P. Sojan Lal

Learn More
— Software obfuscation or obscuring a software is an approach to defeat the practice of reverse engineering a software for using its functionality illegally in the development of another software. Java applications are more amenable to reverse engineering and re-engineering attacks through methods such as decompilation because Java class files store the(More)
Fingerprint classification is an important part of fingerprint identification system that works on large databases to increase its matching speed. In this paper, an automatic fingerprint classification method is proposed to classify the fingerprint images by combining singular points and Gray Level Co-occurrence Matrix (GLCM) features. Co-occurrence(More)
— Array restructuring operations obscure arrays. Our work aims on java source code obfuscation containing arrays. Our main proposal is Classes with restructured array members and obscured member methods for setting, getting array elements and to get the length of arrays. The class method definition codes are obscured through index transformation and(More)
Reference point identification is important in automatic fingerprint recognition system as it can be used to align fingerprints in a correct orientation in spite of the possibility of different transformations in fingerprint images. It is also used in fingerprint classification, as it is desirable to classify fingerprint images for forensic type(More)
Web Usage Mining also known as Web Log Mining is the extraction of user behaviour from web log data. The log files also provide immense information about the search engine traffic at a website. This search engine traffic is helpful to analyse the ethics of search engines, quality of the crawlers, periodicity of the visits and also the server load. Search(More)