Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,416 Hits in 5.9 sec

Review of Face Recognition Techniques

Kamini Solanki, Prashant Pittalia
2016 International Journal of Computer Applications  
This paper represents review of face recognition methods and discusses their advantages and disadvantages.  ...  So reliability is the more important matter for security. Facial Recognition is rapidly becoming area of interest. Face biometrics is useful for authentication that recognizes face.  ...  Jain, Fellow, IEEE, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012.  ... 
doi:10.5120/ijca2016907994 fatcat:rqmop3wwafd7nbejv44tlcroje

Categorization and Organization of Database Forensic Investigation Processes

Arafat Al-Dhaqm, Shukor Razak, David A. Dampier, Kim-Kwang Raymond Choo, Kamran Siddique, Richard Adeyemi Ikuesan, Abdulhadi Alqarni, Victor R. Kebande
2020 IEEE Access  
This harmonized DBFI process has been developed based on three key categories (i.e. planning, preparation and pre-response, acquisition and preservation, and analysis and reconstruction).  ...  Database forensic investigation (DBFI) is an important area of research within digital forensics. It's importance is growing as digital data becomes more extensive and commonplace.  ...  Blockchain 2019 Outstanding Paper Award, the International Conference on Information Security and Cryptology (Inscrypt 2019) Best Student Paper Award, the IEEE TrustCom 2018 Best Paper Award, the ESORICS  ... 
doi:10.1109/access.2020.3000747 fatcat:ccx63ynokbenfmyuxs3rhd4ip4

Hybrid Matching Algorithm for Personal Names

Cihan Varol, Coskun Bayrak
2012 Journal of Data and Information Quality  
The work involved focusing on error and change propagation to define and validate a set of architectural metrics for assessing quality of software architectures.  ...  Software Architecture Metrics -Led software developer on a NASA sponsored software architectural metrics project.  ...  of Intelligent Information Processing • Manuscript Reviewer, Journal of Data and Information Quality • Manuscript Reviewer, IEEE Transactions on Automation Science and Engineering • Manuscript Reviewer  ... 
doi:10.1145/2348828.2348830 dblp:journals/jdiq/VarolB12 fatcat:afk72rr26nb4hobaqk3572dsfm

Present and Future of Network Security Monitoring

Marta Fuentes-Garcia, Jose Camacho, Gabriel Macia-Fernandez
2021 IEEE Access  
Author et al.: Preparation of Papers for IEEE TRANSACTIONS and JOURNALS Diagnosis is usually related to forensics tasks, where the III.  ...  Citation information: DOI 10.1109/ACCESS.2021.3067106, IEEE Access Author et al.: Preparation of Papers for IEEE TRANSACTIONS  ... 
doi:10.1109/access.2021.3067106 fatcat:hv2kviv5vbd67ikmlva6ip6gzu

Reversible Data Hiding Based on Adaptive Block Selection Strategy

Dan Huang, Fangjun Huang
2020 International Journal of Digital Crime and Forensics  
Recently, a reversible data hiding (RDH) method was proposed based on local histogram shifting.  ...  In this article, as an extension of the algorithm, the authors propose an RDH scheme based on adaptive block selection strategy.  ...  IEEE Transactions on Information Forensics and Security, 11(12), 2777–2789. doi:10.1109/TIFS.2016.2598528 Li, J., Li, X., & Yang, B. (2013).  ... 
doi:10.4018/ijdcf.2020010108 fatcat:ztqvstfln5coflu2n6rtwmtgce

Intrusion Detection on the In-Vehicle Network Using Machine Learning

Shaila Sharmin, Hafizah Mansor
2021 2021 3rd International Cyber Resilience Conference (CRC)  
The usage of only timing information for intrusion detection makes it a vehicle -agnostic method that does not rely on the message content, which is often proprietary and confidential information.  ...  This paper presents an intrusion detection method based on the Isolation Forest (iForest) algorithm that detects message insertion attacks using message timing information.  ...  Joo, K. , 17 (2019) IEEE Transactions on Information Forensics and Security, 14 (4), art. no. doi: 10.1109/MDAT.2019.2899062 8466914, pp. 1083-1097. .  ... 
doi:10.1109/crc50527.2021.9392627 fatcat:6jipwcszszcv3jgc527qftj3bm

Deep Learning in Information Security [article]

Stefan Thaler, Vlado Menkovski, Milan Petkovic
2018 arXiv   pre-print
DL methods generally are capable of achieving high-performance and generalize well. However, information security is a domain with unique requirements and challenges.  ...  In this survey, we study the use of DL techniques within the domain of information security. We systematically reviewed 77 papers and presented them from a data-centric perspective.  ...  IEEE Transactions on Information Forensics and Security, 12(11):2640–2653, 2017.  ... 
arXiv:1809.04332v1 fatcat:xfb7lgrkw5cirdl3qvmg3ssnbi

Accountable clouds

Ashish Gehani, Gabriela F. Ciocarlie, Natarajan Shankar
2013 2013 IEEE International Conference on Technologies for Homeland Security (HST)  
Assurance becomes a measurable property, quantified by the volume of evidence to audit and retain in a privacy-preserving and nonrepudiable fashion.  ...  By proactively collecting potential forensic evidence, the cloud becomes more accountable, while providing its regular services.  ...  There are numerous scenarios where this lack of appropriate forensic support as a reactive security measure could play a significant role; we review some of the most relevant ones below.  ... 
doi:10.1109/ths.2013.6699038 fatcat:pyex452jincu5diillnmasdheu

