Skip to main content

Blockchain-Based Secure Method for Tiger Detection Using Machine Learning

  • Chapter
  • First Online:
Convergence of Internet of Things and Blockchain Technologies

Abstract

The field of computer vision is encountering an extraordinary jump forward improvement today. This targets giving a thorough review of the ongoing advancement on computer vision calculations and their related equipment usage. Specifically, the noticeable accomplishments in computer vision errands, for example, picture characterization, object identification, and picture division, brought by profound learning methods are featured. Then again, survey of procedures for executing and upgrading profound learning put together by computer vision calculations with respect to Graphics Processing Units (GPU), Field Programmable Gate Arrays (FPGA), and other new ages of equipment quickening agents is introduced to encourage ongoing or potentially energy-productive activities. At long last, a few promising bearings for future examination are introduced to propel further advancement in the field. The capacity to convey remote sensor networks in far-off territories is making new occasions to screen jeopardized species and their current circumstance so as to guarantee their insurance and security, and trustworthiness is the fundamental issue in Internet of Things (IoT)-based organization climate in which capture attempt free made sure about correspondence is required. The blockchain innovation is one of the indisputable and tip-top procedures that can be used for the joining of security with remote frameworks. This part gives the definite contextual investigation on blockchain about IoT climate for checking and securing the natural life creatures like tigers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Redmon, J., Divvala, S., Girshick, R., & Farhadi, A. (2016). You only look once: Unified, real-time object detection. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). University of Washington, Allen Institute for AI, Facebook AI Research.

    Google Scholar 

  2. Lex, H., Phil, L., Narendra, P., Narayanarao, K., Arjun, G., & Karanth, K. (2009). A tiger cannot change its stripes: Using a three-dimensional model to match images of living tigers and tiger skins. Biology Letters, 5, 383–386. https://doi.org/10.1098/rsbl.2009.0028.

    Article  Google Scholar 

  3. Kumar, S., Gopalaswamy, A. M., & Karanth, K. U. (2011). Counting India’s wild tigers reliably. American Association for the Advancement of Science, 332(6031), 791.

    Google Scholar 

  4. Cheema, G. S., & Anand, S. (2017). Automatic detection and recognition of individuals in patterned species. Machine Learning and Knowledge Discovery in Database, 27–38.

    Google Scholar 

  5. Iyer, N., Jayanti, S., Lou, K., Kalyanaraman, Y., & Ramani, K. (2005). Three-dimensional shape searching: State-of-the-art review and future trends. Computer-Aided Design, 37(5), 509–530.

    Article  Google Scholar 

  6. Lowe, D. G. (2004). Distinctive image features from scale-invariant key points. Computer Science Department, and University of British Columbia, 60, 91–110.

    Google Scholar 

  7. Gowtham, M. Intrusion detection and avoidance for home and smart city automation in IoT. In IoT: Security and Privacy Paradigm. CRC Press, Taylor and Francis Group.

    Google Scholar 

  8. Bahga, A., & Madisetti, V. (2017). Blockchain applications: A hands-on approach. Computers & Internet.

    Google Scholar 

  9. Chondros, N., Kokordelis, K., & Roussopoulos, M. (2012). On the practicality of practical byzantine fault tolerance. ACM/IFIP/USENIX International Conference on Distributed Systems Platforms and Open Distributed Processing, 436–455.

    Google Scholar 

  10. Gowtham, M., Banga, M. K., & Patil, M. Secure internet of things: Assessing challenges and scopes for NextGen communication. In 2nd IEEE International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT-2019) at Vimal Jyothi Engineering College, Kerala.

    Google Scholar 

  11. Heilman, E., Kendler, A., Zohar, A., & Goldberg, S. (2015). Eclipse attacks on bitcoin’s peer-to-peer network. In Proceedings of the 24th USENIX Conference on Security Symposium, ser. SEC’15. USENIX Association (pp. 129–144).

    Google Scholar 

  12. Ohbuchi, R., Osada, K., Furuya, T., & Banno, T. Salient Local Visual Features for Shape-Based 3D Model Retrieval.

    Google Scholar 

  13. Gowtham, M. CL-PKA: Key management in dynamic wireless sensor network: A novel framework. In 3rd International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT-2018) at P.E.S College of Engineering, Mandya. Springer-LNEE.

    Google Scholar 

  14. Deepak, T., Shetty, S., & Kevin, A. K. (2017). Security implications of blockchain cloud with analysis of block withholding attack. In 17th IEEE/ACM International Symposium on Cluster Cloud and Grid Computing (CCGRID) (p. 458).

    Google Scholar 

  15. Kiayias, A., Russell, A., David, B., & Oliynykov, R. (2016). Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. Springer.

    MATH  Google Scholar 

  16. Swanson, T. Consensus-as-a-service: A brief report on the emergence of permissioned distributed ledger systems.

    Google Scholar 

  17. Duong, T., Fan, L., & Zhou, H. S. (2016). 2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely. Springer.

    Google Scholar 

  18. Wood, G. (2014). Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 151.

    Google Scholar 

  19. Ji, S., Cai, Z., Han, M., & Beyah, R. (2015). Whitespace measurement and virtual backbone construction for cognitive radio networks: From the social perspective. In Sensing Communication and Networking (SECON) 2015 12th Annual IEEE International Conference on IEEE (pp. 435–443).

    Chapter  Google Scholar 

  20. Han, M., Yan, M., Li, J., Ji, S., & Li, Y. (2014). Neighborhood-based uncertainty generation in social networks. Journal of Combinatorial Optimization, 28, 561–576.

    Article  MathSciNet  Google Scholar 

  21. Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). An overview of blockchain technology: Architecture consensus and future trends. In Big Data (BigData Congress) 2017 IEEE International Congress on IEEE (pp. 557–564).

    Chapter  Google Scholar 

  22. Min, X., Li, Q., Liu, L., & Cui, L. (2016, August). A permissioned blockchain framework for supporting instant transaction and dynamic block size. In 2016 IEEE Trustcom/BigDataSE/ISPA (pp. 90–96).

    Chapter  Google Scholar 

  23. Malkhi, D. (2012, January). Byzantine quorum systems. Distributed Computing, 4, 203213.

    Google Scholar 

  24. Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. (2016, May). Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In IEEE Symposium on Security and Privacy (pp. 839–858).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Vishwas, D.B., Gowtham, M., Ajay, A.V., Raghavendra, K., Ravi, V., Goundar, S. (2022). Blockchain-Based Secure Method for Tiger Detection Using Machine Learning. In: Gururaj, H.L., Ravi Kumar, V., Goundar, S., Elngar, A.A., Swathi, B.H. (eds) Convergence of Internet of Things and Blockchain Technologies. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-76216-2_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-76216-2_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-76215-5

  • Online ISBN: 978-3-030-76216-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics