{"title":"Reversible secret image sharing scheme with enhanced stego image visual quality","authors":"G. Ulutaş, M. Ulutaş, V. Nabiyev","doi":"10.1109/I-SOCIETY16502.2010.6018815","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018815","url":null,"abstract":"Secret Image Sharing is a technique to share a secret image among n participants using Shamir's secret sharing scheme. Secret image is revealed if any k of the n shares is processed according to the scheme. Research reported in the literature is focused on improving known issues of the method. Reconstruction without distortion, reducing the size expansion of the share images, improving stego image quality and enhancing authentication ability of the method are some of the issues. Recovering cover images after the revealing procedure is an important issue. In 2009, Wu et al. proposed a technique based on Reversible Steganography to solve this problem. A location map is used to recover cover images, which needs extra information. The proposed method outlined in this paper does not need any information except shares to recover cover images. In addition, visual quality of the shares or the Peak Signal to Noise Ratio (PSNR) values of stego images are improved which is used to demonstrate the effectiveness of the method. Experimental results indicate a 3 dB PSNR improvement on the average compared to Wu et al.'s method.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129945411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bin Li, Jiping Liu, Rong Zhao, Lijian Sun, Lihong Shi
{"title":"Information management for flood prevention service work","authors":"Bin Li, Jiping Liu, Rong Zhao, Lijian Sun, Lihong Shi","doi":"10.1109/I-SOCIETY16502.2010.6018793","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018793","url":null,"abstract":"It is of great significance for flood prevention service work due to relating to people's life and property safety in our country. With the concerted cooperation and effort between government sector and Chinese Academy of Surveying and Mapping, great information techniques have been adopted widely and a new type of network platform based on GIS and RS has been developed successfully. Based on this new platform, coordinated work among multi flood prevention departments has been completed by taking the method of telematic service. Correlative information of flood prevention, such as weather, hydrology, remote sensing and disaster and so on can be automatically loaded and integrated in the platform. And the new platform can run ceaselessly under the round-the-clock condition. Ultimately, aided decision-making for flood prevention can be afford to the leaders of government sector and it is convenient for the latter to take effective measures to reduce the losses aroused by different kinds of flood disasters.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116806130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontology of e-Learning security","authors":"G. Akmayeva, C. Shoniregun","doi":"10.1109/I-SOCIETY16502.2010.6018837","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018837","url":null,"abstract":"The ubiquitous nature of e-Learning applications in dealing with huge and diverse population of users creates the gap for errors and malicious attacks. The ability to quickly estimate security risks is particularly crucial for automated assessment of e-learning. What type of measures is taken to keep the privacy and integrity of the information stored? And whether there are mechanisms that can prevent cheating when performing online examinations? In most cases, the e-Learning applications are designed and implemented to combine distinct services into a coherent whole in order to fulfil sophisticated tasks that cannot be fulfilled by a single service. Therefore, an awareness of threats and their countermeasures are essential, as e-Learning does not operate in a vacuum. This paper focuses on the ontology of E-Learning security.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129744872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Martínez-Peláez, F. Rico-Novella, C. Satizábal, J. Pomykala
{"title":"Improvement of the dynamic ID-based remote user authentication scheme","authors":"R. Martínez-Peláez, F. Rico-Novella, C. Satizábal, J. Pomykala","doi":"10.1109/I-SOCIETY16502.2010.6018817","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018817","url":null,"abstract":"Recently, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme and claimed that their scheme is secure. In this paper, we show that Das, Saxena and Gulati's scheme is vulnerable to insider, masquerade, and server spoofing attacks. Moreover, it fails to provide mutual authentication. In order to remedy these drawbacks, this paper proposes a secure dynamic ID-based remote user authentication scheme using smart cards. The performance evaluation and security analysis show that our proposal is feasible in terms of computational cost, storage capacity, and the scheme can resist several attacks.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":" 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120833243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Infrastructure for studying decision — Making processes","authors":"M. Levy, N. Pliskin","doi":"10.1109/I-SOCIETY16502.2010.6018761","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018761","url":null,"abstract":"As the business environment becomes complex, high-quality decision-making processes are critical for organizations. Business simulation games can support learning as well as research of decision-making processes from both human and technological aspects. This research-in-progress paper aims at developing advanced knowledge management (KM) systems and studying their usability and performance within a simulation-game environment.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133965555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. E. Somaratna, Shiromi Arunatilaka, Lalith Premarathna
