Int. J. Multim. Intell. Secur.最新文献

筛选
英文 中文
A new method of combining colour, texture and shape features using the genetic algorithm for image retrieval 一种结合颜色、纹理和形状特征的遗传算法用于图像检索的新方法
Int. J. Multim. Intell. Secur. Pub Date : 2019-11-01 DOI: 10.1504/ijmis.2019.10026482
Mohamed Hamroun, Sonia Lajmi, H. Nicolas, Ikram Amous
{"title":"A new method of combining colour, texture and shape features using the genetic algorithm for image retrieval","authors":"Mohamed Hamroun, Sonia Lajmi, H. Nicolas, Ikram Amous","doi":"10.1504/ijmis.2019.10026482","DOIUrl":"https://doi.org/10.1504/ijmis.2019.10026482","url":null,"abstract":"Semi-automatic or automatic image indexation emerged because manual image indexation is slow and tedious. Generally, this first indexation is used as part of a content-based image retrieval system (CBIR). To have a powerful CBIR system, it is necessary to be concerned with three main facets: 1) the choice of the descriptors (based on shape, colour and texture and/or a combination between them); 2) the process of indexation and finally; 3) the retrieval process. In this work, we focus mainly on an indexing based on genetic algorithm and particle swarm optimisation (PSO) algorithm. We chose an optimal combination of colour, shape and texture (PCM: powerful combination method) descriptors. The fruit of our research work is implemented in a system called image search engine (ISE) which showed a very promising performance. In fact, the performance evaluation of the PCM method of our descriptors combination showed upgrades of the average precision metric from 66.6% to 89.30% for the 'food' category colour histogram, from 77.7% to 100% concerning CCV for the 'flower' category, and from 44.4% to 87.65% concerning the co-occurrence matrix for the 'building' category using the Corel dataset. Likewise, our ISE system showed much more interesting performance compared to what was shown in previous works.","PeriodicalId":312177,"journal":{"name":"Int. J. Multim. Intell. Secur.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130733719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Region-based colour image spatial fusion steganographic system 基于区域的彩色图像空间融合隐写系统
Int. J. Multim. Intell. Secur. Pub Date : 2018-11-30 DOI: 10.1504/IJMIS.2018.10017640
P. Viswanathan, P. Krishna
{"title":"Region-based colour image spatial fusion steganographic system","authors":"P. Viswanathan, P. Krishna","doi":"10.1504/IJMIS.2018.10017640","DOIUrl":"https://doi.org/10.1504/IJMIS.2018.10017640","url":null,"abstract":"The steganographic schemes embed secret data in the location of cover image generated by pseudo random number generator. These kinds of algorithms do not evaluate the content and size of the secret message during embedding. It creates distortion in smooth region of cover image and results in secret data loss. In order to solve the above issues, high-capacity novel region-based spatial fusion steganographic scheme is proposed in this paper. This spatial fusion decomposes the image into various regions based on the level of intensity. It is extensively used to evaluate the capacity of region for high payload. Size and type of secret data is initialised as a key for the extraction to improve the confidentiality and privacy. Then the secret message with key is embedded by differentiating the pixel by 1 with constraints not equal to 0 and even or odd option which leads to less rate of modification. The proposed scheme is applied in the region of blue channel which is less sensitive to human visual system gives high imperceptibility to secret data. It is experimented with standard IST natural images by steganalysis algorithms results in better enhancement of security and quality in terms of imperceptibility and embedding capacity when compare to other LSB approaches.","PeriodicalId":312177,"journal":{"name":"Int. J. Multim. Intell. Secur.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117168169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A reversible high capacity data hiding scheme using combinatorial strategy 一种基于组合策略的可逆大容量数据隐藏方案
Int. J. Multim. Intell. Secur. Pub Date : 2018-11-30 DOI: 10.1504/IJMIS.2018.10017641
Rajeev Kumar, S. Chand, Samayveer Singh
{"title":"A reversible high capacity data hiding scheme using combinatorial strategy","authors":"Rajeev Kumar, S. Chand, Samayveer Singh","doi":"10.1504/IJMIS.2018.10017641","DOIUrl":"https://doi.org/10.1504/IJMIS.2018.10017641","url":null,"abstract":"In this paper, we propose a new reversible high capacity data hiding scheme using combinatorial strategy which has very less distortion while hiding the secret data. It first builds a location map for the pixels of the cover image and then identifies the embeddable pixels. It divides the image into pairs of embeddable pixels and hides the secret data bits in each pair. The values of the embeddable pixels are updated according to pre-specified rules. The pixel values get changed at most by one and some of them may remain unchanged. Thus, there are minor changes in pixel values, which helps our scheme to achieve very good quality and with good hiding capacity. Furthermore, it is very simple as it just increases or decreases the pixel values rather than performing complex computations. The experimental results show that our scheme is superior to the state of the art schemes.","PeriodicalId":312177,"journal":{"name":"Int. J. Multim. Intell. Secur.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129564402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
QoE in multimedia domain: a user-centric quality assessment 多媒体领域的质量评价:以用户为中心的质量评价
Int. J. Multim. Intell. Secur. Pub Date : 2018-11-30 DOI: 10.1504/IJMIS.2018.10017673
