Skip to main content

2022 | OriginalPaper | Buchkapitel

14. Blockchain-Based Secure Method for Tiger Detection Using Machine Learning

verfasst von : D. B. Vishwas, M. Gowtham, A. V. Ajay, K. Raghavendra, Vinayakumar Ravi, Sam Goundar

Erschienen in: Convergence of Internet of Things and Blockchain Technologies

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The field of computer vision is encountering an extraordinary jump forward improvement today. This targets giving a thorough review of the ongoing advancement on computer vision calculations and their related equipment usage. Specifically, the noticeable accomplishments in computer vision errands, for example, picture characterization, object identification, and picture division, brought by profound learning methods are featured. Then again, survey of procedures for executing and upgrading profound learning put together by computer vision calculations with respect to Graphics Processing Units (GPU), Field Programmable Gate Arrays (FPGA), and other new ages of equipment quickening agents is introduced to encourage ongoing or potentially energy-productive activities. At long last, a few promising bearings for future examination are introduced to propel further advancement in the field. The capacity to convey remote sensor networks in far-off territories is making new occasions to screen jeopardized species and their current circumstance so as to guarantee their insurance and security, and trustworthiness is the fundamental issue in Internet of Things (IoT)-based organization climate in which capture attempt free made sure about correspondence is required. The blockchain innovation is one of the indisputable and tip-top procedures that can be used for the joining of security with remote frameworks. This part gives the definite contextual investigation on blockchain about IoT climate for checking and securing the natural life creatures like tigers.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Redmon, J., Divvala, S., Girshick, R., & Farhadi, A. (2016). You only look once: Unified, real-time object detection. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). University of Washington, Allen Institute for AI, Facebook AI Research. Redmon, J., Divvala, S., Girshick, R., & Farhadi, A. (2016). You only look once: Unified, real-time object detection. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). University of Washington, Allen Institute for AI, Facebook AI Research.
3.
Zurück zum Zitat Kumar, S., Gopalaswamy, A. M., & Karanth, K. U. (2011). Counting India’s wild tigers reliably. American Association for the Advancement of Science, 332(6031), 791. Kumar, S., Gopalaswamy, A. M., & Karanth, K. U. (2011). Counting India’s wild tigers reliably. American Association for the Advancement of Science, 332(6031), 791.
4.
Zurück zum Zitat Cheema, G. S., & Anand, S. (2017). Automatic detection and recognition of individuals in patterned species. Machine Learning and Knowledge Discovery in Database, 27–38. Cheema, G. S., & Anand, S. (2017). Automatic detection and recognition of individuals in patterned species. Machine Learning and Knowledge Discovery in Database, 27–38.
5.
Zurück zum Zitat Iyer, N., Jayanti, S., Lou, K., Kalyanaraman, Y., & Ramani, K. (2005). Three-dimensional shape searching: State-of-the-art review and future trends. Computer-Aided Design, 37(5), 509–530.CrossRef Iyer, N., Jayanti, S., Lou, K., Kalyanaraman, Y., & Ramani, K. (2005). Three-dimensional shape searching: State-of-the-art review and future trends. Computer-Aided Design, 37(5), 509–530.CrossRef
6.
Zurück zum Zitat Lowe, D. G. (2004). Distinctive image features from scale-invariant key points. Computer Science Department, and University of British Columbia, 60, 91–110. Lowe, D. G. (2004). Distinctive image features from scale-invariant key points. Computer Science Department, and University of British Columbia, 60, 91–110.
7.
Zurück zum Zitat Gowtham, M. Intrusion detection and avoidance for home and smart city automation in IoT. In IoT: Security and Privacy Paradigm. CRC Press, Taylor and Francis Group. Gowtham, M. Intrusion detection and avoidance for home and smart city automation in IoT. In IoT: Security and Privacy Paradigm. CRC Press, Taylor and Francis Group.
8.
Zurück zum Zitat Bahga, A., & Madisetti, V. (2017). Blockchain applications: A hands-on approach. Computers & Internet. Bahga, A., & Madisetti, V. (2017). Blockchain applications: A hands-on approach. Computers & Internet.
9.
Zurück zum Zitat Chondros, N., Kokordelis, K., & Roussopoulos, M. (2012). On the practicality of practical byzantine fault tolerance. ACM/IFIP/USENIX International Conference on Distributed Systems Platforms and Open Distributed Processing, 436–455. Chondros, N., Kokordelis, K., & Roussopoulos, M. (2012). On the practicality of practical byzantine fault tolerance. ACM/IFIP/USENIX International Conference on Distributed Systems Platforms and Open Distributed Processing, 436–455.
10.
Zurück zum Zitat Gowtham, M., Banga, M. K., & Patil, M. Secure internet of things: Assessing challenges and scopes for NextGen communication. In 2nd IEEE International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT-2019) at Vimal Jyothi Engineering College, Kerala. Gowtham, M., Banga, M. K., & Patil, M. Secure internet of things: Assessing challenges and scopes for NextGen communication. In 2nd IEEE International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT-2019) at Vimal Jyothi Engineering College, Kerala.
