Anda di halaman 1dari 8

IPASJ International Journal of Computer Science (IIJCS)

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

A Publisher for Research Motivation ........

Volume 3, Issue 3, March 2015

Multilevel Authentication System For Providing


Security
Yugha R1, Dr S Uma2, Swarnalatha S3, Poovizhi.M4
1

PG scholar, PG CSE Department, Hindusthan Institute of Technology, Coimbatore, Tamil Nadu, India

Head of the Department, PG CSE Department, Hindusthan Institute of Technology, Coimbatore, Tamil Nadu, India
3

PG scholar, PG CSE Department, Hindusthan Institute of Technology, Coimbatore, Tamil Nadu, India

PG scholar, PG CSE Department, Hindusthan Institute of Technology, Coimbatore, Tamil Nadu, India

ABSTRACT
Security is the process of securing confidential data from unauthorized access and modification. Security threats can compromise
the data stored by an organization to hackers with malicious intentions trying to gain access to sensitive information. Currently,
multilevel authentication is inevitable in mobile phones, systems and online applications. Yet the existing system has limitations like
better optimization is not done, robust security is not achieved for various attack rates and also improved accuracy is not obtained.
Hence, the need for introducing an enhanced multilevel authentication system that overcomes the limitation of the existing systems.
The proposed system is an Image based 3-level authentication system. In the first level, Registration process and second level, image
based authentication and generate the random key to our alias email id and third level, email alias email verification and then
login. The experiment carried out Image based authentication verification is very well and efficiency. A comparison of the proposed
system with the existing shows that the performance of the proposed system is better.

Keywords: artificial bee colony approach, content- based image retrieval, genetic algorithms

1. INTRODUCTION
Image processing is any form of signal processing for which the input is an image, such as a photograph or video frame; the
output of image processing may be either an image or a set of characteristics or parameters related to the image. Most
image-processing techniques involve treating the image as a two-dimensional signal and applying standard signalprocessing techniques to it. Image processing usually refers to digital image processing, but optical and analog image
processing also are possible. This article is about general techniques that apply to all of them. The acquisition of images
(producing the input image in the first place) is referred to as imaging.
Image processing is a physical process used to convert an image signal, either digital or analog, into a physical image. The
actual output itself can be an actual physical image or the characteristics of an image. The most common type is
photography, in which an image is captured using a camera to create a digital or analog image. In order to produce a
physical picture, the image is processed using the appropriate technology based on the input source type. This file is
translated using photographic software to generate an actual image. The colors, shading, and nuances are all captured at the
time the photograph is taken, and the software translates this information into an image. Closely related to image
processing are computer graphics and computer vision.
In computer graphics, images are manually made from physical
models of objects, environments, and lighting, instead of being acquired (via imaging devices such as cameras)
from natural scenes, as in most animated movies. Computer vision, on the other hand, is often considered high-level image
processing out of which a machine/computer/software intends to decipher the physical contents of an image or a sequence of
images (e.g., videos or 3D full-body magnetic resonance scans).In modern sciences and technologies, images also gain
much broader scopes due to the ever growing importance of scientific visualization (of often large-scale complex
scientific/experimental data). Examples include microarray data in genetic research, or real-time multi-asset portfolio
trading in finance.

2. LITERATURE SURVEY
Security researchers have, for a long time, devised mechanisms to prevent adversaries from conducting automated network
attacks, such as denial-of-service, which lead to significant wastage of resources. While undistorted natural images have
been shown to be algorithmically recognizable and searchable by content to moderate levels, controlled distortions of
specific types and strengths can potentially make machine recognition harder without affecting human recognition. The
difference in recognisability makes it a promising candidate for automated Turing tests, which can differentiate humans

