{"title":"Palm vein recognition based on competitive code and DPL","authors":"Xiyu Wang, Hengjian Li, Jian Qiu, Changzhi Yu","doi":"10.1145/3309074.3309106","DOIUrl":"https://doi.org/10.1145/3309074.3309106","url":null,"abstract":"Dictionary learning is essentially a dimensionality reduction representation of large data sets and always attempts to learn the most pristine features behind the sample. In this paper, the palm vein feature is extracted with the Competitive code, then the Competition code feature of the palm vein is learned by a novel projective Dictionary Pair Learning (DPL) model for pattern classification tasks. Different from conventional Dictionary Learning (DL) methods, which learn a single synthesis dictionary, DPL learns jointly a synthesis dictionary and an analysis dictionary. Such a pair of dictionaries work together to perform representation and discrimination simultaneously. Compared with previous DL methods, DPL employs projective coding, which largely reduces the computational burden in learning and testing. The Competition code is used to extract the direction information of the palm vein. The above two methods are comprehensively applied to the palm veins. This paper uses the multispectral near-infrared palm vein image database of Hong Kong Polytech University for testing. Compared with the palm vein Competition code classification, the recognition rate of the palm vein Competition code feature learned by DPL is improved in some degree. When the palm vein features are extracted with filters in six different directions, the recognition rate of the palm vein Competitive code feature after learning with DPL is increased to 98.96%.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124492404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An investigation into the attractiveness level of commercial website for visitors: a case study on 66rpg website","authors":"Yan Zhang, K. T. Chau, Jingfang Xu, Cui-Fen Liu","doi":"10.1145/3309074.3309125","DOIUrl":"https://doi.org/10.1145/3309074.3309125","url":null,"abstract":"An investigation was conducted to look into the attractiveness level of layout for a highly famous website in China, namely 66rpg website. Survey using questionnaire and interview are used to gather analysis data. The finding shows that upper portion of a layout in a website is parts most favorable to visitors. This is reflected in the finding of the research on the top portion of 66rpg website entitled \"BANNER Excellent Work\". This investigation could serve as a reference for commercial companies aims to make best use of layout of a website, such as prioritizing the contents, increasing the price for advertisers or operators to post their works or products at this area to maximize the profit.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125540961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Single image super-resolution using fast sensing block","authors":"Weichen Lu, A. Qing, Ching-Kwang Lee","doi":"10.1145/3309074.3309120","DOIUrl":"https://doi.org/10.1145/3309074.3309120","url":null,"abstract":"Single image super-resolution (SISR) is a classical task in computer vision. In recent years, convolutional neural network (CNN) has been widely used to solve this problem. CNN-based methods directly learn an end to end mapping between low-resolution (LR) and high-resolution (HR) images to achieve state-of-the-art performance. Recent studies show that larger receptive field in CNN is more beneficial for SISR. However, most CNN-based methods have to pass through a mass of serial convolutional layers to get a large size of receptive field. Consequently, computational efficiency is low. Moreover, it is difficult to fully use multi-scale information. In this paper, a fast sensing super-resolution network (FSSRN) built with parallel Fast Sensing Blocks (FSB) is proposed to extract multi-scale features from LR image more efficiently. Experimental results show that FSSRN achieves significant improvement of efficiency while achieves state-of-the-art performance.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115988109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive optimization based neural network for classification of stuttered speech","authors":"G. Manjula, M. Shivakumar, Y. V. Geetha","doi":"10.1145/3309074.3309113","DOIUrl":"https://doi.org/10.1145/3309074.3309113","url":null,"abstract":"Stuttering, also known as stammering is a speech disorder in which the fluency of speech is interrupted by occurrences of dysfluencies like repetitions, prolongations, and blocks or articulatory fixations. This work is intended to develop automatic recognition procedure to assess stuttering disfluencies (Repetitions, Prolongations and Blocks). For predicting the speech dysfluencies, we have employed an effective Adaptive Optimization based Artificial Neural Network (AOANN) approach. Moreover, the proposed technique employs the Mel Frequency Cepstral Coefficient (MFCC) features is implemented to test its effectiveness. The experimental investigations reveal that the proposed method shows promising results in distinguishing between three stuttering events repetitions, prolongations and blocks.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132000617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection and localization of image tamper with scalable granularity","authors":"Yi Xie, Wenjia Ding, Yulin Wang","doi":"10.1145/3309074.3309128","DOIUrl":"https://doi.org/10.1145/3309074.3309128","url":null,"abstract":"Image authentication techniques have recently gained great attention due to its importance for a large number of applications. To protect the authenticity of images, some approaches have been proposed in the past years. These approaches include cryptography, semi-fragile watermarking and digital signatures. In this paper, we propose an authentication technique based on what we call characteristic data digest. The characteristic data is derived from the relative difference between the DC value in a central block and its counterpart estimated by adjacent blocks. The size of the block is scalable, from 1x1 to 8x8, depending on the requirements on granularity of tamper localization. Experimental results show that the technique is significantly superior to semi-fragile watermarking based authentication techniques under the same image fidelity, and feature-based authentication techniques, in tolerance range of legitimate processing, and granularity of detection and localization on the tampered area. Because of the simplicity of the algorithm, our technique can be used in real-time image or video frame authentication.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"332 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134316731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Salsabil Ahmed, Raisa Islam, Sadman Shawmik Himalay, J. Uddin
