Nowadays, videos are mostly multiplexed with au-dios and wrapped in a multimedia container format. With speedy consumption of videos being a norm these days, authenticating video files (video + audio) becomes a challe...
详细信息
ISBN:
(纸本)9781509024018
Nowadays, videos are mostly multiplexed with au-dios and wrapped in a multimedia container format. With speedy consumption of videos being a norm these days, authenticating video files (video + audio) becomes a challenging task. Conventional authentication schemes only focus on individual track such as audio or video. Therefore, in this work, we propose an authentication system where authentication values from video and audio are weaved by exploiting data embedding techniques in the compression/media layer and system layer. Specifically, the authentication value from video is embedded into audio, and vice versa. The authentication values for both audio and video are generated by using the key embedded in the system layer and cryptographic hash function. As a proof of concept, the ideas are implemented on MP4 format container and evaluated using various short movie clips downloaded from YouTube. Results suggest that imperceptible quality degradation and insignificant file size increment were achieved.
Several research efforts suggest that collaborative participatory simulations improve teaching and learning, increasing motivation inside the classroom. Currently, it has been mainly applied with students of primary a...
详细信息
Email spam has been a big issue in recent years. As the percentage of internet users grows, so does the number of spam emails. Technologies are being used for illegitimate and immoral activities, such as phishing and ...
详细信息
Email spam has been a big issue in recent years. As the percentage of internet users grows, so does the number of spam emails. Technologies are being used for illegitimate and immoral activities, such as phishing and robbery. As a consequence, it is essential to identify fraudulent spammers by employing machine learning techniques. This paper presents a novel spam classification technique that integrates the Harris Hawks optimizer (HHO) algorithm with the k-Nearest Neighbors algorithm (k-NN). The Harris Hawks Optimization (HHO) algorithm is a new metaheuristic algorithm motivated by Harris’ Hawks’ cooperative relations and surprises pounce pursue technique in nature. According to empirical results on the dataset, the suggested model can handle high-dimensional data (Spambase). The suggested model’s spam detection accuracy is compared to the numerous algorithms, including the Binary Dragonfly Algorithm (BDA), Equilibrium Optimizer (EO), Teaching-Learning-based Optimization, Seagull Optimization Algorithm (SO), and Marine Predators Algorithm (MPA). We found that the proposed technique trumps the other spam detection techniques investigated in this study in terms of classification accuracy. The experimental results showed that the proposed technique accuracy reaches %94.3.
Counterfeit wine presents a significant issue for winemakers since it affects producer's reputation, profit and most importantly it can be harmful for the consumers. This paper describes a brand protection and ant...
详细信息
Vehicular Ad hoc Networks are emerging class of Mobile Ad hoc Networks that provide wireless communication between vehicles with no need for any fixed infrastructure. It is proven that in highly dynamic vehicular envi...
详细信息
Vehicular Ad hoc Networks are emerging class of Mobile Ad hoc Networks that provide wireless communication between vehicles with no need for any fixed infrastructure. It is proven that in highly dynamic vehicular environments beaconless position-based forwarding algorithms are more suitable than the algorithms that use periodic beacon information in their forwarding decisions. However, data packet broadcasting in forwarding mechanism of these algorithms leads to packet duplications in both forwarding area and the destination node and consequently increases the network overhead and wastes available bandwidth. In this paper we propose a new beaconless forwarding algorithm called CBBPF in which data packets are not broadcasted to the neighbors to avoid duplication. The simulative performance evaluation results in highway scenarios show that CBBPF operates properly in terms of packet delivery ratio and average end-to-end delay.
This book consitutes the refereed joint proceedings of the First European Workshop on Evolutionary Computation in Image Analysis and Signal Processing, EvoIASP '99 and of the First European Workshop on Evolutionar...
详细信息
ISBN:
(数字)9783540489177
ISBN:
(纸本)9783540658375
This book consitutes the refereed joint proceedings of the First European Workshop on Evolutionary Computation in Image Analysis and Signal Processing, EvoIASP '99 and of the First European Workshop on Evolutionary Telecommunications, EuroEcTel '99, held in Göteborg, Sweden in May 1999. The 18 revised full papers presented were carefully reviewed and selected for inclusion in the volume. The book presents state-of-the-art research results applying techniques from evolutionary computing in the specific application areas.
In the automotive industry, platform configuration and software integration are mostly manual tasks performed during the development phase, requiring consideration of various safety and non-safety requirements. This m...
详细信息
Spam detection is a significant problem which considered by many researchers by various developed strategies. Among many others, simple artificial immune system is one of those being proposed. There is a deficiency in...
详细信息
Spam detection is a significant problem which considered by many researchers by various developed strategies. Among many others, simple artificial immune system is one of those being proposed. There is a deficiency in number of optimization methods in simple artificial immune system (SAIS). This problem can be solved and eliminated using other optimization methods besides mutation. In this research, SAIS was hybridized by particle swarm optimization (PSO) for optimizing the performance of SAIS for spam filtering. PSO was used with mutation to reinforce the immune system's searches to find the best class in exemplar for classification. Achieved results represent the Hybrid SAIS and PSO is superior to that of a SAIS.
Malaysia experienced flood on a regular basis due to the geographical location of the country and the improper development of its cities. Based on this situation, it is recognized that Malaysia have to establish an ef...
详细信息
Malaysia experienced flood on a regular basis due to the geographical location of the country and the improper development of its cities. Based on this situation, it is recognized that Malaysia have to establish an effective flood management (FM) practice in order to reduce the impact caused by flood. This article seeks to examine the proper governance framework needed in managing flood. The aim of this paper is to, namely: identify the current governance structure in several selected countries and identify the challenges associated with the structure. Results from this comparative study will be used in recommending the best form of a FM framework.
The nature of Digital Forensics Investigations is complex, which requires multidisciplinary skills, knowledge and abilities. As a result of the Digital Forensics Investigations and its training/education are relativel...
详细信息
The nature of Digital Forensics Investigations is complex, which requires multidisciplinary skills, knowledge and abilities. As a result of the Digital Forensics Investigations and its training/education are relatively new, the world lacks of Digital Forensics Investigation workforces. Thus, this paper focuses on Digital Forensics training/education programs Quality Assurance and Accreditation. Quantitative research method was used. An average of 83.54 percent of the respondents believed the significances of the Quality Assurance and Accreditation to the Digital Forensics training/education programs. Moreover, the Quality Assurance and Accreditation have positive relation to Digital Forensic Investigator Proficiency.
暂无评论