Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
A data-driven active learning approach to reusing ML solutions in scientific applications
Journal of Systems and Software (JSSO), Volume 211, Issue Chttps://doi.org/10.1016/j.jss.2024.111986AbstractArtificial intelligence can revolutionize scientific projects, but scientists face challenges in reusing, integrating, and deploying cost-effective and high-quality machine learning solutions. Determining suitable algorithms and parameters is ...
Highlights- Active learning framework unlocks potential of image segmentation algorithms without annotations.
- Proposing unsupervised metric for initial algorithm choice and settings in segmentation.
- Creating an object-to-parameter map for ...
- research-articleOctober 2014
Efficient implementation of chaotic image encryption in transform domains
- Ensherah A. Naeem,
- Mustafa M. Abd Elnaby,
- Naglaa F. Soliman,
- Alaa M. Abbas,
- Osama S. Faragallah,
- Noura Semary,
- Mohiy M. Hadhoud,
- Saleh A. Alshebeili,
- Fathi E. Abd El-Samie
Journal of Systems and Software (JSSO), Volume 97, Issue CPages 118–127https://doi.org/10.1016/j.jss.2014.07.026Investigation of transform domain encryption.IWT encryption study.Study of chaotic Baker map permutation. The primary goal of this paper is security management in data image transmission and storage. Because of the increased use of images in industrial ...
- articleSeptember 2014
Face recognition based on curvelets and local binary pattern features via using local property preservation
Journal of Systems and Software (JSSO), Volume 95Pages 209–216https://doi.org/10.1016/j.jss.2014.04.037In this paper, we propose a new feature extraction approach for face recognition based on Curvelet transform and local binary pattern operator. The motivation of this approach is based on two observations. One is that Curvelet transform is a new ...
- articleDecember 2013
Chaos-based selective encryption for H.264/AVC
Journal of Systems and Software (JSSO), Volume 86, Issue 12Pages 3183–3192https://doi.org/10.1016/j.jss.2013.07.054Encryption techniques are usually employed to maintain the secrecy of the video streams transmitted via a public network. However, full encryption using strong cryptographic algorithms is usually not necessary if the purpose is to destroy the commercial ...
- articleNovember 2013
A secure palm vein recognition system
Journal of Systems and Software (JSSO), Volume 86, Issue 11Pages 2870–2876https://doi.org/10.1016/j.jss.2013.06.065With the increasing needs in security systems, vein recognition is one of the important and reliable solutions of identity security for biometrics-based identification systems. The obvious and stable line-feature-based approach can be used to clearly ...
-
- articleJanuary 2013
Improving Graph Cuts algorithm to transform sequence of stereo image to depth map
Journal of Systems and Software (JSSO), Volume 86, Issue 1Pages 198–210https://doi.org/10.1016/j.jss.2012.07.044Recently, 3D display systems are getting considerable attentions not only from theater but also from home. 3D multimedia content development plays very important role in helping to setup a visual reality entertainment program. Lenticular ...
- articleDecember 2010
Novel segmentation algorithm in segmenting medical images
Journal of Systems and Software (JSSO), Volume 83, Issue 12Pages 2487–2495https://doi.org/10.1016/j.jss.2010.07.036The aim of this paper is to develop an effective fuzzy c-means (FCM) technique for segmentation of Magnetic Resonance Images (MRI) which is seriously affected by intensity inhomogeneities that are created by radio-frequency coils. The weighted bias ...
- articleApril 2009
Early fire detection method in video for vessels
Journal of Systems and Software (JSSO), Volume 82, Issue 4Pages 656–667https://doi.org/10.1016/j.jss.2008.09.025New generation vessels are equipped with fire detecting sensors; however, fire may not immediately be detected if it is far away from the sensors. The fire process therefore cannot be recorded. A video-based fire alarm system is developed to overcome ...
- articleDecember 2008
A receiver-centric rate control scheme for layered video streams in the Internet
Journal of Systems and Software (JSSO), Volume 81, Issue 12Pages 2396–2412https://doi.org/10.1016/j.jss.2008.02.067We present a new end-to-end protocol, namely Dynamic Video Rate Control (DVRC), which operates on top of UDP and enables the adaptive delivery of layered video streams over the Internet. The protocol optimizes the performance on video delivery with ...