Volume 3 Issue 3 March 2015

Page 11

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 3, Issue 3, March 2015

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

from machines[7]. The work empirically study the application of controlled distortions of varying nature and strength, and
their effect on human and machine recognisability. While human recognisability is measured on the basis of an extensive
user study, machine recognisability is based on memory-based Content-Based Image Retrieval (CBIR) and matching
algorithms. Limitations is to consider as, If the work increases the number of images in the repository, machine
recognisability is bound to suffer. It is difficult to formulate it theoretically as an optimization problem, without which
analytical solutions are not possible.
The composition process is accompanied by a carefully designed sequence of systematic image distortions that makes it
difficult for automated attacks to locate/identify objects present. Automated attacks must recognize all or most objects
contained in the image in order to answer a question correctly, thus the proposed approach reduces attack success rates. A
carefully designed sequence of systematic image distortion and clutter is performed during the image composition process in
order to make it extremely difficult for automated attacks to determine the quantity, identity, and location of the objects
present amongst the large amounts of extraneous image information[8]. Extensive user testing has been used in the design
of this sequence in order to ensure that the impact upon human performance is relatively minor. Experimental and user
study results show that the system presents a task that is strongly resistant to a number of state-of the- art automated
machine vision-based attacks, yet can be easily solved by the average user.
Limitations as need to improve and expand this automated attack testing array along with investigating the use of 3D object
models in this image generation process. Distortion of the composite image, conversely, primarily attempts to make
machine recognition of objects more difficult.
The security measures described above are already implemented and therefore the attacker can only mount online dictionary
attacks. Namely, attacks where the only way for the attacker to verify whether a password is correct is by interacting with
the login server[11]. This might be a reasonable assumption for an Internet based scenario, where SSL is used to encrypt
passwords and the server uses reasonable security measures to secure its password file. Limitations as it is hard to provide
security even against this limited type of attack. During normal operation this work can expect a certain fraction of login
attempts to pass but fail in the password entry.

3. EXISTING WORK
They need for security to prevent confidential data from unauthorized access and modification. Security threats can
compromise the data stored by an organization to hackers with malicious intentions trying to gain access to sensitive
information. The solution for these malicious intentions to use a new Image Based CAPTCHA is used for face detection as
the test. This approach leverages the fact that humans are adept at recognizing faces but this task can be challenging for
computers when distortions are applied. In existing, genetic learning algorithms are used to optimize CAPTCHA
parameters for better human performance and drastically lower the attack success rates of computer Algorithms. In this
distortion types are selected by using genetic algorithm. Genetic algorithms(GAs) are modeled on the biological process of
evolution. GAs work by producing successive generations of candidate solutions, referred to as chromosomes, to find the
distortion settings which generate the optimized CAPTCHA. This method uses chromosomes each representing one
possible combination of distortion settings and selects optimized distortion by using crossover and mutation operator and
finally selects the optimized distortion types by calculating fitness value. The biometric authentication systems which are
used for high security systems need additional hardware and software supports and hence are much expensive and difficult
to maintain.
3.1 Limitations of the Existing work
Some of the Limitations of the existing system are given below:
Better optimization is not done.
Robust security is not achieved for various attack rates
Improved accuracy is not obtained

4. PROPOSED WORK
In the multilevel authentication, the proposed work is to improve the security level . Security protects you for any hackers.
CAPTCHA is used for face detection as the test and the CAPTCHA parameters are optimized by using Artificial Bee colony
algorithm (ABC). Articial Bee Colony (ABC) algorithm which is one of the most recently introduced optimization
algorithms simulates the intelligent foraging behavior of a honey bee swarm. These distortions of face images are classified
into three categories: geometric, noise-based, and degradation distortions. In ABC algorithm, the colony of artificial bees
contains three groups of bees: employed bees, onlookers and scouts. A bee waiting on the dance area for making a decision
to choose a food source is called onlooker and one going to the food source visited by it before is named employed bee. The

Volume 3 Issue 3 March 2015

Page 12

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 3, Issue 3, March 2015

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

other kind of bee is scout bee that carries out random search for discovering new sources. The position of a food source
represents a possible solution to the optimization problem and the nectar amount of a food source corresponds to the quality
(fitness) of the associated solution, process of ABC stops once the termination criteria have been satisfied. Therefore, we
have tried to increase the protection by involving a 3-level security approach,
Image based totally Authentication and random key generation
Email id and also user name must be match at level
Received the key through an automatic email to the authentic user
4.1System Architecture Design
In the Fig 1, the user can complete the registration form, in this form we have to enter the details about user name, email id,
contact no, address, and so on. If the user can enter the four user name and also four email id is must. Then to complete the
registration successfully. The user can enter the user name and then select CAPTCHA process successfully to generate the
random key to email id for that corresponding mail user name. if the user name and email id is valid or same then password
is enable. Then enable the password tab, the can enter the password and the login.

