Wireless Sensor Networks is made of a large number of lowcost and low power sensor nodes that contains strictly limited sensing, computation, as well as communication abilities. Because of resource restricted sensor nodes, it is very important to reduce the amount of data transmission so the average sensor lifespan and also the total bandwidth utilization are generally increased. Data aggregation is the process of summarizing and merging sensor data to be able to minimize the number of data transmission in the network. Cluster based Data Aggregation approach, the data sensed by the sensor nodes are transferred to the cluster head and in the cluster head performs data aggregation and forwards results to the sink. Data aggregation could conserve energy (power) as well as bandwidth of the networks. As wireless sensor networks are generally used in remote and hostile environments in order to transfer very sensitive information, sensor nodes are susceptible to node compromise attacks and security problems such as data confidentiality and integrity are extremely crucial. Therefore, Secure Data aggregation protocol, must be designed with security in mind and investigates the relationship between security and data aggregation process within wireless sensor networks. In this paper, the secure data aggregation schemes are categorized into hop by hop aggregation and end to end aggregation. Here we explore a Homomorphic aggregation system based on a public key encryption (PKE) scheme to protect sensor data secure is proposed. Security analysis shows that our proposed protocol can guarantee end-to-end confidentiality and privacy.
General TermsSecure Data Aggregation, WSN, Privacy Homomorphism(PH).
Age changes cause major variations in the appearance of human faces. Due to many lifestyle factors, it is difficult to precisely predict how individuals may look with advancing years or how they looked with "retreating" years. This paper is a review of age variation methods and techniques, which is useful to capture wanted fugitives, finding missing children, updating employee databases, enhance powerful visual effect in film, television, gaming field. Currently there are many different methods available for age variation. Each has their own advantages and purpose. In this paper, different age variation methods with their prospects are reviewed. These are the selected methods and techniques that had been chosen for review: Anthropometric Model, Image morphing, Image Based Surface Detail Transfer (IBSDT), aging function (AGES), Gaussian Mixture Model (GMM).
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.