The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this digital era, protecting sensitive data, such as military and financial data, has been an important factor for preventing attackers from illegally disclosing them. This protection can be done by hiding the secret into digital data (e.g., image, audio) which act as a cover. So, the secret messages cannot be seen easily. It is intended that the attacker is not able to detect the presence of the...
Wireless sensor networks (WSN) consists of large number of sensor nodes with limited energy and computing resources. These facts have highlighted open problem to prolong the lifetime of sensor nodes while still maintaining the functional roles of WSN in reporting important events to a base station. These papers propose an approach for WSN inspired by the concept of immunity-based system where a set...
The current development of context-awareness has introduced various emerging research areas to reduce complexity in developing context aware applications by applying service-oriented approach in managing context and establish context service. The establishment of context service will enable context aware systems to access and utilize context from context providers without paying necessary attention...
The proliferation of Social Networking Services (SNS) has highlighted the need of providing reliable but efficient mechanism to report information from mobile users to the data center. In this paper, a mechanism to reduce periodic update of position and sensor data for activities recognition from mobile device is proposed. To improve the reporting mechanism, variance analysis from sensor data captured...
Fingerprint is one of popular biometric identifiers for authenticating users. Its permanence characteristic has made it reliable to use. Therefore, fingerprint data should be protected and not be disclosed to unauthorized parties. Neverthelless, its instability scanning result has made conventional cryptographic algorithms do not work. In this paper, we propose an algorithm for protecting fingerprint...
This paper describes prototype development of event-based tracking for mobile users. Nowadays, queries about location and activities are the most common question people send to other people in their social connections. This phenomenon has highlighted the need to provide a service to monitor positions and physical activities of multiple users. There are several challenges that need to be dealt with...
Transferring information between nodes in this digital era has been made it easy for users to communicate. Sensitive data, however, requires protection during transmission to prevent unauthorized users from exploiting it. In this paper, we propose to hide secret data by developing emoticon-based steganography. Here, the data is embedded to the emoticon which is sent along with the cover text via chatting...
Medical data (i.e., medical image and medical record) is private which should be protected before being transferred or stored. There have been some methods proposed by implementing various algorithms, such as steganography. It is sometimes combined with the shared secret method, so that, the reconstruction of the original data must be done by some users. It is believed that this method increases the...
Fall situations can be risky especially for elderly people with health problems. This fact has highlighted the need of fall detection systems. Various fall detection systems have been proposed. The proposed systems commonly used special devices placed at several position of user's body. On the other hand, smartphones with various sensors including gyroscopes are available in the market nowadays. This...
Difference Exapansion is one of popular reversible steganography methods which can be used for authenticating images. By using this method, the reconstructed image is exactly the same as the original one. However, the stego image generated is relatively different from the original. Based on Quad and RDE methods, we propose an algorithm which can improve the quality of the stego image, in terms of...
Advances in wireless and sensing technology and the proliferation of context-aware systems have highlighted the requirement to reduce the complexity of system development by establishing a middleware framework of context management. The middleware aims to manage different aspects of context and location management as well as situation reasoning and other related tasks. In this paper, a middleware...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.