Subjects -> PHOTOGRAPHY (Total: 20 journals)
Showing 1 - 10 of 10 Journals sorted alphabetically
British Journal of Photography     Full-text available via subscription   (Followers: 24)
Ciel variable : Art, photo, médias, culture     Full-text available via subscription   (Followers: 1)
Color Research & Application     Hybrid Journal   (Followers: 4)
Depth of Field     Open Access   (Followers: 9)
Études photographiques     Open Access   (Followers: 8)
Fotocinema : Revista Científica de Cine y Fotografía     Open Access   (Followers: 9)
Getty Research Journal     Full-text available via subscription   (Followers: 3)
History of Photography     Hybrid Journal   (Followers: 34)
Imaging Science Journal     Hybrid Journal   (Followers: 3)
International Journal of Multimedia Intelligence and Security     Hybrid Journal   (Followers: 9)
ISPRS Journal of Photogrammetry and Remote Sensing     Hybrid Journal   (Followers: 78)
Journal of Imaging Science and Technology     Full-text available via subscription   (Followers: 8)
JPhys Energy     Open Access  
Peritia     Full-text available via subscription   (Followers: 8)
Philosophical Papers and Review     Open Access   (Followers: 2)
Photographies     Hybrid Journal   (Followers: 12)
Photography and Culture     Hybrid Journal   (Followers: 24)
Rivista di studi di fotografia. Journal of Studies in Photography     Open Access   (Followers: 1)
The Photogrammetric Record     Hybrid Journal   (Followers: 10)
Trans-Asia Photography Review     Free   (Followers: 4)
Similar Journals
Journal Cover
International Journal of Multimedia Intelligence and Security
Number of Followers: 9  
 
  Hybrid Journal Hybrid journal (It can contain Open Access articles)
ISSN (Print) 2042-3462 - ISSN (Online) 2042-3470
Published by Inderscience Publishers Homepage  [450 journals]
  • TIDE: tampered image detection using mutual information
    • Authors: Dhwani Patel, Manik Lal Das
      Pages: 205 - 220
      Abstract: In this paper, we study the problem of detecting tampering in images without having any prior knowledge of image and its content. The features are designed to classify the given image as raw image (cover image) or image containing hidden data (stego image) embedded into original image. Two set of features are designed – one based on histogram of image and other based on information theoretic measure such as mutual information. Histogram of image is analysed using short-time Fourier transform (STFT) and features based on centre of mass (COM) in frequency domain is designed. Statistical dependency between adjacent pixels in natural images is quantified using Mutual Information. The observations made in our analysis provide some interesting observations on image tampering detection using features based on STFT and mutual information and short-time Fourier transform. We have performed the experimental result using the coral database containing 10,000 images and observed 85.71% classification accuracy which is a significant improvement over the previously reported techniques.
      Keywords: steganography; image tampering; image forgery; mutual information; histogram
      Citation: International Journal of Multimedia Intelligence and Security, Vol. 3, No. 3 (2019) pp. 205 - 220
      PubDate: 2020-01-31T23:20:50-05:00
      DOI: 10.1504/IJMIS.2019.104785
      Issue No: Vol. 3, No. 3 (2020)
       
  • Cyber defence triage for multimedia data intelligence: Hellsing, Desert
           Falcons and Lotus Blossom APT campaigns as case studies
    • Authors: Raúl Vera, Amina F. Shehu, Tooska Dargahi, Ali Dehghantanha
      Pages: 221 - 243
      Abstract: Advanced persistent threats (APTs) refer to sophisticated attacks to businesses and individuals in which adversaries use multiple attack vectors to achieve their objectives. The main challenge regarding APT analysis and defence is that all research body about APTs is fragmented; only a few scientific papers have discussed APT features. In order to defend against APTs, it is necessary to have a complete understanding of their tactics, techniques, and procedures (TTPs). In this paper, we analyse TTPs of three APT groups, namely Hellsing, Desert Falcons and Lotus Blossom, that actively targeted multimedia data storage and multimedia systems. Adopting three attack attribution models (i.e., Lockheed Martin cyber kill-chain, diamond model and course of action matrix) we provide a comprehensive cyber defence triage process (CDTP) against the considered APTs. The CDTP highlights steps undertaken by these APT groups, uncovers factors that have influenced achieving their objectives and suggests possible mitigations against them.
      Keywords: multimedia intelligence; security; advanced persistent threats; APT; cyber kill chain; diamond model; intrusion analysis; cyber defence triage; indicators of compromise; IoC
      Citation: International Journal of Multimedia Intelligence and Security, Vol. 3, No. 3 (2019) pp. 221 - 243
      PubDate: 2020-01-31T23:20:50-05:00
      DOI: 10.1504/IJMIS.2019.104786
      Issue No: Vol. 3, No. 3 (2020)
       