{"title":"Preserving heritage sites using 3D modeling and virtual reality technology","authors":"Salsabil Ahmed, Raisa Islam, Sadman Shawmik Himalay, J. Uddin","doi":"10.1145/3309074.3309116","DOIUrl":"https://doi.org/10.1145/3309074.3309116","url":null,"abstract":"This paper presents a model that is designed at preserving heritage sites by implementing 3D modeling and Virtual Reality (VR) technologies. The proposed model consists of reconstructed 3D models of historical establishments, a VR application and a digital archive of the aforementioned 3D models. To implement the proposed model, three dimensional reconstructions of few prominent heritage sites of Dhaka are created by using Autodesk 3ds Max. Then the 3D models are implemented in a VR environment so that users can explore the heritage sites and finally to preserve the 3D models, a digital archive has been created to store the 3D renderings of the heritage sites. The experimental results demonstrate the novelty of the approach which is successful in utilizing 3D modeling techniques and VR applications that can help to conserve the heritage sites by using an inexpensive method which can be accessed by a wider range of people.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117199627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy and protection of medical images ROI using SPLSB and bit-plane based watermarking","authors":"C. Rupa, C. Devi","doi":"10.1145/3309074.3309088","DOIUrl":"https://doi.org/10.1145/3309074.3309088","url":null,"abstract":"In the current digital world, health departments and telemedicine systems are one among the sensitive data management systems of the users. Currently, at the time of managing the information by the authorities, the attackers have to tamper the medical data. It should happen while transmitting, storing and computing the data. In this paper, we propose a methodology for protecting the ROI of medical images data using Squint-Penultimate-Least Significant bits and Bit-planes of the covered image based watermarking technique. In this method, initially, the sensitive data of the medical image such as ROI segment can be detected using edge contour extraction method. Extracted ROI can act as a watermark which has required protection from the attackers. Later this watermark has protected by embedding into the chosen bit-plane of the source or cover image with SPLSB method. Thus generates a watermarked image which holds the watermark. Experiments have done on various medical images and the results were analyzed by considering performance evaluation factors. Thus, the proposed scheme is the robustness and effective method to protect the ROI of a medical image.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114419967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Rahman, Israt Jahan Ritun, Nafisa Farhin, J. Uddin
{"title":"An assistive model for visually impaired people using YOLO and MTCNN","authors":"F. Rahman, Israt Jahan Ritun, Nafisa Farhin, J. Uddin","doi":"10.1145/3309074.3309114","DOIUrl":"https://doi.org/10.1145/3309074.3309114","url":null,"abstract":"Visually impaired people face difficulties in safe and independent movement which deprive them from regular professional and social activities in both indoors and outdoors. Similarly they have distressin identification of surrounding environment fundamentals. This paper presents a model to detect brightness and major colors in real-time image by using RGB method by means of an external camera and then identification of fundamental objects as well as facial recognition from personal dataset. For the Object identification and Facial Recognition, YOLO Algorithm and MTCNN Networking are used, respectively. The software support is achieved by using OpenCV libraries of Python as well as implementing machine learning process. The major processor used for our model, Raspberry Pi scans and detects the facial edges via Pi camera and objects in the image are captured and recognized using mobile camera. Image recognition results are transferred to the blind users by means of text-to-speech library. The device portability is achieved by using a battery. The object detection process achieved 6-7 FPS processing with an accuracy rate of 63-80%. The face identification process achieved 80-100% accuracy.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114432091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A dynamic solution for fine-grained policy conflict resolution","authors":"N. M. Hoang, H. Son","doi":"10.1145/3309074.3309097","DOIUrl":"https://doi.org/10.1145/3309074.3309097","url":null,"abstract":"Access control is a security technique that specifies access rights to resources in a cloud computing environment. As information in cloud systems nowadays become more complex, it plays an important role in authenticating and authorizing users and preventing an attacker from targeting sensitive information. However, in recent years, with the popularity of the Internet as social network, IoTs which deploy in cloud platforms for sharing data in real-time, more and more challenges have been exposed. For example, the access control mechanism must be able to guarantee fine-grained access control, privacy protection, conflicts and redundancies handle between rules of the same policy or between different policies. In this paper, we proposed an access control model based on attribute that incorporates a policy model based on the combining algorithm and prioritization of functions to resolve conflicts at a fine-grained level called \"Dynamic model for fine-grained policy conflict resolution\". Experiments are carried out to illustrate the relationship between the processing time for the traditional approach (single policy, multi-policy without priority) and our approach (multi-policy with priority). Experimental results show that the evaluation performance satisfies the privacy requirements defined by the user.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129752804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimation of t-score and BMD values from X-ray images for detection of osteoporosis","authors":"S. Fathima, Tamilselvi Rajendran, M. Beham","doi":"10.1145/3309074.3309110","DOIUrl":"https://doi.org/10.1145/3309074.3309110","url":null,"abstract":"Biomedical engineering concepts are related to biotechnology that is used for various healthcare purposes. Osteoporosis is a bone disease that is characterized by decrease in the Bone Mineral Density (BMD) which results in the fracture risk in the bone. Osteoporosis can be competently identified by computing various parameters like Bone mineral density (BMD), numerical features such as T-score and Z-score from various regions such as spine, femur etc. The proposed paper involves a challenge to relate digital image analysis methods to the evaluation of bone mineral density based on the X-ray images. In present scenario, more research is carried out in diagnosis of osteoporosis and it is a major challenging task in the medical field. So motivated by this, a X-Ray database is created and Images of spine, knee, hip and clavicle bones are considered for our study. Shock filter is included in the image preprocessing to improve the image intensity. The impact of image noise is investigated through the Peak Signal to Noise Ratio (PSNR) and thus demonstrating the necessity for image preprocessing before analysis. The Bone Mineral density can be realized by various segmentation methods such as Active Contour and Mean Shift segmentation. Both raw and segmented images are analyzed and results are compared for the detection of osteoporosis condition. Also the proposed work involves the calculation of T score and Z-score by the gold standard methods. The proposed method is validated in 78 subjects and the fracture risk condition is estimated.","PeriodicalId":430283,"journal":{"name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130879771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}