SlideShare a Scribd company logo
Privacy and Quality Preserving Multimedia Data
Aggregation for Participatory Sensing Systems
ABSTRACT:
With the popularity of mobile wireless devices equipped with various kinds of
sensing abilities, a new service paradigm named participatory sensing has emerged
to provide users with brand new life experience. However, the wide application of
participatory sensing has its own challenges, among which privacy and multimedia
data quality preservations are two critical problems. Unfortunately, none of the
existing work has fully solved the problem of privacy and quality preserving
participatory sensing with multimedia data. In this paper, we propose SLICER,
which is the first k-anonymous privacy preserving scheme for participatory sensing
with multimedia data. SLICER integrates a data coding technique and message
transfer strategies, to achieve strong protection of participants’ privacy, while
maintaining high data quality. Specifically, we study two kinds of data transfer
strategies, namely transfer on meet up (TMU) and minimal cost transfer (MCT).
For MCT, we propose two different but complimentary algorithms, including an
approximation algorithm and a heuristic algorithm, subject to different strengths of
the requirement. Furthermore, we have implemented SLICER and evaluated its
performance using publicly released taxi traces. Our evaluation results show that
SLICER achieves high data quality, with low computation and communication
overhead.
EXISTING SYSTEM:
In the current state-of-the-art, a number of privacy preserving techniques for
participatory sensing systems, especially the location-based services (LBSs), have
been proposed by previous researchers, mainly to address the privacy of data
source identity, user location, user trajectory, and sensing data content itself. These
techniques can be classified into the following four categories.
1. Randomization Based Techniques
2. Generalization
3. Cloaking Techniques
4. Cryptography Based Solutions
DISADVANTAGES OF EXISTING SYSTEM:
 Sensing record sent to the service provider, is usually attached with spatio-
temporal tags indicating the location and time information of the data
collected.
 Most of existing applications of participatory sensing only collect small
pieces of sensing data (e.g., temperature, velocity, and geographic location).
 Applying existing privacy preserving schemes to participatory sensing with
multimedia data is not satisfactory, since existing schemes either induce
unacceptable amount of communication cost, or degrade the utility/ quality
of the data badly, in caseof multimedia sensing.
PROPOSED SYSTEM:
 In this paper, we present SLICER, which is a coding based k-anonymous
privacy preserving scheme, working on application layer, for participatory
sensing with multimedia data. Intuitively, k-anonymity means that the
service provider cannot identify the contributor of each sensing record from
a group of at least k participants.
 We propose SLICER for participatory sensing with multimedia data, to
achieve both k-anonymous privacy preservation and high data quality, with
low communication and computation overhead.
 We design an erasure coding based sensing record coding scheme to encode
each sensing record into a number of data slices, each of which can be
delivered to the service provider through the other participants or the
record’s generator herself. When a proper data slice exchanging strategy is
applied, the contributor of each particular sensing record is hidden in a group
of at least k participants.
 We propose two kinds of strategies for slice transfer. The first and
straightforward strategy is named Transfer on Meet Up (TMU), which is to
transfer a slice upon meeting another participant. The latter delivers the slice
to the service provider. The second kind contains two complementary sub-
optimal strategies to transfer the slices to a set of participants that might be
met within a required period of time, minimizing the total cost while
guaranteeing that the sensing record can be delivered to the service provider
with guaranteed high probability, which is named Minimal Cost Transfer
(MCT). The cost difference can be resulted from the wireless
communication fee, available bandwidth, battery power, and so on.
 We have implemented SLICER and evaluated its performance using
publicly released real traces of taxis. Evaluation results show that SLICER
achieves high data quality, with low computation and communication
overhead.
ADVANTAGES OF PROPOSED SYSTEM:
 SLICER proposed in this paper is a coding-based k-anonymous privacy
preserving scheme for high quality multimedia data aggregation in
participatory sensing systems.
 SLICER integrates a data coding technique and message exchanging
strategies, to achieve strong protection of participants’ privacy, while
maintaining high data quality and inducing low communication and
computation overhead.
 High data quality, with low communication and computation overhead.
SYSTEM ARCHITECTURE
BLOCK DIAGRAM
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7/LINUX.
 Implementation : NS2
 NS2 Version : NS2.2.28
 Front End : OTCL (Object Oriented Tool Command
Language)
 Tool : Cygwin (To simulate in Windows OS)
REFERENCE:
Fudong Qiu, Student Member, IEEE, Fan Wu, Member, IEEE, and Guihai Chen,
Senior Member, IEEE, “Privacy and Quality Preserving Multimedia Data
Aggregation for Participatory Sensing Systems”, IEEE TRANSACTIONS ON
MOBILE COMPUTING, VOL. 14, NO. 6, JUNE 2015.

