-
Article
Special issue: Advanced technology for smart home automation and entertainment
-
Article
Study of detection method for spoofed IP against DDoS attacks
Cybercriminals are learning to harness the power of simpler devices like connected cameras. In September of 2016, Mirai software was used to infect more than 100,000 devices and unleash one of the largest dist...
-
Article
Mining intelligent solution to compensate missing data context of medical IoT devices
When gathering experimental data generated by medical IoT devices, the perennial problem is missing data due to recording instruments, errors introduced which cause data to be discarded, or the data is missed ...
-
Article
Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC
The problem of digital forgeries has become more and more serious in various fields like entertainment, digital forensics, and journalism. This paper proposes a self-embedding watermarking scheme for the resto...
-
Article
Palmprint recognition system on mobile devices with double-line-single-point assistance
Compared with other biometrics, palmprint has several advantages in authentication on mobile devices. However, some serious challenges severely restrict the development of palmprint recognition on mobile envir...
-
Article
Aspect ratio invariant visual cryptography by image filtering and resizing
In visual cryptographic scheme (VCS), each secret pixel is expanded to m subpixels in shadow images to encrypt a secret image. Apparently, we should put these m subpixels as a rectangle such that the blocks can b...