Gupta, Gregorio Martinez Perez, editors.
This book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2021), organized during 17-19 September 2021 in India in Online mode. The objectives of ICSPN 2021 is to provide a premier international platform for deli...
Saved in:
Corporate Author: | |
---|---|
Other Authors: | , , , |
Format: | Ebook |
Language: | English |
Published: |
Singapore :
Springer,
2022.
|
Series: | Lecture notes in networks and systems ;
v. 370. |
Subjects: | |
Online Access: | Springer eBooks |
Table of Contents:
- Intro
- Organization
- Preface
- Contents
- Editors and Contributors
- A New Modified MD5-224 Bits Hash Function and an Efficient Message Authentication Code Based on Quasigroups
- 1 Introduction
- 1.1 Hash Function Without a Key
- 1.2 Hash Function with Key or HMAC
- 2 Preliminaries
- 2.1 Quasigroup
- 2.2 Optimal Quasigroups
- 2.3 Brief Description of MD5
- 3 Proposed Schemes
- 3.1 Quasigroup Expansion (QGExp) Operation
- 3.2 Quasigroup Compression (QGComp) Operation
- 4 Implementation and Software Performance
- 5 Security Analysis
- 5.1 Analysis of QGMD5
- 5.2 Collision Resistance
- 5.3 Avalanche Effect
- 5.4 Analysis of QGMAC
- 6 Conclusions
- References
- Leveraging Transfer Learning for Effective Recognition of Emotions from Images: A Review
- 1 Introduction
- 2 Contributions by Researchers on Human Facial Emotion Recognition
- 2.1 Feature Extraction Methods
- 2.2 Classification
- 2.3 Transfer Learning
- 3 Methodology
- 3.1 Dataset
- 3.2 Data Preprocessing
- 3.3 Model Architectures
- 3.4 Experimental Study
- 4 Experimental Study and Comparison
- 5 Conclusion and Future Work
- References
- An Automated System for Facial Mask Detection and Face Recognition During COVID-19 Pandemic
- 1 Introduction
- 2 Related Work
- 3 Methodology
- 3.1 Image Preprocessing
- 3.2 Deep Learning Architecture
- 3.3 Face Recognition Module
- 4 Algorithm Used in Proposed model
- 4.1 Convolutional Neural Network (CNN)
- 4.2 Haar Cascade Algorithm
- 5 Limitations and Future Works
- 6 RESULTS
- 6.1 Face Mask Detection Module
- 6.2 Face Recognition Module
- 7 Conclusion
- References
- ROS Simulation-Based Autonomous Navigation Systems and Object Detection
- 1 Introduction
- 2 Related Work
- 3 Robot and Environment
- 4 Software and Platforms
- 4.1 ROS
- 4.2 RDS
- 4.3 RVIZ
- 5 ROS Autonomous Navigation
- 5.1 Map Creation
- 5.2 Localization
- 5.3 Path Planning
- 6 Object Detection
- 7 Results
- 7.1 Room Map Creation
- 7.2 Object Detection
- 7.3 Navigation
- 8 Conclusion and Further Work
- References
- Robotic Assistant for Medicine and Food Delivery in Healthcare
- 1 Introduction
- 2 The Robot
- 2.1 The Mechanical Implementation
- 2.2 Omnidirectional Wheels
- 2.3 Inverse Kinematic Model
- 3 Control system of the robot
- 3.1 Rotary Encoders
- 3.2 Proximity Sensors
- 3.3 Gyroscope
- 4 Testing of the Robot
- 5 Future work
- 6 Conclusions
- References
- Privacy-Preserving Record Linkage with Block-Chains
- 1 Introduction
- 2 Related Work
- 3 Proposed Approach
- 3.1 Privacy-Preserving Record Linkage
- 3.2 Partial De-identification at Source
- 4 System Design
- 4.1 Service 1
- 4.2 Service 2
- 5 Performance Analysis
- 6 Security Analysis
- 7 Conclusion
- References
- Performance Analysis of Rectangular QAM Schemes Over Various Fading Channels
- 1 Introduction
- 2 Rectangular Quadrature Amplitude Modulation.