International Symposium on Digital Forensics and Security - Symposium Program and Abstracts - ISDFS

Page created by Yolanda Nunez
 
CONTINUE READING
International Symposium on Digital Forensics and Security - Symposium Program and Abstracts - ISDFS
International Symposium on
  Digital Forensics and Security

Symposium Program and Abstracts
                    Edited by
               Prof. Dr. Asaf VAROL
         Assoc. Prof. Dr. Murat KARABATAK
           Assoc. Prof. Dr. Cihan VAROL
                  Sevginur TEKE
International Symposium on Digital Forensics and Security - Symposium Program and Abstracts - ISDFS
7TH INTERNATIONAL SYMPOSIUM ON
 DIGITAL FORENSICS AND SECURITY

           10-12 JUNE 2019
         Barcelos - PORTUGAL

Symposium Program and Abstracts

                 Edited by
            Prof. Dr. Asaf VAROL
      Assoc. Prof. Dr. Murat KARABATAK
        Assoc. Prof. Dr. Cihan VAROL
               Sevginur TEKE

         Barcelos - PORTUGAL
                   2019
International Symposium on Digital Forensics and Security - Symposium Program and Abstracts - ISDFS
WELCOME NOTE FROM GENERAL CHAIR

On behalf of Organizing Committee and Consortium Members of ISDFS, we welcome you to the
7th International Symposium on Digital Forensics and Security (ISDFS 2019) in Barcelos, Portugal. It is an
exciting time for ISDFS as we continue to grow and adapt, remaining always adaptable, motivated and
responsive to the technological advances and challenges in the field of Digital Forensics, Cyber Security,
Cryptopgraphy, Data Privacy and Computer Science. The world of Cyber Security, as the umbrella
terminology, is an exciting area in which to work and study and we’ll continue to meet and bring inspired
people together in forums like this, to ensure our ISDFS remains at the cutting edge.

ISDFS originially held in May 2013, at Firat University, Turkey. While this year, we are gathering together
in Barcelos, Portugal for the 7th event, previously we also had very succesful events at Huntsville-The
Woodlands, Texas, USA; Ankara, Turkey; Little Rock, Arkansas, USA; Tirgu Mures, Romania; and Antalya,
Turkey. We already arranged the next year’s event and it will be held in Beirut Lebanon on June 1st and
2nd, 2020.

ISDFS is organized by a consortium consists of Firat University (TR), Sam Houston State University (USA),
Gazi University (TR), University of Arkansas at Little Rock (USA), University of Medicine, Pharmacy,
Sciences and Technology of Tirgu Mures (RO), Polytechnic Institute of Cavado and Ave (PT),
Lebanon Arab Open University (LB), San Diego State University (USA), Hacettepe University (TR), Balıkesir
University (TR), Youngstown State University (US), Başkent University (TR), HAVELSAN (TR), Singidunum
University (RS) and Association of Software and Cyber Security of Turkey.

The symposium’s technical program is organized into four tracks; Digital Forensics, Information Security,
Data Privacy and Cryptography, and Computer Science in general. Three Keynote Speakers are invited to
the conference. Dr. Peter Cooper will discuss about “Distributed Ledgers as a Support System for Digital
Evidence Management”, Dr. Nuno Ricardo Mateus Coelho will give a talk about “Information Security
Challenges – A Paranoid Operative System Perspective” and finally Dr. Şeref Sağıroğlu will talk about
“Cyber Security and Big Data Issues in Turkey”.

Since 2016, the conference has been sponsored by the IEEE Society and scholarly works disseminated in
the symposium have been cited by Xplore Scientific Index. This year, IEEE Portugal Section sponsored the
event technically and the papers presented at the conference will be published again in IEEE Explore.

ISDFS is growing every year. This year, we received the highest number of paper submissions for the
symposium. We could not achieve this growth without the support of consortium members. I also would
like to extend my appreciatiton to Prof. Dr. Maria Manuela Cruz-Cunha, Assoc. Prof. Dr. Nuno Lopes,
Assoc. Prof. Dr. Sandro Carvalho and Assoc. Prof. Dr. Luis Ferreira as the local orgazining committee to
help us to book this venue for the event and other logistics for the conference. I also would like to thank
IEEE Portugal Section, and in particular Jose Pedro Silva, IEEE Portugal Chair, for sponsoring the conference
from IEEE side. And finally I would like to take this opportunity to thank Scientific Committee Members
for their help during the paper review process.

                                                                                         Prof. Dr. Asaf Varol

                                                                                     General Chair of ISDFS
International Symposium on Digital Forensics and Security - Symposium Program and Abstracts - ISDFS
Organizing Committee

Term Chairs of ISDFS-2019
       Prof. Dr. Maria Manuela Cruz Cunha, Polytechnic Institute of Cávado and Ave, PT

General Chair of ISDFS
        Prof. Dr. Asaf Varol, Fırat University, TR

Co-Chairs and Program Chairs
        Assoc. Prof. Dr. Murat Karabatak, Firat University, TR
        Assoc. Prof. Dr. Cihan Varol, Sam Houston State University, USA
        Assoc. Prof. Nuno Lopes, Polytechnic Institute of Cávado and Ave, PT
        Assoc. Prof. Sandro Carvalho, Polytechnic Institute of Cávado and Ave, PT
        Assoc. Prof. Luis Ferreira, Polytechnic Institute of Cávado and Ave, PT

Conference Registration and Arrangements Committee
       Ass. Prof. Dr. Tamer Kavuran, Graphic Design, Firat University, TR
       Res. Assist. Gamzepelin Aksoy, Web Design and Programming, Firat University, TR
       Halil Öztürk, Web Design and Programming, Firat University, TR
       Sevginur Teke, Web Design and Programming, Firat University, TR

Publications Committee Members
         Assoc. Prof. Dr. Murat Karabatak, Firat University, TR
         Assoc. Prof. Dr. Cihan Varol, Sam Houston State University, USA

Consortium members
        Prof. Dr. Asaf Varol, Firat University, TR
        Prof. Dr. Peter Alan Cooper, Sam Houston State University, USA
        Prof. Dr. Şeref Sağıroğlu, Gazi University, TR
        Prof. Dr. Coşkun Bayrak, Youngstown State University, USA
        Assoc. Prof. Dr. Haller Piroska, University of Medicine, Pharmacy, Sciences and Technology, RO
        Prof. Dr. Maria Manuela Cruz-Cunha, Polytechnic Institute of Cávado and Ave, PT
        Assoc. Prof. Dr. Hassan Sbeity, Arab Open University, LB
        Prof. Dr. Yusuf Öztürk, San Diego State University, USA
        Prof. Dr. Çetin Arslan, Hacettepe University, TR
        Assoc. Prof. Dr. Ayhan İstanbullu, Balıkesir University, TR
        Prof. Dr. Vahit Bıçak, Başkent University, TR
        Assoc. Prof. Dr. İzzet Gökhan Özbilgin, Havelsan Technology and Academy Director, TR
        Prof. Dr. Milan Tuba, Singidunum University, RS
        Association of Software and Cyber Security of Turkey, TR

