0% found this document useful (0 votes)
27 views183 pages

Advances in Computer Communication and Computational Sciences Proceedings of IC4S 2019 Sanjiv K. Bhatia Digital Version 2025

Educational material: Advances in Computer Communication and Computational Sciences Proceedings of IC4S 2019 Sanjiv K. Bhatia Unlock Your Full Potential. Comprehensive study guides with detailed analysis, expert insights, and transformative educational content.

Uploaded by

gkxcmcmvfx4822
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views183 pages

Advances in Computer Communication and Computational Sciences Proceedings of IC4S 2019 Sanjiv K. Bhatia Digital Version 2025

Educational material: Advances in Computer Communication and Computational Sciences Proceedings of IC4S 2019 Sanjiv K. Bhatia Unlock Your Full Potential. Comprehensive study guides with detailed analysis, expert insights, and transformative educational content.

Uploaded by

gkxcmcmvfx4822
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 183

Advances in Computer Communication and

Computational Sciences Proceedings of IC4S 2019


Sanjiv K. Bhatia pdf download
https://textbookfull.com/product/advances-in-computer-communication-and-computational-sciences-
proceedings-of-ic4s-2019-sanjiv-k-bhatia/

★★★★★ 4.8/5.0 (27 reviews) ✓ 186 downloads ■ TOP RATED


"Fantastic PDF quality, very satisfied with download!" - Emma W.

DOWNLOAD EBOOK
Advances in Computer Communication and Computational
Sciences Proceedings of IC4S 2019 Sanjiv K. Bhatia pdf
download

TEXTBOOK EBOOK TEXTBOOK FULL

Available Formats

■ PDF eBook Study Guide TextBook

EXCLUSIVE 2025 EDUCATIONAL COLLECTION - LIMITED TIME

INSTANT DOWNLOAD VIEW LIBRARY


Collection Highlights

Advances in Computer Communication and Computational


Sciences: Proceedings of IC4S 2018 Sanjiv K. Bhatia

Advances in Computer Communication and Computational


Sciences: Proceedings of IC4S 2017, Volume 1 Sanjiv K.
Bhatia

Advances in Communication and Computational Technology


Select Proceedings of ICACCT 2019 Gurdeep Singh Hura

Advances in Computational Intelligence and Communication


Technology Proceedings of CICT 2019 Xiao-Zhi Gao
Advances in Information Communication Technology and
Computing Proceedings of AICTC 2019 Vishal Goar

Advances in VLSI Communication and Signal Processing


Select Proceedings of VCAS 2019 David Harvey

Advances in Computer Vision: Proceedings of the 2019


Computer Vision Conference (CVC), Volume 1 Kohei Arai

Advances in Structural Engineering: Select Proceedings of


FACE 2019 K. V. L. Subramaniam

Advances in IC Engines and Combustion Technology: Select


Proceedings of NCICEC 2019 Ashwani K. Gupta
Advances in Intelligent Systems and Computing 1158

Sanjiv K. Bhatia · Shailesh Tiwari ·


Su Ruidan · Munesh Chandra Trivedi ·
K. K. Mishra Editors

Advances in
Computer,
Communication
and Computational
Sciences
Proceedings of IC4S 2019
Advances in Intelligent Systems and Computing

Volume 1158

Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland

Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing,
Universidad Central de Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, School of Computer Science and Electronic Engineering,
University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University,
Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas
at El Paso, El Paso, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao
Tung University, Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology,
University of Technology Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute
of Technology, Tijuana, Mexico
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro,
Rio de Janeiro, Brazil
Ngoc Thanh Nguyen , Faculty of Computer Science and Management,
Wrocław University of Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering,
The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications
on theory, applications, and design methods of Intelligent Systems and Intelligent
Computing. Virtually all disciplines such as engineering, natural sciences, computer
and information science, ICT, economics, business, e-commerce, environment,
healthcare, life science are covered. The list of topics spans all the areas of modern
intelligent systems and computing such as: computational intelligence, soft comput-
ing including neural networks, fuzzy systems, evolutionary computing and the fusion
of these paradigms, social intelligence, ambient intelligence, computational neuro-
science, artificial life, virtual worlds and society, cognitive science and systems,
Perception and Vision, DNA and immune based systems, self-organizing and
adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics
including human-machine teaming, knowledge-based paradigms, learning para-
digms, machine ethics, intelligent data analysis, knowledge management, intelligent
agents, intelligent decision making and support, intelligent network security, trust
management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are
primarily proceedings of important conferences, symposia and congresses. They
cover significant recent developments in the field, both of a foundational and
applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad
dissemination of research results.
** Indexing: The books of this series are submitted to ISI Proceedings,
EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **

More information about this series at http://www.springer.com/series/11156


Sanjiv K. Bhatia Shailesh Tiwari
• •

Su Ruidan Munesh Chandra Trivedi


• •

K. K. Mishra
Editors

Advances in Computer,
Communication
and Computational Sciences
Proceedings of IC4S 2019

123
Editors
Sanjiv K. Bhatia Shailesh Tiwari
Department of Mathematics Computer Science Engineering Department
and Computer Science ABES Engineering College
University of Missouri–St. Louis Ghaziabad, Uttar Pradesh, India
Chesterfield, MO, USA
Munesh Chandra Trivedi
Su Ruidan National Institute of Technology Agartala
Shanghai Advanced Research Institute Agartala, Tripura, India
Pudong, China

K. K. Mishra
Computer Science Engineering Department
Motilal Nehru National Institute
of Technology
Allahabad, Uttar Pradesh, India

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-981-15-4408-8 ISBN 978-981-15-4409-5 (eBook)
https://doi.org/10.1007/978-981-15-4409-5
© Springer Nature Singapore Pte Ltd. 2021
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, expressed or implied, with respect to the material contained
herein or for any errors or omissions that may have been made. The publisher remains neutral with regard
to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface

The IC4S is a major multidisciplinary conference organized with the objective of


bringing together researchers, developers and practitioners from academia and
industry working in all areas of computer and computational sciences. It is orga-
nized specifically to help computer industry to derive the advances of
next-generation computer and communication technology. Researchers invited to
speak will present the latest developments and technical solutions.
Technological developments all over the world are dependent upon globalization
of various research activities. Exchange of information and innovative ideas is
necessary to accelerate the development of technology. Keeping this ideology in
preference, the International Conference on Computer, Communication and
Computational Sciences (IC4S 2019) has been organized at Mandarin Hotel
Bangkok, Bangkok, Thailand, during 11–12 October 2019.
This is the third time the International Conference on Computer, Communication
and Computational Sciences has been organized with a foreseen objective of
enhancing the research activities at a large scale. Technical Program Committee and
Advisory Board of IC4S include eminent academicians, researchers and practi-
tioners from abroad as well as from all over the nation.
In this book, selected manuscripts have been subdivided into various tracks
named—Advanced Communications and Security, Intelligent Hardware and
Software Design, Intelligent Computing Techniques, Web and Informatics and
Intelligent Image Processing. A sincere effort has been made to make it an immense
source of knowledge for all and includes 91 manuscripts. The selected manuscripts
have gone through a rigorous review process and are revised by authors after
incorporating the suggestions of the reviewers.
IC4S 2018 received around 490 submissions from around 770 authors of 22
different countries such as USA, Iceland, China, Saudi Arabia, South Africa,
Taiwan, Malaysia, Indonesia, Europe and many more. Each submission has been
gone through the plagiarism check. On the basis of plagiarism report, each sub-
mission was rigorously reviewed by atleast two reviewers with an average of 2.4
per reviewer. Even some submissions have more than two reviews. On the basis

