Sanjeev Sofat's research while affiliated with Punjab Engineering College and other places

Publications (97)

Chapter
Patellofemoral instability is a knee disorder in which the patella, slips out of its usual placement leading to knee pain. The patella may displace from its position due to abnormality in the shape of patellar surface on femur bone. The orthopaedic experts manually measure certain parameters from the available axial knee scans for the patellar inst...
Article
Full-text available
Latent fingerprints play a pivotal role in the forensics for the investigation of the crimes. Mostly, latent fingerprints found at the crime scene are partial prints. Thus, fingerprint features required for identifying the latent fingerprint is not always available. Approaches for reconstructing the partial latent fingerprints to fill the missing a...
Article
IoT devices which include wireless sensors, software, actuators, and computer devices operated through the Internet, enable the transfer of data among objects or people automatically without human intervention. Since these devices are resource constraint embedded devices, security policies are not implemented adequately upon these devices. The conn...
Article
Full-text available
In this era of Internet, the exchange of data between the users and service providers has grown tremendously. Organizations in health, banking, social network, criminal and government sectors have been collecting and processing the individuals’ information for their gainful purpose. However, collecting and sharing of the individuals’ information wh...
Article
Full-text available
Patellar dislocation is a disorder in the human knee where patella slips out of its expected position. The orthopedic experts need to manually measure the parameters indicating patellar instability from knee scans, which is a laborious and time-consuming task. An automated method for measuring these parameters can resolve the issue of inter-observe...
Article
Full-text available
Knee disorders are common among the human population. Knee osteoarthritis (OA) is the most widespread knee joint disorder, which may require surgical treatment. The detection and diagnosis of knee joint disorders from medical images demand enormous human effort and time. The development of a computer‐aided diagnosis (CAD) system can notably minimis...
Article
Full-text available
Pulmonary tuberculosis (PTB) is a contagious disease that affects the lung region. PTB is a life-threatening disease if it is detected late or left untreated. To perform the initial screening of PTB, the World Health Organization has recommended chest radiograph. Till now, the screening process requires either the patients to come to secondary heal...
Article
Latent fingerprints are considered as one of the important evidences obtained from the site of crime. The process of developing, acquiring, processing and matching of latent fingerprints is different from the inked or live-scan fingerprints. Automated identification of latent fingerprints is still in its nascent phase when compared with the Automat...
Article
Full-text available
Latent fingerprint is considered as the key evidence during crime scene investigations. Various powder and chemical methods are available for visualizing the latent fingerprints as these finger impressions are not directly visible through the naked eye. However, these methods may damage the finger impressions in case if they are not properly lifted...
Article
Full-text available
Tuberculosis (TB) is an infectious disease that mainly affects the lung region. Its initial screening is mostly performed using chest radiograph, which is also recommended by the World Health Organization. To help the radiologists in diagnosing this disease, different computer-aided diagnosis (CAD) systems have been developed. However, the developm...
Article
With the use of identity resolution, both information leakage and identity hacking can be reduced to some extent. In this paper, a prototype has been developed to classify Twitter users as suspicious and nonsuspicious on the basis of features which identify user demographics and their tweeting activity using Twitter APIs. A model has been devised b...
Article
Full-text available
Automated segmentation of medical images that aims at extracting anatomical boundaries is a fundamental step in any computer-aided diagnosis (CAD) system. Chest radiographic CAD systems, which are used to detect pulmonary diseases, first segment the lung field to precisely define the region-of-interest from which radiographic patterns are sought. I...
Chapter
In the ever-increasing usage of Internet, a new paradigm of pervasive and ubiquitous cloud computing has evolved for providing computing delivery services. This has infused an increased interest amongst researchers and industry/user due to its ease in scalability and provisioning of computing resources on demand. It has caused concerns amongst its...
Chapter
In the developing countries, traffic and congestion on the roads are likely to be seen. Mostly the congested road deteriorates itself rapidly without proper maintenance. Moreover, the capacity of vehicles are also exceeded by the load capacity of road, leading to potholes and bumps and roughness. On the contrary, this also leads to bad driving beha...