Figure 1 System Architecture Design

Volume 3 Issue 3 March 2015

Page 13

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 3, Issue 3, March 2015

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

5.IMPLEMENTATION
5.1Registration
Registration module allows registered users of a public site to register and access restricted content. You can use the module
to register users for the Forum and other custom modules that support personalization and user specific handling. For
example, collect e-mail addresses of subscribers to a newsletter and allowing them to manage subscription details after
login. Public users are stored and managed in the Security on the public instance. The system registers the account
automatically when a user registers. Whether the user can use the account immediately or not depends on the configured
registration strategy.
5.2Creation of CAPTCHA
Creation of a new CAPTCHA image begins with the generation of a 400
300 pixel background composed of many
overlapping rectangles in various colors and sizes. This size is chosen as it can be displayed at its full native resolution on
common mobile devices, avoiding potential issues related to scrolling or downscaling. The individual colored rectangles
have their colors chosen at random from a list of 56 common hues including skin tones. Height and width are based on a
fraction of the overall image size, randomly scaled,

r
S={ 10 min(height, width)|0.75 r 1.25 }

(5.1)
where, s is the resulting size in pixels for one side of the rectangle, height and width are the overall height and width of the
background, and r is a random real-valued scaling factor. Colored rectangles are scattered across the entire background
until at least 95% is covered. This provides a complex pattern to interfere with the rectangular features used by the ViolaJones detector and other similar face detection algorithms. The random sizes and colors make it difficult to isolate
embedded images, and in some cases, lead algorithms to falsely detect faces in the background.
Once the background is generated, a total of 4 to 5 face and non-face images are selected to be embedded such that,

n total n face c n nonface | n face 2,n nonface 1, n total {4,5} (5.2)


Here nface, nnonface, and ntotal represent the number of embedded face, non-face, and total images, respectively. At least two
face images are present to prevent a single guess from successfully solving the CAPTCHA. At least one image is a non-face
image to provide a false target in case attackers can detect the location of embedded images. Each embedded image is scaled
to approximately 100 100 pixels prior to placement. This size is chosen to correspond with the area covered by a
fingertip for accurate use on touch screen devices. The images are placed at randomly selected coordinates within the
background, ensuring that the images do not overlap with each other or the outside boundary of the CAPTCHA.
5.3Image selection
The distortions applied to a CAPTCHA has a significant impact on human and automated attack success rates. During
design, 10 distortion types have been identified that yield the best performance. Previous experience has shown that
applying two distortion types to each CAPTCHA represents a good balance between making images too simple for
automated attacks (one distortion type) or too hard for human users (three or more distortion types). Some distortion type
pairs known to perform poorly are discarded, with the rest continued to the next distortion optimization step. Articial Bee
Colony (ABC) algorithm which is one of the most recently introduced optimization algorithms simulates the intelligent
foraging behavior of a honey bee swarm. Clustering analysis, used in many disciplines and applications, is an important tool
and a descriptive task seeking to identify homogeneous groups of objects based on the values of their attributes.In ABC
algorithm, the actual position of a food source corresponds to a probable solution to the optimization problem and the
amount of nectar found in a food source represents the quality (tness) of the associated solution. The number of employed
bees is equal to the number of onlooker bees and the number of employed bees is equal to the number of food sources. Each
employed bee is assigned to an individual food source. This algorithm is an iterative process, starts by initializing all
employed bees with randomly generated food sources i.e., solution represented by a D-dimensional real valued vector. For
each iteration every employed bee finds a food source in the neighborhood of its current food source and evaluates its nectar
amount i.e., fitness.
In general the position of ith food source is represented as Si=(Si1,Si2.Sid).information is shared by the employed bees
after returning to the hive, onlooker bees go to the region of food source explored by employed bees at Si based on
probability Pi defined as

Volume 3 Issue 3 March 2015

Page 14

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 3, Issue 3, March 2015

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

Pi =
Where FS is total is total number of Food Sources. Fitness value fiti is calculated by using the equation
=
Where denotes the objective function considered. The onlooker finds its food source in the region of Si by using the
following equation
S(new)=S(ij)+r*(Sij)-S(kj))
5.4Distortion selection Table
In this step, the various distortion types are compared to find the types which provide the best performance when applied to
the intended CAPTCHA. Each distortion type is applied at eight different intensities evenly spread over its range.
Performance or fitness values are calculated for each of the resulting images using fitness value. The results are ranked by
their fitness, with those distortion types yielding the top 50% most-fit CAPTCHAs selected for further use. A Cartesian
product is created combining two each of the best-fit distortion types.
Table 1: Distortion Selection table

