• Title/Summary/Keyword: Visual Security

Search Result 248, Processing Time 0.024 seconds

Data Hiding in Halftone Images by XOR Block-Wise Operation with Difference Minimization

  • Yang, Ching-Nung;Ye, Guo-Cin;Kim, Cheon-Shik
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.2
    • /
    • pp.457-476
    • /
    • 2011
  • This paper presents an improved XOR-based Data Hiding Scheme (XDHS) to hide a halftone image in more than two halftone stego images. The hamming weight and hamming distance is a very important parameter affecting the quality of a halftone image. For this reason, we proposed a method that involves minimizing the hamming weights and hamming distances between the stego image and cover image in $2{\times}2$-pixel grids. Moreover, our XDHS adopts a block-wise operation to improve the quality of a halftone image and stego images. Furthermore, our scheme improves security by using a block-wise operation with A-patterns and B-patterns. Our XDHS method achieves a high quality with good security compared to the prior arts. An experiment verified the superiority of our XDHS compared with previous methods.

Detecting Doors Edges in Diverse Environments for Visually Disabled People

  • Habib, Mohamed Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.9-15
    • /
    • 2021
  • It is a challenge for visually impaired people to access unfamiliar environments independently, hence the quality of life is reduced, and safety of life is compromised. An accurate and reliable door detection system comprising of way finding and indoor navigation can be beneficial for a large number of autonomous and mobile applications for visually impaired people. This paper illustrates an image-based door detection scheme for visually impaired people using stable features (edges and corners) including color averaging and image resizing. Simulation results show that the proposed scheme shows a significant improvement when compared with existing scheme.

Adaptive data hiding scheme based on magic matrix of flexible dimension

  • Wu, Hua;Horng, Ji-Hwei;Chang, Chin-Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3348-3364
    • /
    • 2021
  • Magic matrix-based data hiding schemes are applied to transmit secret information through open communication channels safely. With the development of various magic matrices, some higher dimensional magic matrices are proposed for improving the security level. However, with the limitation of computing resource and the requirement of real time processing, these higher dimensional magic matrix-based methods are not advantageous. Hence, a kind of data hiding scheme based on a single or a group of multi-dimensional flexible magic matrices is proposed in this paper, whose magic matrix can be expanded to higher dimensional ones with less computing resource. Furthermore, an adaptive mechanism is proposed to reduce the embedding distortion. Adapting to the secret data, the magic matrix with least distortion is chosen to embed the data and a marker bit is exploited to record the choice. Experimental results confirm that the proposed scheme hides data with high security and a better visual quality.

Empirical Evaluation of Indian Tourism Websites

  • Kaur, Anupriya
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.63-68
    • /
    • 2022
  • Given the competition between different tourist destinations to attract domestic and international tourists it is absolutely vital to examine their website efficacy on specific attributes. This study employs one of the recently developed multi-criteria decision-making method the Best-Worst Method to assess the state government official tourism website across four Indian states known for their tourism potential- Himachal Pradesh, Uttrakhand, Uttar Pradesh and Rajasthan on specific attributes provided by the widely acknowledged WebQual instrument. Information Fit-to-Task and Trust emerged as the most important criterion. Relative advantage and Innovation the least important. The results of the study are easily interpretable and visual. They offer both an individual and comparative analysis of the perceived website efficacy on specific attributes to facilitate tourism stakeholders and website administrators to strategize and make their digital presence effective and competitive.

A Quantitative Approach for Data Visualization in Human Resource Management

  • Bandar Abdullah AlMobark
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.133-139
    • /
    • 2023
  • As the old saying goes "a picture is worth a thousand words" data visualization is essential in almost every industry. Companies make Data-driven decisions and gain insights from visual data. However, there is a need to investigate the role of data visualization in human resource management. This review aims to highlight the power of data visualization in the field of human resources. In addition, visualize the latest trends in the research area of human resource and data visualization by conducting a quantitative method for analysis. The study adopted a literature review on recent publications from 2017 to 2022 to address research questions.

