Опубликована: Окт. 25, 2024
Язык: Английский
Опубликована: Окт. 25, 2024
Язык: Английский
Computer Science Review, Год журнала: 2024, Номер 54, С. 100679 - 100679
Опубликована: Сен. 14, 2024
Язык: Английский
Процитировано
7IEEE Access, Год журнала: 2024, Номер 12, С. 131044 - 131064
Опубликована: Янв. 1, 2024
Язык: Английский
Процитировано
1Опубликована: Дек. 6, 2023
This study presents a comprehensive analysis of user experience (UX) in student assistant application using the Five Planes Method, structured approach UX design. Focusing on specific needs students, this research seeks to enhance usability and overall satisfaction application. The paper begins with detailed review related works design analysis, highlighting various methodologies frameworks field. methodology adopted involves which includes Strategy Plane, Scope Structure Skeleton Surface Plane. Each plane contributes unique aspect process, ensuring user-centric development approach. employs System Usability Scale (SUS) for empirical evaluation, validating efficacy Method improving experience. results indicate significant enhancement provides valuable insights into importance structured, user-focused development, particularly educational domain.
Язык: Английский
Процитировано
3Опубликована: Янв. 1, 2024
Today, the internet allows users to share images that may have been tampered with. This study proposes an improvement in tamper detection with semi-fragile image watermarking identify attacked images. The is transformed into second level of integer wavelet transform (IWT) generate a watermarked and detection. authentication bits are generated from bitwise XOR approximation coefficients (ACb) sub-band random binary matrix. Then, embedded horizontal detail coefficient (HCb) vertical (VCb) sub-band. At detection, cross-detect HCb VCb used After process, attack classification malicious incidental attacks computed using Normalized Hamming Similarity (NHS). If considered malicious, optimized algorithm improve technique uses neighbour calculate enhance process. experimental results show our proposed approach has improved accuracy precision detected perfectly between through scheme achieved 54.73 dB PSNR value SSIM 0.9987 for For method average 0.9714 F1-score 0.9705 various attacks. can achieve high 97.85% against collage attack, copy-paste object deletion attack.
Язык: Английский
Процитировано
0Engineering Science and Technology an International Journal, Год журнала: 2024, Номер 56, С. 101790 - 101790
Опубликована: Авг. 1, 2024
This paper proposed two evaluation metrics of the tamper coincidence in a block map design for image watermarking. These are called Tamper Coincidence Block Ratio (TCBR) and Density (TCBD). A occurred authentication self-recovery when recovery data original location were tampered with simultaneously. high limits inpainting's capability to recover region, leading an imprecise recovered image. The ratio density may significantly affect final quality. Previously, researchers mentioned their experiment but did not evaluate it any metrics. They evaluated robustness technique based on quality using Peak Signal-to-Noise (PSNR) Structural Similarity Index Measure (SSIM). coincidences primarily affected by implemented researcher. Thus, TCBR TCBD provide valuable insight into design's effectiveness preventing coincidence. experimental result shows that values inversely proportional value leads low Therefore, this will help effective minimizing obtain highest
Язык: Английский
Процитировано
0Engineering Science and Technology an International Journal, Год журнала: 2024, Номер 61, С. 101909 - 101909
Опубликована: Дек. 3, 2024
Язык: Английский
Процитировано
0Опубликована: Окт. 25, 2024
Язык: Английский
Процитировано
0