Search For:

Displaying 1-23 out of 23 total
Supporting Negative Authorization in Spatiotemporal Role Based Access Control
Found in: Networks & Communications, International Conference on
By Samrat Mondal, Shamik Sural
Issue Date:December 2009
pp. 422-427
Role based access control (RBAC) has emerged as an effective solution for several access control problems of relevance today. To cope with the growing requirements, core RBAC has been extended over temporal, spatial and spatiotemporal dimensions. The vario...
 
Security Analysis of Temporal-RBAC Using Timed Automata
Found in: Information Assurance and Security, International Symposium on
By Samrat Mondal, Shamik Sural
Issue Date:September 2008
pp. 37-40
Role Based Access Control (RBAC) is arguably the most common access control mechanism today due to its applicability at various levels of authorization in a system. Time varying nature of access control in RBAC administered systems is often implemented thr...
 
Query Refinement for Internet Multimedia Information Retrieval Using Keywords and Low-level Features
Found in: Computational Intelligence and Multimedia Applications, International Conference on
By A. Vadivel, Shamik Sural, A.K. Majumdar
Issue Date:December 2007
pp. 192-196
The main obstacle in realizing semantic-based image retrieval is from the web that semantic description of an image is difficult to capture in low-level features. Text based keywords can be generated from web documents to capture semantic information for n...
 
Access Control Model for Web Services with Attribute Disclosure Restriction
Found in: Availability, Reliability and Security, International Conference on
By Vipin Singh Mewar, Subhendu Aich, Shamik Sural
Issue Date:April 2007
pp. 524-531
Web service is a programmable interface accessible through a network. In this paper we focus on the scenario in which different organizations use web services to collaborate, share knowledge, integrate services and for providing value added services to cus...
 
Toward Memory-efficient Design of Video Encoders for Multimedia Applications
Found in: VLSI, IEEE Computer Society Annual Symposium on
By Avishek Saha, Santosh Ghosh, Shamik Sural, Jayanta Mukherjee
Issue Date:March 2007
pp. 453-454
In this paper, we suggest a scheme to reduce memory requirement of the Full Search Block Matching (FSBM) algorithm. Next, we explore the memory design space of embedded multimedia applications and suggest a speed-energy optimized cache hierarchy.
 
Object Level Frame Comparison for Video Shot Detection
Found in: Applications of Computer Vision and the IEEE Workshop on Motion and Video Computing, IEEE Workshop on
By A. Vadivel, M. Mohan, Shamik Sural, A. K. Majumdar
Issue Date:January 2005
pp. 235-240
We propose a new approach to temporal video segmentation in which shot boundaries are detected by object-level matching of video frames. I-frames are initially segmented using features extracted from the HSV color space. Two consecutive I-frames are compar...
 
P³ — A Power-Aware Polling Scheme with Priority for Bluetooth
Found in: Parallel Processing Workshops, International Conference on
By Rajarshi Roy, Mukesh Kumar, Navin K. Sharma, Shamik Sural
Issue Date:August 2004
pp. 480-487
We propose P^3 - a polling scheme for Bluetooth in which a priority is assigned to each slave based on its packet arrival rate, available buffer space and the number of messages stored in the master buffer for that slave. Contrary to Round Robin (RR) polli...
 
BLAST-SSAHA Hybridization for Credit Card Fraud Detection
Found in: IEEE Transactions on Dependable and Secure Computing
By Amlan Kundu, Suvasini Panigrahi, Shamik Sural, Arun K. Majumdar
Issue Date:October 2009
pp. 309-315
A phenomenal growth in the number of credit card transactions, especially for online purchases, has recently led to a substantial rise in fraudulent activities. Implementation of efficient fraud detection systems has thus become imperative for all credit c...
 
Credit Card Fraud Detection Using Hidden Markov Model
Found in: IEEE Transactions on Dependable and Secure Computing
By Abhinav Srivastava, Amlan Kundu, Shamik Sural, Arun Majumdar
Issue Date:January 2008
pp. 37-48
The Internet has taken its place beside the telephone and the television as an important part of people's lives. Consumers rely on the Internet to shop, bank and invest online. Most online shoppers use credit cards to pay for their purchases. As credit car...
 
Bottom-Up Construction of Bluetooth Topology under a Traffic-Aware Scheduling Scheme
Found in: IEEE Transactions on Mobile Computing
By Rajarshi Roy, Mukesh Kumar, Navin K. Sharma, Shamik Sural
Issue Date:January 2007
pp. 72-86
We propose a Bluetooth topology construction protocol that works in conjunction with a priority-based polling scheme. A master assigns a priority to its slaves including bridges for each polling cycle and then polls them as many times as the assigned prior...
 
A Genetic Algorithm for Feature Selection in a Neuro-Fuzzy OCR System
Found in: Document Analysis and Recognition, International Conference on
By Shamik Sural,P.K. Das
Issue Date:September 2001
pp. 0987
Abstract: We have worked on the development of a character recognition system in the soft computing paradigm. In this paper we present a genetic algorithm used for feature selection with a Feature Quality Index (FQI) metric. We generate feature vectors by ...
 