  • On constructing contention aware connected dominating sets for
           inter-connectivity among internet of things devices
    • Authors: Md. Sadiqur Rahman Sohel, Chowdhury Nawrin Ferdous, Ashikur Rahman, Akib Jawad Nafis, Salsabil Arabi Shushmi, Raqeebir Rab
      Pages: 244 - 270
      Abstract: The heterogeneous IoT devices are often equipped with wireless interfaces capable of creating self-organising multi-hop networks. Any device in such networks often requires broadcasting of packets for data dissemination and route discovery. The straightforward flooding has serious drawback on network throughput due to redundant traffics, contention, and collision. Several methods for creating connected dominant sets (CDS) have been proposed to overcome such bottleneck where only the members of the CDS participate in packet forwarding. However, the state-of-the-art CDS construction algorithms aim at minimising number of forwarding and overlook contention minimisation. In this paper, we provide a novel mathematical analysis of contention and show that contention is mostly dependent on node density and the transmission radius. Then a new centralised algorithm is devised which intellectually selects member nodes while creating a CDS. This helps to reduce contention. Since collecting global network topology information is very difficult to achieve, a distributed algorithm and a hybrid distributed algorithm have also been devised. Finally, the proposed algorithms have been implemented in the state-of-the-art NS-2 simulator where their performance has been captured under realistic settings. The results show a significant reduction in contention. Interestingly, the proposed algorithms' contention and delay performance outperform some other state-of-the-art algorithms' performance although the number of forwarding is increased marginally.
      Keywords: wireless ad hoc network; broadcasting in IoT-devices; connected dominating set; CDS; network contention; mathematical analysis of contention; contention aware connected dominating set; CACDS
      Citation: International Journal of Multimedia Intelligence and Security, Vol. 3, No. 3 (2019) pp. 244 - 270
      PubDate: 2020-01-31T23:20:50-05:00
      DOI: 10.1504/IJMIS.2019.104795
      Issue No: Vol. 3, No. 3 (2020)
       
  • Hardware security threats and countermeasures: a study of obfuscation,
           camouflaging and PUFs
    • Authors: Hamza Al Maharmeh, Mohammad Alhawari, Chung-Chih Hung, Mohammed Ismail
      Pages: 271 - 292
      Abstract: Hardware security threats have gained a tremendous attention where extensive research efforts have been expended toward developing effective countermeasures. These threats can be categorised into five main attacks which are: reverse engineering, side-channel analysis, intellectual property (IP) cores piracy/IC overbuilding, counterfeiting, and hardware Trojans. This paper investigates the most efficient state-of-the-art techniques that are used to thwart main hardware attacks. Reported work in the literature proposed various countermeasures, where obfuscation, camouflaging, and physically unclonable functions (PUFs) are considered the most powerful and effective methods. In obfuscation technique, the chip will be locked and it will not function properly unless the correct secret key is supplied. This paper addresses also camouflaging countermeasure which is a layout-based technique that is used to protect IP cores. Additionally, this paper provides a detailed study on silicon PUFs, where they can be classified into weak and strong PUFs. In this paper, various PUF architectures will be discussed along with the design constraints.
      Keywords: hardware security; physical unclonable functions; PUFs; weak PUFs; strong PUFs; silicon PUFs; obfuscation; camouflaging; logic locking
      Citation: International Journal of Multimedia Intelligence and Security, Vol. 3, No. 3 (2019) pp. 271 - 292
      PubDate: 2020-01-31T23:20:50-05:00
      DOI: 10.1504/IJMIS.2019.104796
      Issue No: Vol. 3, No. 3 (2020)
       
  • A new method of combining colour, texture and shape features using the
           genetic algorithm for image retrieval
    • Authors: Mohamed Hamroun, Sonia Lajmi, Henri Nicolas, Ikram Amous
      Pages: 293 - 319
      Abstract: Semi-automatic or automatic image indexation emerged because manual image indexation is slow and tedious. Generally, this first indexation is used as part of a content-based image retrieval system (CBIR). To have a powerful CBIR system, it is necessary to be concerned with three main facets: 1) the choice of the descriptors (based on shape, colour and texture and/or a combination between them); 2) the process of indexation and finally; 3) the retrieval process. In this work, we focus mainly on an indexing based on genetic algorithm and particle swarm optimisation (PSO) algorithm. We chose an optimal combination of colour, shape and texture (PCM: powerful combination method) descriptors. The fruit of our research work is implemented in a system called image search engine (ISE) which showed a very promising performance. In fact, the performance evaluation of the PCM method of our descriptors combination showed upgrades of the average precision metric from 66.6% to 89.30% for the 'food' category colour histogram, from 77.7% to 100% concerning CCV for the 'flower' category, and from 44.4% to 87.65% concerning the co-occurrence matrix for the 'building' category using the Corel dataset. Likewise, our ISE system showed much more interesting performance compared to what was shown in previous works.
      Keywords: content-based image retrieval system; CBIR; genetic algorithm; particle swarm optimisation; PSO; image retrieval
      Citation: International Journal of Multimedia Intelligence and Security, Vol. 3, No. 3 (2019) pp. 293 - 319
      PubDate: 2020-01-31T23:20:50-05:00
      DOI: 10.1504/IJMIS.2019.104798
      Issue No: Vol. 3, No. 3 (2020)
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 18.215.185.97
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-