35 research outputs found

    Watermark Compression in Digital Medical Image Watermarking

    Get PDF
    Large size data not only require more storage space but also require more transmission time in communication environment. Mostly this obstacle exists in every type image communication process such as in satellite and distributed health facilities provision applications. Data compression causes reduction in storage space and communication time. Data compression is divided into two main categories, lossy and lossless. Although in lossy compression the compression ratio is higher than lossless but mostly important part of data is lost. During data lossless compression important data is not lost and only size reduction taking place. Teleradiology is a health promoting technology used to share medical images among different experts located apart from each other to analyze the image data for patient better treatment and surgical planning. Medical image data is very sensitive data and need its compression without any loss otherwise it will result in erroneous input into health recovery process. This paper focuses on Ultrasound medical image lossless compression using different techniques. PNG, GIF, JPG, JPEG2000 version j2c, JPEG2000 version jp2 in lossless mode techniques were used for this purpose as shown in table 1. The techniques were compared based on compression ratio, time taken during compression and PNG was found the best one. The selected technique is suggested to be used for digital watermarking of Ultrasound medical images. Our consideration is US images because US images are small in sizes as compared to images produced by other modalities and most of information is located in the central part of the image known as Region of Interest (ROI). The rest of the image other than ROI is known as Region of Non Interest (RONI). The main purpose of image compression is the removal of redundant data in such a way that it can be reversed to their original version for the desired operations [Vilas H. Gaidhane et al, 2011]

    Comparative analysis on raster, spiral, hilbert, and peano mapping pattern of fragile watermarking to address the authentication issue in healthcare system

    Get PDF
    Healthcare service is one of the focus areas in supporting the existence of smart city. Nowadays, many procedures are done paperless and fully in digital. Medical scanning is also stored in digital modalities format and transmitted through a hospital management system. An authentication system is needed during the transmission, thus the need of watermarking. Some interesting research directions in watermarking include the embedding pattern of watermark data in the early process of watermarking. The objective of this research is to investigate the best pattern to determine the bit locations for watermark embedding for copyright protection. This paper applies four types of embedding patterns on medical images, which the quality of watermarked images would depend on how the mapping pattern is. It compares the difference of having a straight forward pattern mapping as a raster pattern and a unique pattern mapping like spiral, Hilbert, and Peano patterns. After mapping, all would have the same stages of a watermarking scheme which are embedding, detection and recovery stage. The comparison factors include the peaksignal-noise-ratio, mean-squared-error values of embedded images, and the computational time. From the result, the significant difference is the computational time; the taken time by the unique pattern is significantly longer than raster. When it comes to handling superabundant data, it is very crucial to produce a user-friendly system. However, as a whole, the results from Peano pattern embedding scheme shows it has a unique pattern which hard to be tracked, yet, its computational time to watermark is acceptable

    Analysis of File Carving Approaches : A Literature Review

    Get PDF
    Home Advances in Cyber Security Conference paper Analysis of File Carving Approaches: A Literature Review Nor Ika Shahirah Ramli, Syifak Izhar Hisham & Gran Badshah Conference paper First Online: 01 January 2022 1262 Accesses 2 Citations Part of the Communications in Computer and Information Science book series (CCIS,volume 1487) Abstract Digital forensics is a crucial process of identifying, conserving, retrieving, evaluating, and documenting digital evidence obtained on computers and other electronic devices. Data restoration and analysis on file systems is one of digital forensic science’s most fundamental practices. There is a lot of research being done in developing file carving approaches and different researches focused on different aspects. With the increasing numbers of literature that are covering this research area, there is a need to review this literature for further reference. A review is carried out reviewing different works of literature covering various aspects of carving approaches from multiple digital data sources including IEEE Xplore, Google Scholar, Web of Science, etc. This analysis is done to consider several perspectives which are the current research direction of the file carving approach, the classification for the file carving approaches, and also the challenges are to be highlighted. Based on the analysis, we are able to state the current state of the art of file carving. We classify the carving approach into five classifications which are general carving, carving by specific file type, carving by structure, carving by the file system, and carving by fragmentation. We are also able to highlight several of the challenges for file carving mentioned in the past research. This study will serve as a reference for scientists to evaluate different strategies and obstacles for carving so that they may choose the suitable carving approaches for their study and also future developments

    Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication

    Get PDF
    The wide increment of information and communication technology nowadays in line with the usage of digital documents, the user from different organizations such as education, military, medical, business, and others tend to transfer any official file through various digital platforms. Thus, to secure this confidential data, a digital watermarking technique was chosen. This paper proposed an improved mapping pattern method of a fragile watermarking authentication algorithm for text images. There are various methods for watermark embedding, which mapping pattern is one of them. The aim is to validate and compare the SCAN pattern for digital watermarking in order to produce a fast and efficient authentication algorithm. We proposed a Zigzag SCAN pattern algorithm and compared it with the proposed Hilbert-Peano scheme. The result from this paper shows that Zigzag SCAN algorithm contributed to a superior performance in regard to processing time, while PSNR and MSE are similar

    S.A.Q RPG (Sejarah Awesome Quest Role-Playing Game): History Subject Educational Game for Young Learner

