Improved image analysis methodology for detecting changes in evidence positioning at crime scenes
- Authors: Petty, Mark , Teng, Shyh , Murshed, Manzur
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2019
- Full Text:
- Reviewed:
- Description: This paper proposed an improved methodology to assist forensic investigators in detecting positional change of objects due to crime scene contamination. Either intentionally or by accident, crime scene contamination can occur during the investigation and documentation process. This new proposed methodology utilises an ASIFT-based feature detection algorithm that compares pre- and post-contaminated images of the same scene, taken from different viewpoints. The contention is that the ASIFT registration technique is better suited to real world crime scene photography, being more robust to affine distortion that occurs when capturing images from different viewpoints. The proposed methodology was tested with both the SIFT and ASIFT registration techniques to show that (1) it could identify missing, planted and displaced objects using both SIFT and ASIFT and (2) ASIFT is superior to SIFT in terms of error in displacement estimation, especially for larger viewpoint discrepancies between the pre- and post-contamination images. This supports the contention that our proposed methodology in combination with ASIFT is better suited to handle real world crime scene photography. © 2019 IEEE.
- Description: E1
Increasing hydrogen energy efficiency by heat integration between fuel cell, hydride tank and electrolyzer
- Authors: Ghayur, Adeel , Verheyen, Vincent
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering, CSDE 2019
- Full Text: false
- Reviewed:
- Description: Chemical processes offer untapped potential to increase overall system efficiencies by synergizing renewable hydrogen storage with dispatchable renewable energy facilities. In this study an Energy Storage Facility model is developed and simulation conducted to examine this potential. The model incorporates a Solid Oxide Fuel Cell (SOFC) integrated with a Magnesium Hydride (MgH2) Tank and an alkaline electrolyzer linked to the power grid. Surplus grid power is converted to hydrogen and stored as magnesium hydride. This storage process generates waste heat which is used to partially offset the water heating requirement of the electrolyzer. Simulation results demonstrate 20% reduction in parasitic heat energy consumption using this waste heat. Stored hydrogen provides power on demand via the SOFC. Waste heat from SOFC fulfils the desorption heat demand of the MgH2 Tank. Simulation results reveal waste heat from the SOFC is just enough to preheat oxygen and hydrogen and desorb hydrogen from the MgH2 tank. These results are encouraging, warranting further investigation into metal hydride storage to help Australia's transition towards renewable energy resources. © 2019 IEEE.
Information security: Definitions, threats and management in Dubai hospitals context
- Authors: Bakkar, Mahmoud , Alazab, Ammar
- Date: 2019
- Type: Text , Conference proceedings
- Relation: 2019 Cybersecurity and Cyberforensics Conference CCC 2019;Melbourne, VIC, Australia; 8-9 May 2019 p. 152-159
- Full Text: false
- Reviewed:
- Description: Information technology and high-tech systems used daily in hospitals increase the demand for measuring information security threats in the healthcare industry. The impact of complexity of using new healthcare information and communications technology (ICT) devices places more pressure on the healthcare community to perceive different information systems (IS) security threats as they involve different IS management models. This research study focused on measuring the healthcare community perceptions and on the following issues to include definition of information security perception of information security threats perception of information security management and perception of information security in the context of another healthcare community. To assess to plan, design and implement a national information security strategy for their healthcare sector. A survey was developed and interviewed 60 healthcare employees from three hospitals based in Dubai. The research results assist in creating awareness for easy access to hands-on guidelines for the healthcare community, thereby increasing the awareness levels of information security in the United Arab Emirates (UAE). These results assist the UAE government to further adapt the training and education programs for the healthcare community to increase their effectiveness and efficiency levels of IT and subsequent IS development. A discussion of the current status of Dubai hospitals privacy, confidentiality and security challenge is presented.
