• Title/Summary/Keyword: Visual Security

Search Result 248, Processing Time 0.028 seconds

3D Point Clouds Encryption Method and Analysis of Encryption Ratio in Holographic Reconstruction Image (3D 공간정보 암호화 기법과 홀로그래픽 복원영상의 암호화 효율 분석)

  • Choi, Hyun-Jun;Seo, Young-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1703-1710
    • /
    • 2017
  • This paper propose a 3D point clouds (depth) security technique for digital holographic display service. Image contents encryption is a method to provide only authorized right owners with the original image information by encrypting the entire image or a part of the image. The proposed method detected an edge from a depth and performed quad tree decomposition, and then performed encryption. And encrypts the most significant block among the divided blocks. The encryption effect was evaluated numerically and visually. The experimental results showed that encrypting only 0.43% of the entire data was enough to hide the constants of the original depth. By analyzing the encryption amount and the visual characteristics, we verified a relationship between the threshold for detecting an edge-map. As the threshold for detecting an edge increased, the encryption ratio decreased with respect to the encryption amount.

Implementation of Network Traffic and QoS Monitoring System based on User Agent (사용자 에이전트 기반의 네트워크 트래픽 및 QoS 모니터링 시스템 구현)

  • Lee, Do-Hyeon;Jung, Jae-Il
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.41-50
    • /
    • 2008
  • Recently amount of traffic into the network rapidly increase since multimedia streaming services is generally adopted for application. In addition, various network management systems have been suggested for providing a stable service and QoS guarantee. It is necessary for such systems to have QoS monitoring module in order to evaluate acceptance or violation of QoS requirements by analogizing a state information of each node within network. In this paper, we suggest a network management system to evaluate QoS level between end-to-end agents and analysis traffics transmitted between them. The proposed system is implemented for the purpose of collecting network traffic information and monitoring of the view. The proposed system makes user easily understand information of QoS parameters such as throughput, delay and jitter by adopting a method of visual and numerical representation. To achieve this, we purportedly generate test packet into network for confirming acceptance or violation of QoS requirements from point of view of multimedia application service.

  • PDF

Development of Power System Health Algorithm (전력계통 건전성 지수 알고리즘 개발)

  • Lim, Jin-Taek;Lee, Sung-Hun;Lee, Yeon-Chan;Choi, Jae-Seok;Choi, Hong-Seok;Joo, Joon-Young
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.10
    • /
    • pp.1328-1336
    • /
    • 2014
  • This paper proposes Power System Health Index(PSHI) newly. The paper describes several kind of power system health indices based on two main categories, which are adequacy and security. In adequacy, four kinds of health indices of Frequency, Voltage, Reserve(Operating Reserve Power and Frequency Regulation Reserve Power) and Overload of lines and transformers are proposed. In security, four kinds of health indices of Voltage(154kV, 345kV and 765kV), Overload of lines and transformers, Power flow constraint among areas and SPS are proposed. All indices are mapped with three domains, which are indicated as Health, Margin and Risk, defined with expert interview. While domains of health, margin and risk is defined similar with the conventional well being analysis of power system. The criterion of the domains is proposed using an interview with expert operators and practical reliability codes in Korea. The several kinds of health index functions, which are linear ratio, piecewise linear ration and reverse ratio function etc. are developed in this paper. It will be expected that the developed health indices can help operators to control power system more successfully and also prevent power system from accident as like as black out in future because operator can make a decision immediately based on more easily visual information of system conditions from too much indices acquisition of complex power system.

A Novel RGB Image Steganography Using Simulated Annealing and LCG via LSB

  • Bawaneh, Mohammed J.;Al-Shalabi, Emad Fawzi;Al-Hazaimeh, Obaida M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.143-151
    • /
    • 2021
  • The enormous prevalence of transferring official confidential digital documents via the Internet shows the urgent need to deliver confidential messages to the recipient without letting any unauthorized person to know contents of the secret messages or detect there existence . Several Steganography techniques such as the least significant Bit (LSB), Secure Cover Selection (SCS), Discrete Cosine Transform (DCT) and Palette Based (PB) were applied to prevent any intruder from analyzing and getting the secret transferred message. The utilized steganography methods should defiance the challenges of Steganalysis techniques in term of analysis and detection. This paper presents a novel and robust framework for color image steganography that combines Linear Congruential Generator (LCG), simulated annealing (SA), Cesar cryptography and LSB substitution method in one system in order to reduce the objection of Steganalysis and deliver data securely to their destination. SA with the support of LCG finds out the optimal minimum sniffing path inside a cover color image (RGB) then the confidential message will be encrypt and embedded within the RGB image path as a host medium by using Cesar and LSB procedures. Embedding and extraction processes of secret message require a common knowledge between sender and receiver; that knowledge are represented by SA initialization parameters, LCG seed, Cesar key agreement and secret message length. Steganalysis intruder will not understand or detect the secret message inside the host image without the correct knowledge about the manipulation process. The constructed system satisfies the main requirements of image steganography in term of robustness against confidential message extraction, high quality visual appearance, little mean square error (MSE) and high peak signal noise ratio (PSNR).