More Related Content

Viewers also liked

Viewers also liked (6)

Key recovery attacks on kids, a keyed
Key recovery attacks on kids, a keyedKey recovery attacks on kids, a keyed
Key recovery attacks on kids, a keyed
 
Vlsi assisted nonrigid registration using modified demons algorithm
Vlsi assisted nonrigid registration using modified demons algorithmVlsi assisted nonrigid registration using modified demons algorithm
Vlsi assisted nonrigid registration using modified demons algorithm
 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of network
 
Eye gaze tracking with a web camera
Eye gaze tracking with a web cameraEye gaze tracking with a web camera
Eye gaze tracking with a web camera
 
Defeating jamming with the power of silence
Defeating jamming with the power of silenceDefeating jamming with the power of silence
Defeating jamming with the power of silence
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
 

Similar to Privacy and quality preserving multimedia data

Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...
IJECEIAES
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
Editor IJARCET
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
Editor IJARCET
 
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an image
Iaetsd Iaetsd
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
 

Similar to Privacy and quality preserving multimedia data (20)

Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocol
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
Integrity for join queries in the cloud
Integrity for join queries in the cloudIntegrity for join queries in the cloud
Integrity for join queries in the cloud
 
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
 
Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security Projects
 
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an image
 
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoring
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projects
 
M.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsM.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security Projects
 
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 

More from jpstudcorner

More from jpstudcorner (20)

Variable length signature for near-duplicate
Variable length signature for near-duplicateVariable length signature for near-duplicate
Variable length signature for near-duplicate
 
Robust representation and recognition of facial
Robust representation and recognition of facialRobust representation and recognition of facial
Robust representation and recognition of facial
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
 
Pareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrievalPareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrieval
 
Multifocus image fusion based on nsct
Multifocus image fusion based on nsctMultifocus image fusion based on nsct
Multifocus image fusion based on nsct
 
Image super resolution based on
Image super resolution based onImage super resolution based on
Image super resolution based on
 
Fractal analysis for reduced reference
Fractal analysis for reduced referenceFractal analysis for reduced reference
Fractal analysis for reduced reference
 
Face sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy searchFace sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy search
 
Face recognition across non uniform motion
Face recognition across non uniform motionFace recognition across non uniform motion
Face recognition across non uniform motion
 
Combining left and right palmprint images for
Combining left and right palmprint images forCombining left and right palmprint images for
Combining left and right palmprint images for
 
A probabilistic approach for color correction
A probabilistic approach for color correctionA probabilistic approach for color correction
A probabilistic approach for color correction
 
A no reference texture regularity metric
A no reference texture regularity metricA no reference texture regularity metric
A no reference texture regularity metric
 
A feature enriched completely blind image
A feature enriched completely blind imageA feature enriched completely blind image
A feature enriched completely blind image
 
Sel csp a framework to facilitate
Sel csp a framework to facilitateSel csp a framework to facilitate
Sel csp a framework to facilitate
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertain
 
Psmpa patient self controllable
Psmpa patient self controllablePsmpa patient self controllable
Psmpa patient self controllable
 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detection
 
Page a partition aware engine
Page a partition aware enginePage a partition aware engine
Page a partition aware engine
 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of network
 

Recently uploaded

Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
Kamal Acharya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
Kamal Acharya
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
Kamal Acharya
 

Recently uploaded (20)

Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in KrakówNatalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Kraków
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering Workshop
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdf
 
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and ClusteringKIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
 
Furniture showroom management system project.pdf
Furniture showroom management system project.pdfFurniture showroom management system project.pdf
Furniture showroom management system project.pdf
 
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES  INTRODUCTION UNIT-IENERGY STORAGE DEVICES  INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
 
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
 
IT-601 Lecture Notes-UNIT-2.pdf Data Analysis
IT-601 Lecture Notes-UNIT-2.pdf Data AnalysisIT-601 Lecture Notes-UNIT-2.pdf Data Analysis
IT-601 Lecture Notes-UNIT-2.pdf Data Analysis
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Pharmacy management system project report..pdf
Pharmacy management system project report..pdfPharmacy management system project report..pdf
Pharmacy management system project report..pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 