Integrating biological heuristics and gene expression data for gene regulatory network inference
- Authors: Zarnegar, Armita , Jelinek, Herbert , Vamplew, Peter , Stranieri, Andrew
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 Australasian Computer Science Week Multiconference, ACSW 2019; Sydney, Australia; 29th-31st January 2019 p. 1-10
- Full Text: false
- Reviewed:
- Description: Gene Regulatory Networks (GRNs) offer enhanced insight into the biological functions and biochemical pathways of cells associated with gene regulatory mechanisms. However, obtaining accurate GRNs that explain gene expressions and functional associations remains a difficult task. Only a few studies have incorporated heuristics into a GRN discovery process. Doing so has the potential to improve accuracy and reduce the search space and computational time. A technique for GRN discovery that integrates heuristic information into the discovery process is advanced. The approach incorporates three elements: 1) a novel 2D visualized coexpression function that measures the association between genes; 2) a post-processing step that improves detection of up, down and self-regulation and 3) the application of heuristics to generate a Hub network as the backbone of the GRN. Using available microarray and next generation sequencing data from Escherichia coli, six synthetic benchmark GRN datasets were generated with the neighborhood addition and cluster addition methods available in SynTReN. Results of the novel 2D-visualization co-expression function were compared with results obtained using Pearson's correlation and mutual information. The performance of the biological genetics-based heuristics consisting of the 2D-Visualized Co-expression function, post-processing and Hub network was then evaluated by comparing the performance to the GRNs obtained by ARACNe and CLR. The 2D-Visualized Co-expression function significantly improved gene-gene association matching compared to Pearson's correlation coefficient (t = 3.46, df = 5, p = 0.02) and Mutual Information (t = 4.42, df = 5, p = 0.007). The heuristics model gave a 60% improvement against ARACNe (p = 0.02) and CLR (p = 0.019). Analysis of Escherichia coli data suggests that the GRN discovery technique proposed is capable of identifying significant transcriptional regulatory interactions and the corresponding regulatory networks.
Isolation set-kernel and its application to multi-instance learning
- Authors: Xu, Bi-Cun , Ting, Kaiming , Zhou, Zhi-Hua
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 25th ACM SIGKDD International Conferencce on Knowledge Discovery and Data Mining, KDD 2019; Anchorage, United States; 4th-8th August 2019 p. 941-949
- Full Text: false
- Reviewed:
- Description: Set-level problems are as important as instance-level problems. The core in solving set-level problems is: how to measure the similarity between two sets. This paper investigates data-dependent kernels that are derived directly from data. We introduce Isolation Set Kernel which is solely dependent on data distribution, requiring neither class information nor explicit learning. In contrast, most current set-similarities are not dependent on the underlying data distribution. We theoretically analyze the characteristic of Isolation Set-Kernel. As the set-kernel has a finite feature map, we show that it can be used to speed up the set-kernel computation significantly. We apply Isolation Set-Kernel to Multi-Instance Learning (MIL) using SVM classifier, and demonstrate that it outperforms other set-kernels or other solutions to the MIL problem.
Measuring soil strain using fibre optic sensors
- Authors: Costa, Susanga , Kahandawa, Gayan , Chen, Jian , Xue, Jianfeng
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 8th International Congress on Environmental Geotechnics, ICEG 2018; Hangzhou, China; 28th October-1st November 2018; part of the Environmental Science and Engineering book series p. 43-50
- Full Text:
- Reviewed:
- Description: Monitoring subsurface soil movement is important in many geotechnical engineering applications such as stability of slopes, road embankments and settlement in foundations. Soil displacement measurement is also helpful in understanding the formation of shrinkage cracks. Clay soils undergo shrinkage during drying and experience substantial stresses and strains, which results in shrinkage cracks. This paper presents a novel approach to measure soil strain using Fibre Bragg grating (FBG) sensors. In the experiments described, FBG sensors have been used to investigate the strain development in clay during drying. FBG sensors are fabricated in the core region of specially fabricated single mode low-loss germanium doped silicate optical fibres. The grating is the laser-inscribed region with a periodically varying refractive index, which reflects a specific light wavelength. Due to the applied strain, ε, there is a change in the wavelength which can be measured and is directly proposal to strain. Kaolin clay, mixed with water close to the liquid limit, was allowed to dry under room temperature. The specimens were prepared in thin, long linear shrinkage moulds. FBG sensors were placed inside soil at the centre of the specimen. The strain development during drying underwent four phases moving from compression to tension. An oscillating nature of strain was also observed throughout the drying process. Results obtained are useful to develop analytical solutions to describe stress-strain behavior of drying soil. © Springer Nature Singapore Pte Ltd. 2019.