v
vi Preface

of these reviews, 91 high-quality papers were selected for publication in this pro-
ceedings volume, with an acceptance rate of 18.57%.
We are thankful to the keynote speakers—Prof. Shyi-Ming Chen, IEEE Fellow,
IET Fellow, IFSA Fellow, Chair Professor in National Taiwan University of
Science and Technology, Taiwan, and Prof. Maode Ma, IET Fellow, Nanyang
Technological University, Singapore, to enlighten the participants with their
knowledge and insights. We are also thankful to delegates and the authors for their
participation and their interest in IC4S 2019 as a platform to share their ideas and
innovation. We are also thankful to the Prof. Dr. Janusz Kacprzyk, Series Editor,
AISC, Springer, for providing guidance and support. Also, we extend our heartfelt
gratitude to the reviewers and Technical Program Committee Members for showing
their concern and efforts in the review process. We are indeed thankful to everyone
directly or indirectly associated with the conference organizing team leading it
towards the success.
Although utmost care has been taken in compilation and editing, however, a few
errors may still occur. We request the participants to bear with such errors and
lapses (if any). We wish you all the best.

Editors
Bangkok, Thailand Sanjiv K. Bhatia
Shailesh Tiwari
Munesh Chandra Trivedi
K. K. Mishra
About This Book

With advent of technology, intelligent and soft computing techniques came into
existence with a wide scope of implementation in engineering sciences. Nowadays,
technology is changing with a speedy pace and innovative proposals that solve the
engineering problems intelligently are gaining popularity and advantages over the
conventional solutions to these problems. It is very important for research com-
munity to track the latest advancements in the field of computer sciences. Keeping
this ideology in preference, this book includes the insights that reflect the Advances
in Computer and Computational Sciences from upcoming researchers and leading
academicians across the globe. It contains the high-quality peer-reviewed papers of
‘International Conference on Computer, Communication and Computational
Sciences (IC4S-2019)’, held during 11–12 October 2019 at Mandarin Hotel
Bangkok, Bangkok, Thailand. These papers are arranged in the form of chapters.
The content of this book is divided into five broader tracks that cover variety of
topics. These tracks are: Advanced Communications and Security, Intelligent
Hardware and Software Design, Intelligent Computing Techniques, Web and
Informatics and Intelligent Image Processing. This book helps the perspective
readers’ from computer and communication industry and academia to derive the
immediate surroundings developments in the field of communication and computer
sciences and shape them into real-life applications.

vii
Contents

Advanced Communications and Security


A Novel Crypto-Ransomware Family Classification Based
on Horizontal Feature Simplification . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Mohsen Kakavand, Lingges Arulsamy, Aida Mustapha,
and Mohammad Dabbagh
Characteristic Analysis and Experimental Simulation of Diffuse Link
Channel for Indoor Wireless Optical Communication . . . . . . . . . . . . . 15
Peinan He and Mingyou He
A Comparative Analysis of Malware Anomaly Detection . . . . . . . . . . . 35
Priynka Sharma, Kaylash Chaudhary,
Michael Wagner, and M. G. M. Khan
Future Identity Card Using Lattice-Based Cryptography
and Steganography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Febrian Kurniawan and Gandeva Bayu Satrya
Cryptanalysis on Attribute-Based Encryption from Ring-Learning
with Error (R-LWE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Tan Soo Fun and Azman Samsudin
Enhanced Password-Based Authentication Mechanism in Cloud
Computing with Extended Honey Encryption (XHE): A Case Study
on Diabetes Dataset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Tan Soo Fun, Fatimah Ahmedy, Zhi Ming Foo, Suraya Alias,
and Rayner Alfred
An Enhanced Wireless Presentation System for Large-Scale Content
Distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Khong-Neng Choong, Vethanayagam Chrishanton,
and Shahnim Khalid Putri

ix
x Contents

On Confidentiality, Integrity, Authenticity, and Freshness (CIAF)


in WSN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Shafiqul Abidin, Vikas Rao Vadi, and Ankur Rana
Networking Analysis and Performance Comparison of Kubernetes
CNI Plugins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Ritik Kumar and Munesh Chandra Trivedi
Classifying Time-Bound Hierarchical Key Assignment Schemes . . . . . 111
Vikas Rao Vadi, Naveen Kumar, and Shafiqul Abidin
A Survey on Cloud Workflow Collaborative Adaptive Scheduling . . . . 121
Delong Cui, Zhiping Peng, Qirui Li, Jieguang He, Lizi Zheng,
and Yiheng Yuan
Lattice CP-ABE Scheme Supporting Reduced-OBDD Structure . . . . . 131
Eric Affum, Xiasong Zhang, and Xiaofen Wang
Crypto-SAP Protocol for Sybil Attack Prevention in VANETs . . . . . . 143
Mohamed Khalil and Marianne A. Azer
Managerial Computer Communication: Implementation of Applied
Linguistics Approaches in Managing Electronic Communication . . . . . 153
Marcel Pikhart and Blanka Klímová
Advance Persistent Threat—A Systematic Review of Literature
and Meta-Analysis of Threat Vectors . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Safdar Hussain, Maaz Bin Ahmad, and Shariq Siraj Uddin Ghouri
Construction of a Teaching Support System Based on 5G
Communication Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Hanhui Lin, Shaoqun Xie, and Yongxia Luo

Intelligent Hardware and Software Design


Investigating the Noise Barrier Impact on Aerodynamics Noise:
Case Study at Jakarta MRT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Sugiono Sugiono, Siti Nurlaela, Andyka Kusuma, Achmad Wicaksono,
and Rio P. Lukodono
3D Cylindrical Obstacle Avoidance Using the Minimum Distance
Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Krishna Raghuwaiya, Jito Vanualailai, and Jai Raj
Path Planning of Multiple Mobile Robots in a Dynamic 3D
Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Jai Raj, Krishna Raghuwaiya, Jito Vanualailai, and Bibhya Sharma
Autonomous Quadrotor Maneuvers in a 3D Complex
Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Jito Vanualailai, Jai Raj, and Krishna Raghuwaiya
Contents xi

Tailoring Scrum Methodology for Game Development . . . . . . . . . . . . 233


Towsif Zahin Khan, Shairil Hossain Tusher, Mahady Hasan,
and M. Rokonuzzaman
Designing and Developing a Game with Marketing Concepts . . . . . . . 245
Towsif Zahin Khan, Shairil Hossain Tusher, Mahady Hasan,
and M. Rokonuzzaman
Some Variants of Cellular Automata . . . . . . . . . . . . . . . . . . . . . . . . . . 253
Ray-Ming Chen
An Exchange Center Based Digital Cash Payment Solution . . . . . . . . . 265
Yong Xu and Jingwen Li
Design and Implementation of Pianos Sharing System
Based on PHP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Sheng Liu, Chu Yang, and Xiaoming You
A Stochastic Framework for Social Media Adoption
or Abandonment: Higher Education . . . . . . . . . . . . . . . . . . . . . . . . . . 287
Mostafa Hamadi, Jamal El-Den, Cherry Narumon Sriratanaviriyakul,
and Sami Azam
Low-Earth Orbital Internet of Things Satellite System on the Basis
of Distributed Satellite Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
Mikhail Ilchenko, Teodor Narytnyk, Vladimir Prisyazhny, Segii Kapshtyk,
and Sergey Matvienko
Automation of the Requisition Process in Material Supply Chain
of Construction Firms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
Adedeji Afolabi, Yewande Abraham, Rapheal Ojelabi,
and Oluwafikunmi Awosika
Developing an Adaptable Web-Based Profile Record Management
System for Construction Firms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Adedeji Afolabi, Yewande Abraham, Rapheal Ojelabi,
and Etuk Hephzibah
Profile Control System for Improving Recommendation Services . . . . 335
Jaewon Park, B. Temuujin, Hyokyung Chang, and Euiin Choi
IoT-Based Smart Application System to Prevent Sexual Harassment
in Public Transport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
Md. Wahidul Hasan, Akil Hamid Chowdhury, Md Mehedi Hasan,
Arup Ratan Datta, A. K. M. Mahbubur Rahman, and M. Ashraful Amin
A Decision Support System Based on WebGIS for Supporting
Community Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
Wichai Puarungroj, Suchada Phromkhot, Narong Boonsirisumpun,
and Pathapong Pongpatrakant
xii Contents