5.5Random key generation


Key generation is the process of generating keys for cryptography. A key is used to encrypt and decrypt whatever data is
being encrypted/decrypted. Modern cryptographic systems include symmetric-key algorithms (such as DES and AES)
and public-key algorithms (such as RSA). Symmetric-key algorithms use a single shared key; keeping data secret requires
keeping this key secret. Public-key algorithms use a public key and a private key. The public key is made available to
anyone (often by means of a digital certificate). A sender encrypts data with the public key; only the holder of the private
key can decrypt this data. Computer cryptography uses integers for keys. In some cases keys are randomly generated using
a Random Number Generator (RNG) or Pseudorandom Number Generator (PRNG). A PRNG is a computer algorithm that
produces data that appears random under analysis. PRNGs that use system entropy to seed data generally produce better
results, since this makes the initial conditions of the PRNG much more difficult for an attacker to guess. In other situations,
the key is created using a passphrase and a key generation algorithm, usually involving a cryptographic hash function such
as SHA-1(Secure Hash Function).The simplest method to read encrypted data is a brute force attacksimply attempting
every number, up to the maximum length of the key. Therefore, it is important to use a sufficiently long key length; longer
keys take exponentially longer to attack, rendering a brute force attack impractical. Currently, key lengths of 128 bits (for
symmetric key algorithms) and 1024 bits (for public-key algorithms) are common. Key generation is the process of
generating keys for cryptography. A key is used to encrypt and decrypt whatever data is being encrypted/decrypted. Modern
cryptographic systems include symmetric-key algorithms (such as DES and AES) and public-key algorithms (such as RSA).
Symmetric-key algorithms use a single shared key; keeping data secret requires keeping this key secret. Public-key
algorithms use a public key and a private key.

Volume 3 Issue 3 March 2015

Page 15

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 3, Issue 3, March 2015

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

5.6 Email alias Email Verification


An Email address identifies an email box to which email messages are delivered. The universal standard for the format and
meaning of an email address today is the model developed for Internet electronic mail systems , but some earlier systems,
and many proprietary commercial email systems used different address formats.
OK - Valid Address - The mail address is valid.
OK - Catch-All Active -The mail server for this domain accepts the address, but it also implements a catch-all policy.
For this reason, it is not possible to determine if a mail account with this name actually exists, without sending a
message and waiting for a reply.
OK - Catch-All Test Delayed-The mail server for this domain accepts the address, the Catch-All test returned a
temporary error (API only).

Figure 1 Authentication verification


This will then show you whether or not your domain has been verified. If your domain has not been verified you will be
prompted to resend the verification email. This email will contain a verification link. Clicking this link will verify the
domain name.
5.7 Login
Service is based on so called one-time (single-session) password concept, which is valid only for one user session. We call it
authorization. The system issues one authorization to the user every time when he wants to login to the site, sends it
and other parameters the page that requested authorization. The page which has received the information about the user,
checks the user and carries out necessary actions. In general computer usage, logon is the procedure used to get access to an
operating system or application, usually in a remote computer. Almost always a logon requires that the user have (1) a user
ID and (2) a password. Often, the user ID must conform to a limited length such as eight characters and the password must
contain at least four digit and not match a natural language word. The user ID can be freely known and is visible when
entered at a keyboard or other input device. The password must be kept secret (and is not displayed as it is entered). Some
Web sites require users to register in order to use the site; registered users can then enter the site by logging on.

