• Title/Summary/Keyword: Internet Novel

Search Result 1,006, Processing Time 0.023 seconds

A Novel System for Detecting Adult Images on the Internet

  • Park, Jae-Yong;Park, Sang-Sung;Shin, Young-Geun;Jang, Dong-Sik
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.910-924
    • /
    • 2010
  • As Internet usage has increased, the risk of adolescents being exposed to adult content and harmful information on the Internet has also risen. To help prevent adolescents accessing this content, a novel detection method for adult images is proposed. The proposed method involves three steps. First, the Image Of Interest (IOI) is extracted from the image background. Second, the IOI is distinguished from the segmented image using a novel weighting mask, and it is determined to be acceptable or unacceptable. Finally, the features (color and texture) of the IOI or original image are compared to a critical value; if they exceed that value then the image is deemed to be an adult image. A Receiver Operating Characteristic (ROC) curve analysis was performed to define this optimal critical value. And, the textural features are identified using a gray level co-occurrence matrix. The proposed method increased the precision level of detection by applying a novel weighting mask and a receiver operating characteristic curve. To demonstrate the effectiveness of the proposed method, 2850 adult and non-adult images were used for experimentation.

Process-Aware Internet of Things: A Conceptual Extension of the Internet of Things Framework and Architecture

  • Kim, Meesun;Ahn, Hyun;Kim, Kwanghoon Pio
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.4008-4022
    • /
    • 2016
  • This paper tries to extend the conventional conceptual framework of the Internet of Things (IoT) so as to reify an advanced pervasive IoT-community collaboration concept, which is called the process-aware Internet of Things. The extended conceptual framework is embodied as a referential architecture that can be a standardized reference model supporting the conceptual integration of the Internet of Things and the process awareness. The extended referential architecture covers the full range of the architectural details from abstracting the process-aware behavioral semantics to reifying the IoT-process enactments. These extended framework and architecture ought to be the theoretical basis for implementing a process-aware IoT-community computing system supporting process-aware collaborations of Things in pervasive computing environments. In particular, we do point up that the proposed framework of the process-aware Internet of Things is revised from the Internet of Things framework announced in ITU-T SG133 Y.2060 [26] by integrating the novel concept of process awareness. We strongly believe that the extended conceptual framework and its referential architecture are able to deliver the novel and meaningful insight as a standardized platform for describing and achieving the goals of IoT-communities and societies.

A New Communication Network Model for Chat Agents in Virtual Space

  • Kim, Jong-Woo;Ji, Seong-Hyun;Kim, Seon-Yeong;Cho, Hwan-Gue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.2
    • /
    • pp.287-312
    • /
    • 2011
  • Internet chat programs and instant messaging services are becoming increasingly popular among Internet users. One of the crucial issues with Internet chat is how to manage the corresponding pairs of questions and answers in a sequence of conversations. Although many novel methodologies have been introduced to cope with this problem, most are poor in managing interruptions, organizing turn-taking, and conveying comprehension. The Internet environment is recently evolving into a 3D environment, but the problems with managing chat dialogues with the standard 2D text-based chat have remained. Therefore, we propose a more realistic communication model for chat agents in 3D virtual space in this paper. First, we propose a new method to measure the capacity of communication between chat agents and a novel visualization method to depict the hierarchical structure of chat dialogues. In addition, we are concerned with communication networks for virtual people (avatars) living in virtual worlds. In this paper we consider a microscopic aspect of a social network in a relatively short period of time. Our experiments show that our model is highly effective in a virtual chat environment, and the communication network based on our model greatly facilitates investigation of a very large and complicated communication network.

JND-based Multiple Description Image Coding

  • Zong, Jingxiu;Meng, Lili;Zhang, Huaxiang;Wan, Wenbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.3935-3949
    • /
    • 2017
  • In this paper, a novel multiple description image coding (MDC) scheme is proposed, which is based on the characteristics of the human visual model. Due to the inherent characteristics of human vision, the human eye can only perceive the change of the specific thresholds, that is, the just noticeable difference (JND) thresholds. Therefore, JND model is applied to improve MDC syetem. This paper calculates the DCT coefficients firstly, and then they are compared with the JND thresholds. The data that is less than the JND thresholds can be neglected, which will improve the coding efficiency. Compared with other existing methods, the experimental results of the proposed method are superior.

A Novel Image Encryption Using Calligraphy Based Scan Method and Random Number

  • Sivakumar, T;Venkatesan, R
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.6
    • /
    • pp.2317-2337
    • /
    • 2015
  • Cryptography provides an effective solution to secure the communication over public networks. The communication over public networks that includes electronic commerce, business and military services, necessitates the requirement of simple and robust encryption techniques. In this paper, a novel image encryption method which employs calligraphy based hybrid scan and random number is presented. The original image is scrambled by pixel position permutation with calligraphy based diagonal and novel calligraphy based scan patterns. The cipher image is obtained by XORing the scrambled image with random numbers. The suggested method resists statistical, differential, entropy, and noise attacks which have been demonstrated with a set of standard images.

