Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 17 de 17
Filter
Add more filters










Publication year range
1.
Sensors (Basel) ; 23(6)2023 Mar 16.
Article in English | MEDLINE | ID: mdl-36991880

ABSTRACT

In recent years, the number of personal accounts assigned to one business user has been constantly growing. There could be as many as 191 individual login credentials used by an average employee, according to a 2017 study. The most recurrent problems associated with this situation faced by users are the strength of passwords and ability to recall them. Researchers have proven that "users are aware of what constitutes a secure password but may forgo these security measures in terms of more convenient passwords, largely depending on account type". Reusing the same password across multiple platforms or creating one with dictionary words has also been proved to be a common practice amongst many. In this paper, a novel password-reminder scheme will be presented. The goal was that the user creates a CAPTCHA-like image with a hidden meaning, that only he or she can decode. The image must be in some way related to that individual's memory or her/his unique knowledge or experience. With this image, being presented each time during logging in, the user is asked to associate a password consisting of two or more words and a number. If the image is selected properly and strong association with a person's visual memory has been linked to it, the chances of recalling a lengthy password he/she created should not present a problem.

2.
Sensors (Basel) ; 23(6)2023 Mar 20.
Article in English | MEDLINE | ID: mdl-36991998

ABSTRACT

This paper describes a multi-secret steganographic system for the Internet-of-Things. It uses two user-friendly sensors for data input: thumb joystick and touch sensor. These devices are not only easy to use, but also allow hidden data entry. The system conceals multiple messages into the same container, but with different algorithms. The embedding is realized with two methods of video steganography that work on mp4 files, namely, videostego and metastego. These methods were chosen because of their low complexity so that they may operate smoothly in environments with limited resources. It is possible to replace the suggested sensors with others that offer similar functionality.

3.
Neural Comput Appl ; 35(19): 13935-13940, 2023.
Article in English | MEDLINE | ID: mdl-34248290

ABSTRACT

One of the most important goals of modern medicine is prevention against pandemic and civilization diseases. For such tasks, advanced IT infrastructures and intelligent AI systems are used, which allow supporting patients' diagnosis and treatment. In our research, we also try to define efficient tools for coronavirus classification, especially using mathematical linguistic methods. This paper presents the ways of application of linguistics techniques in supporting effective management of medical data obtained during coronavirus treatments, and possibilities of application of such methods in classification of different variants of the coronaviruses detected for particular patients. Currently, several types of coronavirus are distinguished, which are characterized by differences in their RNA structure, which in turn causes an increase in the rate of mutation and infection with these viruses.

4.
Sensors (Basel) ; 22(7)2022 Mar 29.
Article in English | MEDLINE | ID: mdl-35408225

ABSTRACT

This article describes a steganographic system for IoT based on an APDS-9960 gesture sensor. The sensor is used in two modes: as a trigger or data input. In trigger mode, gestures control when to start and finish the embedding process; then, the data come from an external source or are pre-existing. In data input mode, the data to embed come directly from the sensor that may detect gestures or RGB color. The secrets are embedded in time-lapse photographs, which are later converted to videos. Selected hardware and steganographic methods allowed for smooth operation in the IoT environment. The system may cooperate with a digital camera and other sensors.


Subject(s)
Computers , Gestures
5.
Internet Things (Amst) ; 20: 100625, 2022 Nov.
Article in English | MEDLINE | ID: mdl-37520339

ABSTRACT

IoT-based crowd-sensing network, which aims to achieve data collection and task allocation to mobile users, become more and more popular in recent years. This data collected by IoT devices may be private and directly transmission of these data maybe incur privacy leakage. With the help of homomorphic encryption (HE), which supports the additive and/or multiplicative operations over the encrypted data, privacy preserving crowd-sensing network is now possible. Until now several such secure data aggregation schemes based on HE have been proposed. In many cases, ciphertext comparison is an important step for further secure data processing. However efficient ciphertext comparison is not supported by most such schemes. In this paper, aiming at enabling ciphertext comparison among multiple users in crowd-sensing network, with Lagrange's interpolation technique we propose comparable homomorphic encryption (CompHE) schemes. We also prove our schemes' security, and the performance analysis show our schemes are practical. We also discuss the applications of our IoT based crowd-sensing network with comparable homomorphic encryption for combatting COVID19, including the first example of privacy preserving close contact determination based on the spatial distance, and the second example of privacy preserving social distance controlling based on the spatial difference of lockdown zones, controlled zones and precautionary zones. From the analysis we see our IoT based crowd-sensing network can be used for contact tracing without worrying about the privacy leakage. Compared with the existing CompHE schemes, our proposals can be collusion resistance or secure in the semi-honest model while the previous schemes cannot achieve this easily. Our schemes only need 4 or 5 modular exponentiation when implementing the most important comparison algorithm, which are better than the existing closely related scheme with advantage of 50% or 37.5%.