    Get PDF
    History subject is one of the subjects required to pass the Sijil Pelajaran Malaysia (SPM) examination set by the Ministry of Education Malaysia (MOE). With rapid technology growth, more educational uses and dedicated virtual worlds focused on education will begin to evolve, encouraging new and more advanced learning scenarios, allowing the development of analytical skills and greater reflection. History is often associated as a dry and boring subject due to the high factual content and horizontal storytelling in the classroom resulting in the subject of history as one of the subjects that are less preferred by students. To overcome this situation, a game-based learning is a good approach in line with the development of technology today. S.A.Q RPG (Sejarah Awesome Quest Role-Playing Game) is a game-based learning medium which focus in using game to familiarize and increase students understanding of history concept. This game is built by using ADDIE (Analysis, Design, Development, Implementation and Evaluation) model and the development is done by using Unity software. A survey will be done for 40 students in the evaluation stage to asses effectiveness of the proposed game. It is believed that historical educational games can be used as an opportunity to facilitate the study of history in an enjoyable atmosphere

    Importance of Watermark Lossless Compression in Digital Medical Image Watermarking

    Get PDF
    Large size data requires more storage space, communication time, communication bandwidth and degrades host image quality when it is embedded into it as watermark. Lossless compression reduces data size better than lossless one but with permanent loss of important part of data. Data lossless compression reduces data size contrast to lossy one without any data loss. Medical image data is very sensitive and needs lossless compression otherwise it will result in erroneous input for the health recovery process. This paper focuses on Ultrasound medical image region of interest(ROI) lossless compression as watermark using different techniques; PNG, GIF, JPG, JPEG2000 and Lempel Ziv Welsh (LZW). LZW technique was found 86% better than other tabulated techniques. Compression ratio and more bytes reduction were the parameters considered for the selection of better compression technique. In this work LZW has been used successfully for watermark lossless compression to watermark medical images in teleradiology to ensure less payload encapsulation into images to preserve their perceptual and diagnostic qualities unchanged. On the other side in teleradiology the extracted lossless decompressed watermarks ensure the images authentication and their lossless recoveries in case of any tamper occurrences

    Cybercrime behaviour in the context of youth development

    Get PDF
    The positive growth of youth is vital in the development of the particular country. Thus, it is crucial to acknowledge the factors that contribute to positive youth development. Using a bibliometric analysis approach, this study investigated the research contribution in the fields of positive youth development by finding the information related to the annual growth of publication, research areas, top 20 impactful journals, and highly cited articles and authors. This study aimed to present an extensive knowledge map of Malaysian youth development by accumulating a 10-year dataset from the Scopus database. Articles published between 2011 until 2021 were analysed using bibliometric approach. Searching the keyword “youth”, 3354 articles were found. After refining with the keywords of “Malaysia Youth”, 528 articles were then collected. In addition, this paper collected data from the Institute for Youth Research Malaysia, a leading centre in researching youth and their development in Malaysia. It is proven that health (stress-free, worry-free), social relations (relationship with parents), and safety (security while using the internet) had a significant relationship in cybercrime behaviour among Malaysian youth. Furthermore, this study discussed the contributions and significance of youth studies in the latest research studies together with the future direction

    Covid-19 Embedded with Aerosol Particles Travel Simulation Inside a Mosque

    Get PDF
    When an infected person coughs, thousands of micro-size aerosol particles will transmit to the surrounding, especially in a closed space. Mosque is one of the confined areas that Muslims regularly go to pray together. Multiple standards of procedures have been proposed to prevent the virus transmission, however, the cases involving people praying in mosque are still reported. This study aims to simulate the virus transmission in mosque by modelling the aerosol particles generated by the worshipper coughing. A geometry of praying area in mosque was created mimicking the actual praying space. Realistic boundary conditions involving coughing, airflow at the inlet and outlet diffusers were specified. The simulation result confirms that the SARS-COV-2 virus in a closed space praying room is not uniform and it is strongly influenced by the location of the coughing source and the air conditioning layout. The study also recorded Ma’mums are at the higher chance to get infected if one of the Ma’mum is the COVID-19 carrier due to the nature of normal congregational praying arrangement. The outcomes of this study may help the scientist and the authorities to understand how dramatic COVID-19 virus may spread in the confined praying area, hence, may enforce a better standard of procedure in a mosque

    ObeM 2.0: Obesity management secured system 2.0

    Get PDF
    Obesity issue is a critical issue at Malaysia. It leads to economic costs, direct & indirectly

    Rainfall-runoff modelling using adaptive neuro-fuzzy inference system

    Get PDF
    This paper discusses the working mechanism of ANFIS, the flow of research, the implementation and evaluation of ANFIS models, and discusses the pros and cons of each option of input parameters applied, in order to solve the problem of rainfall-runoff forecasting. The rainfall-runoff modelling considers time-series data of rainfall amount (in mm) and water discharge amount (in m3/s). For model parameters, the models apply three triangle membership functions for each input. Meanwhile, the accuracy of the data is measured using the Root Mean Square Error (RMSE). Models with good performance in training have low values of RMSE. Hence, the 4-input model data is the best model to measure prediction accurately with the value of RMSE as 22.157. It is proven that ANFIS has the potential to be used for flood forecasting generally, or rainfall-runoff modelling specifically
    corecore