Xinyi Ding, Zohreh Raziei, Eric C. Larson, Eli V. Olinick, Paul S. Krueger, Michael Hahsler
AbstractThe tremendous success of deep learning for imaging applications has
resulted in numerous beneficial advances. Unfortunately, this success has also
been a catalyst for malicious uses such as photo-realistic face swapping of
parties without consent. In this study, we use deep transfer learning for face
swapping detection, showing true positive rates greater than 96% with very few
false alar... hiện toàn bộ
AbstractThe rapid development of IoT technology has led to the usage of various
devices in our daily life. Along with the ever-increasing rise of the Internet
of Things, the use of appropriate methods for establishing secure communications
in health care systems is vital. The adoption of high-security optimal
mechanisms for this purpose has been more effective regarding the efficiency of
medical i... hiện toàn bộ
T. Rama Reddy, P. Jayarama Reddy, Rayudu Srinivas, Ch. V. Raghavendran, R. V. S. Lalitha, B. Annapurna
AbstractEducation acts as a soul in the overall societal development, in one way
or the other. Aspirants, who gain their degrees genuinely, will help society
with their knowledge and skills. But, on the other side of the coin, the problem
of fake certificates is alarming and worrying. It has been prevalent in
different forms from paper-based dummy certificates to replicas backed with
database tamp... hiện toàn bộ
AbstractSHDM stands for Sphere-Hardening Dither Modulation and is a watermarking
algorithm based on quantizing the norm of a vector extracted from the cover
work. We show how SHDM can be integrated into a fully commutative
watermarking-encryption scheme and investigate implementations in the spatial,
DCT, and DWT domain with respect to their fidelity, robustness, capacity, and
security of encrypti... hiện toàn bộ
AbstractIn order to further improve the accuracy and efficiency of network
information security situation prediction, this study used the dynamic
equal-dimensional method based on gray correlation analysis to improve the GM
(1, N) model and carried out an experiment on the designed network security
situation prediction (NSSP) model in a simulated network environment. It was
found that the predicte... hiện toàn bộ
Sebastiano Battiato, Oliver Giudice, Francesco Guarnera, Giovanni Puglisi
AbstractThe JPEG compression algorithm has proven to be efficient in saving
storage and preserving image quality thus becoming extremely popular. On the
other hand, the overall process leaves traces into encoded signals which are
typically exploited for forensic purposes: for instance, the compression
parameters of the acquisition device (or editing software) could be inferred. To
this aim, in thi... hiện toàn bộ
AbstractDifferent types of network traffic can be treated as data originating
from different domains with the same objectives of problem-solving. Previous
work utilizing multi-domain machine learning has primarily assumed that data in
different domains have the same distribution, which fails to effectively address
the domain offset problem and may not achieve excellent performance in every
domain.... hiện toàn bộ
AbstractReliable and non-intrusive user identification and authentication on
mobile devices, such as smartphones, are topical tasks today. The majority of
state-of-the-art solutions in this domain are based on “device unlock”
scenario—checking of information (authentication factors) provided by the user
for unlocking a smartphone. As such factors, we may use either single strong
authentication fac... hiện toàn bộ
Kiran Saleem, Lei Wang, Salil Bharany, Khmaies Ouahada, Ateeq Ur Rehman, Habib Hamam
AbstractThe research addresses energy consumption, latency, and network
reliability challenges in wireless sensor network communication, especially in
military security applications. A multi-agent context-aware model employing the
belief-desire-intention (BDI) reasoning mechanism is proposed. This model
utilizes a semantic knowledge-based intelligent reasoning network to monitor
suspicious activit... hiện toàn bộ