6.CONCLUSION AND FUTURE WORK


The system uses Image based passwords and integrates image registration and authentication. This method is thought to
solve the traditional problems related to the authentication process in the internet environment by exploiting the human
brains ability in image recognition. The advantage of this method is that it is user friendly, secure and cost effective. It can
also be used both in heterogeneous network and with different devices. Currently, multilevel authentication is inevitable in
mobile phones, systems and online applications. Yet the existing system has limitations like better optimization is not done,
robust security is not achieved for various attack rates and also Improved accuracy is not obtained. Hence, the need for
introducing an enhanced multilevel authentication system that overcomes the limitation of the existing systems. The
proposed system is an Image based 3-level authentication system. In the first level, Registration process and second level,
image based authentication and generate the random key to our alias email id and third level, email alias email verification

Volume 3 Issue 3 March 2015

Page 16

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 3, Issue 3, March 2015

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

and then login. The experiment carried out Image based authentication verification is very well and efficiency.Then the
authenticate user only can easily access the login process. Because in this project we have using multilevel authentication
have been using. The unauthorized person does not used for this login and registration have multilevel security can be
provide. The authentication may use only knowledge about how to use the system, mobile phones, online applications, etc.
Thus the experimental result was done successfully.
This technique of the Image Based Authentication is to provide the user always in secure. User want to the security in all
the products like mobile phones, laptop, online systems, etc. The users are directed to Pass Image selection only if they
choose correct type. Hence it cannot be guessed and strengthens the security. In this multilevel authentication should
provide the security rate is increased. A newly emerging trend, claimed to achieve improved accuracies, is threedimensional face recognition. This technique uses 3D sensors to capture information about the shape of a face. This
information is then used to identify distinctive features on the surface of a face, such as the contour of the eye sockets, nose,
and chin.

REFERENCES
[1] Alma Whitten and Tygar J D. Why Johnny cant encrypt: A usability evaluation of pgp 5.0. In Proceedings of the 8th
USENIX Security Symposium, August 1999.
[2] Chew M and Baird M S, ``Baf_eText: A human interactive proof,'' in Proc. Document Recognit.Retr. X, Santa Clara,
CA, USA, Jan. 2003pp. 305_316.
[3] Elson J, Douceur J, Howell J, and Saul J, ``Asirra: A CAPTCHA that exploits interest-aligned manual image
categorization,'' in Proc. 14th ACM Conf. Comput. Commun.Security, Oct. 2007, pp. 366_374.
[4] Haitham Al-Sinani, Chi Nguyen, BranislavVuksanovic, 2009.H-IBAS-H- Authentication System for University
Student Portalusing Images.International Conference on Communication, Computer and Power.
[5] Karl Sims. Artificial evolution for computergraphics. In Thomas W. Sederberg, editor,Proceedings of the ACM
SIGGRAPHConference on Computer Graphics (SIGGRAPH91), pages 319328, Las Vegas,Nevada, USA, July 1991.
ACM Press.
[6] Kim J D, Chung K W, and Hong K S, ``Person authentication using face, teeth and voice modalities for mobile device
security,'' IEEE Trans. Consum. Electron., vol. 56, no. 4, pp. 2678_2685, Nov. 2010.
[7] Lee Jackson, 2006. Analysis of Image-Based Authentication and its Role in Security Systems of the Future.
[8] Matthews P and Zou C C, ``Scene tagging: Image-based CAPTCHA using image composition and object
relationships,'' in Proc. 5th ACM Symp. Inf., Comput.andCommun. Security, 2010, pp. 345_350.
[9] Microsoft, Albuquerque, NM, USA. (2006). Microsoft Human InteractionProof (HIP): Technical and Market Overview
[Online].
Available:http://download.microsoft.com/download/3/2/0/320e814a-d969-4c6ca26
2f3115032d4c/Human_Interaction_Proof_Technical_Overview.doc
[10] Ongtang M, McLaughlin S, Enck W, and McDaniel P, ``Semantically rich application-centric security in android,'' in
Proc. ACSAC, Honolulu, Hawaii, Dec. 2009, pp. 340_349.
[11] Pinkas B and Sander T, ``Securing passwords against dictionary attacks,'' in Proc. 9th ACM Conf. Comput.
Commun.Security, 2002, pp. 161_170.
[12] Richard E. Newman, Piyush Harsh, and PrashantJayaraman,Security Analysis of and Proposal for Image
BasedAuthentication, 2005.
[13] RachnaDhamija and Adrian Perrig, A user study Using Imagesfor Authentication, Proceedings of the 9th Usenix
SecuritySymposium, August 2000.
[14] Richard E. Newman, Piyush Harsh and PrashantJayaraman.Security Analysis Of and Proposal for Image-Based
Authentication.CISEDept, university Of Florida.Thenmozhi et.al / International Journal of Engineering and
Technology (IJET) ISSN.
[15] Rusu A and Govindaraju V, ``Handwritten CAPTCHA: Using the difference in the abilities of humans and machines
in reading handwritten words,'' in Proc. 9th Int. Workshop Frontiers Handwriting Recognit.,Tokyo, Japan, Oct. 2004,
pp. 226_231.
[16] Steiner J, Neuman C, and Schiller J. Kerberos: An authentication service for open network systems. In USENIX
Conference Proceedings, pages 191200, 1988.
[17] SrinathAkula, VeerabhadramDevisetty. Image Based Registration And Authentication System, Department of
Computer Science.
[18] Rusu A and Govindaraju V, ``Handwritten CAPTCHA: Using the difference in the abilities of humans and
machines in reading handwritten words,'' in Proc. 9th Int. Workshop Frontiers Handwriting Recognit., Tokyo, Japan,
Oct. 2004, pp. 226_231.
[19] William StallingDatta R, Li J, and Wang J Z, ``Exploiting the human-machine gap in image recognition for
designing CAPTCHAs,'' IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 504_518, Sep. 2009.

