International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2023,
Номер
17(10), С. 136 - 154
Опубликована: Май 22, 2023
Remarkable
success
has
been
recorded
in
the
usage
of
digital
watermarking
which
is
aimed
at
protecting
intellectual
property
multimedia
content.
In
this
paper,
a
new
tone
mapping
attack-resistant
high
dynamic
range
(HDR)
image
zero-watermarking
algorithm
proposed.
extraction
stable
and
invariant
features
are
extracted
for
efficient
through
application
redundant
discrete
wavelet
transform
(RDWT)
to
HDR
image.
The
first
step
involves
transforming
HVS
color
space,
RDWT
implemented
using
V-channel
so
that
LL
sub-band
contains
strong
structure
contents
obtained.
second
dividing
into
non-overlapping
blocks,
afterwards
subjected
process
transformation
use
singular
value
decomposition
(SVD)
U
matrix
can
be
extracted.
Third,
an
Auto-Regressive
(AR)
prediction
technique
was
employed
generating
local
relationship
model
comparison
done
facilitate
production
binary
feature
mask.
fourth
process,
hybrid
chaotic
(HCM)
used
generate
blended
watermark
security
fortified.
Lastly,
computation
effective
zero-watermark
achieved
implementation
exclusive-or
operation
on
Based
results,
approach
presented
study
demonstrated
superior
performance
terms
withstanding
TM
attacks
other
associated
with
processing.
International Journal of Online and Biomedical Engineering (iJOE),
Год журнала:
2022,
Номер
18(12), С. 89 - 105
Опубликована: Сен. 14, 2022
This
research
is
aimed
at
planning
the
manner
in
which
secure
5G
communication
can
be
controlled
based
on
traffic
floods.
To
accomplish
excellent
administration
execution
of
organization
observing
and
directing
calculation
inescapable,
dynamic
steering
actual
equipment
isn't
reasonable
for
practical
plans
action.
Accordingly,
to
bring
down
functional
capital
consumption,
we
propose
a
strategy
called
versatile
made
do
with
help
(Quality
Service
MANET
(Mobile
specially
appointed
Network).
A
model
will
fulfilling
needs
customers
simultaneously
gives
huge
investment
funds
item
cost
convenience
was
presented
this
paper.
perform
steering,
planned
geography
virtualized
climate.
We
customized
CHAOS
network
flood
board
goes
about
as
consistent
northward
API
directing.
Network
infused
dynamically
from
1MB
up
10MB
(connect
b/w)
progressive
way
similar
10
occurrences.
In
conclusion,
performed
applying
control
hypothetical
method
assistance
calculations.
By
looking
two
situations,
noticed
prominent
distinction
throughput
controlling
application
MANETs.
data
refreshed
after
clockwork.
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2022,
Номер
16(10), С. 122 - 139
Опубликована: Май 24, 2022
Dark
web
is
a
canopy
concept
that
denotes
any
kind
of
illicit
activities
carried
out
by
anonymous
persons
or
organizations,
thereby
making
it
difficult
to
trace.
The
content
on
the
dark
constantly
updated
and
changed.
collection
classification
such
illegal
are
challenging
tasks,
as
they
time-consuming.
This
problem
has
in
recent
times
emerged
an
issue
requires
quick
attention
from
both
industry
academia.
To
this
end,
efforts
have
been
made
article
crawler
capable
collecting
pages,
cleaning
them,
saving
them
document
database,
proposed.
carries
automatic
gathered
pages
into
five
classes.
classifiers
used
classifying
include
Linear
Support
Vector
Classifier
(SVC),
Naïve
Bayes
(NB),
Document
Frequency
(TF-IDF).
experimental
results
revealed
accuracy
rate
92%
81%
were
achieved
SVC
NB,
respectively.
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2022,
Номер
16(08), С. 34 - 48
Опубликована: Апрель 26, 2022
The
past
few
years
have
witnessed
a
huge
increase
in
the
application
of
facial
recognition,
detection,
and
analysis
technology.
However,
face
recognition
systems
remain
most
popular
among
general
public.
system
can
detect
presence
when
exposed
to
one.
accuracy
fairness
that
be
derived
from
such
necessitate
their
use,
because
humans,
particularly
security
personnel
tired
target
wrong
person
as
suspect.
artificial
intelligence
are
properly
trained
capable
efficiently
identifying
classifying
faces
without
errors.
In
this
work,
use
Matlab
language
was
employed
building
software
is
recognizing
differentiating
different
patterns.
proposed
equipped
with
camera
serves
practical
aspect
captures
shots
sent
theoretical
part
special
program
designed
recognize
by
comparing
them
database
stored
within
program.
work
involved
Quantum
Neural
Network.
training
dataset
made
up
features
vectors
were
obtained
well-known
set
images
people.
Here,
Principle
Component
Analysis
(PCA)
used
for
extraction
feature
then
prepared
next
step.
experimental
results
revealed
efficient
achieved
through
well-trained
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2022,
Номер
16(10), С. 244 - 252
Опубликована: Май 24, 2022
Computational
Thinking
(CT)
is
very
useful
in
the
process
of
solving
everyday
problems
for
undergraduates.
In
terms
content,
computational
thinking
involves
problems,
studying
data
patterns,
deconstructing
using
algorithms
and
procedures,
doing
simulations,
computer
modeling,
reasoning
about
abstract
things.