Privacy and quality preserving multimedia data

  • 1. Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems ABSTRACT: With the popularity of mobile wireless devices equipped with various kinds of sensing abilities, a new service paradigm named participatory sensing has emerged to provide users with brand new life experience. However, the wide application of participatory sensing has its own challenges, among which privacy and multimedia data quality preservations are two critical problems. Unfortunately, none of the existing work has fully solved the problem of privacy and quality preserving participatory sensing with multimedia data. In this paper, we propose SLICER, which is the first k-anonymous privacy preserving scheme for participatory sensing with multimedia data. SLICER integrates a data coding technique and message transfer strategies, to achieve strong protection of participants’ privacy, while maintaining high data quality. Specifically, we study two kinds of data transfer strategies, namely transfer on meet up (TMU) and minimal cost transfer (MCT). For MCT, we propose two different but complimentary algorithms, including an approximation algorithm and a heuristic algorithm, subject to different strengths of the requirement. Furthermore, we have implemented SLICER and evaluated its
  • 2. performance using publicly released taxi traces. Our evaluation results show that SLICER achieves high data quality, with low computation and communication overhead. EXISTING SYSTEM: In the current state-of-the-art, a number of privacy preserving techniques for participatory sensing systems, especially the location-based services (LBSs), have been proposed by previous researchers, mainly to address the privacy of data source identity, user location, user trajectory, and sensing data content itself. These techniques can be classified into the following four categories. 1. Randomization Based Techniques 2. Generalization 3. Cloaking Techniques 4. Cryptography Based Solutions DISADVANTAGES OF EXISTING SYSTEM:  Sensing record sent to the service provider, is usually attached with spatio- temporal tags indicating the location and time information of the data collected.  Most of existing applications of participatory sensing only collect small pieces of sensing data (e.g., temperature, velocity, and geographic location).
  • 3.  Applying existing privacy preserving schemes to participatory sensing with multimedia data is not satisfactory, since existing schemes either induce unacceptable amount of communication cost, or degrade the utility/ quality of the data badly, in caseof multimedia sensing. PROPOSED SYSTEM:  In this paper, we present SLICER, which is a coding based k-anonymous privacy preserving scheme, working on application layer, for participatory sensing with multimedia data. Intuitively, k-anonymity means that the service provider cannot identify the contributor of each sensing record from a group of at least k participants.  We propose SLICER for participatory sensing with multimedia data, to achieve both k-anonymous privacy preservation and high data quality, with low communication and computation overhead.  We design an erasure coding based sensing record coding scheme to encode each sensing record into a number of data slices, each of which can be delivered to the service provider through the other participants or the record’s generator herself. When a proper data slice exchanging strategy is applied, the contributor of each particular sensing record is hidden in a group of at least k participants.
  • 4.  We propose two kinds of strategies for slice transfer. The first and straightforward strategy is named Transfer on Meet Up (TMU), which is to transfer a slice upon meeting another participant. The latter delivers the slice to the service provider. The second kind contains two complementary sub- optimal strategies to transfer the slices to a set of participants that might be met within a required period of time, minimizing the total cost while guaranteeing that the sensing record can be delivered to the service provider with guaranteed high probability, which is named Minimal Cost Transfer (MCT). The cost difference can be resulted from the wireless communication fee, available bandwidth, battery power, and so on.  We have implemented SLICER and evaluated its performance using publicly released real traces of taxis. Evaluation results show that SLICER achieves high data quality, with low computation and communication overhead. ADVANTAGES OF PROPOSED SYSTEM:  SLICER proposed in this paper is a coding-based k-anonymous privacy preserving scheme for high quality multimedia data aggregation in participatory sensing systems.  SLICER integrates a data coding technique and message exchanging strategies, to achieve strong protection of participants’ privacy, while
  • 5. maintaining high data quality and inducing low communication and computation overhead.  High data quality, with low communication and computation overhead.
  • 7. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7/LINUX.  Implementation : NS2  NS2 Version : NS2.2.28  Front End : OTCL (Object Oriented Tool Command Language)  Tool : Cygwin (To simulate in Windows OS)
  • 8. REFERENCE: Fudong Qiu, Student Member, IEEE, Fan Wu, Member, IEEE, and Guihai Chen, Senior Member, IEEE, “Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 6, JUNE 2015.