- articleSeptember 2008
A new region filtering and region weighting approach to relevance feedback in content-based image retrieval
Journal of Systems and Software (JSSO), Volume 81, Issue 9Pages 1525–1538https://doi.org/10.1016/j.jss.2007.10.006A new region filtering and region weighting method, which filters out unnecessary regions from images and learns region importance from the region size and the spatial location of regions in an image, is proposed based on region representations. It ...
- articleSeptember 2008
An embedding technique based upon block prediction
Journal of Systems and Software (JSSO), Volume 81, Issue 9Pages 1505–1516https://doi.org/10.1016/j.jss.2007.09.017This paper presents a novel data hiding scheme for VQ compression images. This scheme first uses SMVQ prediction to classify encoding blocks into different types, then uses different codebooks and encoding strategies to perform encoding and data hiding ...
- articleJuly 2008
An efficient iconic indexing strategy for image rotation and reflection in image databases
Journal of Systems and Software (JSSO), Volume 81, Issue 7Pages 1184–1195https://doi.org/10.1016/j.jss.2007.08.019Spatial relationships are important issues for similarity-based retrieval in many image database applications. With the popularity of digital cameras and the related image processing software, a sequence of images are often rotated or flipped. That is, ...
- articleJuly 2008
Cryptanalysis of the RCES/RSES image encryption scheme
Journal of Systems and Software (JSSO), Volume 81, Issue 7Pages 1130–1143https://doi.org/10.1016/j.jss.2007.07.037Recently, a chaos-based image encryption scheme called RCES (also called RSES) was proposed. This paper analyses the security of RCES, and points out that it is insecure against the known/chosen-plaintext attacks: the number of required known/chosen ...
- articleJuly 2008
Adaptive watermark mechanism for rightful ownership protection
Journal of Systems and Software (JSSO), Volume 81, Issue 7Pages 1118–1129https://doi.org/10.1016/j.jss.2007.07.036Watermarking is used to protect the integrity and copyright of images. Conventional copyright protection mechanisms; however, are not robust enough or require complex computations to embed the watermark into the host image. In this article, we propose an ...
- articleJanuary 2008
Utilizing venation features for efficient leaf image retrieval
Journal of Systems and Software (JSSO), Volume 81, Issue 1Pages 71–82https://doi.org/10.1016/j.jss.2007.05.001Most Content-Based Image Retrieval systems use image features such as textures, colors, and shapes. However, in the case of a leaf image, it is not appropriate to rely on color or texture features only as such features are very similar in most leaves. ...
- articleDecember 2007
Round-Eye: A system for tracking nearest surrounders in moving object environments
Journal of Systems and Software (JSSO), Volume 80, Issue 12Pages 2063–2076https://doi.org/10.1016/j.jss.2007.03.007This paper presents ''Round-Eye'', a system for tracking nearest surrounding objects (or nearest surrounders) in moving object environments. This system provides a platform for surveillance applications. The core part of this system is continuous ...
- articleJuly 2007
Novel image copy detection with rotating tolerance
Journal of Systems and Software (JSSO), Volume 80, Issue 7Pages 1057–1069https://doi.org/10.1016/j.jss.2006.12.001In 2003, Kim applied the discrete cosine transform (DCT) technique to propose a content-based image copy detection method. He successfully detected the copies both with and without modifications, and his method is the first to detect the copies with ...
- articleJuly 2007
Improvements of image sharing with steganography and authentication
Journal of Systems and Software (JSSO), Volume 80, Issue 7Pages 1070–1076https://doi.org/10.1016/j.jss.2006.11.022Recently, Lin and Tsai proposed an image secret sharing scheme with steganography and authentication to prevent participants from the incidental or intentional provision of a false stego-image (an image containing the hidden secret image). However, ...
- articleMarch 2007
A novel data hiding scheme for color images using a BSP tree
Journal of Systems and Software (JSSO), Volume 80, Issue 3Pages 429–437https://doi.org/10.1016/j.jss.2006.06.016In this paper, we propose a novel data hiding technique for color images using a BSP (Binary Space Partitioning) tree. First, we treat the RGB values at each pixel as a three-dimensional (3D) virtual point in the XYZ coordinates and a bounding volume is ...
- articleAugust 2006
An image size unconstrained ownership identification scheme for gray-level and color ownership statements based on sampling methods
Journal of Systems and Software (JSSO), Volume 79, Issue 8Pages 1130–1140https://doi.org/10.1016/j.jss.2005.11.577This paper describes an ownership identification method with gray-level or color ownership statements. The proposed scheme uses the theories and properties of sampling distribution of means to achieve the requirements of robustness and security. Besides,...