Yun Gao, Xin Wei, Liang Zhou, M. Guizani
{"title":"QoE in multimedia domain: a user-centric quality assessment","authors":"Yun Gao, Xin Wei, Liang Zhou, M. Guizani","doi":"10.1504/IJMIS.2018.10017673","DOIUrl":"https://doi.org/10.1504/IJMIS.2018.10017673","url":null,"abstract":"The rapid development of multimedia services has attracted increasing attention on the interests in the study of quality of experience (QoE) in the multimedia domain. QoE, as a promising user-centric quality evaluation metric, has gradually been a hot research topic in recent years. Compared with conventional multimedia service quality metrics [e.g., quality of service (QoS), peak-signal-noise-ratio (PSNR)], QoE is more concerned about user's subjective experience. Accordingly, a user-centric quality strategy brings an increasing popularity of QoE-driven applications in the multimedia domain. Therefore, in this paper, we present the latest development of QoE in the multimedia domain. Specifically, we first introduce the background of QoE, including the definitions of QoE and the relationship between QoS and QoE. Then, we explain the influence factors of QoE in detail, which are the basis of QoE modelling and prediction. Subsequently, we mainly present typical latest research work about QoE measurement and modelling in recent years. Moreover, we also exhibit our research work about QoE-driven multimedia applications. Finally, open challenges and research directions are presented in the conclusion for future studies.","PeriodicalId":312177,"journal":{"name":"Int. J. Multim. Intell. Secur.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121985031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improvement on OTP authentication and a possession-based authentication framework 改进OTP身份验证和基于所有权的身份验证框架
Int. J. Multim. Intell. Secur. Pub Date : 2018-11-30 DOI: 10.1504/IJMIS.2018.10017674
Shushan Zhao, Wenhui Hu
{"title":"Improvement on OTP authentication and a possession-based authentication framework","authors":"Shushan Zhao, Wenhui Hu","doi":"10.1504/IJMIS.2018.10017674","DOIUrl":"https://doi.org/10.1504/IJMIS.2018.10017674","url":null,"abstract":"Authentication plays a paramount role in online services. Today many online services are still using password as single authentication method, but this is not considered secure any more. There have been many attempts to introduce multifactor authentication mechanism, for example, counter-based one-time password, and time-based one-time password. In this paper, we first list some limitations and weaknesses of the existing multifactor authentication methods, then propose an improvement to one-time password algorithms, and finally apply it in a general-purpose possession-based authentication framework. The framework can be implemented in popularly used smartphones but does not rely on cellular network or wifi network. The purpose of the framework is for current password-authenticated online services to adopt multifactor authentication easily.","PeriodicalId":312177,"journal":{"name":"Int. J. Multim. Intell. Secur.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128534715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Camera detection through internet of video sensors 摄像头检测通过互联网的视频传感器
Int. J. Multim. Intell. Secur. Pub Date : 2013-09-23 DOI: 10.1504/IJMIS.2013.056466
T. Gao, Guo Li, Ping Wang, Chengshan Wang
{"title":"Camera detection through internet of video sensors","authors":"T. Gao, Guo Li, Ping Wang, Chengshan Wang","doi":"10.1504/IJMIS.2013.056466","DOIUrl":"https://doi.org/10.1504/IJMIS.2013.056466","url":null,"abstract":"This paper describes the image pattern recognition techniques provided by the internet of things used to observe vehicles as well as the detection techniques used to tie each frame’s pattern recognition results together. Adaboost detection and wireless networks are used for video supervision. For wireless system, a camera that can transmit video signal to a receiver or to a wireless router without using any cable in between. The Wi-Fi technologies are used to transfer detection results which are located at the same base station. The experimental results prove the classifiers to be more efficient, and demonstrate superior classification performance of the proposed method, and the WSN frame has simple computational process, which can be easily used in real environments.","PeriodicalId":312177,"journal":{"name":"Int. J. Multim. Intell. Secur.","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131850361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of secured video transmission over 3G networks based on H.264/AVC 基于H.264/AVC的3G网络安全视频传输性能分析
Int. J. Multim. Intell. Secur. Pub Date : 2013-09-23 DOI: 10.1504/IJMIS.2013.056473
Varalakshmi Kumar, G. Sudha, Ilamparuthi Paruthi
{"title":"Performance analysis of secured video transmission over 3G networks based on H.264/AVC","authors":"Varalakshmi Kumar, G. Sudha, Ilamparuthi Paruthi","doi":"10.1504/IJMIS.2013.056473","DOIUrl":"https://doi.org/10.1504/IJMIS.2013.056473","url":null,"abstract":"Video transmission in wireless environment is a challenging task calling for high-compression efficiency as well as network friendly design which is achieved by means of H.264/AVC. Video transmission for mobile terminals is a major application in 3G systems and is a key factor for its success. Wireless links are error-prone and unreliable and so video transmission over 3G networks experiences packet loss due to fading and interference causing substantial quality degradation to the video which may be avoided by appropriate error resilience features. Moreover, it is important that the video is transmitted in a secured manner in certain applications like video conferencing, medical applications etc. This is achieved with the help of suitable encryption techniques without affecting the quality of the decoded video. Encryption of video transmission in wireless environment with suitable error resilience techniques to achieve good quality is the main objective of this work. Performance analysis of secured video ...","PeriodicalId":312177,"journal":{"name":"Int. J. Multim. Intell. Secur.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126529430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A semi-fragile lossless digital watermarking based on adaptive threshold for image authentication 基于自适应阈值的图像认证半脆弱无损数字水印
