Skin cancer is the most common type of cancer in many parts of the world. As skin cancers start as skin lesions, it is important to identify precancerous skin lesions early. In this paper we propose an image based skin lesion identification to classify seven different classes of skin lesions.
View Article and Find Full Text PDFComput Med Imaging Graph
April 2021
Worldwide, the burden of cancer is drastically increasing over the past few years. Among all types of cancers in women, breast cancer (BrC) is the main cause of unnatural deaths. For early diagnosis, histopathology (Hp) imaging is a gold standard for positive and detailed (at tissue level) diagnosis of breast tumor (BrT) compared to mammogram images.
View Article and Find Full Text PDFTaking into consideration that the prior CMF detection methods rely on several fixed threshold values in the filtering process, we propose an efficient CMF detection method with an automatic threshold selection, named as CMF-iteMS. The CMF-iteMS recommends a PatchMatch-based CMF detection method that adapts Fourier-Mellin Transform (FMT) as the feature extraction technique while a new automatic threshold selection based on iterative means of regions size (iteMS) procedure is introduced to have flexibility in changing the threshold value for various characteristics (quality, sizes, and attacks) in each input image. To ensure the reliability of the proposed CMF-iteMS, the method is compared with four state-of-the-art CMF detection methods based on Scale Invariant Feature Transform (SIFT), patch matching, multi-scale analysis and symmetry techniques using three available datasets that cover the variety of characteristics in CMF images.
View Article and Find Full Text PDFRetinal image registration is important to assist diagnosis and monitor retinal diseases, such as diabetic retinopathy and glaucoma. However, registering retinal images for various registration applications requires the detection and distribution of feature points on the low-quality region that consists of vessels of varying contrast and sizes. A recent feature detector known as Saddle detects feature points on vessels that are poorly distributed and densely positioned on strong contrast vessels.
View Article and Find Full Text PDFThe VoIP services provide fertile ground for criminal activity, thus identifying the transmitting computer devices from recorded VoIP call may help the forensic investigator to reveal useful information. It also proves the authenticity of the call recording submitted to the court as evidence. This paper extended the previous study on the use of recorded VoIP call for blind source computer device identification.
View Article and Find Full Text PDFVehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among vehicles with the use of multiple hops.
View Article and Find Full Text PDFSoft set theory is a mathematical approach that provides solution for dealing with uncertain data. As a standard soft set, it can be represented as a Boolean-valued information system, and hence it has been used in hundreds of useful applications. Meanwhile, these applications become worthless if the Boolean information system contains missing data due to error, security or mishandling.
View Article and Find Full Text PDFAudio forgery is any act of tampering, illegal copy and fake quality in the audio in a criminal way. In the last decade, there has been increasing attention to the audio forgery detection due to a significant increase in the number of forge in different type of audio. There are a number of methods for forgery detection, which electric network frequency (ENF) is one of the powerful methods in this area for forgery detection in terms of accuracy.
View Article and Find Full Text PDFCamera attribution plays an important role in digital image forensics by providing the evidence and distinguishing characteristics of the origin of the digital image. It allows the forensic analyser to find the possible source camera which captured the image under investigation. However, in real-world applications, these approaches have faced many challenges due to the large set of multimedia data publicly available through photo sharing and social network sites, captured with uncontrolled conditions and undergone variety of hardware and software post-processing operations.
View Article and Find Full Text PDFNetwork forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms.
View Article and Find Full Text PDFA soft methodology study has been applied on tapered plastic multimode sensors. This study basically used tapered plastic multimode fiber [polymethyl methacrylate (PMMA)] optics as a sensor. The tapered PMMA fiber was fabricated using an etching method involving deionized water and acetone to achieve a waist diameter and length of 0.
View Article and Find Full Text PDF