21,229 research outputs found

    Digital Image Access & Retrieval

    Get PDF
    The 33th Annual Clinic on Library Applications of Data Processing, held at the University of Illinois at Urbana-Champaign in March of 1996, addressed the theme of "Digital Image Access & Retrieval." The papers from this conference cover a wide range of topics concerning digital imaging technology for visual resource collections. Papers covered three general areas: (1) systems, planning, and implementation; (2) automatic and semi-automatic indexing; and (3) preservation with the bulk of the conference focusing on indexing and retrieval.published or submitted for publicatio

    Sixth Annual Users' Conference

    Get PDF
    Conference papers and presentation outlines which address the use of the Transportable Applications Executive (TAE) and its various applications programs are compiled. Emphasis is given to the design of the user interface and image processing workstation in general. Alternate ports of TAE and TAE subsystems are also covered

    Solutions to Detect and Analyze Online Radicalization : A Survey

    Full text link
    Online Radicalization (also called Cyber-Terrorism or Extremism or Cyber-Racism or Cyber- Hate) is widespread and has become a major and growing concern to the society, governments and law enforcement agencies around the world. Research shows that various platforms on the Internet (low barrier to publish content, allows anonymity, provides exposure to millions of users and a potential of a very quick and widespread diffusion of message) such as YouTube (a popular video sharing website), Twitter (an online micro-blogging service), Facebook (a popular social networking website), online discussion forums and blogosphere are being misused for malicious intent. Such platforms are being used to form hate groups, racist communities, spread extremist agenda, incite anger or violence, promote radicalization, recruit members and create virtual organi- zations and communities. Automatic detection of online radicalization is a technically challenging problem because of the vast amount of the data, unstructured and noisy user-generated content, dynamically changing content and adversary behavior. There are several solutions proposed in the literature aiming to combat and counter cyber-hate and cyber-extremism. In this survey, we review solutions to detect and analyze online radicalization. We review 40 papers published at 12 venues from June 2003 to November 2011. We present a novel classification scheme to classify these papers. We analyze these techniques, perform trend analysis, discuss limitations of existing techniques and find out research gaps

    Data Hiding and Its Applications

    Get PDF
    Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others

    Hacker Combat: A Competitive Sport from Programmatic Dueling & Cyberwarfare

    Full text link
    The history of humanhood has included competitive activities of many different forms. Sports have offered many benefits beyond that of entertainment. At the time of this article, there exists not a competitive ecosystem for cyber security beyond that of conventional capture the flag competitions, and the like. This paper introduces a competitive framework with a foundation on computer science, and hacking. This proposed competitive landscape encompasses the ideas underlying information security, software engineering, and cyber warfare. We also demonstrate the opportunity to rank, score, & categorize actionable skill levels into tiers of capability. Physiological metrics are analyzed from participants during gameplay. These analyses provide support regarding the intricacies required for competitive play, and analysis of play. We use these intricacies to build a case for an organized competitive ecosystem. Using previous player behavior from gameplay, we also demonstrate the generation of an artificial agent purposed with gameplay at a competitive level

    2D-barcode for mobile devices

    Get PDF
    2D-barcodes were designed to carry significantly more data than its 1D counterpart. These codes are often used in industrial information tagging applications where high data capacity, mobility, and data robustness are required. Wireless mobile devices such as camera phones and Portable Digital Assistants (PDAs) have evolved from just a mobile voice communication device to what is now a mobile multimedia computing platform. Recent integration of these two mobile technologies has sparked some interesting applications where 2D-barcodes work as visual tags and/or information source and camera phones performs image processing tasks on the device itself. One of such applications is hyperlink establishment. The 2D symbol captured by a camera phone is decoded by the software installed in the phone. Then the web site indicated by the data encoded in a symbol is automatically accessed and shown in the display of the camera phone. Nonetheless, this new mobile applications area is still at its infancy. Each proposed mobile 2D-barcode application has its own choice of code, but no standard exists nor is there any study done on what are the criteria for setting a standard 2D-barcode for mobile phones. This study intends to address this void. The first phase of the study is qualitative examination. In order to select a best standard 2D-barcode, firstly, features desirable for a standard 2D-barcode that is optimized for the mobile phone platform are identified. The second step is to establish the criteria based on the features identified. These features are based on the operating limitations and attributes of camera phones in general use today. All published and accessible 2D-barcodes are thoroughly examined in terms of criteria set for the selection of a best 2D-barcode for camera phone applications. In the second phase, the 2D-barcodes that have higher potential to be chosen as a standard code are experimentally examined against the three criteria: light condition, distance, whether or not a 2D-barcode supports VGA resolution. Each sample 2D-barcode is captured by a camera phone with VGA resolution and the outcome is tested using an image analysis tool written in the scientific language called MATLAB. The outcome of this study is the selection of the most suitable 2D-barcode for applications where mobile devices such as camera phones are utilized
    corecore