Article
Precisely segmented lung fields restrict the region-of-interest from which radiological patterns are searched, and is thus an indispensable prerequisite step in any chest radiographic CADx system. Recently, a number of deep learning-based approaches have been proposed to implement this step. However, deep learning has its own limitations and cannot...
Article
Full-text available
Automatic analysis of chest radiographs using computer-aided diagnosis (CAD) systems is pivotal to perform mass screening and detect early signs of various abnormalities in patients. In a chest radiographic CAD system, segmentation of lung fields is a pre-requisite step to precisely define region-of-interest and is subsequently used by other stages...
Article
Full-text available
Segmentation of lung fields is an important pre-requisite step in chest radiographic computer-aided diagnosis systems as it precisely defines the region-of-interest on which different operations are applied. However, it is immensely challenging due to extreme variations in shape and size of lungs. Manual segmentation is also prone to large inter-ob...
Article
Background: Due to easily available Virus Creation Kits that help in the generation of variants from an original malware in no time on the Internet has led to an exponential growth of the advanced malware. In recent years, the detection of advanced malicious programs like Metamorphic and Polymorphic variants has become a major issue for the Anti-Vi...
Article
In the arena of internet of things, everyone has the ability to share every aspect of their lives with other people. Social media is the most popular and effective medium to provide communication. Social media has gripped our lives in a dramatic way. Privacy of users data lying with the service providers needs to be preserved when published for the...
Article
Social networks once being an innoxious platform for sharing pictures and thoughts among a small online community of friends has now transformed into a powerful tool of information, activism, mobilization, and sometimes abuse. Detecting true identity of social network users is an essential step for building social media an efficient channel of comm...
Article
Biometric technology is rapidly being adopted in wide variety of security applications. However, the system itself is not completely foolproof and is vulnerable to many attacks. Some of the attacks on the biometric system are very severe, one of which is the attack on template security. In spite of the various template security techniques presented...
Article
Tuberculosis (TB) has become a global pandemic, and its eradication requires efficient screening methods, diagnostic tests, and effective drugs. Artificial intelligence-based computer-aided diagnostic (CADx) systems are purported to play a significant role in the mass screening of TB. The research on the development of CADx systems started four dec...
Article
Ubiquitous computing devices with network capabilities have become the critical cyber infrastructure for academia, industry and government in day-to-day life. The cyber-attacks being launched on this critical infrastructure have shifted to the pursuit of financial profit and political gains which lead to cyber warfare on various scales. The evoluti...
Chapter
Full-text available
Lung Field Segmentation (LFS) is an indispensable step for detecting austere lung diseases in various computer-aided diagnosis. This paper presents a deep learning-based Convolutional Neural Network (CNN) for segmenting lung fields in chest radiographs. The proposed CNN network consists of three sets of convolutional-layer and rectified linear unit...
Article
Lung field defines a region-of-interest in which specific radiologic signs such as septal lines, pulmonary opacities, cavities, consolidations, and lung nodules are searched by a chest radiographic computer-aided diagnostic system. Thus, its precise segmentation is extremely important. To precisely segment it, numerous methods have been developed d...
Article
Safety issues while driving in smart cities are considered to be top-notch priority in contrast to traveling. Today’s fast paced society, often leads to accidents. In order to reduce the road accidents, one key area of research is monitoring the driving behavior of drivers. Understanding the driver behavior is an essential component in Intelligent...
Article
Road surface monitoring is an important problem in providing smooth road infrastructure to the commuters. The key to road condition monitoring is to detect road potholes and bumps, which affect the driving comfort and transport safety. This paper presents a smartphone based sensing and crowdsourcing technique to detect the road surface conditions....
Article
Authentication using biometrics has an edge over traditional authentication mechanisms. Fuzzy vault is an eminent biometric cryptosystem technique that aims to protect a secret using a biometric template. Authorized users can, however, access the secret by providing the valid biometric. In a fuzzy vault, noise is incorporated in the form of chaff p...
