Texture features play an important role in most image retrieval techniques to obtain results of high accuracy. In this work, the face image retrieval method considering texture analysis and statistical features has been proposed. Textile features can also be extracted using the GLCM tool. In this research, the GLCM calculation method involves two phases, first: some of the previous image processing techniques work together to get the best results to determine the big object of the face image (center of face image) then, the gray level cooccurrence matrix GLCM is computed for gray face image and then some statistical texture features with second order are extracted. The second phase, the facial texture features are retrieved by finding the minimum distance between texture features of an unknown face image with the texture features of face images which are stored in the database system. The experimental results show that the proposed method is capable to achieve high accuracy degree in face image retrieval.
The importance of systems dependability is the main motivation for developing fault injection methods (because fault injection is one of the most important ways to assess system dependability). Dependability assessment automatically generates mathematical models of reliability based on simple representations of the parameters of the functions of the system components, service and logistics functions, subsystem order structures, and critical functions. If necessary, it is also possible to develop a detailed mathematical model for various aspects of the stability system behavior. Package evaluation functions include accurate and approximate solution methods that can be used to quantify the reliability of components, subsystems and operations, maintenance functions, and availability with respect to potential project design. In this research, several fault injection tools and software system dependability assessment are rewired. The general method of dependability assessment for software systems under testing is a fault injection tool. Dependability assessment based on the fault injection tool can be done by inserting the faults into a system and monitoring that system for determining its behavior and response. Practically, experimented fault injection techniques can be grouped into fault injection implementation by hardware, software, simulation, emulation, and hybrid fault injection techniques. This study aims to measure the weakness that affects dependability attributes by presenting a survey on the implementation of software fault injection approaches for three major levels (interface, distributed systems, and operating systems levels) with dependability applications and an overview of the different injection tools.
Biometrics is the science and technology dealing with the measurement and analysis of the biological features of the human body. The analysis is based on comparing the value of certain measured features with the form features in the database. Unimodal Biometric Systems have many limitations regarding precision in the identification/authentication of personal data. To accurately identify a person, a multimodal biometrics system such as combining face and fingerprint characteristic is used. Many such multi-biometrics fusion possibilities exist that can be utilized as an authentication system. In this paper, we present a new authentication system of the multimodal biometrics method for both face and fingerprint characteristics based on general shape feature fusion vectors. There are two main phases in our method: first, the fused shape features for both face and fingerprint images are extracted in accordance with central moments, and second, these features were recognized for retrieval of an authorized person using direct Euclidian distance. Experimentally, we tested about 100 shape features vectors, and observed that our method allows to improve the multimodal biometrics model when we are using the same features for two biometric images. A new method has a high-performance precision when invariant moments are used to extract shape features vectors and when similarity measurements computed based on direct Euclidean distance in the experiments are performed. We recorded False Acceptance Rate, False Rejection Rate, and Accuracy, FAR and FRR where the accuracy of the model is 91 %.
The <span>use of the fingerprint recognition has been and remains very important in many security applications and licensing systems. Fingerprint recognition is required in many areas such as licensing access to networks, corporate computers and organizations. In this paper, the system of fingerprint recognition that can be used in several cases of fingerprint such as being rounded at an angle by a randomly inked fingerprint on paper. So, fingerprint image is tooked at a different angle in order to identify the owner of the ink fingerprint. This method involves two working levels. The first one, the fingerprint pattern's shape features are calculated based on the central moments of each image being listed on a regular basis with three states rotation. Each image is rotated at a specified angle. In the second level, the fingerprint holder entered is identified using the previously extracted shape features and compared to the three local databases content of three rotation states. When applied the method for several persons by taken their inked fingerprint on the paper, the accuracy of the system in identifying the owner of the fingerprint after rotation states were close to 83.71.</span>
Video computer vision applications require moving objects detection as a first phase of their operation. Therefore, background subtraction (BS), an investigate branch in computer vision with intensive published research, is applied to obtain the “background” and the “foreground.” Our study proposes a new BS model that utilizes instant pixel histogram, which is implemented to extract foreground objects from two datasets, the first Visor (different human actions) and the second Anomaly Detection Dataset UCSD (Peds2). The model when using the Visor dataset gives 100% detection rate with 8% false alarm rate, whereas, when using UCSD (Peds2), it achieves a detection rate and false alarm rate of 77% and 34% respectively.
Steganography techniques have taken a major role in the development in the field of transferring multimedia contents and communications. Therefore, field of steganography become interested as the need for security increased significantly. Steganography is a technique to hide information within cover media so that this media does not change significantly. Steganography process in a video is to hide the information from the intruder and prevent him access to that hidden information. This paper presents the algorithm of steganography in the video frames. The proposed algorithm selected the best frames to hide the message in video using 3D distance equation to increasing difficulty onto the intruder to detect and guess the location of the message in the video frames. As well as selected the best frames in this algorithm increased the difficulty and give us the best stego-video quality using structural similarity (SSIM). Also, the hash function was used to generate random positions to hide the message in the lines of video frames. The proposed algorithm evaluated with mean squared error (MSE), peak signalto-noise ratio (PSNR) and SSIM measurement. The results were acceptable and shows that is the difficulty of distinguishing the hidden message in stego-video with the human eye.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.