Recognition of an Indian Script Using Multilayer Perceptrons and Fuzzy Features
Found in: Document Analysis and Recognition, International Conference on
By Shamik Sural,K. Das
Issue Date:September 2001
pp. 1120
Abstract: We present a multi-stage character recognition system for an Indian script, namely, Bengali (also called Bangla) using fuzzy features and multilayer perceptrons (MLP). The fuzzy features are extracted from Hough transform of a character pattern p...
 
A Two-Step Algorithm and its Parallelization for the Generation of Minimum Containing Rectangles for Document Image Segmentation
Found in: Document Analysis and Recognition, International Conference on
By Shamik Sural, P.K. Das
Issue Date:September 1999
pp. 173
In document processing, segmentation is done to uniquely identify each foreground connected region of an image by specifying its minimum containing rectangle (MCR). MCR is the rectangle with minimum dimensions that completely encloses a geometric pattern. ...
 
A Two-State Markov Chain Model of Degraded Document Images
Found in: Document Analysis and Recognition, International Conference on
By Shamik Sural, P.K. Das
Issue Date:September 1999
pp. 463
We propose a two-state Markov chain model of degraded document images. The model generates random and burst noise to simulate isolated pixel reversal as well as blurring of a larger document region. In the Random state, the probability of pixel inversion i...
 
Meeting Cardinality Constraints in Role Mining
Found in: IEEE Transactions on Dependable and Secure Computing
By Pullamsetty Harika,Marreddy Nagajyothi,John C. John,Shamik Sural,Jaideep Vaidya,Vijayalakshmi Atluri
Issue Date:March 2014
pp. 1
Role mining is a critical step for organizations that migrate from traditional access control mechanisms to Role Based Access Control (RBAC). Additional constraints may be imposed while generating roles from a given user-permission assignment relation. In ...
 
A Wide-Band Lumped Element Compact CAD Model of Si-Based Planar Spiral Inductor for RFIC Design
Found in: VLSI Design, International Conference on
By Sushanta K. Mandal, Arijit De, Amit Patra, Shamik Sural
Issue Date:January 2006
pp. 619-624
In this paper, a new lumped element compact Si-based on-chip spiral inductor model is presented for wide-band application. It consists of a new substrate network and underpass oxide leakage component to model the reduction in equivalent series resistance a...
 
A Document Image Analysis System on Parallel Processors
Found in: High-Performance Computing, International Conference on
By Shamik Sural, P. K. Das
Issue Date:December 1997
pp. 527
This paper presents a document image processing system implemented on a set of parallel processors. A pre-processing stage is first used to correct skew from scanned document images. The corrected image is segmented and labelled in a two-step Minimum Conta...
 
Re-targeting of multi-script document images for handheld devices
Found in: Proceedings of the 4th International Workshop on Multilingual OCR (MOCR '13)
By Jayanta Mukhopadhyay, Partha Bhowmick, Shamik Sural, Soumyadeep Dey
Issue Date:August 2013
pp. 1-5
We propose here a technique for transforming the layout of a printed document image to a new user-conducive layout. Its objective is to effectuate better display in a low-resolution screen for providing comfort and convenience to a viewer while reading. Th...
     
Detection and removal of hand-drawn underlines in a document image using approximate digital straightness
Found in: Proceeding of the workshop on Document Analysis and Recognition (DAR '12)
By Jayanta Mukhopadhyay, Partha Bhowmick, Sanjoy Pratihar, Shamik Sural
Issue Date:December 2012
pp. 124-131
A novel algorithm for detection and removal of underlines present in a scanned document page is proposed. The underlines treated here are hand-drawn and of various patterns. One of the important features of these underlines is that they are drawn by hand i...
     
Margin noise removal from printed document images
Found in: Proceeding of the workshop on Document Analysis and Recognition (DAR '12)
By Jayanta Mukhopadhyay, Partha Bhowmick, Shamik Sural, Soumyadeep Dey
Issue Date:December 2012
pp. 86-93
In this paper, we propose a technique for removing margin noise (both textual and non-textual noise) from scanned document images. We perform layout analysis to detect words, lines, and paragraphs in the document image. These detected elements are classifi...
     
High resolution 3-D MR image reconstruction from multiple views
Found in: Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP '12)
By Jayanta Mukherjee, Pinak Pani Bhattacharyya, Prasenjit Mondal, Shamik Sural
Issue Date:December 2012
pp. 1-8
This paper introduces an efficient technique to reconstruct the volume of human brain from low resolution MR image sequences acquired in sagittal, coronal and axial views. The algorithm uses image interpolation as the basis of volume reconstruction. It wor...
     
XML-based policy specification framework for spatiotemporal access control
Found in: Proceedings of the 2nd international conference on Security of information and networks (SIN '09)
By Samrat Mondal, Shamik Sural
Issue Date:October 2009
pp. 98-103
Role based access control (RBAC) is an established paradigm in current enterprise resource protection environment. However, with the proliferation of mobile computing, it is being frequently observed that the RBAC access decision is directly influenced by ...
     
Towards formal security analysis of GTRBAC using timed automata
Found in: Proceedings of the 14th ACM symposium on Access control models and technologies (SACMAT '09)
By Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
Issue Date:June 2009
pp. 1-22
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whether a desirable property is satisfied in all the reachable states. Such an anal...
     
 1