Speech Emotion Recognition with SVM, KNN and DSVM

  • Hadhami Aouani ;Yassine Ben Ayed
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.40-48
    • /
    • 2023
  • Speech Emotions recognition has become the active research theme in speech processing and in applications based on human-machine interaction. In this work, our system is a two-stage approach, namely feature extraction and classification engine. Firstly, two sets of feature are investigated which are: the first one is extracting only 13 Mel-frequency Cepstral Coefficient (MFCC) from emotional speech samples and the second one is applying features fusions between the three features: Zero Crossing Rate (ZCR), Teager Energy Operator (TEO), and Harmonic to Noise Rate (HNR) and MFCC features. Secondly, we use two types of classification techniques which are: the Support Vector Machines (SVM) and the k-Nearest Neighbor (k-NN) to show the performance between them. Besides that, we investigate the importance of the recent advances in machine learning including the deep kernel learning. A large set of experiments are conducted on Surrey Audio-Visual Expressed Emotion (SAVEE) dataset for seven emotions. The results of our experiments showed given good accuracy compared with the previous studies.

COLORNET: Importance of Color Spaces in Content based Image Retrieval

  • Judy Gateri;Richard Rimiru;Micheal Kimwele
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.33-40
    • /
    • 2023
  • The mainstay of current image recovery frameworks is Content-Based Image Retrieval (CBIR). The most distinctive retrieval method involves the submission of an image query, after which the system extracts visual characteristics such as shape, color, and texture from the images. Most of the techniques use RGB color space to extract and classify images as it is the default color space of the images when those techniques fail to change the color space of the images. To determine the most effective color space for retrieving images, this research discusses the transformation of RGB to different color spaces, feature extraction, and usage of Convolutional Neural Networks for retrieval.

Multi-Focus Image Fusion Using Transformation Techniques: A Comparative Analysis

  • Ali Alferaidi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.39-47
    • /
    • 2023
  • This study compares various transformation techniques for multifocus image fusion. Multi-focus image fusion is a procedure of merging multiple images captured at unalike focus distances to produce a single composite image with improved sharpness and clarity. In this research, the purpose is to compare different popular frequency domain approaches for multi-focus image fusion, such as Discrete Wavelet Transforms (DWT), Stationary Wavelet Transforms (SWT), DCT-based Laplacian Pyramid (DCT-LP), Discrete Cosine Harmonic Wavelet Transform (DC-HWT), and Dual-Tree Complex Wavelet Transform (DT-CWT). The objective is to increase the understanding of these transformation techniques and how they can be utilized in conjunction with one another. The analysis will evaluate the 10 most crucial parameters and highlight the unique features of each method. The results will help determine which transformation technique is the best for multi-focus image fusion applications. Based on the visual and statistical analysis, it is suggested that the DCT-LP is the most appropriate technique, but the results also provide valuable insights into choosing the right approach.

A Bibliometric Analysis Data Visualization in Human Resource Management

  • Bandar Abdullah AlMobark
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.162-168
    • /
    • 2023
  • As the old saying goes "a picture is worth a thousand words" data visualization is essential in almost every industry. Companies make Data-driven decisions and gain insights from visual data. However, there is a need to investigate the role of data visualization in human resource management. This review aims to highlight the power of data visualization in the field of human resources. In addition, visualize the latest trends in the research area of human resource and data visualization by conducting a bibliometric analysis. The study adopted a literature review on recent publications from 2017 to 2022 to address research questions.

Reversible Multipurpose Watermarking Algorithm Using ResNet and Perceptual Hashing

  • Mingfang Jiang;Hengfu Yang
    • Journal of Information Processing Systems
    • /
    • v.19 no.6
    • /
    • pp.756-766
    • /
    • 2023
  • To effectively track the illegal use of digital images and maintain the security of digital image communication on the Internet, this paper proposes a reversible multipurpose image watermarking algorithm based on a deep residual network (ResNet) and perceptual hashing (also called MWR). The algorithm first combines perceptual image hashing to generate a digital fingerprint that depends on the user's identity information and image characteristics. Then it embeds the removable visible watermark and digital fingerprint in two different regions of the orthogonal separation of the image. The embedding strength of the digital fingerprint is computed using ResNet. Because of the embedding of the removable visible watermark, the conflict between the copyright notice and the user's browsing is balanced. Moreover, image authentication and traitor tracking are realized through digital fingerprint insertion. The experiments show that the scheme has good visual transparency and watermark visibility. The use of chaotic mapping in the visible watermark insertion process enhances the security of the multipurpose watermark scheme, and unauthorized users without correct keys cannot effectively remove the visible watermark.