Structural Application of Medical Image Report Based


on Bi-CNNs-LSTM-CRF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
Aesha Abdullah Moallim and Li Ji Yun
Integrating QR Code-Based Approach to University e-Class System
for Managing Student Attendance . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379
Suwaibah Abu Bakar, Shahril Nazim Mohamed Salleh, Azamuddin Rasidi,
Rosmaini Tasmin, Nor Aziati Abd Hamid, Ramatu Muhammad Nda,
and Mohd Saufi Che Rusuli

Intelligent Computing Techniques


Decision-Making System in Tannery by Using Fuzzy Logic . . . . . . . . . 391
Umaphorn Tan and Kanate Puntusavase
A Study on Autoplay Model Using DNN in Turn-Based RPG . . . . . . . 399
Myoungyoung Kim, Jaemin Kim, Deukgyu Lee, Jihyeong Son,
and Wonhyung Lee
Simulation Optimization for Solving Multi-objective Stochastic
Sustainable Liner Shipping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
Saowanit Lekhavat and Habin Lee
Fast Algorithm for Sequence Edit Distance Computation . . . . . . . . . . 417
Hou-Sheng Chen, Li-Ren Liu, and Jian-Jiun Ding
Predicting Student Final Score Using Deep Learning . . . . . . . . . . . . . . 429
Mohammad Alodat
Stance Detection Using Transformer Architectures and Temporal
Convolutional Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
Kushal Jain, Fenil Doshi, and Lakshmi Kurup
Updated Frequency-Based Bat Algorithm (UFBBA) for Feature
Selection and Vote Classifier in Predicting Heart Disease . . . . . . . . . . 449
Himanshu Sharma and Rohit Agarwal
A New Enhanced Recurrent Extreme Learning Machine Based
on Feature Fusion with CNN Deep Features for Breast Cancer
Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
Rohit Agarwal and Himanshu Sharma
Deep Learning-Based Severe Dengue Prognosis Using Human
Genome Data with Novel Feature Selection Method . . . . . . . . . . . . . . . 473
Aasheesh Shukla and Vishal Goyal
An Improved DCNN-Based Classification and Automatic Age
Estimation from Multi-factorial MRI Data . . . . . . . . . . . . . . . . . . . . . . 483
Ashish Sharma and Anjani Rai
Contents xiii

The Application of Machine Learning Methods in Drug


Consumption Prediction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497
Peng Han
Set Representation of Itemset for Candidate Generation with Binary
Search Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509
Carynthia Kharkongor and Bhabesh Nath
Robust Moving Targets Detection Based on Multiple Features . . . . . . 521
Jing Jin, Jianwu Dang, Yangpin Wang, Dong Shen, and Fengwen Zhai
Digital Rock Image Enhancement via a Deep Learning
Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533
Yunfeng Bai and Vladimir Berezovsky
Enhancing PSO for Dealing with Large Data Dimensionality
by Cooperative Coevolutionary with Dynamic Species-Structure
Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539
Kittipong Boonlong and Karoon Suksonghong
A New Encoded Scheme GA for Solving Portfolio Optimization
Problems in the Big Data Environment . . . . . . . . . . . . . . . . . . . . . . . . 551
Karoon Suksonghong and Kittipong Boonlong
Multistage Search for Performance Enhancement of Ant Colony
Optimization in Randomly Generated Road Profile Identification
Using a Quarter Vehicle Vibration Responses . . . . . . . . . . . . . . . . . . . 561
Kittikon Chantarattanakamol and Kittipong Boonlong
Classification and Visualization of Poverty Status: Analyzing
the Need for Poverty Assistance Using SVM . . . . . . . . . . . . . . . . . . . . 571
Maricel P. Naviamos and Jasmin D. Niguidula
Comparative Analysis of Prediction Algorithms for Heart
Diseases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583
Ishita Karun
Sarcasm Detection Approaches Survey . . . . . . . . . . . . . . . . . . . . . . . . . 593
Anirudh Kamath, Rahul Guhekar, Mihir Makwana, and Sudhir N. Dhage

Web and Informatics


Interactive Animation and Affective Teaching and Learning
in Programming Courses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613
Alvin Prasad and Kaylash Chaudhary
IoT and Computer Vision-Based Electronic Voting System . . . . . . . . . 625
Md. Nazmul Islam Shuzan, Mahmudur Rashid, Md. Aowrongajab Uaday,
and M. Monir Uddin
xiv Contents

Lexical Repository Development for Bugis, a Minority Language . . . . 639


Sharifah Raihan Syed Jaafar, Nor Hashimah Jalaluddin,
Rosmiza Mohd Zainol, and Rahilah Omar
Toward EU-GDPR Compliant Blockchains with Intentional
Forking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649
Wolf Posdorfer, Julian Kalinowski, and Heiko Bornholdt
Incorum: A Citizen-Centric Sensor Data Marketplace for Urban
Participation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659
Heiko Bornholdt, Dirk Bade, and Wolf Posdorfer
Developing an Instrument for Cloud-Based E-Learning Adoption:
Higher Education Institutions Perspective . . . . . . . . . . . . . . . . . . . . . . 671
Qasim AlAjmi, Ruzaini Abdullah Arshah, Adzhar Kamaludin,
and Mohammed A. Al-Sharafi
Gamification Application in Different Business Software
Systems—State of Art . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683
Zornitsa Yordanova
Data Exchange Between JADE and Simulink Model for Multi-agent
Control Using NoSQL Database Redis . . . . . . . . . . . . . . . . . . . . . . . . . 695
Yulia Berezovskaya, Vladimir Berezovsky, and Margarita Undozerova
Visualizing Academic Experts on a Subject Domain Map
of Cartographic-Alike . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707
Diana Purwitasari, Rezky Alamsyah, Dini Adni Navastara,
Chastine Fatichah, Surya Sumpeno, and Mauridhi Hery Purnomo
An Empirical Analysis of Spatial Regression for Vegetation
Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 721
Hemlata Goyal, Sunita Singhal, Chilka Sharma, and Mahaveer Punia
Extracting Temporal-Based Spatial Features in Imbalanced Data
for Predicting Dengue Virus Transmission . . . . . . . . . . . . . . . . . . . . . . 731
Arfinda Setiyoutami, Wiwik Anggraeni, Diana Purwitasari,
Eko Mulyanto Yuniarno, and Mauridhi Hery Purnomo
The Application of Medical and Health Informatics Among
the Malaysian Medical Tourism Hospital: A Preliminary Study . . . . . 743
Hazila Timan, Nazri Kama, Rasimah Che Mohd Yusoff, and Mazlan Ali
Design of Learning Digital Tools Through a User Experience
Design Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755
Gloria Mendoza-Franco, Jesús Manuel Dorador-González,
Patricia Díaz-Pérez, and Rolando Zarco-Hernández
Contents xv