                                                     II
International Symposium on Digital Forensics and Security - Symposium Program and Abstracts - ISDFS
Scientific Committee Members
First Name   Middle     Last Name     Organization

Abdulsamet              Hasiloglu     Ataturk University, TR
Abdullah                Cavusoglu     HAVELSAN, TR
Ahmet        Hamdi      Atalay        HAVELSAN, TR
Ahmad                   Fadlallah     USAL
Ahmet        Hasan      Koltuksuz     Yasar University, TR
Ali          Aydin      Selçuk        TOBB ETU, TR
Ali                     Yazici        Atilim University, TR
Antal                   Margit        Sapientia University, RO
Asaf                    Varol         Firat University, TR
Atila                   Bostan        Atilim University, TR
Ayhan                   Erdem         Gazi University, TR
Ayhan                   Istanbullu    Balikesir University, TR
Aytug                   Boyaci        Firat University, TR
Baris                   Aksanli       San Diego University, US
Bassem                  Haidar        Public Lebanese University, LB
Bedri                   Ozer          Firat University, TR
Bela                    Genge         Univ. of Medicine, Pharmacy, Sciences and Techn., RO
Bilal                   Alatas        Firat University, TR
Bogdan                  Robu          Grenoble Institute of Technology, FR
Bünyamin                Ciylan        Gazi University, TR
Chia-Chu                Chiang        University of Arkansas at Little Rock, US
Chris                   Bowerman      University of Sunderland, UK
Cihan                   Varol         Sam Houston State University, US
Coskun                  Bayrak        Youngstown State University, US
Derya                   Avcı          Firat University,TR
Dimitris                Geneiatakis   Aristotle University of Thessaloniki, GR
Ecir         Ugur       Kucuksille    Suleyman Demirel University, TR
Engin                   Avci          Firat University, TR
Enis                    Karaarslan    Marmara University, TR
Erhan                   Akbal         Firat University, TR
Erhan                   Akin          Firat University, TR
Erkan                   Tanyildizi    Firat University, TR
Erkay                   Savas         Sabanci University, TR
Esref                   Adali         ITU,TR
Fahad                   Salamh        Purdue University, USA
Fakis                   Alexandros    University of the Aegean, GR
Fatih                   Ozkaynak      Firat University, TR
Ferruh                  Ozbudak       METU, TR
Georgios                Kambourakis   University of the Aegean, GR
Georgios                Karopoulos    University of Athens, GR
Gheorghe                Sebestyen     Technical University of Cluj-Napoca, RO
Hamadou      Saliah     Hassane       Teluq University, CA
Hassan                  Noura         Arab Open University, LB
Hassan                  Sbeyti        Arab Open University, LB
Hayri                   Sever         Hacettepe University, TR
Husrev       Taha       Sencar        TOBB ETU, TR
Ibrahim      Halil      Bulbul        Ahmet Yesevi University, KZ
Ibrahim                 Ozcelik       Sakarya University, TR
Ibrahim                 Sogukpinar    Gebze Institute of Technology,TR
Ihsan                   Basturk       Supreme Court, TR
Ioan                    Salomie       Technical University of Cluj-Napoca, RO
Ibrahim                 Turkoglu      Firat University, TR
Ilker                   Ozcelik       Recep Tayyip Erdogan University, TR

                                      III
International Symposium on Digital Forensics and Security - Symposium Program and Abstracts - ISDFS
Joao                     Vilaça       Polytechnic Institute of Cávado and Ave, PT
Jozsef                   Vssarhelyi   University of Miskolc, HU
Kenji                    Yoshigoe     University of Arkansas at Little Rock, US
Lei                      Chen         Georgia Southern University, US
Leyla                    Keser        Istanbul Bilgi University, TR
Luis                     Ferreira     Polytechnic Institute of Cávado and Ave, PT
Majed                    Sinane       Public Lebanese University, LB
Maria Manuela   Cruz     Cunha        Polytechnic Institute of Cávado and Ave, PT
Mehmet                   Demirci      Gazi University, TR
Mehmet                   Kaya         Syracuse University, US
Mohand          Tahar    Kechadi      University College Dublin, IE
Mohamad                  Malli        Arap Open University, LB
Mohamad                  Sbeiti       Deutsche Telecom, LB
Muhammet                 Baykara      Firat University, TR
Muharrem        Tolga    Sakalli      Trakya University, TR
Muharrem        Tuncay   Gencoglu     Firat University, TR
Murat                    Karabatak    Firat University, TR
Murat                    Kayri        Batman University, TR
Mustafa                  Alkan        BTK, TR
Mustafa                  Kaya         Firat University, TR
Mustafa                  Ulaş         Firat University, TR
Narasimha K.             Shashidhar   Sam Houston State University, US
Nazife                   Baykal       METU-Cyprus, CY
Nhien-An                 Le-Khac      University College Dublin, IE
Nuno            Mateus   Coelho       Univ. of Trás os Montes e Alto Douro, PT
Nuno                     Rodrigues    Polytechnic Institute of Cávado and Ave, PT
Ozgur                    Karaduman    Firat University, TR
Peter           Alan     Cooper       Sam Houston State University, US
Raymond                  Choo         University of South Australia, AU
Razvan                   Deaconescu   Univ. Politehnica of Bucharest, RO
Resul                    Das          Firat University, TR
Sandro                   Carvalho     Polytechnic Institute of Cávado and Ave, PT
Seda            Arslan   Tuncer       Firat University, TR
Sedat                    Akleylek     Ondokuz Mayis University, TR
Seethal                  Paluri       San Diego State University, US
Selcuk                   Kavut        Balikesir University, TR
Sengul                   Dogan        Firat University, TR
Seref                    Sagiroglu    Gazi University, TR
Sundar                   Krishnan     Sam Houston State University, US
Sunil                    Kumar        San Diego State University, US
Suzanne                  McIntosh     New York University, US
Sylvain                  Guilley      Secure-IC S.A.S Rennes, FR
Szabo                    Laszlo       Sapientia University, RO
Szanto                   Zoltan       Sapientia University, RO
Tolga                    Sakalli      Trakya University, TR
Tuncay                   Dincer       Ege University, TR
Tuncay                   Gencoglu     Firat University, TR
Turker                   Tuncer       Firat University, TR
Turksel         Kaya     Benshgir     TODAIE, TR
Uraz                     Yavanoğlu    Gazi University, TR
Vahit                    Bicak        Başkent University, TR
Vajda                    Tamas        Sapientia University, RO
Yilmaz                   Vural        Hacettepe University, TR
Yusuf                    Ozturk       San Diego State University, US
Yusuf                    Tulgar       Net Data Soft, TR
Zisis                    Tsiatsikas   University of the Aegean, GR