Measuring trustworthiness of IoT image sensor data using other sensors' complementary multimodal data
- Authors: Islam, Mohammad , Karmakar, Gour , Kamruzzaman, Joarder , Murshed, Manzur
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019 p. 775-780
- Full Text: false
- Reviewed:
- Description: Trust of image sensor data is becoming increasingly important as the Internet of Things (IoT) applications grow from home appliances to surveillance. Up to our knowledge, there exists only one work in literature that estimates trustworthiness of digital images applied to forensic applications, based on a machine learning technique. The efficacy of this technique is heavily dependent on availability of an appropriate training set and adequate variation of IoT sensor data with noise, interference and environmental condition, but availability of such data cannot be assured always. Therefore, to overcome this limitation, a robust method capable of estimating trustworthy measure with high accuracy is needed. Lowering cost of sensors allow many IoT applications to use multiple types of sensors to observe the same event. In such cases, complementary multimodal data of one sensor can be exploited to measure trust level of another sensor data. In this paper, for the first time, we introduce a completely new approach to estimate the trustworthiness of an image sensor data using another sensor's numerical data. We develop a theoretical model using the Dempster-Shafer theory (DST) framework. The efficacy of the proposed model in estimating trust level of an image sensor data is analyzed by observing a fire event using IoT image and temperature sensor data in a residential setup under different scenarios. The proposed model produces highly accurate trust level in all scenarios with authentic and forged image data. © 2019 IEEE.
- Description: E1
Mitigation of sympathetic tripping leveraging on IEC 61850 Protocol
- Authors: Kumar, Shantanu , Das, Narottam , Islam, Syed
- Date: 2019
- Type: Text , Conference proceedings
- Relation: 2018 Australasian Universities Power Engineering Conference (AUPEC); Auckland, New Zealand; 27-30 Nov. 2018 p. 1-6
- Full Text: false
- Reviewed:
- Description: Intelligent Electronic Devices (IEDs) diagnose faults and traffic issues of data packets in a reliable and efficient manner in a substation environment. These devices determine abnormal system condition, wide area disturbances offering greater flexibility to the operator in terms of condition monitoring and diagnostics. In a distribution system, end user get multiple faults in the network and one such nuisance disruption of power on a faulty feeder results in sympathetic tripping. Sympathetic tripping occurs during high load conditions causing entire protection system to spuriously trip due to an out of section fault. Occurrence of such faults could be attributed to load unbalance in the distribution feeders, delayed voltage recovery conditions, voltage swell/sag in the feeders etc. Usually, this phenomenon occur when loads containing low inertia rotating equipment are connected to distribution feeders. In this paper, an Optimized Network Engineering Tool (OPNET) is used to simulate, mitigate faults attributed to Sympathetic Tripping in a laboratory environment.
Monitoring body motions related to Huntington disease by exploiting the 5G Paradigm
- Authors: Haider, Daniyal , Romain, Olivier , Kernec, Julien Le , Shah, Syed Yaseen , Farooq, Malik Muhammad Umer , Qadus, Zunaira
- Date: 2019
- Type: Text , Conference proceedings
- Relation: 2019 UK/ China Emerging Technologies (UCET); Glasgow UK; 21-22 August 2019 p. 1-4
- Full Text: false
- Reviewed:
- Description: The modern wireless technology exploiting the full potential of 5G IoT is the future for healthcare sector. In the healthcare sector, the 5G technology will maximize the performance and will reduce the chances of damage to the patient by providing careful and advance activity monitoring scenarios. We have proposed the idea of monitoring different body posture in Huntington disease by exploiting the low cost wireless devices operating at 4.8 GHz frequency. The system captures the wireless channel information for three body motions and classification of these motions was performed by using support vector machine. The SVM used 10 time-domain features for the classification process by using three main kernel functions, such as, Linear, Polynomial and Radial basis function. The system minimizes all the external noise by using the microwave absorbing materials. This increases the performance and feasibility of sensing body motions.
