2022 IEEE 10th International Conference on Information, Communication and Networks (ICICN),
Journal Year:
2023,
Volume and Issue:
unknown, P. 782 - 786
Published: Aug. 17, 2023
To
protect
the
integrity
and
reliability
of
images,
we
propose
a
watermarking-based
approach
for
identifying
whether
image
has
been
tampered
with
during
transmission
recovering
content
to
its
original
form.
The
pixel
values
are
treated
as
unknowns
in
our
proposed
method
calculated
by
solving
system
equations
using
Gauss-Jordan
elimination.
recovery
data
is
obtained
encoding
MSB
matrix
secret
key
then
embedded
part
watermark
self-recovery.
remainder
authentication
information
localizing
forged
region,
which
produced
each
block.
Compared
existing
works,
experimental
results
show
superior
capability.
International Journal of Advanced Computer Science and Applications,
Journal Year:
2022,
Volume and Issue:
13(8)
Published: Jan. 1, 2022
Tracer
Study
is
a
mandatory
aspect
of
accreditation
assessment
in
Indonesia.
The
Indonesian
Ministry
Education
requires
all
Indonesia
Universities
to
anually
report
graduate
tracer
study
reports
the
government.
also
needed
by
University
evaluating
success
learning
that
has
been
applied
curriculum.
One
things
need
be
evaluated
level
absorption
graduates
into
working
industry,
so
machine
model
assist
Officials
and
understanding
character
its
graduates,
it
can
help
determine
curriculum
policies.
In
this
research,
researcher
focuses
on
making
reliable
with
dataset
format
determined
Government
was
obtained
from
Amikom
University.
study,
SVM
will
tested
several
variants
algorithm
handle
imbalanced
data.
compared
SMOTE,
SMOTE-ENN,
SMOTE-Tomek
combined
detect
employability
graduates.
test
carried
out
K-Fold
Cross
Validation,
highest
accuracy
precision
results
produced
SMOTE-ENN
value
0.96
0.89.
2022 5th International Conference on Information and Communications Technology (ICOIACT),
Journal Year:
2022,
Volume and Issue:
unknown, P. 116 - 121
Published: Aug. 24, 2022
The
important
process
in
wastewater
treatment
is
the
removal
of
pollutants,
and
dataset
having
so
many
features
may
cause
difficulty
training
data
predicting
key
variables.
This
work
aims
to
propose
set
parameters
through
normalization
techniques,
feature
selection
AI
techniques.
datasets
have
36
a
parameter,
experimental
contain
628.
Constant
factor,
Z-score,
Min-max
are
techniques
used
normalize
petrochemical
dataset.
SelectKBest,
ExtraTreeClassifier,
PCA,
RFE
for
mining.
Then
finally
done
with
implementation
help
supervised
neural
network
technique
called
backpropagation
(BPNN).
2022 5th International Conference on Information and Communications Technology (ICOIACT),
Journal Year:
2022,
Volume and Issue:
unknown, P. 188 - 193
Published: Aug. 24, 2022
The
growth
of
internet
users
in
Indonesia
experiences
a
very
high
increase
every
year,
with
the
also
resulting
many
people
using
social
media.
Sestyc
is
media
application
created
by
group
millennial
children
Indonesia.
This
study
was
conducted
to
analyze
sentiment
text
data
form
review
obtained
from
Google
Play
Store.
purpose
this
research
towards
sestyc
and
find
best
algorithm
for
classifying
sentiment.
used
analyzing
consists
Support
Vector
Machine,
Logistic
regression,
Naive
Bayes.
results
class
labeling
on
8000
reviews
total
4719
positive
3281
negative
reviews.
indicate
that
Machine
has
highest
accuracy
value
compared
other
algorithms,
where
gets
an
value.
87.81%.
Journal of King Saud University - Computer and Information Sciences,
Journal Year:
2023,
Volume and Issue:
35(9), P. 101726 - 101726
Published: Aug. 24, 2023
This
paper
introduces
an
advanced
grayscale-invariant
authentication
method
for
color
images.
Prior
work
directly
utilizes
the
most
significant
bits
(MSBs)
of
red
and
blue
channels
code
generation
embeds
these
codes
into
least
(LSBs).
Concurrently,
green
channel
is
adjusted
to
sustain
consistent
grayscale
values.
However,
this
direct
utilization
MSBs
often
leads
a
decline
in
image
quality
results
number
unsolvable
pixels.
To
address
challenges,
we
present
new
approach
specifically
designed
combat
deterioration
prevalence
In
our
method,
propose
MSB
alteration
(MSBA)
technique,
which
modifies
generate
with
minimal
distortion.
technique
effectively
reduces
distortion
Furthermore,
introduce
pixel
substitution
strategy
(PSS)
constraint-reduced
(CRS)
enhance
embedding
efficiency.