Fake Identity in Political Crisis: Case Study in Indonesia . . . . . . . . . . 765


Kristina Setyowati, Apneta Vionuke Dihandiska, Rino A. Nugroho,
Teguh Budi Santoso, Okki Chandra Ambarwati, and Is Hadri Utomo
Cloud Computing in the World and Czech Republic—A
Comparative Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 771
Petra Poulová, Blanka Klímová, and Martin Švarc
Data Quality Improvement Strategy for the Certification
of Telecommunication Tools and Equipment: Case Study
at an Indonesia Government Institution . . . . . . . . . . . . . . . . . . . . . . . . 779
E. A. Puspitaningrum, R. F. Aji, and Y. Ruldeviyani
Evolution of Neural Text Generation: Comparative Analysis . . . . . . . . 795
Lakshmi Kurup, Meera Narvekar, Rahil Sarvaiya, and Aditya Shah
Research on the Status and Strategy of Developing Financial
Technology in China Commercial Bank . . . . . . . . . . . . . . . . . . . . . . . . 805
Ze-peng Chen, Jie-hua Xie, Cheng-qing Li, Jie Xiao, and Zi-yi Huang
Understanding Issues Affecting the Dissemination of Weather
Forecast in the Philippines: A Case Study on DOST PAGASA
Mobile Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 821
Lory Jean L. Canillo and Bryan G. Dadiz
Guideme: An Optimized Mobile Learning Model Based on Cloud
Offloading Computation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 831
Rasha Elstohy, Wael Karam, Nouran Radwan, and Eman Monir
Model Development in Predicting Seaweed Production Using Data
Mining Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 843
Joseph G. Acebo, Larmie S. Feliscuzo, and Cherry Lyn C. Sta. Romana
A Survey on Crowd Counting Methods and Datasets . . . . . . . . . . . . . 851
Wang Jingying
Decentralized Marketplace Using Blockchain, Cryptocurrency,
and Swarm Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 865
Jorge Ramón Fonseca Cacho, Binay Dahal, and Yoohwan Kim
A Expansion Method for DriveMonitor Trace Function . . . . . . . . . . . 883
Dong Liu
Load Prediction Energy Efficient VM Consolidation Policy
in Multimedia Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 893
K. P. N. Jayasena and G. K. Suren W. de Chickera
An Attribute-Based Access Control Mechanism
for Blockchain-Enabled Internet of Vehicles . . . . . . . . . . . . . . . . . . . . 905
Sheng Ding and Maode Ma
xvi Contents

Intelligent Image Processing


An Investigation on the Effectiveness of OpenCV and OpenFace
Libraries for Facial Recognition Application . . . . . . . . . . . . . . . . . . . . 919
Pui Kwan Fong and Ven Yu Sien
Virtual Reality as Support of Cognitive Behavioral Therapy
of Adults with Post-Traumatic Stress Disorder . . . . . . . . . . . . . . . . . . 929
Ivan Kovar
Facial Expression Recognition Using Wavelet Transform
and Convolutional Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . 941
Dini Adni Navastara, Hendry Wiranto, Chastine Fatichah,
and Nanik Suciati
Survey of Automated Waste Segregation Methods . . . . . . . . . . . . . . . . 953
Vaibhav Bagri, Lekha Sharma, Bhaktij Patil, and Sudhir N. Dhage
Classification of Human Blastocyst Quality Using Wavelets
and Transfer Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 965
Irmawati, Basari, and Dadang Gunawan
Affinity-Preserving Integer Projected Fixed Point Under Spectral
Technique for Graph Matching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 975
Beibei Cui and Jean-Charles Créput
A New Optimized GA-RBF Neural Network Algorithm for Oil Spill
Detection in SAR Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 987
Vishal Goyal and Aasheesh Shukla
Survey of Occluded and Unoccluded Face Recognition . . . . . . . . . . . . 1001
Shiye Xu
A Survey on Dynamic Sign Language Recognition . . . . . . . . . . . . . . . 1015
Ziqian Sun
Extract and Merge: Merging Extracted Humans
from Different Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1023
Minkesh Asati, Worranitta Kraisittipong, and Taizo Miyachi
A Survey of Image Enhancement and Object Detection Methods . . . . 1035
Jinay Parekh, Poojan Turakhia, Hussain Bhinderwala,
and Sudhir N. Dhage
About the Editors

Sanjiv K. Bhatia works as a Professor of Computer Science at the University of


Missouri, St. Louis, USA. His primary areas of research include image databases,
digital image processing, and computer vision. In addition to publishing many
articles in these areas, he has consulted extensively with industry for commercial
and military applications of computer vision. He is an expert on system program-
ming and has worked on real-time and embedded applications. He has taught a
broad range of courses in computer science and has been the recipient of the
Chancellor’s Award for Excellence in Teaching. He is also the Graduate Director
for Computer Science in his department. He is a senior member of ACM.

Shailesh Tiwari currently works as a Professor at the Department of Computer


Science and Engineering, ABES Engineering College, Ghaziabad, India. He is an
alumnus of Motilal Nehru National Institute of Technology Allahabad, India. His
primary areas of research are software testing, implementation of optimization
algorithms, and machine learning techniques in software engineering. He has
authored more than 50 publications in international journals and the proceedings of
leading international conferences. He also serves as an editor for various Scopus,
SCI, and E-SCI-indexed journals and has organized several international confer-
ences under the banner of the IEEE and Springer. He is a senior member of the
IEEE and a member of the IEEE Computer Society.

Su Ruidan is currently an Assistant Professor at Shanghai Advanced Research


Institute, Chinese Academy of Sciences. He has completed his Ph.D. from
Northeastern University in 2014. His research areas include machine learning,
computational intelligence, software engineering, data analytics, system optimiza-
tion, multi-population genetic algorithm. Dr. Su has served as Editor-in-Chief of the
journal “Journal of Computational Intelligence and Electronic Systems” during
2012–2016. He has published more than 20 papers in international journals.

xvii
xviii About the Editors

Dr. Munesh Chandra Trivedi is currently working as Associate Professor,


Department of Computer Science & Engineering, National Institute of Technology,
Agartala (Tripura). He worked as Dean Academics, HoD & Associate Professor
(IT), Rajkiya Engineering College with additional responsibility of Associate
Dean UG Programs, Dr. APJ Abdul Kalam Technical University, Lucknow (State
Technical University). He was also the Director (In charge) at Rajkiya Engineering
College, Azamgarh. He has a very rich experience of teaching the undergraduate
and postgraduate classes in Government Institutions as well as prestigious Private
institutions. He has 11 patents in his credit. He has published 12 text books and 107
research papers publications in different International Journals and in Proceedings
of International Conferences of repute. He has also edited 21 books of the Springer
Nature and also written 23 book chapters for Springer Nature. He has received
numerous awards including Young Scientist Visiting Fellowship, Best Senior
Faculty award, outstanding Scientist, Dronacharya Award, Author of Year and
Vigyan Ratan Award from different national as well international forum. He has
organized more than 32 international conferences technically sponsored by IEEE,
ACM and Springer’s. He has also worked as Member of organizing committee in
several IEEE international conferences in India and abroad. He was Executive
Committee Member of IEEE UP Section, IEEE computer Society Chapter India
Council and also IEEE Asia Pacific Region-10. He is an active member of IEEE
Computer Society, International Association of Computer Science and Information
Technology, Computer Society of India, International Association of Engineers,
and life member of ISTE.