Multi-factor based enhancing students' motivations
- Authors: Kbar, Ghassan , Alazab, Ammar , Agbinya, Johnson
- Date: 2019
- Type: Text , Conference proceedings
- Relation: 2019 IEEE International Conference on Industrial Technology (ICIT); 2019 IEEE International Conference on Industrial Technology (ICIT); 13-15 Feb. 2019 p. 1054-1059
- Full Text: false
- Reviewed:
- Description: Student motivations are affected by many factors that are classified as intrinsic or/and extrinsic. This will influence students' engagement and consequently impacting their performance. To build a better judgment on the factors that affect student motivation, a comprehensive study should be applied in order to identify all factors and their drivers and how they influence student's motivation. Some of these factors have negative impact on motivation, while other have positive impact. In this paper, a multifactor based motivation has been assessed to distinguish the positive from negative factors. Then controlling student's motivation to enhance student engagement can be done through controlling these factors. The negative factors would be minimized or eliminated, and the positive factors will be encouraged and improved. Teaching institutions, universities and teachers play essential role in controlling these factors toward better motivation. A recommendation has been given to control the motivation factors that would lead to better student's engagement and performance.
Multi-source cyber-attacks detection using machine learning
- Authors: Taheri, Sona , Gondal, Iqbal , Bagirov, Adil , Harkness, Greg , Brown, Simon , Chi, Chihung
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1167-1172
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has significantly increased the number of devices connected to the Internet ranging from sensors to multi-source data information. As the IoT continues to evolve with new technologies number of threats and attacks against IoT devices are on the increase. Analyzing and detecting these attacks originating from different sources needs machine learning models. These models provide proactive solutions for detecting attacks and their sources. In this paper, we propose to apply a supervised machine learning classification technique to identify cyber-attacks from each source. More precisely, we apply the incremental piecewise linear classifier that constructs boundary between sources/classes incrementally starting with one hyperplane and adding more hyperplanes at each iteration. The algorithm terminates when no further significant improvement of the separation of sources/classes is possible. The construction and usage of piecewise linear boundaries allows us to avoid any possible overfitting. We apply the incremental piecewise linear classifier on the multi-source real world cyber security data set to identify cyber-attacks and their sources.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
Nano-structured GaAs solar cell design, simulation and analysis for conversion efficiency improvement
- Authors: Tan,Shiyao , Das, Narottam , Helwig, A , Islam, Syed
- Date: 2019
- Type: Text , Conference proceedings
- Relation: 2018 Australasian Universities Power Engineering Conference (AUPEC); Auckland, New Zealand; 27-30 Nov. 2018 p. 1-6
- Full Text: false
- Reviewed:
- Description: This paper discusses nano-structured GaAs solar cell design and analysis for conversion efficiency improvement by increasing the light transmission and absorption, reducing the light reflection. The focus of this research is to construct different type of nano-grating shaped GaAs solar cells with various nano-grating heights and pitches, to compare the simulation results and find a suitable nano-structure that can provide higher conversion efficiency. Finite difference time domain (FDTD) simulation tool is used to simulate and calculate the light reflection, transmission and absorption for different nano-grating shapes, such as, parabolic, triangular, trapezoidal and rectangular. Based on the simulation results, it has been confirmed that the light reflection of parabolic shaped nano-grating structures is higher than triangular nano-grating structures, but it is lower than rectangular and trapezoidal shaped nano-grating structures. Moreover, the simulation results confirmed that the light transmission of parabolic shaped nano-grating structures is about 62.3% having a 200-nm grating height and an 810-nm grating pitch, which is about 22% higher than the rectangular (i.e., flat) type substrates.
Nano-structured photovoltaic cell design for high conversion efficiency by optimizing various parameters
- Authors: Shelat, Niraj , Das, Narottam , Khan, Masud , Islam, Syed
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 29th Australasian Universities Power Engineering Conference; Momi Bay, Fiji; 26th-29th November 2019
- Full Text: false
- Reviewed:
- Description: This paper investigates the effect of different types of nano-grating structures embossed on top of the substrate of solar photovoltaic (PV) cell for high conversion efficiency. The simulation results for light reflection are obtained by using Opti-wave finite difference time-domain (Opti-FDTD) software. These nano-grating structures have different shapes, such as triangular, trapezoidal, pillar and parabolic. These nano-grating profiles work as a multilayer anti-reflective coating for GaAs solar cells and reduce the light reflection from the surface of the panel and increase the light trapping capacity inside the solar cell. These structures allow the gradual change in refractive index and provide a high transmission and less reflection of light that confirms excellent anti-reflective coating and increased light trapping capacity inside the cell substrate. For this simulation, different periodic shaped arrangements were made to obtain the higher conversion efficiency, the factors considered while develop the design are the aspect ratio (AR), thickness of the nano-grating structure and duty cycles. The simulation result shows that the light reflection loss in pillar shaped nano-grating structures having 150 nm of height and a 50% period (i.e., duty cycle) is ~0.5% only, which is the lowest reflection loss obtained, when compared with the triangular and trapezoidal shaped nano-grating structures, it is approximately 38% more efficient in trapping the incident light.