The Accessibility of Taif University Blackboard for Visually Impaired Students

  • Alnfiai, Mrim;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.258-268
    • /
    • 2021
  • Online learning systems are becoming an effective educational medium for many universities. The accessibility of online learning system in universities means that every student, including the visually impaired, is able use all the site's services. This research focuses on investigating the accessibility of online learning systems for visually impaired users. The paper purpose is to understand the perception of visually impaired undergraduate students towards Blackboard's accessibility and to make recommendations for a new Blackboard design with accessible features that support their needs. Impact of a new Blackboard design with accessible features on visually impaired students, using Taif University students as a case study is evaluated in this paper, as it is similar to most learning systems used by Saudi universities. A study on Taif University's utilization of Blackboard was conducted using mixed method approaches (an automatic tool and a user study). In the first phase, Taif's use of Blackboard was evaluated by the web accessibility tool called AChecker. In the second phase, we conducted a user study to verify previously discovered accessibility challenges to fully assess them according to the accessibility and usability guidelines. In this study, the accessibility of Taif University's Blackboard was evaluated by thirteen visually impaired undergraduate students. The results of the study show that Blackboard has accessibility issues, which are confusing navigation, incompatibility with assistive technologies, untitled pages or parts, unclear identification for visual elements, and inaccessible PDF files. This paper also introduces a set of recommendations that aim to improve the accessibility of Blackboard and other educational websites developed for this population. It also highlights the serious need for universities to enhance web accessibility for online learning systems for students with disabilities.

A Novel Approach to COVID-19 Diagnosis Based on Mel Spectrogram Features and Artificial Intelligence Techniques

  • Alfaidi, Aseel;Alshahrani, Abdullah;Aljohani, Maha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.195-207
    • /
    • 2022
  • COVID-19 has remained one of the most serious health crises in recent history, resulting in the tragic loss of lives and significant economic impacts on the entire world. The difficulty of controlling COVID-19 poses a threat to the global health sector. Considering that Artificial Intelligence (AI) has contributed to improving research methods and solving problems facing diverse fields of study, AI algorithms have also proven effective in disease detection and early diagnosis. Specifically, acoustic features offer a promising prospect for the early detection of respiratory diseases. Motivated by these observations, this study conceptualized a speech-based diagnostic model to aid in COVID-19 diagnosis. The proposed methodology uses speech signals from confirmed positive and negative cases of COVID-19 to extract features through the pre-trained Visual Geometry Group (VGG-16) model based on Mel spectrogram images. This is used in addition to the K-means algorithm that determines effective features, followed by a Genetic Algorithm-Support Vector Machine (GA-SVM) classifier to classify cases. The experimental findings indicate the proposed methodology's capability to classify COVID-19 and NOT COVID-19 of varying ages and speaking different languages, as demonstrated in the simulations. The proposed methodology depends on deep features, followed by the dimension reduction technique for features to detect COVID-19. As a result, it produces better and more consistent performance than handcrafted features used in previous studies.

Digital Marketing Tools for Managing the Development of Park and Recreation Complexes

  • Chaikovska, Maryna;Mashika, Hanna;Mankovska, Ruslana;Liulchak, Zoreslava;Haida, Pavlo;Diakova, Yana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.154-162
    • /
    • 2022
  • Digital marketing tools are actively used in managing the development of park and recreation complexes to familiarize the population with the objects of natural heritage. This article aims to empirically evaluate digital marketing tools for popularizing the park and recreational complexes. The methodology was based on the concept of ecosystem value of park and recreation complexes as a natural heritage site. These methods included: identifying and selecting websites with information about park and recreation complexes in Slovakia and Ukraine. structural analysis of the main channels of online details about natural parks. Assessing the current state of online identity of the studied sites from the perspective of Internet users. The results indicate that to manage the development of park and recreational complexes developed their driven official websites in the Internet space, on which sections structure the information with the allocation of data on tourism and recreational potential. The article identifies additional digital marketing tools for managing the development of park and recreation complexes, particularly social networks and tourist websites. There is a sufficient amount of information about tourist recreation sites within these natural parks and tourist routes. Among the main problems of the websites: the information on the websites is entirely textual, there is a lack of sufficient data on social networks, despite the created official pages, there is no video content, which was more attracted tourists and visitors, allowing a visual assessment of the tourist potential; there is a problem of many communication channels to present the natural heritage of the countries. The research proves that the website is the primary and most common digital marketing tool for natural heritage, structuring information about tourism potential and recreation.

