Mohamed Hamroun, Sonia Lajmi, H. Nicolas, Ikram Amous
{"title":"A new method of combining colour, texture and shape features using the genetic algorithm for image retrieval","authors":"Mohamed Hamroun, Sonia Lajmi, H. Nicolas, Ikram Amous","doi":"10.1504/ijmis.2019.10026482","DOIUrl":"https://doi.org/10.1504/ijmis.2019.10026482","url":null,"abstract":"Semi-automatic or automatic image indexation emerged because manual image indexation is slow and tedious. Generally, this first indexation is used as part of a content-based image retrieval system (CBIR). To have a powerful CBIR system, it is necessary to be concerned with three main facets: 1) the choice of the descriptors (based on shape, colour and texture and/or a combination between them); 2) the process of indexation and finally; 3) the retrieval process. In this work, we focus mainly on an indexing based on genetic algorithm and particle swarm optimisation (PSO) algorithm. We chose an optimal combination of colour, shape and texture (PCM: powerful combination method) descriptors. The fruit of our research work is implemented in a system called image search engine (ISE) which showed a very promising performance. In fact, the performance evaluation of the PCM method of our descriptors combination showed upgrades of the average precision metric from 66.6% to 89.30% for the 'food' category colour histogram, from 77.7% to 100% concerning CCV for the 'flower' category, and from 44.4% to 87.65% concerning the co-occurrence matrix for the 'building' category using the Corel dataset. Likewise, our ISE system showed much more interesting performance compared to what was shown in previous works.","PeriodicalId":312177,"journal":{"name":"Int. J. Multim. Intell. Secur.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130733719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Region-based colour image spatial fusion steganographic system","authors":"P. Viswanathan, P. Krishna","doi":"10.1504/IJMIS.2018.10017640","DOIUrl":"https://doi.org/10.1504/IJMIS.2018.10017640","url":null,"abstract":"The steganographic schemes embed secret data in the location of cover image generated by pseudo random number generator. These kinds of algorithms do not evaluate the content and size of the secret message during embedding. It creates distortion in smooth region of cover image and results in secret data loss. In order to solve the above issues, high-capacity novel region-based spatial fusion steganographic scheme is proposed in this paper. This spatial fusion decomposes the image into various regions based on the level of intensity. It is extensively used to evaluate the capacity of region for high payload. Size and type of secret data is initialised as a key for the extraction to improve the confidentiality and privacy. Then the secret message with key is embedded by differentiating the pixel by 1 with constraints not equal to 0 and even or odd option which leads to less rate of modification. The proposed scheme is applied in the region of blue channel which is less sensitive to human visual system gives high imperceptibility to secret data. It is experimented with standard IST natural images by steganalysis algorithms results in better enhancement of security and quality in terms of imperceptibility and embedding capacity when compare to other LSB approaches.","PeriodicalId":312177,"journal":{"name":"Int. J. Multim. Intell. Secur.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117168169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A reversible high capacity data hiding scheme using combinatorial strategy","authors":"Rajeev Kumar, S. Chand, Samayveer Singh","doi":"10.1504/IJMIS.2018.10017641","DOIUrl":"https://doi.org/10.1504/IJMIS.2018.10017641","url":null,"abstract":"In this paper, we propose a new reversible high capacity data hiding scheme using combinatorial strategy which has very less distortion while hiding the secret data. It first builds a location map for the pixels of the cover image and then identifies the embeddable pixels. It divides the image into pairs of embeddable pixels and hides the secret data bits in each pair. The values of the embeddable pixels are updated according to pre-specified rules. The pixel values get changed at most by one and some of them may remain unchanged. Thus, there are minor changes in pixel values, which helps our scheme to achieve very good quality and with good hiding capacity. Furthermore, it is very simple as it just increases or decreases the pixel values rather than performing complex computations. The experimental results show that our scheme is superior to the state of the art schemes.","PeriodicalId":312177,"journal":{"name":"Int. J. Multim. Intell. Secur.