However,
there
a
lack
studies
dealing
with
it
its
skills
that
can
be
developed
utilized
field
information
technology
used
learning
teaching.
The
descriptive
research
method
was
used,
test
tool
prepared
to
measure
level
consisting
(24)
items
type
multiple-choice
"CT".
study
group
consists
(100)
third-year
students
at
University
Baghdad
Computer
Science
within
scope
(2020-2021).
results
are
detailed.
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2022,
Номер
16(08), С. 124 - 137
Опубликована: Апрель 26, 2022
A
major
issue
in
the
field
of
education
is
exam
malpractice
and
other
forms
academic
dishonesty,
where
efforts
made
towards
assessment
students
are
undercut.
In
order
to
address
this
menace,
a
cheating
detection
system
has
been
proposed
study.
The
can
detect
real-time.
uses
video
surveillance
monitor
activities
student
during
exams,
especially
abnormal
behavior.
development
involved
use
three
different
techniques,
with
functions.
first
technique
helps
determining
direction
students’
heads
when
they
move
from
their
initial
direction,
which
script.
Some
form
involves
peeping
at
scripts
people
writing
same
exam.
Whenever
observes
deviation
that
exceeds
set
threshold,
it
classifies
behavior
as
abnormal.
second
works
movement
student’s
iris.
It
detects
iris
moves
copy
answers
written
documents
like
mobile
phones,
books,
hands,
summary
papers.
third
used
identifying
contact
between
hands
face,
well
for
shared
students,
such
sharing
incriminating
materials.
When
any
these
detected,
an
automatic
alarm
alerts
authority
about
thereby
minimizing
error
rate
occur
result
manual
monitoring.
International Journal of Online and Biomedical Engineering (iJOE),
Год журнала:
2023,
Номер
19(06), С. 4 - 17
Опубликована: Май 16, 2023
In
cloud
computing,
resources
are
used
to
communicate
instead
of
local
servers
or
individual
devices.
However,
sharing
among
several
users
is
a
difficult
issue
in
communication.
Cryptography
and
steganography
techniques
for
storage
address
data
security
challenges.
This
paper
presents
novel
method
securely
encrypting
image
transmission
link
exchange
with
service.
There
two
phases
accomplish
the
encryption
process,
first
phase
encrypts
file
by
XORing
it
random
key
that
generated
new
hybrid
chaotic
map.
The
second
converts
encrypted
format
audio
add
another
layer
improve
secure
transfer.
using
map
has
benefit
having
more
than
10256
spaces
necessary
level
security.
Based
on
statistical
analysis
encryption,
quality
evaluated
criteria,
results
demonstrate
algorithm's
ability
resist
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2023,
Номер
17(08), С. 113 - 134
Опубликована: Апрель 26, 2023
In
the
realm
of
robotics
and
interactive
systems,
gender
recognition
is
a
crucial
problem.
Considering
several
uses
it
has
in
security,
web
search,
human-computer
interactions,
etc.,
from
facial
photos
garnered
lot
attention.
The
need
to
use
enhance
techniques
felt
more
strongly
today
due
significant
development
design
systems.
Relatively
speaking
other
approaches,
progress
gained
this
area
thus
far
not
exceptional.
Thus,
novel
method
been
adopted
study
improve
accuracy
comparison
earlier
research.
To
create
best
rate
efficiency
suggested
research,
we
choose
minimal
set
characteristics.
Testing
on
FERET
UTK-Face
datasets
reveals
that
our
algorithm
lower
degree
inaccuracy.
article,
input
image
person's
face
pre-processed
extract
right
features
once
recognized.
Gender
separation
achieved
using
Multi-class
Support
Vector
Machine
(SVM)
Classifiers
after
normalized
images
have
extracted
Histogram
Oriented
Gradient
(HOG),
Gabor
Filters,
Speeded
Up
Robust
Features
(SURF),
as
well
their
combination
select
most
appropriate
feature
them
for
classification.
As
reduction
feature,
Principal
Component
Analysis
(PCA)
also
employed.
Using
proposed
approach,
98.75%
precision
accomplished
database
runtime
performance
0.4
Sec.
database,
97.43%
0.5
Wasit Journal of Computer and Mathematics Science,
Год журнала:
2022,
Номер
1(2), С. 1 - 7
Опубликована: Июнь 30, 2022
Finger
vein
biometrics
have
gained
a
lot
of
attention
in
recent
years
because
they
offer
the
perfect
balance
security
and
economic
viability,
with
advantages
such
as
being
least
susceptible
to
identity
theft
veins
are
present
beneath
skin,
unaffected
by
ageing
person,
etc.
All
these
factors
make
it
necessary
create
functioning
models
meet
ever-increasing
need
for
security.
The
use
facial
recognition
AI-based
biometrics,
particularly
law
enforcement,
has
become
hot
topic
its
inadvertent
demographic
bias.
Biometric
bias,
on
other
hand,
far-reaching
consequences
that
extend
into
daily
cases.
When
an
ATM
transaction
or
online
banking
is
compromised
false
positive
negative
verification,
fraudulent
activity
made
easier.
study
this
research
work
focused
difficulty
determining
fingertip.
On
two
widely
used
freely
available
datasets
finger
veins,
we
applied
deep
convolutional
neural
network
feature
extraction.
gotten
interest
recently
novel
biometric
technique.
might
benefit
from
applying
learning,
end-to-end
approach
shown
promising
results
sectors
like
face
target
detection.