{"title":"Which is better for inflation forecasting? Neural networks or data mining","authors":"P. E. Somaratna, Shiromi Arunatilaka, Lalith Premarathna","doi":"10.1109/I-SOCIETY16502.2010.6018807","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018807","url":null,"abstract":"In present context, Information Technology (IT) is used in every field whether it is Business, Social Service or Entertainment. However, application of IT in economic field is very limited. Stability and healthiness of a country's economy directly connects with the accuracy of forecasted Inflation rate. With the recession raised at end of year 2008, world communities pay much attention on inflation and put huge efforts to predict it accurately. Neural networking and data mining are two IT techniques that are commonly used in forecasting and hidden pattern recognition. We have applied both of these techniques to the theoretically sound data set with the intention of identifying most appropriate IT forecasting technique for forecasting the inflation rate. Since forecasted inflation rate directly link with country's monetary policy, accuracy of predictions is very significant. Further continuity of government as well as the economy depends on these decisions. Through this study we were able to identify appropriate characteristics of neural networks and Data mining techniques in case of forecasting inflation rate with high accuracy.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132507448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maturity model for process of academic management","authors":"Daniel Fernando Antonucci e Silva, R. B. Cabral","doi":"10.1109/I-SOCIETY16502.2010.6018745","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018745","url":null,"abstract":"The segment of education in Brazil, especially in higher education, has undergone major changes. The search for professionalization, for cost reduction and process standardization has led many institutions to associate through partnerships or acquisitions. On the other hand, maturity models have been used very successfully in several areas of knowledge especially in software development, as an approach for quality models. This paper presents a methodology for assessing the maturity of academic process management in private institutions of higher education that, initially, aims the Brazilian market, but its idea can be applied to a global maturity model of academic process management.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134244820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-learning reflecting individual learning styles","authors":"P. Poulova, M. Černá, S. Ivana","doi":"10.1109/I-SOCIETY16502.2010.6018799","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018799","url":null,"abstract":"The efforts towards increasing the number of educated people should be prioritized in every society. Due to this influence university education has changed substantially but numerous problems still exist. Plenty of teachers implement into the instructional process self-study methods supported by information and communication technologies (ICT). Having undergone the initial period which was affected by suspicion, material and technical problems, the time of a new stage came to deal with didactic aspects of ICT implementation into the educational process.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124917405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SocialCompanion: Connecting virtual and physical social networks","authors":"Claudia Becker, P. Rothenpieler, S. Fischer","doi":"10.1109/I-SOCIETY16502.2010.6018748","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018748","url":null,"abstract":"In this paper we present SocialCompanion, an approach for connecting virtual and physical social networks. Social-Companion is a learning system which adapts to the users needs and interests using contextual information about the user and his environment. SocialCompanion is work-in-progress and will be providing innovative user-centric and user-assisting services. Currently, we are implementing a prototype for real-life experiments.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125073564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The small business web presence: Extending the reach of the website","authors":"Stephen Burgess","doi":"10.1109/I-SOCIETY16502.2010.6018813","DOIUrl":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018813","url":null,"abstract":"It has been known for some time that small businesses have had access to third party websites to extend their web presence. However, little is known about the extent to which they use them and how the usage may differ across various types of small businesses. This paper addresses this by examining the third party website use of 50 Australian small businesses that have used the services of 139 third party websites. There are differences that can be attributed to different business categories. The majority of third party websites used were directory services, with more complex portal websites being used by the accommodation, café and restaurant; retail and personal services business categories. Most businesses used directories that were free to use or were free for basic listings with a fee for extended listings. However, some 30% of the third party website usage did involve some fee.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121239130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}