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129564402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoE in multimedia domain: a user-centric quality assessment","authors":"Yun Gao, Xin Wei, Liang Zhou, M. Guizani","doi":"10.1504/IJMIS.2018.10017673","DOIUrl":"https://doi.org/10.1504/IJMIS.2018.10017673","url":null,"abstract":"The rapid development of multimedia services has attracted increasing attention on the interests in the study of quality of experience (QoE) in the multimedia domain. QoE, as a promising user-centric quality evaluation metric, has gradually been a hot research topic in recent years. Compared with conventional multimedia service quality metrics [e.g., quality of service (QoS), peak-signal-noise-ratio (PSNR)], QoE is more concerned about user's subjective experience. Accordingly, a user-centric quality strategy brings an increasing popularity of QoE-driven applications in the multimedia domain. Therefore, in this paper, we present the latest development of QoE in the multimedia domain. Specifically, we first introduce the background of QoE, including the definitions of QoE and the relationship between QoS and QoE. Then, we explain the influence factors of QoE in detail, which are the basis of QoE modelling and prediction. Subsequently, we mainly present typical latest research work about QoE measurement and modelling in recent years. Moreover, we also exhibit our research work about QoE-driven multimedia applications. Finally, open challenges and research directions are presented in the conclusion for future studies.","PeriodicalId":312177,"journal":{"name":"Int. J. Multim. Intell. Secur.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121985031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improvement on OTP authentication and a possession-based authentication framework","authors":"Shushan Zhao, Wenhui Hu","doi":"10.1504/IJMIS.2018.10017674","DOIUrl":"https://doi.org/10.1504/IJMIS.2018.10017674","url":null,"abstract":"Authentication plays a paramount role in online services. Today many online services are still using password as single authentication method, but this is not considered secure any more. There have been many attempts to introduce multifactor authentication mechanism, for example, counter-based one-time password, and time-based one-time password. In this paper, we first list some limitations and weaknesses of the existing multifactor authentication methods, then propose an improvement to one-time password algorithms, and finally apply it in a general-purpose possession-based authentication framework. The framework can be implemented in popularly used smartphones but does not rely on cellular network or wifi network. The purpose of the framework is for current password-authenticated online services to adopt multifactor authentication easily.","PeriodicalId":312177,"journal":{"name":"Int. J. Multim. Intell. Secur.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128534715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Camera detection through internet of video sensors","authors":"T. Gao, Guo Li, Ping Wang, Chengshan Wang","doi":"10.1504/IJMIS.2013.056466","DOIUrl":"https://doi.org/10.1504/IJMIS.2013.056466","url":null,"abstract":"This paper describes the image pattern recognition techniques provided by the internet of things used to observe vehicles as well as the detection techniques used to tie each frame’s pattern recognition results together. Adaboost detection and wireless networks are used for video supervision. For wireless system, a camera that can transmit video signal to a receiver or to a wireless router without using any cable in between. The Wi-Fi technologies are used to transfer detection results which are located at the same base station. The experimental results prove the classifiers to be more efficient, and demonstrate superior classification performance of the proposed method, and the WSN frame has simple computational process, which can be easily used in real environments.","PeriodicalId":312177,"journal":{"name":"Int. J. Multim. Intell. Secur.","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131850361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of secured video transmission over 3G networks based on H.264/AVC","authors":"Varalakshmi Kumar, G. Sudha, Ilamparuthi Paruthi","doi":"10.1504/IJMIS.2013.056473","DOIUrl":"https://doi.org/10.1504/IJMIS.2013.056473","url":null,"abstract":"Video transmission in wireless environment is a challenging task calling for high-compression efficiency as well as network friendly design which is achieved by means of H.264/AVC. Video transmission for mobile terminals is a major application in 3G systems and is a key factor for its success. Wireless links are error-prone and unreliable and so video transmission over 3G networks experiences packet loss due to fading and interference causing substantial quality degradation to the video which may be avoided by appropriate error resilience features. Moreover, it is important that the video is transmitted in a secured manner in certain applications like video conferencing, medical applications etc. This is achieved with the help of suitable encryption techniques without affecting the quality of the decoded video. Encryption of video transmission in wireless environment with suitable error resilience techniques to achieve good quality is the main objective of this work. Performance analysis of secured video ...","PeriodicalId":312177,"journal":{"name":"Int. J. Multim. Intell. Secur.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126529430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhenyong Chen, Fangjie Fu, Zhuo Wang, Wei Fan, Z. Xiong