                                      IV
KEYNOTE SPEAKERS

                        Prof. Dr. Peter A. Cooper
                   Sam Houston State University – USA

           10.06.2019 / MONDAY / 14.30 – 15.30 / AUDITORIO

“Distributed Ledgers as a Support System for Digital Evidence Management”

                       Prof. Dr. Şeref SAĞIROĞLU
                          Gazi University – TR

           11.06.2019 / TUESDAY / 11.30 – 12.30 / AUDITORIO

              "Cyber Security and Big Data Issues in Turkey”

                                    V
Dr. Nuno Ricardo Mateus Coelho
                 University of Trás os Montes e Alto Douro

            11.06.2019 / TUESDAY / 14.00 – 15.00 / AUDITORIO

“Information Security Challenges – A Paranoid Operative System Perspective”

                                    VI
SYMPOSIUM PROGRAM

               7th International Symposium on Digital Forensics and Security
                                   (ISDFS 2019 Schedule)
                                                    10.06.2019 MONDAY

 13:00-14:00                                                 REGISTRATION

                                                  OPENING CEREMONY (AUDITORIO)
 14:00-14:30                                     Prof. Dr. Maria Manuela Cruz-Cunha
                                                          Prof. Dr. Asaf Varol
                                                 KEYNOTE SPEECH (AUDITORIO)
 14:30-15:30                                       Prof. Dr. Peter Alan Cooper
                          "Distributed Ledgers as a Support System for Digital Evidence Management"

 15:30-16:00                                                 COFFEE BREAK

                                          Peer-reviewed Presentations / PARALLEL SESSIONS

                         AUDITORIO                               SALA - 1                           SALA - 2
 16:00-18:00
                    Information Security               Data Privacy & Cryptography              Computer Science

                  P_ID: 25-26-38-42-69*-72              P_ID: 10*-19*-23-48-61-68             P_ID: 5-20*-32-33-55-58

 19:00-21:00                                                 GALA DINNER

                                                    11.06.2019 TUESDAY

                                          Peer-reviewed Presentations / PARALLEL SESSIONS

                        AUDITORIO                               SALA - 1                            SALA - 2
 09:30-11:00
                    Information Security                    Digital Forensics                   Computer Science

                  P_ID: 35-40*-47-50-52-62*              P-ID: 9*-45-46*-59-65-73         P_ID: 4*-21-43-51*-56-64-74

 11:00-11:30                                                 COFFEE BREAK

                                                    KEYNOTE SPEECH (AUDITORIO)
 11:30-12:30                                          Prof. Dr. Şeref SAĞIROĞLU
                                             "Cyber Security and Big Data Issues in Turkey"

 12:30-14:00                                                       LUNCH

                                                KEYNOTE SPEECH (AUDITORIO)
 14:00-15:00                                   Dr. Nuno Ricardo Mateus Coelho
                         "Information Security Challenges – A Paranoid Operative System Perspective"

 15:00-15:30                                                 COFFEE BREAK

                                          Peer-reviewed Presentations / PARALLEL SESSIONS

                        AUDITORIO                    SALA - 1 (Online Presentations)                SALA - 2
 15:30-17:30
                      Digital Forensics                  Information Security*                  Computer Science

                   P-ID: 1-12-13-34*-36-37            P_ID: 14-24-31-41-53-71-75-83     P_ID: 44-49-51*-54*-76-77-78-82

 17:30-18:00                                       CLOSING CEREMONY (AUDITORIO)

                                                  12.06.2019 WEDNESDAY

                                                 SOCIAL EVENT/ Trip to Braga or Porto
 09:30-17:00
                                                     (Additional Charges will apply)

* On-line/Video Presentations

                                                             VII
TABLE OF CONTENTS

A Comparative Study of COAP And MQTT Communication Protocols
Samer Hamdani, Hassan Sbeyti ................................................................................................................................... 01
A Four-Step Method for Investigating Network Worm Propagation
Tala Tafazzoli, Babak Sadeghiyan ................................................................................................................................ 01
A New Approach for Exiting from Parking Lot based on Artificial Neural Network
Halil Öztürk, Sevginur Teke, Murat Karabatak ............................................................................................................. 02
A New Model for Creating Layer Planes Using Steganography for Text Hiding
Shalaw Mshir, Asaf Varol ............................................................................................................................................. 02
A Novel Hybrid Image Encryption Algorithm Based on Data Compression and Chaotic Key Planning Algorithms
Yücel Bürhan, Fırat Artuğer, Fatih Ozkaynak ............................................................................................................... 02
A Research on Security Vulnerabilities in Online and Mobile Banking Systems
Nilay Yıldırım, Asaf Varol .............................................................................................................................................. 03
A Review Paper on Cryptography
Abdalbasit Mohammed Qadir, Nurhayat Varol ........................................................................................................... 03
A Security-Enhanced Interoperability Middleware for the Internet of Things
Hunor Sándor, Béla Genge, Piroska Haller, Andrei Bica ............................................................................................... 03
A Statistical Modulation Type Identifier for Remote Keyless Entry Transmitters Based on Extended Energy Detector
Özgür Alaca, Ali Boyacı, Serhan Yarkan, Muhammet Ali Aydın .................................................................................... 04
A Stenography Application for Hiding Student Information into an Image
Yıldıray Yiğit, Murat Karabatak .................................................................................................................................... 04
A Survey On Backbone Attack
Ebu Yusuf Güven, Mehmet Yavuz Yağcı, Ali Boyacı, Serhan Yarkan, Muhammet Ali Aydın ......................................... 05
A Target Tracking Application On Mobese Videos
Sevinç Ay, Murat Karabatak ......................................................................................................................................... 05
A Trust Management Model for IoT
Ahmed Abdlrazaq, Serkan Varol................................................................................................................................... 06
Advantages to Disadvantages of Cloud Computing for Small-Sized Business
Peshraw Ahmed Abdalla, Asaf Varol ............................................................................................................................ 06
An Integrated Framework to Examine Mobile Users’ Pathway from Threat Cognition to Action
Noushin Ashrafi, Daniel Lee, Jean-Pierre Kuilboer, G. Christoph Schütz ...................................................................... 06
Analysis of Malware Hidden Behind Firewalls with Back Scans
Zhiqing Zhang, Hiroshi Esaki, Hideya Ochiai ................................................................................................................ 07
Analysis of Realistic Attack Scenarios in Vehicle Ad-hoc Networks
Jan Lastinec, Mario Keszeli........................................................................................................................................... 07
Android Mobile Device Forensics: A Review
Hussein Farooq Tayeb, Cihan Varol .............................................................................................................................. 08