- Description: This research is supported by the School of Engineering and Technology, Melbourne, Victoria; Centre for Intelligent Systems, Brisbane, QLD, Central Queensland University, Australia.
Nearest neighbor ensembles: An effective method for difficult problems in streaming classification with emerging new classes
- Authors: Cai, Xin-Qiang , Zhao, Peng , Ting, Kai-Ming , Mu, Xin , Jiang, Yuan
- Date: 2019
- Type: Text , Conference proceedings
- Relation: 2019 IEEE International Conference on Data Mining (ICDM) , Beijing, China, 8-11 Nov. 2019 p. 970-975
- Full Text: false
- Reviewed:
- Description: This paper re-examines existing systems in streaming classification with emerging new classes (SENC) problems, where new classes that have not been used to train a classifier may emerge in a data stream. We identify that existing systems have an unspecified assumption that emerging new classes are geometrically far from known classes, or instances of known classes are densely distributed, in the feature space. Using a class separation indicator alpha, we refine the SENC problem into an alpha-SENC problem, where alpha indicates a geometric distance between two classes in the feature space. We show that while most existing systems work well in high-alpha SENC problems (i.e., a new class is geometrically far from a known class or instances of known classes are densely distributed), they perform poorly in low-alpha SENC problems. To solve low-alpha SENC problems effectively, we propose an approach using nearest neighbor ensembles or SENNE. We demonstrate that SENNE is able to handle both the low-alpha and high-alpha SENC problems which can appear at different times in a single data stream.
One-shot malware outbreak detection using spatio-temporal isomorphic dynamic features
- Authors: Park, Sean , Gondal, Iqbal , Kamruzzaman, Joarder , Zhang, Leo
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019 p. 751-756
- Full Text: false
- Reviewed:
- Description: Fingerprinting the malware by its behavioural signature has been an attractive approach for malware detection due to the homogeneity of dynamic execution patterns across different variants of similar families. Although previous researches show reasonably good performance in dynamic detection using machine learning techniques on a large corpus of training set, decisions must be undertaken based upon a scarce number of observable samples in many practical defence scenarios. This paper demonstrates the effectiveness of generative adversarial autoencoder for dynamic malware detection under outbreak situations where in most cases a single sample is available for training the machine learning algorithm to detect similar samples that are in the wild. © 2019 IEEE.
- Description: E1
Patient-empowered electronic health records
- Authors: Sahama, Tony , Stranieri, Andrew , Butler-Henderson, Kerryn
- Date: 2019
- Type: Text , Conference proceedings
- Relation: MEDINFO 2019: Health and Wellbeing e-Networks for All Vol. 264, p. 1765
- Full Text:
- Reviewed:
- Description: Electronic Health Records (EHRs) constitute evidence of online health information management. Critical healthcare information technology (HIT) infrastructure facilitates health information exchange of 'modern' health systems. The growth and implementation of EHRs are progressing in many countries while the adoption rate is lagging and lacking momentum amidst privacy and security concerns. This paper uses an interrupted time series (ITS) analysis of OECD data related to EHRs from many countries to make predictions about EHR adoption. The ITS model can be used to explore the impact of various HIT on adoption. Assumptions about the impact of Information Accountability are entered into the model to generate projections if information accountability technologies are developed. In this way, the OECD data and ITS analysis can be used to perform simulations for improving EHR adoption.
Privacy and Security of Connected Vehicles in Intelligent Transportation System
- Authors: Jolfaei, Alireza , Kant, Krishna
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2019, Portland, United States; 24-27 June 2019. p. 9-10
- Full Text:
- Reviewed:
- Description: The paper considers data security and privacy issues in intelligent transportation systems which involve data streams coming out from individual vehicles to road side units. In this environment, there are issues in regards to the scalability of key management and computation limitations at the edge of the network. To address these issues, we suggest the formation of groups in the vehicular layer, where a group leader is assigned to communicate with group members and the road side unit. We propose a lightweight permutation mechanism for preserving the confidentiality and privacy of sensory data. © 2019 IEEE.
