Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,415 Hits in 5.7 sec

Review of Face Recognition Techniques

Kamini Solanki, Prashant Pittalia
2016 International Journal of Computer Applications  
This paper represents review of face recognition methods and discusses their advantages and disadvantages.  ...  So reliability is the more important matter for security. Facial Recognition is rapidly becoming area of interest. Face biometrics is useful for authentication that recognizes face.  ...  Jain, Fellow, IEEE, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012.  ... 
doi:10.5120/ijca2016907994 fatcat:rqmop3wwafd7nbejv44tlcroje

Reversible Data Hiding Based on Adaptive Block Selection Strategy

Dan Huang, Fangjun Huang
2020 International Journal of Digital Crime and Forensics  
Recently, a reversible data hiding (RDH) method was proposed based on local histogram shifting.  ...  In this article, as an extension of the algorithm, the authors propose an RDH scheme based on adaptive block selection strategy.  ...  IEEE Transactions on Information Forensics and Security, 11(12), 2777–2789. doi:10.1109/TIFS.2016.2598528 Li, J., Li, X., & Yang, B. (2013).  ... 
doi:10.4018/ijdcf.2020010108 fatcat:ztqvstfln5coflu2n6rtwmtgce

Advancing the Science of Digital Forensics

Gary C. Kessler
2012 Computer  
24/12 10:06 AM IEEE TransacTIons on BIomEdIcal cIrcuITs and sysTEms special Issue on '-omics'-Based companion diagnostics for Personalized medicine Manuscripts describing original research as well as reviews  ...  D igital forensics combines methods from science, technology, and engineering to acquire and interpret information stored on digital devices for use in answering questions in court.  ... 
doi:10.1109/mc.2012.399 fatcat:ri6lyyeisfha5m7yvskcmirvvu

Hybrid Matching Algorithm for Personal Names

Cihan Varol, Coskun Bayrak
2012 Journal of Data and Information Quality  
The work involved focusing on error and change propagation to define and validate a set of architectural metrics for assessing quality of software architectures.  ...  Software Architecture Metrics -Led software developer on a NASA sponsored software architectural metrics project.  ...  of Intelligent Information Processing • Manuscript Reviewer, Journal of Data and Information Quality • Manuscript Reviewer, IEEE Transactions on Automation Science and Engineering • Manuscript Reviewer  ... 
doi:10.1145/2348828.2348830 dblp:journals/jdiq/VarolB12 fatcat:afk72rr26nb4hobaqk3572dsfm

Intrusion Detection on the In-Vehicle Network Using Machine Learning

Shaila Sharmin, Hafizah Mansor
2021 2021 3rd International Cyber Resilience Conference (CRC)  
The usage of only timing information for intrusion detection makes it a vehicle -agnostic method that does not rely on the message content, which is often proprietary and confidential information.  ...  This paper presents an intrusion detection method based on the Isolation Forest (iForest) algorithm that detects message insertion attacks using message timing information.  ...  Joo, K. , 17 (2019) IEEE Transactions on Information Forensics and Security, 14 (4), art. no. doi: 10.1109/MDAT.2019.2899062 8466914, pp. 1083-1097. .  ... 
doi:10.1109/crc50527.2021.9392627 fatcat:6jipwcszszcv3jgc527qftj3bm

Categorization and Organization of Database Forensic Investigation Processes

Arafat Al-Dhaqm, Shukor Razak, David A. Dampier, Kim-Kwang Raymond Choo, Kamran Siddique, Richard Adeyemi Ikuesan, Abdulhadi Alqarni, Victor R. Kebande
2020 IEEE Access  
This harmonized DBFI process has been developed based on three key categories (i.e. planning, preparation and pre-response, acquisition and preservation, and analysis and reconstruction).  ...  Database forensic investigation (DBFI) is an important area of research within digital forensics. It's importance is growing as digital data becomes more extensive and commonplace.  ...  Blockchain 2019 Outstanding Paper Award, the International Conference on Information Security and Cryptology (Inscrypt 2019) Best Student Paper Award, the IEEE TrustCom 2018 Best Paper Award, the ESORICS  ... 
doi:10.1109/access.2020.3000747 fatcat:ccx63ynokbenfmyuxs3rhd4ip4

Present and Future of Network Security Monitoring

Marta Fuentes-Garcia, Jose Camacho, Gabriel Macia-Fernandez
2021 IEEE Access  
Author et al.: Preparation of Papers for IEEE TRANSACTIONS and JOURNALS Diagnosis is usually related to forensics tasks, where the III.  ...  Citation information: DOI 10.1109/ACCESS.2021.3067106, IEEE Access Author et al.: Preparation of Papers for IEEE TRANSACTIONS  ... 
doi:10.1109/access.2021.3067106 fatcat:hv2kviv5vbd67ikmlva6ip6gzu

Deep Learning in Information Security [article]

Stefan Thaler, Vlado Menkovski, Milan Petkovic
2018 arXiv   pre-print
DL methods generally are capable of achieving high-performance and generalize well. However, information security is a domain with unique requirements and challenges.  ...  In this survey, we study the use of DL techniques within the domain of information security. We systematically reviewed 77 papers and presented them from a data-centric perspective.  ...  IEEE Transactions on Information Forensics and Security, 12(7):1686–1698, 2017.  ... 
arXiv:1809.04332v1 fatcat:xfb7lgrkw5cirdl3qvmg3ssnbi