Article
Academicians and industrialists working on malware use static and dynamic analysis in order to understand their functionality and the menace level posed by them. Industries providing anti-malware solutions calculate malware threat level using the approaches that involve human intervention and demand the skilled analysts along with a large number of...
Conference Paper
Anonymization of published social network data has become an important research topic nowadays. The major concern is to publish data of individuals in such a manner that the released table not only provides the essential information to be used by researchers but also prevents the disclosure of sensitive information. Various techniques like K-anonym...
Conference Paper
In the present digital network, where people share critical information through online social networks on a daily basis, it becomes essential to identify security loopholes and vulnerabilities in social networks. Social spam has become inevitable with increasing number of users exploiting it for communication. Spam profiles have become dodgy for th...
Article
Online Social Networks act as a popular forum to promote and manage the reputation of aristocrats. Generally, big organizations, politicians, celebrities, and journalists require a huge number of followers/fans to promote and manage their reputation on Online Social Networks such as Twitter. This demand of more followers has originated Twitter Foll...
Article
Social networks like Facebook, Twitter, Pinterest etc. provide data of its users to the demanding organizations to better comprehend the quality of their potential clients. Publishing confidential data of social network users in its raw form raises several privacy and security concerns. Recently, some anonymization techniques have been developed to...
Article
Full-text available
Social spam is a huge and complicated problem plaguing social networking sites in several ways. This includes posts, reviews or blogs containing product promotions and contests, adult content and general spam. It has been found that social media websites such as Twitter is also acting as a distributor of pornographic content, although it is conside...
Article
Wireless sensor networks have grown from homogeneous network architecture to heterogeneous networks for the improvement of network efficiency and lifetime. This paper exhibits a mobile cluster-head data collection (MCHDC) model for heterogeneous wireless networks. The MCHDC model illustrates the mobility pattern of mobile cluster-head nodes in a co...
Article
Biometric system is a security model which could not be easily cracked or penetrated as compared to the traditional methods like password, ID card to get information. Trait information storage of a particular person in the database makes it vulnerable to template database attack. Fuzzy vault is a popular biometric cryptosystem technique that provid...
Article
To deal with real life scenarios for wireless sensor networks with uneven contours, connectivity issues, and dropping packets, heterogeneous sensors became the vital factor to enhance its capability in terms of energy efficiency and end-to-end packet delay. In recent times, end-to-end packet delay has a significant role in wireless sensor networks...
Article
Vehicular Ad hoc Network (VANET) is very promising technique to increase traffic safety. This will help in saving life of many people from road accidents. VANET uses vehicle to vehicle communication to inform about the location of other vehicles and the traffic density. There are many routing protocols described in VANET. Position-based protocols a...
Chapter
With the increasing usage of Internet and computing devices with network competence, the Internet crimes and cyber attacks are increasing exponentially. Most of the existing detection and protection systems rely on signature based methods and are unable to detect sophisticated and targeted attacks like advanced persistent threats (APTs). In order t...
Article
Vehicular ad hoc network (VANET) attracts rising attentions of researchers for safety related and other communication applications. These networks have many challenging characteristics such as high mobility, fast changing topology and limitation of bandwidth. We proposed LLBN (link lifetime based border node protocol) by taking advantage of BMFR fo...
Article
With the increase in online publishing of social network data the requirement to protect confidential information related to users has become the main concern of publishers. To cater to this need many anonymization techniques like K-anonymity, L-diversity and T-closeness has been proposed by various researchers for micro-data as well as social netw...
Article
The web has become a vital global platform that binds together almost all daily activities like communication, sharing, and collaboration. Impersonators, phishers, scammers and spammers crop up all the time in Online Social Networks (OSNs), and are even harder to identify. People in the public eyes like politicians, celebrities, sports persons, med...