                                                                                   VIII
Application of Similarity-Based Image Steganography Method to Computerized Tomography Images
Songül Karakuş, Engin Avcı .......................................................................................................................................... 08
Augmenting Gabor-based Face Recognition with Global Soft Biometrics
Emad Sami Jaha ........................................................................................................................................................... 09
Capacity of Adaptive Free Space Optical Transmission over Malaga Turbulence with Pointing Error using Truncated
Channel Inversion
Dejan Milić, Marko Smilić, Bojana Nikolić, Milan Tuba, Petar Spalević........................................................................ 09
Chaotic Analysis of Radon Gas (222Rn) measurements in Lesvos Island: Detrended Fluctuation Analysis (DFA)
Miraç Kamışlıoğlu, Feride Kulalı ................................................................................................................................... 10
Circle Map for Internet of Things Networks
Peter Szabo, Bela Genge .............................................................................................................................................. 10
Clustering Algorithm Optimized by Brain Storm Optimization for Digital Image Segmentation
Eva Tuba, Raka Jovanovic, Dejan Zivkovic, Marko Beko, Milan Tuba .......................................................................... 10
Comparison of Zigbee, Z-Wave, Wi-Fi, and Bluetooth Wireless Technologies Used in Home Automation
Salim Jibrin Danbatta, Asaf Varol................................................................................................................................. 11
Continuous Authentication Based on User Interaction Behavior
Long Chen, Yi Zhong, Weidong Ai, Difang Zhang ......................................................................................................... 11
Defending Against Cyber-Attacks on the Internet of Things
Ghazi Abdalla Abdalrahman, Hacer Varol.................................................................................................................... 12
Determining the Effectiveness of Data Remanence Prevention in the Aws Cloud
Bradley Lee Snyder, James H. Jones ............................................................................................................................. 12
Digital Forensics: Focusing on Image Forensics
Rayan Sulaiman Khalaf, Asaf Varol .............................................................................................................................. 13
Electronic Datas and Forgery of Documents Offenses
İhsan Baştürk, Çetin Arslan .......................................................................................................................................... 13
Enhancing Security of SDN Focusing on Control Plane and Data Plane
Barbora Čelesová, Jozef Vaľko, Rudolf Grežo, Pavol Helebrandt.................................................................................. 14
Experience of Incorporating NIST Standards in a Digital Forensics Curricula
Sankardas Roy, Yan Wu, Kristina N. LaVenia ............................................................................................................... 14
Face Verification and Recognition for Digital Forensics and Information Security
Giuseppe Amato, Fabrizio Falchi, Claudio Gennaro, Fabio Valerio Massoli, Nikolaos Passalis, Anastasios Tefas,
Alessandro Trivilini, Claudio Vairo ................................................................................................................................ 15
Feature Extraction of ECG Signal by using Deep Feature
Aykut Diker, Engin Avcı ................................................................................................................................................ 15
Human vs Bots: Detecting Human Attacks in a Honeypot Environment
Shreya Udhani, Alexander Withers, Masooda Bashir................................................................................................... 15
Image and Video Processing Applications Using Xilinx System Generator
Sertaç Yaman, Merve Yıldırım, Bircan Kamışlıoğlu, Yavuz Erol, Hasan Kürüm ............................................................. 16
Information Security Awareness of School Administrators
Songül Karabatak, Murat Karabatak ........................................................................................................................... 16

                                                                                    IX
Legal and Technical Aspects of Web Forensics
Yeşim Ülgen Sönmez, Asaf Varol .................................................................................................................................. 17
Measuring the Effects of Emojis on Turkish Context in Sentiment Analysis
Çağatay Ünal Yurtöz, İsmail Burak Parlak .................................................................................................................... 17
Multidimensional Signal Interpolation based on Parametric Space Dimension Reduction
Mikhail Gashnikov ........................................................................................................................................................ 18
New Trends in Speech Emotion Recognition
Yeşim Ülgen Sönmez, Asaf Varol .................................................................................................................................. 18
Overview of Machine Learning Methods for Android Malware Identification
João Lopes, Carlos Serrão, Luís Nunes, Ana Almeida, João Oliveira ............................................................................. 19
Parameter Space Dimension Reduction for Multidimensional Signals Differential Pulse-Code Modulation
Interpolator
Aleksey Maksimov, Mikhail Gashnikov ........................................................................................................................ 19
Performance Comparison of Classification Algorithms for The Diagnosis of Mastitis Disease in Dairy Animals
Erkan Tanyıldızı, Gökçe Yıldırım.................................................................................................................................... 19
Performance Comparison of New Fast Weighted Naïve Bayes Classifier with Other Bayes Classifiers
Gamzepelin Aksoy, Murat Karabatak........................................................................................................................... 20
Predicting Daily Activities Effectiveness Using Base-level and Meta level Classifiers
Mohammad Akour, Shadi Banitaan, Hiba Alsghaier, Khalid Al Radaideh .................................................................... 20
Predicting Stealthy Watermarks in Files Using Deep Learning
Maha F Sabir, James Jones, Hang Liu, Alex V Mbaziira ................................................................................................ 21
Problems and Prospects of Anti-Theft and Mobile Phone Tracking: A Case in Nigeria
Iliyasu Yahaya Adam, Cihan Varol, Asaf Varol ............................................................................................................. 21
Prototype of A Paranoid Mobile Operating System Distribution
Nuno Mateus Coelho, Miguel Peixoto, Maria Manuela Cruz Cunha ............................................................................ 22
Refactoring Code Clone Detection
Zhala Sarkawt Othman, Mehmet Kaya ........................................................................................................................ 22
Review of Chaotic Based S-Box Structures
Ayşe Cengiz, Derya Avcı................................................................................................................................................ 22
SCADA Testbed for Vulnerability Assessments, Penetration Testing and Incident Forensics
Sundar Krishnan, Mingkui Wei ..................................................................................................................................... 23
Securing Database Management Systems using RAM Serial Numbers
Sapan Noori Azeez, Serkan Varol ................................................................................................................................. 23
Security Enhancement in Storage Area Network
Souheil Chukry, Hassan Sbeyti...................................................................................................................................... 24
Semi-Fragile Watermarking for JPEG Image Authentication: A Comparative Study
Anna Egorova, Victor Fedoseev .................................................................................................................................... 24
SmartThings Event Export using SmartApps
Jose Garcia, Cihan Varol ............................................................................................................................................... 24