Experimental
demonstrate
that
outperforms
prior
by
converting
more
pixels
solvable
ones
achieving
better
detection
results.
Moreover,
enhances
approximately
1.5
dB,
while
maintaining
same
capacity.
Journal of King Saud University - Computer and Information Sciences,
Journal Year:
2023,
Volume and Issue:
35(9), P. 101755 - 101755
Published: Sept. 15, 2023
This
paper
proposes
a
new
block
mapping
technique
for
image
authentication
and
self-recovery
designed
to
avoid
the
tamper
coincidence
problem
called
AuSR3.
The
can
arise
when
modifications
an
affect
original
its
recovery
data,
resulting
in
inability
recover
tampered
region
of
image.
ensures
that
data
is
embedded
into
most
distant
location
possible,
minimizing
problem.
In
addition,
improved
LSB
shifting
algorithm
employed
embed
watermark
consisting
data.
experimental
result
shows
AuSR3
produce
high-quality
watermarked
images
across
various
datasets
with
average
PSNR
values
46.2
dB,
which
by
2.1
dB
compared
replacement
technique.
avoids
up
25%
tampering
rates.
It
contributes
recovered
SSIM
value
39.10
0.9944,
respectively,
on
10%
rate
USC-SIPI
dataset.
Sensors,
Journal Year:
2023,
Volume and Issue:
23(21), P. 8957 - 8957
Published: Nov. 3, 2023
Color
face
images
are
often
transmitted
over
public
channels,
where
they
vulnerable
to
tampering
attacks.
To
address
this
problem,
the
present
paper
introduces
a
novel
scheme
called
Authentication
and
Face
Self-Recovery
(AuCFSR)
for
ensuring
authenticity
of
color
recovering
tampered
areas
in
these
images.
AuCFSR
uses
new
two-dimensional
hyperchaotic
system
modular
sine-cosine
map
(2D
MSCM)
embed
authentication
recovery
data
into
least
significant
bits
image
pixels.
This
produces
high-quality
output
with
high
security
level.
When
is
detected,
executes
two
deep
learning
models:
CodeFormer
model
enhance
visual
quality
recovered
DeOldify
improve
colorization
image.
Experimental
results
demonstrate
that
outperforms
recent
similar
schemes
tamper
detection
accuracy,
level,
2022 5th International Conference on Information and Communications Technology (ICOIACT),
Journal Year:
2022,
Volume and Issue:
unknown, P. 122 - 126
Published: Aug. 24, 2022
The
use
of
a
crowdsourcing
platform
is
an
option
to
get
workers
who
will
help
complete
the
work.
Crowdsourcing
process
gathering
work,
information,
or
opinions
from
large
number
individuals
using
internet,
social
media,
smartphone
apps.
Whether
used
for
programming,
design,
content
creation,
any
other
task,
requesters
are
putting
their
trust
in
unfamiliar
with
knowledge
and
have
unknown
histories
skills.
Requesters
do
not
time
resources
screen
all
crowd's
qualities,
unlike
employing
full-time
personnel.
In
this
study,
we
try
minimize
risks
faced
by
when
namely
increasing
match
between
profile
jobs
offered
on
platform.
researcher
implemented
matching
method
dataset
consisting
several
fields
that
became
criteria
finding
match.
find
work
consist
two
parts,
core
factors
secondary
factors.
Core
Factor
Criteria
as
skill,
designation,
location,
factor
years
experience.
These
become
variables
algorithm
best
profiles
offered.
This
able
select
worker
10,000
datasets,
up
1148
people
most
suitable
tasks
And
results
obtained
indicate
increase
needs
requester.
Mathematics,
Journal Year:
2022,
Volume and Issue:
10(23), P. 4441 - 4441
Published: Nov. 24, 2022
In
order
to
solve
various
security
risks
faced
by
image
privacy
protection,
we
propose
a
3D
cuboid
encryption
scheme
based
on
message-encoded
controlled
alternate
quantum
walks.
Firstly,
calculated
the
initial
parameters
of
system
and
performed
one-dimensional
walk
generate
probability
distribution
sequence.
Secondly,
encoded
sequence
into
quaternary
message
using
multiple
sets
messages
control
model,
generating
amplitude
matrix
obtain
hash
through
matrix.
Then,
was
divided
blocks
integrated
cuboid.
The
scrambled
between
layers
value
sequence,
used
complete
scrambling
cross-section
layers.
Finally,
converted
each
pixel
binary
cube
it
perform
rotation
operation
magnitude
matrix,
then
XOR
obtained
tilted
final
encrypted
image.
simulation
results
show
that
can
resist
typical
attacks
has
good
performance.