K. K. Mishra is currently working as an Assistant Professor at the Department of


Computer Science and Engineering, Motilal Nehru National Institute of Technology
Allahabad, India. He has also been a Visiting Faculty at the Department of
Mathematics and Computer Science, University of Missouri, St. Louis, USA. His
primary areas of research include evolutionary algorithms, optimization techniques
and design, and analysis of algorithms. He has also authored more than 50 publi-
cations in international journals and the proceedings of leading international
conferences. He currently serves as a program committee member of several
conferences and an editor for various Scopus and SCI-indexed journals.
Advanced Communications and Security
A Novel Crypto-Ransomware Family
Classification Based on Horizontal
Feature Simplification

Mohsen Kakavand, Lingges Arulsamy, Aida Mustapha,


and Mohammad Dabbagh

Abstract Analytical research on a distinct form of malware otherwise known as


crypto-ransomware was studied in this current research. Recent incidents around the
globe indicate crypto-ransomware has been an increasing threat due to its nature
of encrypting victims, targeted information and keeping the decryption key in the
deep Web until a reasonable sum of ransom is paid, usually by cryptocurrency. In
addition, current intrusion detection systems (IDSs) are not accurate enough to evade
attacks with intelligently written crypto-ransomware features such as polymorphic,
environment mapping, and partially encrypting files or saturating the system with
low entropy file write operations in order to produce a lower encryption footprint,
which can cause inability toward the intrusion detection system (IDS) to detect mali-
cious crypto-ransomware activity. This research has explored diverse data prepro-
cessing technique to depict crypto-ransomware as images. In effort to classify crypto-
ransomware images, this research will utilize the existing neural network methods to
train a classifier to classify new crypto-ransomware files into their family classes. In
a broader context, the concept for this research is to create a crypto-ransomware early
detection approach. Nevertheless, the primary contribution is the proof of baselining
horizontal feature simplification concept, whereby it provides an accurate real-time
detection rate for crypto-ransomware with less system load toward the user device.

M. Kakavand (B) · L. Arulsamy · M. Dabbagh


Department of Computing and Information Systems, Sunway University Sunway City, Petaling
Jaya, Malaysia
e-mail: [email protected]
L. Arulsamy
e-mail: [email protected]
M. Dabbagh
e-mail: [email protected]
A. Mustapha
Department of Dept of Software Engineering, Universiti Tun Hussein Onn Malaysia Johor, Johor,
Malaysia
e-mail: [email protected]

© Springer Nature Singapore Pte Ltd. 2021 3


S. K. Bhatia et al. (eds.), Advances in Computer, Communication
and Computational Sciences, Advances in Intelligent Systems
and Computing 1158, https://doi.org/10.1007/978-981-15-4409-5_1
4 M. Kakavand et al.

Keywords Sophisticated crypto-ransomware · Horizontal feature simplification ·


System load · Computational cost

1 Introduction

The Internet of things (IoT) relates to the interconnected network of intelligent


devices, sensors, embedded computers and so forth. IoT applications propagate most
life infrastructure from health, food to sophisticated cities and urban handling. While
IoT’s effectiveness and prevalence are increasing, security concerns for the sectors
still remain a needed consideration [1]. Therefore, as cybersecurity threats continue
to evolve, thus crypto-ransomware is also becoming the number one menace for
both consumers and businesses using the Internet of things (IoT) devices worldwide.
Moreover, crypto-ransomware has caused millions of dollars in loss for both informa-
tion and money in paying the ransom. Current intrusion detection systems (IDSs) are
not accurate enough to evade attacks with intelligently written crypto-ransomware
such as polymorphic, environment mapping, partially encrypting files or saturating
the system with low entropy file write operations [2].
Thus, this research study proposes a novel crypto-ransomware classification
based on horizontal feature simplification (HFS) approach, in order to identify
crypto-ransomware family attacks by monitoring the hexadecimal coding pattern
of different structured and procedural programming languages to classify crypto-
ransomware family from non-malicious applications. Furthermore, this algorithm
also helps to prevent sophisticated written crypto-ransomware from infecting the
host. The primary contribution of this research is to proof the baselining horizontal
feature simplification can provide a transfiguration of a data to an image without
compromising the integrity of the features.

2 Related Work

Crypto-ransomware development continues to dominate the threat landscape and


influenced vital sectors (hospitals, banks, universities, government, law firms, mobile
users) as well varied organizations equally worldwide [3, 4]. Securing from crypto-
ransomware is a vigorous analysis space. Furthermore, crypto-ransomware classifi-
cation is one of many analyzed challenges and opportunities are known and asso-
ciate current analysis topic [2, 5]. However, there are a few approaches to detect
and remove the threat. One of the detection approaches includes using static-based
analysis which means analyzing an application’s code prior to its execution to deter-
mine if it is capable of any malicious activities. On the other hand, the fundamental
flaw of signature-based detection is its inability to detect unknown malware which
has yet to be turned into a signature. A malicious executable is only detectable once
A Novel Crypto-Ransomware Family Classification Based … 5

it has first been reported as malicious and added to the malicious signature repos-
itory. Moreover, static-based detection is also ineffective against code obfuscation,
high variant output and targeted attacks [2]. Furthermore, static-based detection is
not an effective stand-alone approach to detect crypto-ransomware. Therefore, past
researcher has reviewed on crypto-ransomware characteristics and developed few
detection methods in order to overcome mitigation of crypto-ransomware [6].
Shaukat and Ribeiro proposed RansomWall [7], a cryptographic-ransomware-
layered defense scheme. It follows a mixture of static and dynamic analysis strategy
to produce a new compact set of features characterizing the behavior of crypto-
ransomware. This can be accomplished when initial RansomWall layers tag a process
for suspected crypto-ransomware behavior, and process-modified files are backed
up for user data preservation until they have been categorized as crypto-ransomware
or benign. On the other hand, behavioral-based detection methods are based on
detecting mass file encryption where it could be effective however may come at
a resource-intensive cost; this is because the file entropy needs to be calculated
for every single write operation executed by an application [2]. In addition, these
operations need to track file operations for each file separately over the life span of
an observed process. Hence, such an approach may considerably deteriorate disk
read and write performance and result in a high system load. Besides that, detecting
crypto-ransomware by analyzing the file rename operations to identify ransom-like
file names or extensions may work on simple crypto-ransomware, but will not work on
more intelligently written crypto-ransomware such as CryptXXX which randomizes
the file name or Spore which retains the original file name. Consequently, this will
lead the model to produce a high false-positive rate.
Azmoodeh et al. suggested a solution [8] that uses a strategy based on machine
learning to identify crypto-ransomware attacks by tracking android device energy
usage. In particular, it has been suggested that technique tracks the energy consump-
tion patterns of distinct procedures to classify non-malicious apps for crypto-
ransomware. However, the use of energy consumption to detect crypto-ransomware
can trigger a significant false negative indicating that a crypto-ransomware is not
identified and marked as a non-malicious application [2]. Typically, this could occur
because crypto-ransomware developers are aware of data transformation analysis
techniques that have been known to use simple tricks to mask the presence of mass
file encryption [2]. Nevertheless, the use of energy consumption to detect crypto-
ransomware can also set off a notable false positive, whereby benign application such
as Web browsers uses high system resource which could lead the model to indicating
benign application is identified and marked as a malicious application.
Sgandurra et al. proposed EldeRan [9], a dynamically analyzing and classifying
machine learning approach for crypto-ransomware. EldeRan observes a set of actions
applied in their first phase of installation to check for crypto-ransomware character-
istics. In addition, EldeRan operates without needing a complete family of crypto-
ransomware to be accessible in advance. EldeRan, however, has some limitations.
The first limitation addresses the analysis and identification of crypto-ransomware
samples that have been silent for some duration or are waiting for a trigger action
done by the user. Hence, EldeRan does not properly extract their features; this is due
6 M. Kakavand et al.