                                                                                     X
Speculative Execution Attack Methodologies(SEAM) : An overview and component modelling of Spectre, Meltdown
and Foreshadow attack methods
Andrew Johnson, Ross Davies ...................................................................................................................................... 25
Temperature Estimation with Time Series Analysis from Air Quality Data Set
Zeynep Özpolat, Murat Karabatak ............................................................................................................................... 25
Thwarting C2 Communication of DGA-Based Malware using Process-level DNS Traffic Tracking
Anjali Menon ................................................................................................................................................................ 26
User Profiling Based on Application-Level Using Network Metadata
Faisal Shaman, Bogdan Ghita, Nathan Clarke, Abdulrahman Alruban ........................................................................ 26

                                                                                      XI
ABSTRACTS
                                          Paper ID: 054
                 A Comparative Study of COAP and MQTT Communication Protocols

                                      Samer Hamdani, Hassan Sbeyti*

                                       *Arab Open University Lebanon
                                         *Email: hsbeity@aou.edu.lb

Abstract—Internet of things (IOT) technology consists of nonstop data emitter small devices, sensor nodes
and gateways. Structured and unstructured data delivered mainly through internet connection, cause
heterogeneous and enormous data transmission. The IOT ecosystem is a composition of heterogeneous smart
objects like actuators; sensors having the main purpose of insuring the interconnectivity of all its components
that functions in our daily industrial and educational life, as well as our daily security. In addition toIOT
devices allowing the monitoring of humans, they also are interacting together like mobile devices, health
monitor gadgets, heart beat integrated sensors, fitness bands, Patient Workup and surgical Medical Equipment.
This myriad of devices highlights the challenge of how to accomplish all these goals with the tiny capabilities,
since all of them are equipped with light resources with affordability limitations, in addition to little power
sources availability (devices that might need to function for years with being recharged). Scalability is main
purpose for an efficient IOT ecosystem. At devices level this efficiency could be accomplished mainly through
three essential factors: energy, resources and network usage to support the large amount of bandwidth
transmitted by the overall systems devices. Here appears the important role of communication protocol stack
that main ruin these tiny devices resources while transmitting large bandwidth data, insuring data delivery,
uncontrollable latency or scattered inefficient iterating processes. In this paper, we have designed and
implemented two client applications: first based on Message Queue Telemetry Transport (MQTT) and the
second on Constrained Application Protocol (CoAP) in order to monitor and compare the impact of these two
communications over IOT eco system functionality, alongside energy consumption, resources usage on
devices, latency and data bandwidth produces over network.

                                            Paper ID: 034
                   A Four-Step Method for Investigating Network Worm Propagation

                                     Tala Tafazzoli*, Babak Sadeghiyan

                                       *ICT Research Institute (ITRC)
                                         *Email: tafazoli@itrc.ac.ir

Abstract—Worm origin identification and propagation path reconstruction are important topics in information
security and digital forensics. This information helps forensic investigators to guess initial suspects and do
further investigations on the suspicious computers. Network and system administrators also use the
information to identify security weaknesses of their systems and networks. The goal of this paper is to identify
the origins and to reconstruct the propagation path of preferential scanning worm back-in-time. The main idea
of this paper is to use back-to-origin modeling and a step-by-step improvement, to identify the origins and to
reconstruct the propagation path after the worm outbreak using information gathered over the network. We
construct a probabilistic model to receive features over the network and estimate infection status of nodes. We
also developed an algorithm that identifies the origins and reconstructs the propagation path, back-in-time
using the learned model. In order to achieve this, we used a 4-step method. The proposed method has
acceptable accuracy.

                                                       1
Paper ID: 082
          A New Approach for Exiting from Parking Lot based on Artificial Neural Network

                                Halil Öztürk, Sevginur Teke*, Murat Karabatak

                                               *Fırat University
                                       *Email: sevginurteke@gmail.com

Abstract— As a result of developing technology, autonomous vehicle systems have become very important.
One of the biggest problems of these vehicles is entering parking lots and exiting from parking lots. As well
as parallel parking and vertical parking problems, exiting from a parking lot can also be a problem in some
cases. In this paper, it is aimed to find a solution to the problem of exiting the vehicles from the parking lot.
Due to the location and structure of the parking lots, it can be difficult to exit from a parking lot for a vehicle.
In this study, data such as speed, wheel angle and position of the vehicle were obtained from the vehicle and
it is aimed to automatically exit from the parking lot. Artificial Neural Network was used to perform this
procedure. The modelling results show that it is possible for a vehicle to exit autonomously from the parking
lot.

                                          Paper ID: 019
             A New Model for Creating Layer Planes Using Steganography for Text Hiding

                                          Shalaw Mshir*, Asaf Varol

                                               * Fırat University
                                     *Email: Shalaw.00115594@gmail.com

Abstract— Steganography is the art and science of hiding messages in a secret way such that only the sender
and receiver know. This allows one party to communicate with another without a third party knowing that the
connection is taking place. Here, the data is hidden inside a safe “cover”, where even if a third party can
capture the cover, there will be nothing to show what data is hidden inside. Meanwhile, the cover can be an
image, sound, video or document. Steganography has two primary aspects: security – whether the hidden data
is perceptible by either a person or a computer; and capacity – how much data can be hidden in a given cover
file. Because the system works within a spatial domain, it can hide a large amount of information, while
embedding and extraction processes require less time in terms of execution than methods using transform
domains. This paper explains how to use steganography through a modern technique with a practical
understanding.