{"title":"A semi-fragile lossless digital watermarking based on adaptive threshold for image authentication","authors":"Zhenyong Chen, Fangjie Fu, Zhuo Wang, Wei Fan, Z. Xiong","doi":"10.1504/IJMIS.2013.056467","DOIUrl":"https://doi.org/10.1504/IJMIS.2013.056467","url":null,"abstract":"In this paper, a novel semi-fragile lossless digital watermarking method based on adaptive threshold for image authentication is presented. Most of the existing semi-fragile lossless watermarking schemes are based on modulo-256 addition to achieve losslessness. In order to avoid the salt-and-pepper noise, some of the schemes ignore the blocks which lead to overflow/underflow, and using error correction codes (ECCs). But the ECC will reduce available embedding capacity, especially for the complex images. We then propose an adaptive threshold method to improve the existing schemes. By employing a robust statistical quantity based on the patchwork to embed data, identifying image complexity based on wavelet-domain generalised Gaussian distribution (GGD) and using it to adaptively quantise thresholds which differentiating the embedding process, and using simple ECC, this technique has achieved losslessness, robustness and more competitive available embedding capacity. Experimental results demonstrate that the capacity of watermarked image of this technique is highly improved, and the quality of the image is acceptable.","PeriodicalId":312177,"journal":{"name":"Int. J. Multim. Intell. Secur.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116503473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vocabulary hierarchy optimisation based on spatial context and category information","authors":"Zhiguo Yang, Yuxin Peng, Jianguo Xiao","doi":"10.1504/IJMIS.2013.056470","DOIUrl":"https://doi.org/10.1504/IJMIS.2013.056470","url":null,"abstract":"In this paper, we focus on the hierarchy and discriminating ability of visual vocabulary. We propose to use the category information of images and the spatial context of keypoints to select appropriate visual words from different hierarchical levels. Existing approaches, such as flat vocabulary and vocabulary tree, can change the hierarchy of all visual words at the same time, by setting different cluster numbers and tree height respectively. However, the most appropriate visual words may be at different hierarchical levels, and existing approaches could not adjust the hierarchy of different visual words separately. To address this problem, we propose an object function to describe the consistence of visual words, with category information of images and spatial context of keypoints, and then we adopt simulated annealing algorithm to search for a sub-optimal solution, which corresponds to a visual vocabulary selected from the vocabulary tree. Different from existing methods, the proposed approach can selec...","PeriodicalId":312177,"journal":{"name":"Int. J. Multim. Intell. Secur.","volume":"144 46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114387255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient password-authenticated key agreement protocol for smart cards based on ECC","authors":"S. Kalra, S. Sood","doi":"10.1504/IJMIS.2013.056472","DOIUrl":"https://doi.org/10.1504/IJMIS.2013.056472","url":null,"abstract":"Today, networks are no longer limited to servers and desktops. A lot of information transfer is done over mobile devices like smart cards, cell phones, PDAs etc. User authentication and session key agreement is an important aspect of a secure information system. In this paper, we propose an efficient password-authenticated protocol for smart cards which provides user authentication and session key agreement. This protocol is based on ECC and has the following merits: 1) The computation and communication cost is low; 2) The password can be freely chosen by the user; 3) There is no time synchronisation problem; 4) It prevents the offline dictionary attack even if the information stored in the smart card is compromised; 5) It provides for mutual authentication and session key agreement; 6) All well known attacks are prevented using our protocol; 7) The identity of the user changes dynamically for every new session.","PeriodicalId":312177,"journal":{"name":"Int. J. Multim. Intell. Secur.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134503201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}