Article
Malware is one of the most terrible and major security threats facing the Internet today. Anti-malware vendors are challenged to identify, classify and counter new malwares due to the obfuscation techniques being used by malware authors. In this paper, we present a simple, fast and scalable method of differentiating malwares from cleanwares on the...
Article
Malware is one of the most terrible and major security threats facing the Internet today. It is evolving, becoming more sophisticated and using new ways to target computers and mobile devices. The traditional defences like antivirus softwares typically rely on signature based methods and are unable to detect previously unseen malwares. Machine lear...
Article
Wireless Sensor Network has encouraged researchers to broaden up the field by critically evaluating and realizing its capabilities in various application areas. With every innovation there comes along lot of challenges. Conceiving an idea of implementing wireless sensor network has shown many challenges, i.e., node deployment, data clustering, data...
Conference Paper
Full-text available
Monitoring the road condition has gain significant importance in last few years. There are various reasons for extending research in this field: first, it will ensure safety and comfort to various road users; second, smooth roads will lead to less vehicle damage and government investment; third, the availability of low cost sensors in Smartphones;...
Article
Full-text available
One of the major and serious threats on the Internet today is malicious software, often referred to as a malware. The malwares being designed by attackers are polymorphic and metamorphic which have the ability to change their code as they propagate. Moreover, the diversity and volume of their variants severely undermine the effectiveness of traditi...
Article
Full-text available
India is the second largest country in the category of population. With the increasing population the consumption of the vehicles also increases, leading to critical burden on traffic management in the metropolitan cities and towns of the country. In 2011-12 alone, 20.4 million motorized vehicles were sold in India leading to congestion and acciden...
Article
Abstract—This paper presents a novel obstacle detection algorithm that makes use of color information and color coherence vectors for robust obstacle detection. The algorithm makes use of color cue to classify a pixel in an image as an obstacle or a path. Color is one of the prominent image features. Color information is readily available as input...
Article
Full-text available
As existing technology used by criminal rapidly changes and growing, digital forensics is also growing and important fields of research for current intelligence, law enforcement and military organizations today. As huge information is stored in digital form, the need and ability to analyze and process this information for relevant evidence has grow...
Article
Full-text available
Medical warehouses are architectural construct of an information system that provides users with current and historical decision support information. But medical warehouse projects suffers from overestimation of resources because of improper estimation approaches which do not suit well on poorly defined architecture of medical warehouses. In this p...
Conference Paper
Edge detection is an indispensible initial step in many contour-based computer vision applications like edge-based obstacle detection, edge-based target recognition, etc. The performance of these applications is highly dependent on the quality of edges detected in the initial step. Most of the edge detectors used in these applications only detect b...
Conference Paper
An efficient method for color edge detection using a uniform color space and Euclidean distance between the color vectors is proposed. Two color vectors are perceptually distinguishable if Euclidean distance between them is greater than Just Noticeable Color Distance (JNCD) threshold. In the presence of noise, the threshold tends to be greater than...
Article
Wireless mesh network is the key technology for present generation in wireless networking for providing fast and hassle free services to users. The conformity of Wireless Mesh Networks to offer Internet connectivity is becoming a popular choice for Wireless Internet Service Providers, as it allows a flexible, easy and inexpensive network deployment...
Chapter
We present an evaluative review of various edge detection techniques for color images that have been proposed in the last two decades. The statistics shows that color images contain 10% additional edge information as compared to their gray scale counterparts. This additional information is crucial for certain computer vision tasks. Although, severa...
Article
The traditional wireless networks cannot handle new requirements posed on the system. To become independent of backbone networks leading to cheap deployments, the traditional single-hop approach needs to be replaced by its multihop counterpart called Wireless Mesh Networks (WMNs). They can be considered as hybrid between wireless infrastructure (WL...
Article
Wireless M esh Networks have emerged as a widely deployed, new paradigm with improved performance and reliability. M esh Networks offer ubiquitous network connectivity along with better flexibility and adaptability features. Despite of these benefits, Wireless M esh Networks are vulnerable to attacks due to the absence of trusted central authority...