                                        Paper ID: 061
A Novel Hybrid Image Encryption Algorithm Based on Data Compression and Chaotic Key Planning
                                         Algorithms

                                Yücel Bürhan, Fırat Artuğer, Fatih Özkaynak*

                                               *Fırat University
                                         *Email: ozkaynak@firat.edu.tr

Abstract—In this study, a hybrid image encryption algorithm which provides data compression and encryption
requirements is proposed. Both JPEG and fractal compression algorithms can be used in the data compression
process of the proposed new algorithm. In the encryption process, a chaotic key planning algorithm has been
used. Chaotic systems are used as an entropy source. This approach, based on the one time pad principle, is
unconditionally secure because it uses different secret keys in each encryption process. Successful analysis
results show that the proposed new method can be used in many practical applications in the field of
information security.

                                                         2
Paper ID: 072
             A Research on Security Vulnerabilities in Online and Mobile Banking Systems

                                         Nilay Yıldırım*, Asaf Varol

                                              *Fırat University
                                      *Email: nilyildirim87@gmail.com

Abstract—Mobil and online banking becomes one of the most important technologies that will not lose its
popularity with new technology features added every day for the convenience of the user. Most of the financial
companies offer mobile and online banking applications to their customers. Security, privacy and customer
privacy in online and mobile banking have become important. Security risks in mobile and online banking,
especially in mobile banking is a major problem for the banks and the users because of the innovations brought
by the technology and security gaps in every innovation. The banking system offers various security solutions
for mobile and online banking security. In this research paper, security threats and security measures in mobile
and online banking systems are examined.

                                              Paper ID: 010
                                     A Review Paper on Cryptography

                              Abdalbasit Mohammed Qadir, Nurhayat Varol*

                                              *Fırat University
                                     *Email: nurhayat_varol@gmail.com

Abstract—With the internet having reached a level that merges with our lives, growing explosively during the
last several decades, data security has become a main concern for anyone connected to the web. Data security
ensures that our data is only accessible by the intended receiver and prevents any modification or alteration of
data. In order to achieve this level of security, various algorithms and methods have been developed.
Cryptography can be defined as techniques that cipher data, depending on specific algorithms that make the
data unreadable to the human eye unless decrypted by algorithms that are predefined by the sender.

                                           Paper ID: 052
              A Security-Enhanced Interoperability Middleware for the Internet of Things

                          Hunor Sándor*, Béla Genge, Piroska Haller, Andrei Bica

                                       * Kalos Information Systems
                                     *Email: hunor.sandor@kalosis.com

Abstract—This paper documents an Internet of Things (IoT) middleware specially tailored to address the
security, and operational requirements expected from an effective IoT platform. In essence, the middleware
exposes a diverse palette of features, including authentication, authorization, auditing, confidentiality and
integrity of data. Besides these aspects, the middleware encapsulates an IoT object abstraction layer that builds
a generic object model that is independent from the device type (i.e.,hardware, software, vendor). Furthermore,
it builds on standards and specifications to accomplish a highly resilient and scalable solution. The approach
is tested on several hardware platforms. A use case scenario is presented to demonstrate its main features. The
middleware represents a key component in the context of the “GHOST - Safe-Guarding Home IoT
Environments with Personalised Real-time Risk Control” project.

                                                       3
Paper ID: 068
 A Statistical Modulation Type Identifier for Remote Keyless Entry Transmitters Based on Extended
                                           Energy Detector

                      Özgür Alaca*, Ali Boyacı, Serhan Yarkan, Muhammet Ali Aydın

                                       * Istanbul Commerce University
                                        *Email: oalaca@ticaret.edu.tr

Abstract—Remote keyless entry (RKE) systems are an integral part of modern daily life. Vehicle access, drive
authorization, and arming/disarming the alarm systems for houses, garages, and/or facilities are instances for
popular uses of RKE. Despite their obvious advantages such as gaining access/authorization solely by carrying
them, any security breach experienced with remote keyless entrys (RKEs) could end up with cataclysmic
consequences. Therefore, manufacturers continuously develop new methods and techniques to fortify their
RKEs systems. One of the prominent ways of tackling the inherent security concern is to establish a rapid
wireless message exchange mechanism/protocol such that intruders could not have time to place their attacks.
However, with recent advances in digital technology along with software–defined radio (SDR), quantification
of rapidness becomes crucial for RKE manufacturers. Therefore, in this study, a statistical modulation type
identifier for RKEs systems is proposed. Both an automatic modulation type identifier based on complex
baseband equivalent of the received signal and an automatic mode detector are employed as an extension of
traditional energy detector. This way, presumable bottlenecks for the receiver at intruderside are identified
and elaborated. Measurement results are provided along with relevant discussions. Results demonstrate that
frequency compensation along with energy detection are the two indispensable serial modules and provide the
bottleneck for any receiver at intruder’s side.

                                           Paper ID: 071
               A Stenography Application for Hiding Student Information into an Image

                                      Yıldıray Yiğit, Murat Karabatak*

                                              *Fırat University
                                       *Email: mkarabatak@firat.edu.tr

Abstract— Information security is a major problem today. Different approaches and methods are introduced
every day for data protection. One of them is steganography. The word steganography combines the Greek
words steganos (στεγανός),meaning "covered, concealed, or protected," and graphein (γράφειν) meaning
"writing". The purpose of steganography is to construct the stego object by placing important information
invisible into the ordinary cover object (image, sound, video, text, etc.) and to transmit it to the recipient. In
this study, it is aimed to strengthen the LSB technique which is one of the steganography methods by
suggesting the use of mask which will provide the least change on the image while hiding the data into a
digital image. In the proposed method, the data is also compressed by the LZW algorithm, thus allowing more
data to be hidden.

                                                        4
Paper ID: 069
                                       A Survey On Backbone Attack

       Ebu Yusuf Güven*, Mehmet Yavuz Yağcı, Ali Boyacı, Serhan Yarkan, Muhammet Ali Aydın

                                       * Istanbul University - Cerrahpaşa
                                       *Email: eyguven @istanbul.edu.tr

Abstract—The Internet is the universal network infrastructure that surrounds the Earth with thousands of
devices and connections that make up it. The communication of various technologies from data centers to
personal smartphones is provided through this infrastructure. While end devices are renewed as technology
and product in short periods, network devices such as switches and routers, where communication is provided,
can work for many years and work with out-of-date software and protocols. Therefore, it is clear how
important the weaknesses are. Internet communication protocols are designed with security concerns in mind
instead of communication speed and bandwidth. Even though researchers work intensively on wireless
networks, the security of the infrastructure that connects wireless networks is ignored. In this study, we
examined the attacks on OSI layer 2 and layer 3 layers made to the devices that constitute the backbone of the
Internet infrastructure. Although several security measures and updates have been published for some of these
attacks, the vulnerabilities that may occur in outdated devices are revealed.