- Description: E1
PU-shapelets : Towards pattern-based positive unlabeled classification of time series
- Authors: Liang, Shen , Zhang, Yanchun , Ma, Jiangang
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 24th International Conference on Database Systems for Advanced Applications, DASFAA 2019; Chiang Mai, Thailand; 22nd-25th April 2019; part of the Lecture Notes in Computer Science book series, also part of the Information Systems and Applications, incl. Internet/Web and HCI sub series Vol. 11446 LNCS, p. 87-103
- Full Text:
- Reviewed:
- Description: Real-world time series classification applications often involve positive unlabeled (PU) training data, where there are only a small set PL of positive labeled examples and a large set U of unlabeled ones. Most existing time series PU classification methods utilize all readings in the time series, making them sensitive to non-characteristic readings. Characteristic patterns named shapelets present a promising solution to this problem, yet discovering shapelets under PU settings is not easy. In this paper, we take on the challenging task of shapelet discovery with PU data. We propose a novel pattern ensemble technique utilizing both characteristic and non-characteristic patterns to rank U examples by their possibilities of being positive. We also present a novel stopping criterion to estimate the number of positive examples in U. These enable us to effectively label all U training examples and conduct supervised shapelet discovery. The shapelets are then used to build a one-nearest-neighbor classifier for online classification. Extensive experiments demonstrate the effectiveness of our method.
- Description: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Remote asset management for reducing life cycle costs (LCC), risks and enhancing asset performance
- Authors: Chundhoo, Vickram , Chattopadhyay, Gopinath , Parida, Aditya
- Date: 2019
- Type: Text , Conference proceedings
- Relation: Proceedings of the 5th International Workshop and Congress on eMaintenance: eMaintenance: Trends in Technologies & methodologies, challenges, possibilites and applications p. 74-80
- Full Text:
- Reviewed:
- Description: Remote asset management are faced with additional challenges in monitoring conditions, coordinating logistics for maintenance crew, transport and spare parts for maintenance delivery and asset replacements. Recent trends in technologies, remote performance monitoring and risk-based decision making in Capital Expenditure (CAPEX) and Operations and Maintenance Expenditure (OPEX) decisions for asset management are being embraced by asset intensive industries around the world, where critical assets are located in geographically distributed remote areas or difficult to inspect and maintain locations. Industries are also pushing boundaries by reducing crew size, deferring capital expenditure and overhauling and decision making in inspection and in some cases relaxing Original Equipment Manufacturers (OEM) recommended maintenance schedules. This paper discusses some of the issues and challenges with remote asset management. Illustrative example from heavy haul rail is used to explain reduction in Life Cycle Costs (LCC) and further enhancing operational performance.
- Description: E1
Reversible data hiding in encrypted images based on image partition and spatial correlation
- Authors: Song, Chang , Zhang, Yifeng , Lu, Guojun
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018; Jeju Island, South Korea; 22nd-24th October 2018; Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 11378 LNCS, p. 180-194
- Full Text: false
- Reviewed:
- Description: Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images because of its better protection of privacy compared with traditional RDH methods directly operated in original images. In several RDH algorithms, prediction-error expansion (PEE) is proved to be superior to other methods in terms of embedding capacity and distortion of marked image and multiple histograms modification (MHM) can realize adaptive selection of expansion bins which depends on image content in the modification of a sequence of histograms. Therefore, in this paper, we propose an efficient RDH method in encrypted images by combining PEE and MHM, and design corresponding mode of image partition. We first divide the image into three parts: W (for embedding secret data), B (for embedding the least significant bit(LSB) of W) and G (for generating prediction-error histograms). Then, we apply PEE and MHM to embed the LSB of W to reserve space for secret data. Next, we encrypt the image and change the LSB of W to realize the embedding of secret data. In the process of extraction, the reversibility of image and secret data can be guaranteed. The utilization of correlation between neighbor pixels and embedded order decided by the smoothness of pixel in part W contribute to the performance of our method. Compared to the existing algorithms, experimental results show that the proposed method can reduce distortion to the image at given embedding capacity especially at low embedding capacity.