An Enhanced Blockchain-based IoT Digital Forensics Architecture using Fuzzy Hash

Wael A. Mahrous, Mahmoud Farouk, Saad M. Darwish
2021 IEEE Access  
Recently, blockchain technology was presented as one of the options for achieving IoT security via the use of an immutable ledger, a decentralized architecture, and strong cryptographic primitives.  ...  The majority of IoT systems are composed of disparate software and hardware components, which may pose security and privacy concerns.  ...  Smart contracts may execute, verify, and make decisions automatically in a secure and immutable manner on the decentralized ledger [12] .  ... 
doi:10.1109/access.2021.3126715 fatcat:ye4dkcbjyvaurisjvbkwhdpg7i

Intelligent Strategies or Smart Grid and Cyber Security

Emmanuel Hooper
2011 International Journal of Intelligent Computing Research  
Secondly, Smart Grid and Cyber Security technology is based on several premises including the efficiency of renewable energy versus traditional energy sources.  ...  Thirdly, Smart Grid and Cyber Security functions include the potential to provide accurate real-time prediction of the output energy for dynamic adjustments of the output based on the load demand from  ...  This includes automated traceback analysis of security, privacy, transparency, auditability, traceability, accountability and forensics on transactions and breaches in cyber and complex infrastructures  ... 
doi:10.20533/ijicr.2042.4655.2011.0013 fatcat:gkpihp4efvgnnhgawgtnopvgde

Elimination of Angular Problem in Face Recognition

Dr. Kamini Solanki
2017 International Journal of Engineering Research and  
Previously various algorithms and techniques were used for the purpose of security and authentication, but they were having several pitfalls like time consumption, pose and illumination problem along with  ...  This technique is commonly used for the security purposes of authentication in computerized fields.  ...  Jawahar, Blind Authentication: A Secure Crypto-Biometric Verification Protocol,IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 2, JUNE 2010, ieeexplore.ieee.org. [6] Wilman W. W.  ... 
doi:10.17577/ijertv6is120051 fatcat:kd4jbmnhpjborbrscgjqqxr3xu

Survey on Real Time Security Mechanisms in Network Forensics

Barenya Bikash, Smriti Priya
2016 International Journal of Computer Applications  
Network forensics is a type of digital forensics which goal is to monitoring, correlate, examine and analysis of computer network traffic for various purposes like-information gathering, legal evidence  ...  The purpose of this paper is to give an overview of different real time security mechanisms for forensic investigation of network communication schemes.  ...  of network traffic for discovering the information breaches or security policy violation. [4] It is proactive and mainly deals with dynamic information.  ... 
doi:10.5120/ijca2016911676 fatcat:2uhfqka3breb5osqyl7wiwqcn4

High Capacity Reversible Data Hiding Technique Framed for Experimentation with PSO

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
We want to contribute towards a proposed method before actual experimentation and results are worked for.  ...  We have seen previous techniques and also carefully analyzed the high capacity reversible data hiding method in MSB.  ...  ., Gui, X. and Yang, B., 2015. Efficient reversible data hiding based on multiple histograms modification. IEEE Transactions on Information Forensics and Security, 10(9), pp.2016-2027. 27.  ... 
doi:10.35940/ijitee.i1130.0789s19 fatcat:ssecwl6hvnbjjn6j3cx6csr2ni

Accountable clouds

Ashish Gehani, Gabriela F. Ciocarlie, Natarajan Shankar
2013 2013 IEEE International Conference on Technologies for Homeland Security (HST)  
Assurance becomes a measurable property, quantified by the volume of evidence to audit and retain in a privacy-preserving and nonrepudiable fashion.  ...  By proactively collecting potential forensic evidence, the cloud becomes more accountable, while providing its regular services.  ...  These processes also pertain to the sharing of medical information as regulated by the Health Insurance Portability and Accountability Act (HIPAA) [12] .  ... 
doi:10.1109/ths.2013.6699038 fatcat:pyex452jincu5diillnmasdheu

Security in Next Generation Mobile Payment Systems: A Comprehensive Survey

Waqas Ahmed, Aamir Rasool, Abdul Rehman Javed, Neeraj Kumar, Thippa Reddy Gadekallu, Zunera Jalil, Natalia Kryvinska
2021 IEEE Access  
For more information, see https://creativecommons.org/licenses/by/4.0/ VOLUME 9, 2021 WAQAS AHMED is currently pursuing the Ph.D. degree with the Department of Cyber Security, Air University, Islamabad  ...  Every subsequent person is heavily relying on them due to multifaceted usage and affordability.  ...  FORENSICS AND SECURITY, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, IEEE TRANSACTIONS ON POWER SYSTEMS, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, IEEE TRANSACTIONS ON SMART GRID, IEEE JOURNAL  ... 
doi:10.1109/access.2021.3105450 fatcat:lecd5ds6obad5dfl4g6uhekf7y
« Previous Showing results 1 — 15 out of 1,415 results