IoT-based crowd-sensing network, which aims to achieve data collection and task allocation to mobile users, become more and more popular in recent years. This data collected by IoT devices may be private and directly transmission of these data maybe incur privacy leakage. With the help of homomorphic encryption (HE), which supports the additive and/or multiplicative operations over the encrypted data, privacy preserving crowd-sensing network is now possible.
View Article and Find Full Text PDFSensors (Basel)
March 2023
This paper describes a multi-secret steganographic system for the Internet-of-Things. It uses two user-friendly sensors for data input: thumb joystick and touch sensor. These devices are not only easy to use, but also allow hidden data entry.
View Article and Find Full Text PDFIn recent years, the number of personal accounts assigned to one business user has been constantly growing. There could be as many as 191 individual login credentials used by an average employee, according to a 2017 study. The most recurrent problems associated with this situation faced by users are the strength of passwords and ability to recall them.
View Article and Find Full Text PDFThis article describes a steganographic system for IoT based on an APDS-9960 gesture sensor. The sensor is used in two modes: as a trigger or data input. In trigger mode, gestures control when to start and finish the embedding process; then, the data come from an external source or are pre-existing.
View Article and Find Full Text PDFThe objective of the verification process, besides guaranteeing security, is also to be effective and robust. This means that the login should take as little time as possible, and each time allow for a successful authentication of the authorised account. In recent years, however, online users have been experiencing more and more issues with recalling their own passwords on the spot.
View Article and Find Full Text PDFThe sparse data in PM2.5 air quality monitoring systems is frequently happened on large-scale smart city sensing applications, which is collected via massive sensors. Moreover, it could be affected by inefficient node deployment, insufficient communication, and fragmented records, which is the main challenge of the high-resolution prediction system.
View Article and Find Full Text PDFNeural Comput Appl
July 2021
One of the most important goals of modern medicine is prevention against pandemic and civilization diseases. For such tasks, advanced IT infrastructures and intelligent AI systems are used, which allow supporting patients' diagnosis and treatment. In our research, we also try to define efficient tools for coronavirus classification, especially using mathematical linguistic methods.
View Article and Find Full Text PDFIn this paper we propose a novel transform domain steganography technique-hiding a message in components of linear combination of high order eigenfaces vectors. By high order we mean eigenvectors responsible for dimensions with low amount of overall image variance, which are usually related to high-frequency parameters of image (details). The study found that when the method was trained on large enough data sets, image quality was nearly unaffected by modification of some linear combination coefficients used as PCA-based features.
View Article and Find Full Text PDFImagechain is a cryptographic structure that chain digital images with hash links. The most important feature, which differentiates it from blockchain, is that the pictures are not stored inside the blocks. Instead, the block and the image are combined together in the embedding process.
View Article and Find Full Text PDFThis paper shows how to diffuse a message and hide it in multiple PDF files. Presented method uses dereferenced objects and secret splitting or sharing algorithms. It is applicable to various types of PDF files, including text documents, presentations, scanned images etc.
View Article and Find Full Text PDFThis paper will present the authors' own techniques of secret data management and protection, with particular attention paid to techniques securing data services. Among the solutions discussed, there will be information-sharing protocols dedicated to the tasks of secret (confidential) data sharing. Such solutions will be presented in an algorithmic form, aimed at solving the tasks of protecting and securing data against unauthorized acquisition.
View Article and Find Full Text PDFThe aim of this paper is to propose and evaluate the novel method of template generation, matching, comparing and visualization applied to motion capture (kinematic) analysis. To evaluate our approach, we have used motion capture recordings (MoCap) of two highly-skilled black belt karate athletes consisting of 560 recordings of various karate techniques acquired with wearable sensors. We have evaluated the quality of generated templates; we have validated the matching algorithm that calculates similarities and differences between various MoCap data; and we have examined visualizations of important differences and similarities between MoCap data.
View Article and Find Full Text PDFThe main novelty of this paper is presenting the adaptation of Gesture Description Language (GDL) methodology to sport and rehabilitation data analysis and classification. In this paper we showed that Lua language can be successfully used for adaptation of the GDL classifier to those tasks. The newly applied scripting language allows easily extension and integration of classifier with other software technologies and applications.
View Article and Find Full Text PDFThis paper presents a novel method of detecting and describing pathological changes that can be visualized on dynamic computer tomography brain maps (perfusion CT). The system was tested on a set of dynamic perfusion computer tomography maps. Each set consisted of two perfusion maps (CBF, CBV and TTP for testing the irregularity detection algorithm) and one CT brain scan (for the registration algorithm) from 8 different patients with suspected strokes.
View Article and Find Full Text PDFComput Med Imaging Graph
March 2009
This paper presents a new approach to gallbladder ultrasonic image processing and analysis towards detection of disease symptoms on processed images. First, in this paper, there is presented a new method of filtering gallbladder contours from USG images. A major stage in this filtration is to segment and section off areas occupied by the said organ.
View Article and Find Full Text PDFThis paper presents the way of application of structural methods of Artificial Intelligence-in particular, linguistic mechanisms of semantic meaning reasoning-for development of intelligent medical information systems. They also facilitate an in-depth analysis of the meaning presented in Diagnosis Support Information Systems used in analysis of selected medical examinations. This paper will present the mechanisms of pattern meaning description on selected examples of spinal cord image analysis.
View Article and Find Full Text PDFArtif Intell Med
October 2002
This paper presents a new approach to the application of structural pattern recognition methods for image understanding, based on content analysis and knowledge discovery performed on medical images. This presents in particular computer analysis and recognition of local stenoses of the coronary arteries lumen. These stenoses are the result of the appearance of arteriosclerosis plaques, which in consequence lead to different forms of ischemic cardiovascular diseases.
View Article and Find Full Text PDF