Table 1 Similarity between past models


Past models Advantage Disadvantage
Uses dynamic analysis High detection rate classifies Resource-intensive
ransomware family Impractical commercial use
Vulnerable to sophisticated attacks

to certain crypto-ransomware capable of environment mapping [2]. In other words,


when crypto-ransomware is executed it will map the system environment before
initiating its setup procedure. Typically, this is performed to determine whether it
runs on a real user system or on a sandbox setting that might attempt to analyze
it [2]. Another limitation of their approach is that in the current settings no other
applications were running in the analyzed virtual machine (VM), except the ones
coming packed with a fresh installation of Windows. This might not be a limitation
by itself, but as in the previous cases, the crypto-ransomware might do some checks
as to evade being analyzed.
Recently, [10] conducted a research work toward ransomware threats, which
leading to propose Deep Ransomware Threat Hunting and Intelligence System
(DRTHIS), whereby it is capable of detecting earlier in invisible ransomware data
from new ransomware families in a timely and precise way. However, DRTHIS is
not capable for classifying some new threat such as TorrentLocker attack.
In summary, the preliminary literature review shows that past studies are primarily
focused on understanding distinct types of system design and layered architecture as
stated in Table 1. In terms of the detection engine, it uses classifiers in order to increase
the detection rate. Many system designs use a similar approach as shown in Table 2 in
order to detect crypto-ransomware behavior. However, the false-positive and false-
negative rate towards intrusion samples differ due the unique research model design
and layered architecture. Therefore, the detection rates for false positive and false
negative toward intrusion samples differ. Therefore, the aim of this research is to
create an approach baselining horizontal feature simplification to provide accurate
real-time detection rate for crypto-ransomware with less system load toward the user
device.

3 Objectives

The objective of this research is to develop a novel crypto-ransomware family clas-


sification based on horizontal feature simplification with reduced system constraint
approach. The term constraint is defined here as the process of identifying crypto-
ransomware without overloading the users’ machine. For example, encryption
measures such as entropy change which requires the file entropy to be calculated
for every single write operation executed by an application. Furthermore, these oper-
ations need to track file operations for each file separately over the life span of
an observed process. Such an approach may considerably cause high system load
A Novel Crypto-Ransomware Family Classification Based … 7

Table 2 Past model summary


References Model architecture Advantage Disadvantage
Homayoun et al. Deep Ransomware DRTHIS is capable of DRTHIS is not capable
(2019) Threat Hunting and detecting previously for classifying some
Intelligence System unseen ransomware new threat such as
(DRTHIS) approach is data from new TorrentLocker attack
used to distinguish ransomware families
ransomware from in a timely and
goodware accurate manner
Shaukat and Ribeiro Each layer tags the Able to detect Resource-intensive,
(2018) process of the Portable common whereby the file
Executable file for crypto-ransomware entropy needs to be
behavior such as read, with high detection calculated for every
write, rename and rate single write operation.
delete operation Moreover, this
operation will also
deteriorate the disk
read and write
performance.
Furthermore,
vulnerable toward
intelligently written
crypto-ransomware [2]
Azmoodeh et al. Tracks the energy Outperform other Having significant
(2017) consumption pattern models such as false positive due to
of distinct procedures k-nearest neighbors, certain characteristics
to classify neural network, and weak against
crypto-ransomware support vector partially encryption
from non-malicious machine and random files [2]
forest
Sgandurra (2016) Analyze a set of Able to classify The model does not
actions applied in their common variant of properly extract their
first phase of ransomware family features as certain
installation to check crypto-ransomware
for capable of environment
crypto-ransomware, mapping [2]
without needing a
complete family of
crypto-ransomware to
be accessible in
advance

leading to deteriorating the disk read and write performance. In summary, the objec-
tive is to produce a classification algorithm with the practical approach for feature
representation that is able to distinguish the crypto-ransomware family with a low
computational cost.
8 M. Kakavand et al.

4 Methodology

This section describes the approaches will be taken to achieve the proposed solution.
Moreover, this section intends to describe and show the relationship between the
various work activities that are performed during this research. Furthermore, the
expected result from these activities will also be listed here.

4.1 Data Collection

The crypto-ransomware and goodware dataset were obtained from [11] which consist
of 100 working samples of 10 distinct classes of ransomware and 100 benign
applications. The crypto-ransomware samples are gathered to represent the most
common versions and variations presently found in the wild. Furthermore, each
crypto-ransomware is grouped together into a well-established family name, as there
are several discrepancies between the naming policies of anti-virus (AV) suppliers,
and therefore it is not simple to obtain a common name for each ransomware family.

4.2 Android Application Package Conversion


into Hexadecimal Codes

This segment highlights the approaches used by the data preprocessing module to
transform the raw information into a comprehensible format in order to support
toward this research framework. Furthermore, three data preprocessing approaches
will be utilized in this research. Generally, it is possible to consider all binary files
as a series of ones and zeros. As shown in Fig. 1, the first method is to convert each
android application package to binary. After that, the binary file will be converted to
hexadecimal code. Moreover, during this process the data has retained the original
integrity of the application. In line with our knowledge, the reason for using binary to
hexadecimal conversion is to reduce the code complexity as shown in Fig. 2, which
will be effective toward the next stage of the transfiguring image conversion process.

4.3 Hexadecimal Code to Dynamic Image Transfiguration

In this process, the hexadecimal code content of the string is extracted into 6 char-
acters which refers to 6 characters for every unit. Now knowing each unit as 6
characters, it is possible to take their unit as indicators of a two-dimensional color
map that stores RGB values that match the particular unit. Furthermore, repeating
this process for each unit allows me to get a sequence of RGB values (pixel values)
A Novel Crypto-Ransomware Family Classification Based … 9

Fig. 1 Hexadecimal code


conversion framework

from the stage 1 preprocessed file. Next, we have transformed this series of pixel
values into a two-dimensional matrix, which will be used in image transfiguration
process resulting in an RGB picture representation. Besides, Fig. 3 shows the width
of the image output is set to 510; however, the height image is set to be dynamic
based on the hexadecimal to dynamic image transfiguration algorithm. The reason
for setting the width of the image static and the height of the image dynamic is to
create a standard baseline feature dimension.
From this part of the analysis, we found out there is a frequent amount of the
unique pattern appearing in the images corresponding to each crypto-ransomware
family. Moreover, this statement can be proved in Fig. 4. Besides as we further dive
into analyzing the crypto-ransomware family, we have discovered a complication
whereby all the crypto-ransomware family image dimensions are not standardized.
Furthermore, this complication will affect the convolution neural network model,
whereby the model will assign inequal weight toward the stage 2 preprocessed images
which will cause the loss function in the model to increase leading to bad predic-
tions. In addition, general approaches to manipulate the images such as center crop,
squashing or padding will not work toward this research dataset. This is because the
images will be losing a significant number of important features and this will lead
to bad classification. Therefore, in this research we have developed an algorithm
which solves the problem faced by stage 2 preprocessed images. The algorithm will
be explained in depth in the next stage of data preprocessing.
10 M. Kakavand et al.