An Enhanced Blockchain-based IoT Digital Forensics Architecture using Fuzzy Hash

Wael A. Mahrous, Mahmoud Farouk, Saad M. Darwish
2021 IEEE Access  
Recently, blockchain technology was presented as one of the options for achieving IoT security via the use of an immutable ledger, a decentralized architecture, and strong cryptographic primitives.  ...  The majority of IoT systems are composed of disparate software and hardware components, which may pose security and privacy concerns.  ...  Massive volumes of diverse and dispersed evidence created by IoT devices found at crime scenes significantly increase the difficulty of forensic investigations [8] [9] [10] [11] [12] .  ... 
doi:10.1109/access.2021.3126715 fatcat:ye4dkcbjyvaurisjvbkwhdpg7i

High Capacity Reversible Data Hiding Technique Framed for Experimentation with PSO

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
We want to contribute towards a proposed method before actual experimentation and results are worked for.  ...  We have seen previous techniques and also carefully analyzed the high capacity reversible data hiding method in MSB.  ...  ., Gui, X. and Yang, B., 2015. Efficient reversible data hiding based on multiple histograms modification. IEEE Transactions on Information Forensics and Security, 10(9), pp.2016-2027. 27.  ... 
doi:10.35940/ijitee.i1130.0789s19 fatcat:ssecwl6hvnbjjn6j3cx6csr2ni

Security in Next Generation Mobile Payment Systems: A Comprehensive Survey

Waqas Ahmed, Aamir Rasool, Abdul Rehman Javed, Neeraj Kumar, Thippa Reddy Gadekallu, Zunera Jalil, Natalia Kryvinska
2021 IEEE Access  
For more information, see https://creativecommons.org/licenses/by/4.0/ VOLUME 9, 2021 WAQAS AHMED is currently pursuing the Ph.D. degree with the Department of Cyber Security, Air University, Islamabad  ...  Every subsequent person is heavily relying on them due to multifaceted usage and affordability.  ...  FORENSICS AND SECURITY, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, IEEE TRANSACTIONS ON POWER SYSTEMS, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, IEEE TRANSACTIONS ON SMART GRID, IEEE JOURNAL  ... 
doi:10.1109/access.2021.3105450 fatcat:lecd5ds6obad5dfl4g6uhekf7y

Towards a Forensic-Based Service Oriented Architecture Framework for Auditing of Cloud Logs

Sean Thorpe, Tyrone Grandison, Arnett Campbell, Janet Williams, Khalilah Burrell, Indrajit Ray
2013 2013 IEEE Ninth World Congress on Services  
In cloud digital log forensics, work on the forensic reconstruction of evidence on VM hosts system is required, but with the heterogeneous complexity involved with an enterprise's private cloud not to  ...  This framework will be necessary in order to develop investigative and forensic auditing tools and techniques for use in cloud based log-centric SOAs.  ...  in a cloud SOA transaction to negotiate what information would be recorded.  ... 
doi:10.1109/services.2013.76 dblp:conf/services/ThorpeGCWBR13 fatcat:ccf4f7l7ofcyhaibetb4zjpmty

Elimination of Angular Problem in Face Recognition

Dr. Kamini Solanki
2017 International Journal of Engineering Research and  
Previously various algorithms and techniques were used for the purpose of security and authentication, but they were having several pitfalls like time consumption, pose and illumination problem along with  ...  This technique is commonly used for the security purposes of authentication in computerized fields.  ...  Jawahar, Blind Authentication: A Secure Crypto-Biometric Verification Protocol,IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 2, JUNE 2010, ieeexplore.ieee.org. [6] Wilman W. W.  ... 
doi:10.17577/ijertv6is120051 fatcat:kd4jbmnhpjborbrscgjqqxr3xu

A Classical Review On Advanced Digital Image Watermarking Techniques

BAISA L. GUNJAL
2018 Zenodo  
Presently, creation, copy and transmission of image data via internet and mobile phone are very common practices.  ...  The world has become a global village in digital era due to advances in internet and communication technology.  ...  . 7) Fabrizio Guerrini, Masahiro Okuda, Nicola Adami, and Riccardo Leonardi," High Dynamic Range Image Watermarking Robust Against Tone-Mapping Operators", IEEE Transactions On Information Forensics and  ... 
doi:10.5281/zenodo.1159107 fatcat:s7nloq2yojaefiusgyxjydgwjy

Research trends, challenges, and emerging topics in digital forensics: A review of reviews

Fran Casino, Thomas K. Dasaklis, George Spathoulas, Marios Anagnostopoulos, Amrita Ghosal, Istvan Borocz, Agusti Solanas, Mauro Conti, Constantinos Patsakis
2022 IEEE Access  
Responsibility for the information and views expressed therein lies entirely with the authors.  ...  This work was supported by the European Commission under the Horizon 2020 Programme (H2020), as part of the projects LOCARD (https://locard.eu) (Grant Agreement no. 832735) and CyberSec4Europe (https:/  ...  more information about the transactions that have taken place.  ... 
doi:10.1109/access.2022.3154059 fatcat:3wmlrku5inhsrahya6cqlpzssa
« Previous Showing results 1 — 15 out of 1,416 results