Int. J. Multim. Intell. Secur. Pub Date : 2013-09-23 DOI: 10.1504/IJMIS.2013.056467
Zhenyong Chen, Fangjie Fu, Zhuo Wang, Wei Fan, Z. Xiong
{"title":"A semi-fragile lossless digital watermarking based on adaptive threshold for image authentication","authors":"Zhenyong Chen, Fangjie Fu, Zhuo Wang, Wei Fan, Z. Xiong","doi":"10.1504/IJMIS.2013.056467","DOIUrl":"https://doi.org/10.1504/IJMIS.2013.056467","url":null,"abstract":"In this paper, a novel semi-fragile lossless digital watermarking method based on adaptive threshold for image authentication is presented. Most of the existing semi-fragile lossless watermarking schemes are based on modulo-256 addition to achieve losslessness. In order to avoid the salt-and-pepper noise, some of the schemes ignore the blocks which lead to overflow/underflow, and using error correction codes (ECCs). But the ECC will reduce available embedding capacity, especially for the complex images. We then propose an adaptive threshold method to improve the existing schemes. By employing a robust statistical quantity based on the patchwork to embed data, identifying image complexity based on wavelet-domain generalised Gaussian distribution (GGD) and using it to adaptively quantise thresholds which differentiating the embedding process, and using simple ECC, this technique has achieved losslessness, robustness and more competitive available embedding capacity. Experimental results demonstrate that the capacity of watermarked image of this technique is highly improved, and the quality of the image is acceptable.","PeriodicalId":312177,"journal":{"name":"Int. J. Multim. Intell. Secur.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116503473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vocabulary hierarchy optimisation based on spatial context and category information 基于空间语境和类别信息的词汇层次优化
Int. J. Multim. Intell. Secur. Pub Date : 2013-09-23 DOI: 10.1504/IJMIS.2013.056470
Zhiguo Yang, Yuxin Peng, Jianguo Xiao
{"title":"Vocabulary hierarchy optimisation based on spatial context and category information","authors":"Zhiguo Yang, Yuxin Peng, Jianguo Xiao","doi":"10.1504/IJMIS.2013.056470","DOIUrl":"https://doi.org/10.1504/IJMIS.2013.056470","url":null,"abstract":"In this paper, we focus on the hierarchy and discriminating ability of visual vocabulary. We propose to use the category information of images and the spatial context of keypoints to select appropriate visual words from different hierarchical levels. Existing approaches, such as flat vocabulary and vocabulary tree, can change the hierarchy of all visual words at the same time, by setting different cluster numbers and tree height respectively. However, the most appropriate visual words may be at different hierarchical levels, and existing approaches could not adjust the hierarchy of different visual words separately. To address this problem, we propose an object function to describe the consistence of visual words, with category information of images and spatial context of keypoints, and then we adopt simulated annealing algorithm to search for a sub-optimal solution, which corresponds to a visual vocabulary selected from the vocabulary tree. Different from existing methods, the proposed approach can selec...","PeriodicalId":312177,"journal":{"name":"Int. J. Multim. Intell. Secur.","volume":"144 46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114387255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient password-authenticated key agreement protocol for smart cards based on ECC 基于ECC的智能卡高效密码认证密钥协商协议
Int. J. Multim. Intell. Secur. Pub Date : 2013-09-23 DOI: 10.1504/IJMIS.2013.056472
S. Kalra, S. Sood
{"title":"Efficient password-authenticated key agreement protocol for smart cards based on ECC","authors":"S. Kalra, S. Sood","doi":"10.1504/IJMIS.2013.056472","DOIUrl":"https://doi.org/10.1504/IJMIS.2013.056472","url":null,"abstract":"Today, networks are no longer limited to servers and desktops. A lot of information transfer is done over mobile devices like smart cards, cell phones, PDAs etc. User authentication and session key agreement is an important aspect of a secure information system. In this paper, we propose an efficient password-authenticated protocol for smart cards which provides user authentication and session key agreement. This protocol is based on ECC and has the following merits: 1) The computation and communication cost is low; 2) The password can be freely chosen by the user; 3) There is no time synchronisation problem; 4) It prevents the offline dictionary attack even if the information stored in the smart card is compromised; 5) It provides for mutual authentication and session key agreement; 6) All well known attacks are prevented using our protocol; 7) The identity of the user changes dynamically for every new session.","PeriodicalId":312177,"journal":{"name":"Int. J. Multim. Intell. Secur.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134503201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信