Using Roots and Patterns to Detect Arabic Verbs without Affixes Removal

  • Abdulmonem Ahmed;Aybaba Hancrliogullari;Ali Riza Tosun
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.1-6
    • /
    • 2023
  • Morphological analysis is a branch of natural language processing, is now a rapidly growing field. The fundamental tenet of morphological analysis is that it can establish the roots or stems of words and enable comparison to the original term. Arabic is a highly inflected and derivational language and it has a strong structure. Each root or stem can have a large number of affixes attached to it due to the non-concatenative nature of Arabic morphology, increasing the number of possible inflected words that can be created. Accurate verb recognition and extraction are necessary nearly all issues in well-known study topics include Web Search, Information Retrieval, Machine Translation, Question Answering and so forth. in this work we have designed and implemented an algorithm to detect and recognize Arbic Verbs from Arabic text.The suggested technique was created with "Python" and the "pyqt5" visual package, allowing for quick modification and easy addition of new patterns. We employed 17 alternative patterns to represent all verbs in terms of singular, plural, masculine, and feminine pronouns as well as past, present, and imperative verb tenses. All of the verbs that matched these patterns were used when a verb has a root, and the outcomes were reliable. The approach is able to recognize all verbs with the same structure without requiring any alterations to the code or design. The verbs that are not recognized by our method have no antecedents in the Arabic roots. According to our work, the strategy can rapidly and precisely identify verbs with roots, but it cannot be used to identify verbs that are not in the Arabic language. We advise employing a hybrid approach that combines many principles as a result.

Image-based Soft Drink Type Classification and Dietary Assessment System Using Deep Convolutional Neural Network with Transfer Learning

  • Rubaiya Hafiz;Mohammad Reduanul Haque;Aniruddha Rakshit;Amina khatun;Mohammad Shorif Uddin
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.158-168
    • /
    • 2024
  • There is hardly any person in modern times who has not taken soft drinks instead of drinking water. The rate of people taking soft drinks being surprisingly high, researchers around the world have cautioned from time to time that these drinks lead to weight gain, raise the risk of non-communicable diseases and so on. Therefore, in this work an image-based tool is developed to monitor the nutritional information of soft drinks by using deep convolutional neural network with transfer learning. At first, visual saliency, mean shift segmentation, thresholding and noise reduction technique, collectively known as 'pre-processing' are adopted to extract the location of drinks region. After removing backgrounds and segment out only the desired area from image, we impose Discrete Wavelength Transform (DWT) based resolution enhancement technique is applied to improve the quality of image. After that, transfer learning model is employed for the classification of drinks. Finally, nutrition value of each drink is estimated using Bag-of-Feature (BoF) based classification and Euclidean distance-based ratio calculation technique. To achieve this, a dataset is built with ten most consumed soft drinks in Bangladesh. These images were collected from imageNet dataset as well as internet and proposed method confirms that it has the ability to detect and recognize different types of drinks with an accuracy of 98.51%.

Multimedia Technologies for Teaching Musical Art under Present-day Conditions

  • Svitlana Huralna;Nataliia Demianko;Nataliia Sulaieva;Viktoriia Irkliienko;Tetiana Horokhivska
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.165-171
    • /
    • 2024
  • The processes of society's informatization and digitalization necessitate the widespread use of new pedagogical technologies. Through these technologies, comprehensive disclosure of didactic functions of new methods of educational activity and the realization of the potential and creative potential. The use of information and computer multimedia technologies in teaching music art is especially relevant in the intensification of the development of interactive technologies, the transition to mixed forms of learning, and a period of socio-economic and sociopolitical upheavals. The study aims to substantiate the theoretical and applied principles of the analysis of multimedia technology learning musical art in modern conditions and assess the status and trends in their use in conducting educational activities. The study uses general scientific and unique methods of economic analysis, in particular, analysis and synthesis, analogy and comparison, generalization and systematization, and graphic ways. Regarding the results of the study of multimedia technologies for teaching musical art in current conditions, it was found that they contribute to the development of the seeker's creative, creative, and cognitive activity, have a positive impact on learning material, and diversify the educational process. Multimedia technologies such as presentations, programs for watching a video, listening to audio, music and singing karaoke, electronic encyclopedias, and Internet resources are proven to be the most used in music education. They have several qualitative and quantitative advantages, manifested in the possibilities of audio-visual presentation of educational material and significantly higher information density. It is suggested to strengthen the use of such computer programs as Microsoft Word, Ahead Nero, Finale, Adobe Audition, Sound Forge, and Microsoft PowerPoint for musical art classes.