                                            Paper ID: 078
                            A Target Tracking Application On Mobese Videos

                                         Sevinç Ay*, Murat Karabatak

                                               *Fırat University
                                            *Email: say@firat.edu.tr

Abstract—The development of digital communication and image technologies is becoming increasingly
widespread. The high resolution rates used in image technologies increased the quality of the recordings.
These developments reveal the necessity of interpretation studies on digital images. Image processing
applications were first created by the interpretation of still images. In order to achieve better image processing
after the stages of obtaining, improving and decontamination of the image, certain features have been
determined and highlighted. Nowadays, it continues with the processing and interpretation of moving images
or videos. In recent studies, object tracking has gained importance in order to interpret visual inspection
systems.

                                                        5
Paper ID: 041
                                     A Trust Management Model for IoT

                                      Ahmed Abdlrazaq*, Serkan Varol

                                             *Fırat University
                                  *Email: Ahmed.abdulfattah87@gmail.com

Abstract—The Internet of Things (IoT) is profoundly influencing our daily lives in many areas, covering small
devices to large network systems. An IoT system may be a set of directing rules that rearranges the usage of
IoT applications. This paper details a trust management model and security of IoT systems. Trust management
models and security play a critical part in IoT to protect information and devices from attacks since it supplies
security for all layers and networks. This review focuses on how a trust management model has a significant
function in IoT in enhancing reliability, privacy, and security. In this survey, we explained the challenges
along with the solutions in terms of IoT security and privacy and recognized the main security problem in the
IoT framework. In addition, this paper explored the characteristics of trust and pointed out some IoT security
challenges, explaining how middleware can affect the security of IoT.

                                           Paper ID: 075
              Advantages to Disadvantages of Cloud Computing for Small-Sized Business

                                    Peshraw Ahmed Abdalla*, Asaf Varol

                                               *Fırat University
                                   *Email: peshraw.abdalla1991@gmail.com

Abstract— This paper presents a complete overview of the storage landscape and cloud computing. It explains
the majör advantages and disadvantages of storing data online using cloud storage, how this works, and the
basic concepts involved in cloud computing, while also demonstrating the layers of its architecture with
reference to the Infrastructure as a Service (IaaS) that contains the cloud storage architecture. The paper further
discusses the concept of Storage as a Service (StaaS), which lets users or clients utilize cloud storage to save
data by providing them space without them having to use physical storage.

                                       Paper ID: 050
   An Integrated Framework to Examine Mobile Users’ Pathway from Threat Cognition to Action

                  Noushin Ashrafi, Daniel Lee, Jean-Pierre Kuilboer*,G. Cristoph Schütz

                                     *University of Massachusetts Boston
                                     *Email: jeanpierre.kuilboer@umb.edu

Abstract—The upsurge in usage of mobile devices together with significant growth in security threats has led
to pervasive harm both in organizational and personal levels. The perilous rise in security threats is mostly
due to a huge amount of sensitive information stored and transmitted on digital devices and intensified by
inadequate security practices. The Protection of information assets is often contingent on the behavior and
activities of the users leading to the establishment of a subfield of information security known as behavioral
information security (InfoSec). This study presents an all-encompassing yet pragmatic view of mobile user’s
security-related behavior while attempting to respond to scholars’ critiques regarding the incompleteness of
extant behavioral InfoSec research. A careful review of prospects to enhance the previous approaches lead to
an integrated model featuring interrelated deliberations. Interesting and strong results of our integrated model
should validate the efficacy of the hypotheses and add value to the research stream in the field of behavioral
InfoSec.

                                                        6
Paper ID: 026
                     Analysis of Malware Hidden Behind Firewalls with Back Scans

                               Zhiqing Zhang*, Hiroshi Esaki, Hideya Ochiai

                                         *The University of Tokyo
                                       *Email: cyou@hongo.wide.ad.jp

Abstract—Malware infection and propagation in Local Area Network(LAN) have became a critical security
consideration in IoT systems. Recent cases happen when hosts are observed to be infected even protected by
firewall. If we go deep into the analysis on infected hosts, we can measure on the possibility of this situation.
When we are aware of status of ports on the source host, we can determine how intrusion happens based on
classification on manner of infection. We propose SB-MSS (scan back to malicious source scan source), a
network measurement method on malware behaviors in infection on hosts even protected by firewall. This
includes passive analysis and active back scan,i.e., port back scanning and vertical back scanning methods
towards malicious sources. We conducted 2-week experiment and provide our results in attack distribution on
different factors, possible port entrances for malware intrusion and classification result on different infection
type. We found in 82.52% cases, malware infection bypasses firewalls.

                                              Paper ID: 047
                   Analysis of Realistic Attack Scenarios in Vehicle Ad-hoc Networks

                                        Jan Lastinec*, Mario Keszeli

                            *Slovak University of Technology in Bratislava (STU)
                                      *Email: jan.lastinec@stuba.sk

Abstract—The pace of technological development in automotive and transportation has been accelerating
rapidly in recent years. Automation of driver assistance systems, autonomous driving, increasing vehicle
connectivity and emerging inter-vehicular communication (V2V) are among the most disruptive innovations,
the latter of which also raises numerous unprecedented security concerns. This paper is focused on the security
of V2V communication in vehicle ad-hoc networks (VANET) with the main goal of identifying realistic attack
scenarios and evaluating their impact, as well as possible security countermeasures to thwart the attacks. The
evaluation has been done in OMNeT++ simulation environment and the results indicate that common attacks,
such as replay attack or message falsification, can be eliminated by utilizing digital signatures and message
validation. However, detection and mitigation of advanced attacks such as Sybil attack requires more complex
approach. The paper also presents a simple detection method of Sybil nodes based on measuring the signal
strength of received messages and maintaining reputation of sending nodes. The evaluation results suggest
that the presented method is able to detect Sybil nodes in VANET and contributes to the improvement of
traffic flow.

                                                       7
Paper ID: 009
                               Android Mobile Device Forensics: A Review

                                   Hussein Farooq Tayeb*, Cihan Varol

                                              *Fırat University
                                      *Email: husseintaeyb@gmail.com

Abstract— Mobile device forensics is an up-to-date multidisciplinary methodology aims at Identifying,
preserving, extracting, analyzing, and presenting digital evidence from mobile devices. The technique
encompasses various phases, which require both deep insights into mobile devices’ organization and structure
as well as digital analysis and examination approaches. Modern mobile devices enable multitask computing
ability that requires a suitable Operating System (OS). Nowadays, both proprietary and open source operating
mobile OSs are available. The progressive growth of Android operated devices makes them a potential target
for cyber-attacks. In this paper, a review of the Android mobile device forensics is presented. The study is not
an exhaustive review, rather it only offers a discussion of the most influential papers in the field.