11.
Zurück zum Zitat Heilman, E., Kendler, A., Zohar, A., & Goldberg, S. (2015). Eclipse attacks on bitcoin’s peer-to-peer network. In Proceedings of the 24th USENIX Conference on Security Symposium, ser. SEC’15. USENIX Association (pp. 129–144). Heilman, E., Kendler, A., Zohar, A., & Goldberg, S. (2015). Eclipse attacks on bitcoin’s peer-to-peer network. In Proceedings of the 24th USENIX Conference on Security Symposium, ser. SEC’15. USENIX Association (pp. 129–144).
12.
Zurück zum Zitat Ohbuchi, R., Osada, K., Furuya, T., & Banno, T. Salient Local Visual Features for Shape-Based 3D Model Retrieval. Ohbuchi, R., Osada, K., Furuya, T., & Banno, T. Salient Local Visual Features for Shape-Based 3D Model Retrieval.
13.
Zurück zum Zitat Gowtham, M. CL-PKA: Key management in dynamic wireless sensor network: A novel framework. In 3rd International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT-2018) at P.E.S College of Engineering, Mandya. Springer-LNEE. Gowtham, M. CL-PKA: Key management in dynamic wireless sensor network: A novel framework. In 3rd International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT-2018) at P.E.S College of Engineering, Mandya. Springer-LNEE.
14.
Zurück zum Zitat Deepak, T., Shetty, S., & Kevin, A. K. (2017). Security implications of blockchain cloud with analysis of block withholding attack. In 17th IEEE/ACM International Symposium on Cluster Cloud and Grid Computing (CCGRID) (p. 458). Deepak, T., Shetty, S., & Kevin, A. K. (2017). Security implications of blockchain cloud with analysis of block withholding attack. In 17th IEEE/ACM International Symposium on Cluster Cloud and Grid Computing (CCGRID) (p. 458).
15.
Zurück zum Zitat Kiayias, A., Russell, A., David, B., & Oliynykov, R. (2016). Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. Springer.MATH Kiayias, A., Russell, A., David, B., & Oliynykov, R. (2016). Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. Springer.MATH
16.
Zurück zum Zitat Swanson, T. Consensus-as-a-service: A brief report on the emergence of permissioned distributed ledger systems. Swanson, T. Consensus-as-a-service: A brief report on the emergence of permissioned distributed ledger systems.
17.
Zurück zum Zitat Duong, T., Fan, L., & Zhou, H. S. (2016). 2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely. Springer. Duong, T., Fan, L., & Zhou, H. S. (2016). 2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely. Springer.
18.
Zurück zum Zitat Wood, G. (2014). Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 151. Wood, G. (2014). Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 151.
19.
Zurück zum Zitat Ji, S., Cai, Z., Han, M., & Beyah, R. (2015). Whitespace measurement and virtual backbone construction for cognitive radio networks: From the social perspective. In Sensing Communication and Networking (SECON) 2015 12th Annual IEEE International Conference on IEEE (pp. 435–443).CrossRef Ji, S., Cai, Z., Han, M., & Beyah, R. (2015). Whitespace measurement and virtual backbone construction for cognitive radio networks: From the social perspective. In Sensing Communication and Networking (SECON) 2015 12th Annual IEEE International Conference on IEEE (pp. 435–443).CrossRef
20.
Zurück zum Zitat Han, M., Yan, M., Li, J., Ji, S., & Li, Y. (2014). Neighborhood-based uncertainty generation in social networks. Journal of Combinatorial Optimization, 28, 561–576.MathSciNetCrossRef Han, M., Yan, M., Li, J., Ji, S., & Li, Y. (2014). Neighborhood-based uncertainty generation in social networks. Journal of Combinatorial Optimization, 28, 561–576.MathSciNetCrossRef
21.
Zurück zum Zitat Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). An overview of blockchain technology: Architecture consensus and future trends. In Big Data (BigData Congress) 2017 IEEE International Congress on IEEE (pp. 557–564).CrossRef Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). An overview of blockchain technology: Architecture consensus and future trends. In Big Data (BigData Congress) 2017 IEEE International Congress on IEEE (pp. 557–564).CrossRef
22.
Zurück zum Zitat Min, X., Li, Q., Liu, L., & Cui, L. (2016, August). A permissioned blockchain framework for supporting instant transaction and dynamic block size. In 2016 IEEE Trustcom/BigDataSE/ISPA (pp. 90–96).CrossRef Min, X., Li, Q., Liu, L., & Cui, L. (2016, August). A permissioned blockchain framework for supporting instant transaction and dynamic block size. In 2016 IEEE Trustcom/BigDataSE/ISPA (pp. 90–96).CrossRef
23.
Zurück zum Zitat Malkhi, D. (2012, January). Byzantine quorum systems. Distributed Computing, 4, 203213. Malkhi, D. (2012, January). Byzantine quorum systems. Distributed Computing, 4, 203213.
24.
Zurück zum Zitat Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. (2016, May). Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In IEEE Symposium on Security and Privacy (pp. 839–858). Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. (2016, May). Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In IEEE Symposium on Security and Privacy (pp. 839–858).
Metadaten
Titel
Blockchain-Based Secure Method for Tiger Detection Using Machine Learning
verfasst von
D. B. Vishwas
M. Gowtham
A. V. Ajay
K. Raghavendra
Vinayakumar Ravi
Sam Goundar
Copyright-Jahr
2022
DOI
https://doi.org/10.1007/978-3-030-76216-2_14

Neuer Inhalt