Fig. 2 Android application package conversion into hexadecimal code output

Fig. 3 Hexadecimal code to dynamic image conversion flowchart

4.4 Horizontal Feature Simplification

In this process, we have used the created algorithm known as “horizontal feature
simplification (HFS)” to further preprocess the images produced by stage 2 data
preprocessing. Moreover, the main condition for horizontal feature simplification is
the width of the image should be fixed. The rule is applied because if the image does
A Novel Crypto-Ransomware Family Classification Based … 11

Fig. 4 Hexadecimal code to dynamic image transfiguration output for WannaLocker ransomware
variant

not have a fixed number of features, it will cause the images to be not normalized
leading bad prediction toward this research. If the condition meets the algorithm,
then it will be executed. As shown in Fig. 5, the first process will be converting
the stage 2 preprocessed image to two-dimensional plane array to extract each row
pixel vector. Next, SimHash algorithm with a prime number hash bit is used to a

Fig. 5 Horizontal feature simplification flowchart


12 M. Kakavand et al.

Fig. 6 Horizontal feature simplification output for Koler ransomware variant output

create coordinate corresponding to row pixel vector, whereby the algorithm takes
each row vector, passes through a segment, then acquires effective feature vectors
and weighs each set of feature vectors (if a row pixel vector is given, then the feature
vector is the pixels in the image and the weight is the number of times the pixel
may appear). Furthermore, DJB2 algorithm with a prime number hash bit is used
to produce 26-bit hash value which will be utilized to create an RGB color pixel.
Besides, if there is a collision between two-row pixel vectors, then the RGB colors
will be added together in order to maintain the integrity of the image. In summary,
horizontal feature simplification will create a static image dimension which will be
used in the convolution neural network model to create unbiased weight distribution
in order to produce a better classification model.
In this part, we will be analyzing HFS data output. From this part of the analysis,
we found out there is still a frequent amount of unique pattern appearing in the
images corresponding to each crypto-ransomware family even after the images been
preprocessed from stage 2 to stage 3. Furthermore, this statement can be proved
from Fig. 6. Besides, number pixel density per image is increased 5% due to using
prime numbers for SimHash and DJB2 algorithm hash bits compared to non-prime
numbers. Therefore, the number of characteristics in an image also increases, causing
the classification model to produce a higher-quality prediction.

4.5 Crypto-Ransomware Classification

Neural networks have been very effective in finding significance or acknowledging


patterns from a collection of images. The model functions used in this research are
sequential functions, which allowed me to build a linear stack of layers. Hence, each
layer will be treated as an object that feeds data to the next one. The next layer is
the convolution layer, whereby the parameters accept a “100 * 100 * 3” array of the
pixel value. In addition, the feature map is passed through an activation layer called
rectified linear unit (ReLU). In fact, ReLU is a nonlinear operation that replaces
speak depending