                                          Paper ID: 023
Application of Similarity-Based Image Steganography Method to Computerized Tomography Images

                                       Songül Karakuş*, Engin Avcı

                                             *Fırat University
                                      *Email: songul4444@gmail.com

Abstract—With the rapid development of technology, computers have got in every area of our lives. One of
these areas is the area of health. Medical records are now stored in computer environments and can be accessed
if needed. Nowadays, thanks to internet technologies, access to information has been facilitated, and this has
brought security problems with malicious users. Using computed tomography images in this study, doctor
reviews are hidden in these images. For this purpose, similarity based least significant bit method was used.
While hiding the reviews of the doctor, three different messages were concealed with the capacity of hiding,
applied directly to the hiding and NOT to the reviews to be hidden. The mean square error and peak signal to
noise ratio metrics were used as performance evaluation criteria. As a result, the peak signal to noise ratio
value of the lowest message hiding capacity (961 bytes) was found as 71.4408, applied to the original reviews,
while the peak signal to noise ratio value was found to be 71.0473, applied to the inverted reviews.

                                                       8
Paper ID: 025
                Augmenting Gabor-based Face Recognition with Global Soft Biometrics

                                               Emad Sami Jaha*

                                          *King Abdulaziz University
                                           *Email: ejaha@kau.edu.sa

Abstract—Though face recognition using traditional (hard) biometrics has attracted massive research interest
and received extensive studies, it still confronts degrading variability challenges and notably achieves lower
performance compared with other biometric recognition forms like fingerprint and iris. Recently, a number of
research studies have been interested in enhancing face recognition performance by all means of
supplementary facial biometric traits or other biometric modalities. Thus, soft biometrics have been emerged
as a new promising modality of biometrics and highlighted as likely viable and fusible traits for augmenting
traditional/hard biometrics. This is due to the expected advantages of soft biometrics over the traditional
biometric traits, such as the high collectability and invariance properties. Other than fusing different kinds of
traditional traits to augment face recognition, adding soft biometrics to augment various traditional facial traits
has yet gained little research attention. Hence, in this research, unlike the majority of existing work, we
investigate the viability of global soft face biometrics in supplementing traditional (hard) biometrics and the
efficacy of concurrently using absolute and relative descriptions as soft biometrics. We conduct a new soft
biometric-based fusion scheme in feature-level for augmenting a traditional Gabor-based face
identification/verification in different potential forensic scenarios, considering performance variability
evaluation and comparison with the baseline performance of Gabor features in isolation.

                                         Paper ID: 043
Capacity of Adaptive Free Space Optical Transmission over Malaga Turbulence with Pointing Error
                               using Truncated Channel Inversion

                  Dejan Milić, Marko Smilić, Bojana Nikolić, Milan Tuba*, Petar Spalević

                                          *Singidunum University
                                       *Email: mtuba@singidunum.ac.rs

Abstract— In this paper we consider channel capacity based on Truncated Channel Inversion with Fixed Rate
(TIFR) adaptive transmission over Malaga model of atmospheric turbulence with pointing error. Analytical
expressions in closed form are derived for capacity based on TIFR adaptive transmission. The impact of cut-
off SNR level on channel capacity based on TIFR adaptive transmission is investigated. Also, value of cut-off
SNR level for different regimes of transmitter power is considered. Analytical results are numerically
evaluated and graphically presented depending on cut-off SNR level and signal to noise ratio (SNR).

                                                        9
Paper ID: 058
    Chaotic Analysis of Radon Gas (222Rn) measurements in Lesvos Island: Detrended Fluctuation
                                          Analysis (DFA)

                                     Miraç Kamışlıoğlu*, Feride Kulalı

                                            *Üsküdar University
                                  *Email: mirac.kamislioglu@uskudar.edu.tr

Abstract— Numerous investigations have been performed to establish a correlation between earthquakes and
the geological parameters. Radon is one of the general criterions that is referred for the examination of this
correlation. Chaotic signal processing methods has a very important explain of complex dynamical system for
example earthquakes. Scale analyses technique, Detrended Fluctuation Analysis (DFA), has similar exponents
with RMS (Root Mean Square). Hurst exponent is an enormous method to prediction long-range power law.
Multifractal time series have both excessively great and little ripple. Made in this study, Detrended Fluctuation
Analysis was performed for 222Rn data that was gathered from Lesvos Island in Greece. The results of
Detrended Fluctuation Analysis have a robust correlation for each 222Rn time series.

                                              Paper ID: 049
                                Circle Map for Internet of Things Networks

                                          Peter Szabo*, Bela Genge

                        *University of Medicine, Pharmacy, Sciences and Technology
                                       *Email: peter@kaizen-ux.com

Abstract— We have reviewed the existing metro network mapping solutions. While none of them are ideal
for IoT network mapping, the research on network map usability aspects can be applied to IoT networks. By
doing so, we were able to come up with a new map type, tailored to IoT networks. We have created and
optimized an algorithm to create and plot this new map type, the circle map. We have used B´ezier curves to
connect nodes, arranged in recursive circular patterns. Overall, the circle map needs some refinement and real
user research before realworld application, but its core concepts seem to work, and our algorithm efficiently
creates circle maps.

                                         Paper ID: 044
    Clustering Algorithm Optimized by Brain Storm Optimization for Digital Image Segmentation

                  Eva Tuba*, Raka Jovanovic, Dejan Zivkovic, Marko Beko, Milan Tuba

                                           *Singidunum University
                                           *Email: etuba@ieee.org

Abstract— In the last several decades digital images were extend their usage in numerous areas. Due to various
digital image processing methods they became part areas such as astronomy, agriculture and more. One of the
main task in image processing application is segmentation. Since segmentation represents rather important
problem, various methods were proposed in the past. One of the methods is to use clustering algorithms which
is explored in this paper. We propose k-means algorithm for digital image segmentation. K-means algorithm’s
well known drawback is the high possibility of getting trapped into local optima. In this paper we proposed
brain storm optimization algorithm for optimizing k-means algorithm used for digital image segmentation.
Our proposed algorithm is tested on several benchmark images and the results are compared with other statof-
the-art algorithms. The proposed method outperformed the existing methods.

                                                       10
You can also read