Evaluating Internet Pricing Schemes: A Three-Dimensional Visual Model

  • Nguyen, Thuy T.T.;Armitage, Grenville J.
    • ETRI Journal
    • /
    • v.27 no.1
    • /
    • pp.64-74
    • /
    • 2005
  • Traditional Internet pricing schemes are coming under continual pressure to adapt to, and encourage, a changing mix of Internet applications and consumer usage patterns. Much research effort over the last decade has been focused on developing more efficient and attractive charging schemes. However, none of the proposed models has been widely deployed. This raises questions regarding the inhibiting factors and missing pieces that make pricing the Internet such a challenge. In this paper, we discuss the problems with current Internet pricing schemes, review the history of Internet pricing research over the last ten years, and summarize the key features and motivations of the most significant models. We develop a novel visual approach to comparing and evaluating such schemes using a three-dimensional (3D) metric encompassing technical efficiency, economic efficiency, and social impact. We address and discuss the important factors that have inhibited the deployment of the reviewed models and suggest productive areas of focus for future Internet pricing research.

  • PDF

A Novel Route Discovery Scheme Equipped with Two Augmented Functions for Ad Hoc Networks

  • Lee Hae-Ryong;Shin Jae-Wook;Na Jee-Hyeon;Jeong Youn-Kwae;Park Kwang-Roh;Kim Sang-Ha
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.3 no.1
    • /
    • pp.15-24
    • /
    • 2004
  • 'The delay and control overhead during route discovery for destinations outside ad hoc networks are major obstacle to achieving scalability in the Internet. To solve this issue, we propose a novel route discovery scheme equipped with two augmented functions. In this paper, the Internet gateway maintains an address cache of Internet nodes frequently accessed from the ad hoc network and replies with an extended Route Response (RREP) message to the Route Request (RREQ) message based on its routing table and the address cache called EXIT(EXternal node Information Table). These augmented functions make the source node determine the location of the destination as fast as possible. Through simulations, the proposed route discovery scheme using both EXIT and extended RREP message shows considerable' reduction in both route discovery time and control message overhead.

  • PDF

Efficient and Secure Sound-Based Hybrid Authentication Factor with High Usability

  • Mohinder Singh B;Jaisankar N.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2844-2861
    • /
    • 2023
  • Internet is the most prevailing word being used nowadays. Over the years, people are becoming more dependent on the internet as it makes their job easier. This became a part of everyone's life as a means of communication in almost every area like financial transactions, education, and personal-health operations. A lot of data is being converted to digital and made online. Many researchers have proposed different authentication factors - biometric and/or non-biometric authentication factors - as the first line of defense to secure online data. Among all those factors, passwords and passphrases are being used by many users around the world. However, the usability of these factors is low. Also, the passwords are easily susceptible to brute force and dictionary attacks. This paper proposes the generation of a novel passcode from the hybrid authentication factor - sound. The proposed passcode is evaluated for its strength to resist brute-force and dictionary attacks using the Shannon entropy and Passcode (or password) entropy formulae. Also, the passcode is evaluated for its usability. The entropy value of the proposed is 658.2. This is higher than that of other authentication factors. Like, for a 6-digit pin - the entropy value was 13.2, 101.4 for Password with Passphrase combined with Keystroke dynamics and 193 for fingerprint, and 30 for voice biometrics. The proposed novel passcode is far much better than other authentication factors when compared with their corresponding strength and usability values.

A novel route restoring method upon geo-tagged photos

  • Wang, Guannan;Wang, Zhizhong;Zhu, Zhenmin;Wen, Saiping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1236-1251
    • /
    • 2013
  • Sharing geo-tagged photos has been a hot social activity in the daily life because these photos not only contain geo information but also indicate people's hobbies, intention and mobility patterns. However, the present raw geo-tagged photo routes cannot provide information as enough as complete GPS trajectories due to the defects hidden in them. This paper mainly aims at analyzing the large amounts of geo-tagged photos and proposing a novel travel route restoring method. In our approach we first propose an Interest Measure Ratio to rank the hot spots based on density-based spatial clustering arithmetic. Then we apply the Hidden Semi-Markov model and Mean Value method to demonstrate migration discipline in the hot spots and restore the significant region sequence into complete GPS trajectory. At the end of the paper, a novel experiment method is designed to demonstrate that the approach is feasible in restoring route, and there is a good performance.

A Novel Perceptual Hashing for Color Images Using a Full Quaternion Representation

  • Xing, Xiaomei;Zhu, Yuesheng;Mo, Zhiwei;Sun, Ziqiang;Liu, Zhen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5058-5072
    • /
    • 2015
  • Quaternions have been commonly employed in color image processing, but when the existing pure quaternion representation for color images is used in perceptual hashing, it would degrade the robustness performance since it is sensitive to image manipulations. To improve the robustness in color image perceptual hashing, in this paper a full quaternion representation for color images is proposed by introducing the local image luminance variances. Based on this new representation, a novel Full Quaternion Discrete Cosine Transform (FQDCT)-based hashing is proposed, in which the Quaternion Discrete Cosine Transform (QDCT) is applied to the pseudo-randomly selected regions of the novel full quaternion image to construct two feature matrices. A new hash value in binary is generated from these two matrices. Our experimental results have validated the robustness improvement brought by the proposed full quaternion representation and demonstrated that better performance can be achieved in the proposed FQDCT-based hashing than that in other notable quaternion-based hashing schemes in terms of robustness and discriminability.