Volume 3 Issue 3 March 2015

Page 17

IPASJ International Journal of Computer Science (IIJCS)


Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm
Email: editoriijcs@ipasj.org
ISSN 2321-5992

A Publisher for Research Motivation ........

Volume 3, Issue 3, March 2015

[20] Yan J and Salah El Ahmad A, ``A low-cost attack on a microsoftcaptcha,''in Proc. 15th ACM Conf. Comput.
andCommun. Security, Oct. 2008,pp. 543_554.

Equations
Once the background is generated, a total of 4 to 5 face and non-face images are selected to be embedded such that,

n total n face c n nonface | n face 2,n nonface 1, n total {4,5} (5.2)


Here nface, nnonface, and ntotal represent the number of embedded face, non-face, and total images, respectively. Height and
width are based on a fraction of the overall image size, randomly scaled,

r
S={ 10 min(height, width)|0.75 r 1.25 }

(1)

where, s is the resulting size in pixels for one side of the rectangle, height and width are the overall height and width of the
background, and r is a random real-valued scaling factor. Colored rectangles are scattered across the entire background
until at least 95% is covered. This provides a complex pattern to interfere with the rectangular features used by the ViolaJones detector and other similar face detection algorithms.
E

P K
o 2
( pk )
p 1 k 1

(2)

AUTHOR
Yugha R received Bachelor of Technology degree in Information Technology Sona College of Technology,
Salem, Tamilnadu, India affiliated to Anna University. Now she is pursuing Masters of Engineering in
Computer Science & Engineering from Hindusthan Institute of Technology, Coimbatore, Tamilnadu, India
affiliated to Anna University.
Dr S.Uma is Professor and Head of PG Department of Computer Science and Engineering at Hindusthan Institute of
Technology, Coimbatore, Tamilnadu, India. She received her B.E., degree in Computer Science and Engineering in First
Class with Distinction from PSG College of technology in 1991 and the M.S., degree from Anna University, Chennai,
Tamilnadu, India. She received her Ph.D., in Computer Science and Engineering Anna University, Chennai, Tamilnadu,
India with High Commendation. She has nearly 24 years of academic experience. She has organized many National Level
events like seminars, workshops and conferences. She has published many research papers in National and International
Conferences and Journals. She is a potential reviewer of International Journals and life member of ISTE professional body.
Her research interests are pattern recognition and analysis of non linear time series data.
Swarnalatha S received Bachelor of Technology degree in Information Technology Sona College of
Technology, Salem, Tamilnadu, India affiliated to Anna University. Now she is pursuing Masters of
Engineering in Computer Science & Engineering from Hindusthan Institute of Technology, Coimbatore,
Tamilnadu, India affiliated to Anna University
Poovizhi M received Bachelor of Technology degree in Computer science and Engineering, Vivekananda
Institute of Engineering and Technology for Women, Thiruchencode, Tamilnadu, India affiliated to Anna
University. Now she is pursuing Masters of Engineering in Computer Science & Engineering from
Hindusthan Institute of Technology, Coimbatore, Tamilnadu, India affiliated to Anna University.

Volume 3 Issue 3 March 2015

Page 18

Anda mungkin juga menyukai