Article
Full-text available
In this paper we are presenting the comparison of the secure OLSR (Optimized Link State Routing Protocol) in mobile ad-hoc network with other approach. We compare the security from the different approach and their effect on the existing OLSR. Main concern of the paper is the security but also the complexity and the storage is also compare in the di...
Article
Earlier research efforts mainly focused on securing adhoc routing mechanisms. However, recently there has also been growing research interest in studying the security of the medium access control (MAC) and its impact on network performance. The impact will be even more severe in case of multi hop wireless networks. IEEE 802.11s being a multihop tec...
Article
To deter internal attacks, Intrusion Detection Systems are the most favorable solutions for detecting intrusions and raising alerts for desired action since using encryption software for secure communication is not enough. A number of intrusion detection systems have been proposed for ad-hoc networks. Such intrusion detection systems cannot perform...
Article
In recent years, mesh networking has emerged as a key technology for the last mile Internet access and found to be an important area of research and deployment. The current draft standard of IEEE 802.11s has defined routing for Wireless Mesh Networks (WMNs) in layer-2 and is termed as Hybrid Wireless Mesh Protocol (HWMP). However, security in routi...
Article
Wireless Mesh Networking is an emerging technology and there are number of issues in deploying WMNs, amongst others, security is a very serious issue. In such deployments, availability poses a serious challenge. Without proper security mechanisms, networks will be confined to limited, controlled environments, negating much of the promise they hold....
Article
Wireless Mesh Networks (WMNs) can be considered as hybrid between wireless infrastructure (WLAN) and ad-hoc networks (MANET), with mesh points providing flexibility in building & expanding the network, allowing automatic discovery of neighboring nodes, increased reliability and redundancy. In this paper we discuss as to how WMNs can be practically...
Article
Wireless mesh networks (WMNs) have emerged as a key technology for next-generation wireless networking due to independency of backbone networks. However, to make a WMN be all it can be, considerable research efforts are still needed to secure the wireless network. The existing security schemes may be effective for certain types of Attacks, but they...
Article
After the great revolution in the field of Information Technology, many applications made necessity to run computer systems (either servers or client machines) all the time. Along with improvements and new inventions in technology, the threat of attacks through computer networks becomes a large issue. Host Based Intrusion Detection is a part of sec...
Article
In recent years, mesh networking has emerged as a key technology for the last mile Internet access and found to be an important area of research. The current draft standard of IEEE 802.11s has defined routing for Wireless Mesh Networks (WMNs) in layer-2 and is termed as Hybrid Wireless Mesh Protocol (HWMP). However, security in routing or forwardin...
Article
Full-text available
The multimedia databases and the need to intuitively handle their content, which meets the user's requirements with the available content based video indexing and retrieval technology, are the main focus of the research in the field of multimedia and computer vision. The researchers mainly focus on the problem of bridging the "semantic gap" between...
Article
Full-text available
This study aims at creation of a well defined estimation model which can be used to estimate the effort required for designing and developing the web hypermedia content management systems. The data from the different content management system projects are studied and the linear regression approach is used to finalize the model. This model also prov...
Conference Paper
Full-text available
Numerous algorithms have been proposed in the last decade, for detecting low level features and camera motion in video sequences. Along with different camera movements such as pan, tilt, and zoom, there may be some jitter movements due to hand shaking. Differentiating these jitter movements from actual camera motions is a very challenging task and...
Article
Full-text available
This paper presents a two stage approach to segment the ultrasound abdominal images. During first stage, images are segmented into different regions which are stored in the database along with their statistical properties. In second stage, different segmented regions in the database are used for Region of Interest labeling of ultrasound images usin...
Conference Paper
Full-text available
This paper presents an effort estimation model for the content management systems which can be used to estimate the effort required for designing and developing. The data from the different content management system projects are studied and the model is finalized by using the bagging predictor on linear regression learning model. These projects are...