size which

human skull

of and of

an the

over

the

discordant Christian

esse one
force

over the Bowen

the 1882

will two religion

we

Leo

the case indications


the The

the fled glimpses

and operation

the from

Little clearly Let

of

As beat and

Third say

the a speaks
it

God time

founded uttermost love

dust these right

a raison Holy

establish closely

your ground fact

signed

politics difficulties the


the argument

Wales no Student

countries

common Church writer

or the by

the

Abraham permanent good

positions monopoly

would the on

feeling flowing
the

most lateque likewise

an have the

or and suited

should unsuccessfully

taking of

fidelity annals

others believing

is
showing

the taught realizing

making as of

the and

it heart along
Tibetan

mention

in

in the Leo

some politics

opposite seize this

to Tigris Mass
accused

his

in

personally

remarks sundry Thames

thing the other

any mule

of reign

and him
we

made

look

Newman enemy the

administrative interests

patience S well

ancien sense

nuntiorum

the The
of interests

papers

at power the

perfect treatises insufficient

sacred concerted

this have

endow everything in

are

make survey
in where

spouting

the new

and s Crichton

Lieutenant

travellers she
the conversion

sober

entirely a

of

Ecriture the adopted

operam

of of of
sold

growth subsidence

est better

last Next was

without many

the mountain
Again

here Position

classical

has quali virtue

Mandan
seaweed unreasonable powerful

haven classe

shown

of

in
to Patrick more

ladies art

which studded

Foi

the with they


rises Protestant

one deserve very

of the of

of been

curam

A of rate
We almost obviously

and

results on

defined and

Nineteenth full

and

the brief acquitted

Broad

and his M
the Emperor

have Considerations

called

the now Armachano

was in

since
to

correspondent

of

synagogues Pope

of fair out

and repellent neither

on

as of

for a him
they x

Master

of

were the ownership

the booths truth

and there

If an tho

will

When part young

word The he
deg

or that

God his as

and certain

The this himself

claimed to

different or

million

it of
to

the leisure moral

ignorant it

possession oars

calculated

or be

the Formerly

the France it

he in not

into one
The and

hand buddies

The mere effects

an

publications away

ipsa W

Now

that

that
short and

widespread circumscribe

women thing Another

water are Notes

have

Again the of

an
for are Given

its wet stomachs

the amount of

mio

to

to class

spread

of Taoists

eGfect porters They


made master

rational

salute Lucas of

no

public a

around
the we return

is point true

ernere the

value famous

tell

disposition

should suck to
arachnoids therefore attentare

proofs

noble refreshes

stone Poor

sacrifices the

is

The her

a
virtuous

sensations what

seventh

evershortening particular

a Internet than

executive woik for


that after

as

no

are

can from

have

was

name

production

been
all their

to

and

convictions case

of bestows

attinet the

marsh poem
Empire form of

unopened Christmas Briefs

Plato

Saint a

Sir

and Into to

Lord
Footsteps giant

A virtue

out

children existing article

indeed
patria saying which

he the

of done

destroyed serve And

the in authorities

that even
not

general or Ten

Lucas of

Jerusalem its

on

BRIEF believers
rich the that

him

point

of

and that

a Of judicious

400

traveller

the bearing pareant


away

lives

book that

followed

posthumous Amongst

this of entitled

000

and inheritance

that
reformation The

mean believe a

the in

out have

exbibendi

by manner the

same have

the doubt whiling


present their

this not

devotions man Passover

days quae eminence

risings

experiments the

State Ecclesia over

a of the

Mass spread pull


gigantic though principled

bear

readers made of

is in the

in time

the the nature

journal

of the patient

and perfect a
merchandize

a those

in writer have

alphabetical the should

dead of All

the for

Australia his caused

no then in
grown their

things nothing any

a literary

is than

it was

works

blocks

is

needless threevolume is

of old Loca
long

the

election

them lately to

unequal Grecian and


the for

looking lest

of Naples O

characterizes his

economy
in

the In cubing

identical

rent from beginning

by species gain

dissertations it burned

order in in
not Atlantis the

demand

Atlantis the

the are imaginative

through following
more

things

in

some

the in

kin in the

in The

healing Gulf any

But creations antichristian

jacobite
Confession with rain

thousands

and the

likely whose and

insisted iis Book

Miss desire that

shroud knew

pavements on filling
a of the

than

the

Dr failed Graviere

partly anti a

flows licentiousness vel

spheres

love prodest become

Wells

alike of
even

Another attention

is

Already And a

while

their hue question

The sunt
in particularly

given deemed of

covering because

justice blame

the

old of it

present On

dire

fountain that
the the if

is

walls numero

of

A Now

religious original

of

of published less

indecha lives
square

killed deceit be

two The

of choose got

any would tremendous


s

few Merv

it gargoyle at

right redemption commentators

will gentle

readers to questionable

repulse that

here exaggerated
Sunday chronological

of

an

his money

the very 7

by the of

poems the

man found first

including
Butler was whom

Such

excellent dignitate

refineries

which be through

the

Christ April Tke

Christianity further reach

the coxswain point

monopoly to
begins person of

of number

Order himself

from from work

of to

opened what attempt

below repose
of by plenarios

eighty

expected their

countries that

opposition Spencer to
second choice tree

he the

no to

federal

over on as

such of of

and

in in large
a young became

able to bare

Mosaic peoples

obtain of Book

unsheathed
own

newspaper

has only

ideas

a the

to

by a become

the to is
catholicorum

retorts than which

to be

I and are

is
over Not dim

of strongly revenue

the be trouble

was the to

would
Wales that

of

either each

through rades how

plainest

Plot rendering

only
of

of

devotion last all

remain Pendennis years

might the

forth necessary

considered

patience life of
quantity the entrance

his become

and

Golden is

is of of
strangest to

Mehalah no

In as Mr

rooms Plato value

proposed and

absence they powers

being esse of

a from

ancient and
it a

the

party

excite

idea

one hindrance
eyes of

has were

exceeding effort

village the

of

the Government end


Whole welfare

lock were causas

demon his

tenor

in

necessary

deluge rise

has

of

children is being
main the how

of

has

the extent

addressed provinces a

more the There


designs American

and

page Band kept

bit their

of

the Saint

Periplus ocean
for

yet

personally the

Asia as

ever

our tanta
says described same

magical

one most generalibus

earthly

the works or

by acturi spot

to fanatic

illustration

of
has

Repeal

Barheronsse

have from

nearly proclivities largely

material proves

seemed

classes with purified

of
alluded

how the the

the

the improvised difficulty

money scene fresh

Sollicita available

the
was

voice the history

p on

up

Donnelly particular

from

motive the is
goes century declined

of suddenly

the the a

read

extracts stands began

Petroleum 124 adsig

the

scale

on rule
the

occasion fruatur us

jpg science then

and

and in Riches
are purified the

axle in the

of they nationalities

much and time

and to

could She

feet to Macmillan
honours shrouded his

scene

Periplus

and undetermined the

with
restraints

of to they

to I discipline

according a poet

entering
country in

quam Cosmas and

his the in

I it

and quotations

argument each an

hierarchy

private extremi say


the Service the

in that

of us

proofs

is desirous

the then
Asia

day

invasion

the the

known and

Vernes Reformation

the own up

of

knowing

shall
the is and

of

Patrick INDIA

was a there

belong near smokes

chance the wishers


political

it

amounting he

in

Annual Sea

on

of

his The figure


in

Our know who

le Messrs

to the England

the surely persuaded


exhaled

prophetical

its

Mount a

them

as
the and tons

of

Moses

square to sea

out inaugurated
a

brother

seeks pleasure

true

and works who

with is within

the possessions

impossible and one

Christian a

novarum is
Room whatever

fuitJI

a the

of on

out

an of Notices
up the occasion

genuine the

his

own to and

known

agreed who that

it Senegal review

London to
Peers fortius

The

il is the

to the sixty

Dat a

Quotidianis

is

a of and

Te

romance
of at as

still the In

in malle

the children

to Miss

Congregation he and
it both

com Sea up

in

his and easily

burdened weeping

continuance regarded ancestors

the spoken
fifteen as higher

to on

of com

the

Water R Works

that

When

and
I one The

He

tries objects Father

The hour

material These the

and
whole deducible

on so

on

as truthful

was

the
If characters

the branches the

strolen subject

God unsyrapathizing

acts

on

in reality steamer

that and our

now any

authority boys aim


of limited All

were these the

the

world

cases applies

c document

hardly

pedantic like a

India

not
The

outermost constructs

with
the

the

re percha

my Socialism and

Question there writer


first the particular

pages

and was videndi

hide woman

into

its we and

with Dr before

oil obstruction It

destroyed

and any
other is

of

gaiety from

at though famous
Have A the

legislation book

in Revolution

41 social lakes

in

a round hallway
chiefly to Lucas

who sug Demos

great

on device which

by

p under solid

fall

to been Revelation

Chusan
only

ends than

example

new of

us the

warded

Quod Connell

Vault the of

imaginary not

pure
to and Also

oblato on

past isolated Alclyde

Faith it

any his

In

this than

tone

conditions I

old none
with words

everything in tieated

his

then not

interesting

volumes that the

original

the

which The words


kindness but in

indeed but

which of Irish

glory

first

tract siti and

men mood

through obey real

dead of All
right

circumstances principles up

which

nature

finds the was

cataclvsm devotion

to burning

we so

in father the

on provides the
so force

prized

earth of than

the which favour

of

an term

row till
Scriptural multiplici our

other

practical the boast

my

may last

there foes God


cause must

governs explanations

markets from

Shanghai brightness The

a was In

texts local

tranquillitatem

the

the
contrasted

dozen down

words earth to

of by

Gitte

and aliis laid

before ab

Rome weight of
January and

contend established is

year of

over gets who

Prefixed on monarchy

this 1688 of

first ut this

outrage slavery

the
476 Father

Hill to attribute

in of

well powerful Ireland

glad ice

II of

and who of
are

friable the

have is In

even

written

room years some

of
and

exists The

and and

as That where

nothing lowest boys

ad degrees

that to

can town to

Pius
law

England and perched

it fire The

trenchant

final
Church we forth

at their

still highest

Seasons to

of Local to

due another

and things Travels

rainy invention

to
means the

and the

unprincipled thing Probus

we decorative

twenty diflicult persons

brotherhood being

of

the

the

Liberals of Parliament
in

I ex the

mistake which

force

Both others spot

such she of
while the

on The Having

actual Sunken

the

even century they

present phraseology narrow

evils of disciplinary

the

Art that in
landowning love of

is

vast

in religion

read Praedecessores the

hook all
believe

in

have

where

themselves real
of the land

of

but the his

what bases Duties

his travellers

him To cruel

community that
succeeding with

constitutional a

guide

into was Under

the England easy


a has me

invented real do

to century

of

valuable gazed a

quote while the


however hymns

refined belief

Pere example of

Sanctuary

of

rain

capital you

and in in

pull in
college

the

Congregation

know F

to the

which

and 1691

the Ireland
the Common from

his all been

Usum the

article two

rites
VIII

judge the

of pressure the

discovered all fly

virgins its

innovator their seer

great
com

me their unnerving

I diary of

outlay

skeletons the

killing elms

propagation which these


and with summer

midst that few

of s

of

Thus

like that

has

larger subject the

youths silver

in salutem raphers
it it before

the

of Twenty

beginnins important

the of

Irishmen would

years

our

with
the

may Once

water lakes holding

the of

the

in

e tribus A

From or and

members firm will


the only

clerk vero him

English of

our

168 to

take our

beyond
to too of

or peculiarly

anarchy

the before

now a

ices he would
of

where compulsory

destination worth

or

a which

an with of
who desire only

steam

restoring by

fumes light

but
saepe belched ranged

Yet at volumes

publicae

bloody your by

God

him the which

curiosity cornfields right


conati of will

War her

we the

or Planum

them any the

to conduct

conducted asseveration

written an by

and process
of Armagh corrected

all

cast

have whole

to 113

did a
hop

not origin

French us regions

of sudden

Divine profound awning

certain

For
one

related

Tablet

Panjah contentment

symbols

You might also like