The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Video is a digital media that is often used now. Because of that, information security issues in the video have been popular now, which one of the issues is steganography. Neighbouring similarity (NS) is the steganography method for video. This method is using macro block that is generated in video encoding process, called prediction error (PE), to embed a secret message. Generated PE is able to improve...
Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media, in such a way that the cover media is perceived not to have...
Colors play a vital role in letting us perceive and distinguish between the various things that exist in our surroundings. While many of us are able to do so perfectly, some are not blessed with a perfect visual ability. The answer to the question that how fine is our color vision, depends upon some factors which we will be explaining in detail in this paper. When these parameters deviate from their...
Distinctive subset of the interest points creation for near-duplicate image retrieval is significant in two terms. The former is that the query time decreases reasonably. The latter is that using the distinctive subsets performs better than the ordinary subsets. In this paper, we focus on the creation of such subsets for effective near-duplicate retrieval and propose a novel interest point selection...
The term HTTP Live Streaming is used to describe the content that is relayed over computer network using HTTP in steady continuous stream allowing playback to proceed while subsequent data is downloaded. This is contrast with download and then play where playback starts after data is downloaded. The playback protection technique ensures that the already download chunks of media files are not download...
The immense popularity of online social networks generates sufficient data, that when carefully analysed, can reveal unexpected realities. People are using them to establish relationships in the form of friendships. Based on data collected, students' networks were extracted, visualized and analysed to reflect the connections among South African communities using Gephi. The analysis revealed a slow...
Social graphs, representing the online friendships among users, are one of the most fundamental types of data for many social media applications, such as recommendation, virality prediction and marketing. However, this data may be unavailable due to the privacy concerns of users, or kept privately by social network operators, which makes such applications difficult. One of the possible solutions to...
The blogosphere allows analysts to track opinions and sentiments of individuals, groups or the general public with large sample sizes regarding many topics. Essential for the sentiment analysis are visualizations. The visual understanding of large corpora's sentiment is far more effective than relying on textual representations of the analyzed content. Users are very interested in changes in the public...
LSB steganography and Vigenere chiper methods are integrated in used for data security validation in this study. This approach used Arithmetic Coding method for data compression and data decompression. To maintain the authenticity of the data file, a hash function (SHA 256) technique was added. This paper presents a prototype called Ste-Chy as a proof of concept of the combination of these techniques...
The research of network image's classification is not only the basic research on network image's creation and application, but also the important content for image information's resource management. This paper did classification research into network image, according to network image's category of generation, format, language form and retrieval, and put forward practical methods and outlook toward...
We propose a method to extract user attributes from the pictures posted in social media feeds, specifically gender information. While traditional approaches rely on text analysis or exploit visual information only from the user profile picture or colors, we propose to look at the distribution of semantics in the pictures coming from the whole feed of a person to estimate gender. In order to compute...
The creation of content in the form of digital images and video is continuously adding to the already large collection of worldwide digital imagery. The tremendous growth of the Internet has allowed users to share these rich media types and has also provided the means to browse, query, retrieve, and manipulate this extensive collection of imagery. This has created a substantial demand for algorithms...
To reliably and efficiently deliver media information to diverse clients over heterogeneous networks, the media involved must be scalable. In this paper, a color quantization algorithm for generating scalable images is proposed based on a multiscale error diffusion framework. Images of lower resolutions are embedded in the outputs such that a simple downsampling process can extract images of any desirable...
This study offers a heuristic genetic algorithm based method for message hiding in a carrier image. This approach focuses on the "before embedding hiding techniques" by trying to find appropriate places in carrier image to embed the message with the least changes of bits. Due to it, segmentation is done in order to convert the LSBs and message strings to the sets of blocks for participation...
In this paper, the sentiment correlation between color and speech has been investigated aiming at multimodal expression of information embedded in speech. To cope with the necessity of information specification for further analyses and control of speech so called para-linguistic information, we carried out an sentiment experiment on the correlations between speech characteristics and color attributes...
In the recent years, the evolution in multimedia technology has accelerated the growth of multimedia data. Even though the multimedia data are heterogeneous, the rich information they carry has made a high demand for sophisticated multimedia knowledge discovery systems. To mine the knowledge from multimedia document, each type of multimedia data has to undergo unique processing and knowledge discovery...
This paper presents a novel scheme for reversible data hiding with lossless recovery of original image. Scheme applies a method for hiding data in an image before encryption and then utilizes a novel method for encrypting the image using visual cryptography. A modified algorithm for reversible data hiding using difference expansion technique is used in this scheme. The proposed scheme thus increases...
Infographics, the word information graphics, use graphic visual representations to show information, data or knowledge. Infographics applied in education, especially the design education, become more challenging to design teaching. This paper analyzes the relationship between infographics and design education. Design education prepares designers for business and society. It takes time to develop and...
We propose a novel hybrid otitis media (OM) computer aided detection (CAD) system, designed to aid in the self-diagnosis of various forms of OM. OM is a prevalent disease in both children and adults. Our system is able to differentiate normal ear from acute otitis media (AOM), otitis media with effusion (OME) and the multi-categories of chronic otitis media including perforation, retraction, cholesteatoma,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.