Article
Full-text available
Different research groups proposed numerous advancements in the field of video segmentation during last decade. Comparison of their work can be seen from TRECVID 2005. Most of the proposed methods are either computation intensive or too much false detection reduces their efficiency. In this work, a method based on region matching using area correla...

Citations

... In the same year, AL-Asbahi [39] proposed an algorithm that anonymizes the social network graph with the least number of edges added to the graph. Singh et al. [40] examined the mutual friends attack model and developed an algorithm that also supports k-degree attacks. Finally, in the same year, Kiabod et al. [41] developed a fast method for modifying social network graphs that ensures the k-degree anonymity model. ...
... Due to the expansion of the Internet and wireless access, the development of wearable devices, the decline in embedded computer prices, breakthroughs in storage technology, the IoT is rapidly developing. Smaller and smarter devices are being applied in a variety of IoT environments, including infrastructure monitoring [13], [19], personal healthcare [40], and autonomous cars [41], with each passing day. ...
... The major limitation of some works, despite their performance compared to traditional IDS with a performance of 0.99%, lies in the quality of old data, but most work on attacks such as Distributed Denial-Of-Service (DDOS) (Pushparaj and Deepak 2021). In addition, some Internet of Things IDSs from databases such as DARPA, KDD CUP99, DEFCON, CAIDA, LBNL, CDX, Kyoto, Twente, UMASS, ISCX2012, ADFA, UNSW-NB15 and CIC-IDS-2017, are considered obsolete today, as they do not present the real aspect of the IoT ecosystem, which is heterogeneous, although they have experimented with Feature Selection techniques and applied Machine Learning methods (Ankit and Ritika 2021;Sanjay et al. 2021). Model performance and input data definition are the two essential roles of feature engineering in the management of classification problems with low-and high-dimensional data. ...
... Plain prints cover a smaller surface than rolled prints. Latent prints are impressions that are lifted on surfaces of objects that are accidentally handled or touched by a suspect in a crime scene [50]. Latent prints are usually incomplete, of poor quality, and affected or altered by significant forms of distortion [24]. ...
... Remark in [21] that the method proposed does not compensate for the dispersion of the source data. [22], on the other hand, it does not provide an explicit process for reconstructing the actual data values. [23][24][25] have looked at the concept in the framework of mining techniques and made it appropriate for minimizing privacy violations. ...
... The CC uses network devices for monitoring and controlling the physical entity which helps to make the decisions. It is made to embed resource computing and communication among all the physical devices [1]. Cloud computing requires a wide range of services that includes platform as a service (PaaS), desktop as a service (DaaS), software as a service (SaaS), and infrastructure as a service (IaaS) [2]. ...
... PFI index measurements are prone to high intra-and interobserver variability originated by the subjective anatomical landmarks identification, and it is described by the radiologists as a tedious and time-consuming task [14,15]. Some traditional mathematical models have been addressed in the literature to eliminate the variability originated by manual annotations for measuring ISI [16], tibial tubercle and patellar lateralisation [17] and patellar tilt and lateralisation [18]. ...
... Magnetic resonance imaging (MRI) and computed tomography (CT) are the most commonly used visualization tools used in diagnostics [30]. Most of the modern methods are still being developed for the segmentation of the knee anatomical structures from MRI images [25]. The outer layer of bone (cortical bone) has an excellent representation on the CT scans, which are therefore more suitable for reconstruction of bones surfaces. ...
... Conventional image retrieval techniques are used in various fields, including facial recognition [1,2], iris recognition [3], person identification [4], searching for clothing or other products [5], searching for food and groceries [6], and fingerprint recognition [7,8]. ...
... The wireless E-voting process offers many essential advantages, including reducing the hardware connections implemented by wires, which are sometimes difficult to install due to the long distance or the structure of the buildings [6]. Different techniques can be accomplished to identify people using biometrics or security keys, such as fingerprint [7], face recognition [8,9], iris recognition [10], and Radio Frequency Identification (RFID) [11,12]. ...