6.
Sensors (Basel) ; 21(21)2021 Oct 31.
Article in English | MEDLINE | ID: mdl-34770571

ABSTRACT

The objective of the verification process, besides guaranteeing security, is also to be effective and robust. This means that the login should take as little time as possible, and each time allow for a successful authentication of the authorised account. In recent years, however, online users have been experiencing more and more issues with recalling their own passwords on the spot. According to research done in 2017 by LastPass on its employees, the number of personal accounts assigned to one business user currently exceeds 191 profiles and keeps growing. Remembering these many passwords, especially to applications which are not used every week, seems to be impossible without storing them either on paper, in a password manager, or saved in a file somewhere on a PC. In this article a new verification model using a Google Street View image as well as the user's personal experience and knowledge will be presented. The purpose of this scheme is to assure secure verification by creating longer passwords as well as delivering a 'password reminder' already embedded into the login scheme.


Subject(s)
Computer Security , Telemedicine , Cognition , Confidentiality
7.
Sensors (Basel) ; 21(13)2021 Jul 04.
Article in English | MEDLINE | ID: mdl-34283140

ABSTRACT

The sparse data in PM2.5 air quality monitoring systems is frequently happened on large-scale smart city sensing applications, which is collected via massive sensors. Moreover, it could be affected by inefficient node deployment, insufficient communication, and fragmented records, which is the main challenge of the high-resolution prediction system. In addition, data privacy in the existing centralized air quality prediction system cannot be ensured because the data which are mined from end sensory nodes constantly exposed to the network. Therefore, this paper proposes a novel edge computing framework, named Federated Compressed Learning (FCL), which provides efficient data generation while ensuring data privacy for PM2.5 predictions in the application of smart city sensing. The proposed scheme inherits the basic ideas of the compression technique, regional joint learning, and considers a secure data exchange. Thus, it could reduce the data quantity while preserving data privacy. This study would like to develop a green energy-based wireless sensing network system by using FCL edge computing framework. It is also one of key technologies of software and hardware co-design for reconfigurable and customized sensing devices application. Consequently, the prototypes are developed in order to validate the performances of the proposed framework. The results show that the data consumption is reduced by more than 95% with an error rate below 5%. Finally, the prediction results based on the FCL will generate slightly lower accuracy compared with centralized training. However, the data could be heavily compacted and securely transmitted in WSNs.


Subject(s)
Air Pollution , Privacy , Cities , Particulate Matter , Software
8.
Entropy (Basel) ; 23(3)2021 Feb 25.
Article in English | MEDLINE | ID: mdl-33668760

ABSTRACT

In this paper we propose a novel transform domain steganography technique-hiding a message in components of linear combination of high order eigenfaces vectors. By high order we mean eigenvectors responsible for dimensions with low amount of overall image variance, which are usually related to high-frequency parameters of image (details). The study found that when the method was trained on large enough data sets, image quality was nearly unaffected by modification of some linear combination coefficients used as PCA-based features. The proposed method is only limited to facial images, but in the era of overwhelming influence of social media, hundreds of thousands of selfies uploaded every day to social networks do not arouse any suspicion as a potential steganography communication channel. From our best knowledge there is no description of any popular steganography method that utilizes eigenfaces image domain. Due to this fact we have performed extensive evaluation of our method using at least 200 000 facial images for training and robustness evaluation of proposed approach. The obtained results are very promising. What is more, our numerical comparison with other state-of-the-art algorithms proved that eigenfaces-based steganography is among most robust methods against compression attack. The proposed research can be reproduced because we use publicly accessible data set and our implementation can be downloaded.

9.
Sensors (Basel) ; 21(1)2020 Dec 25.
Article in English | MEDLINE | ID: mdl-33375606

ABSTRACT

Imagechain is a cryptographic structure that chain digital images with hash links. The most important feature, which differentiates it from blockchain, is that the pictures are not stored inside the blocks. Instead, the block and the image are combined together in the embedding process. Therefore, the imagechain is built from standard graphic files that may be used in the same way as any other image, but additionally, each of them contains a data block that links it to a previous element of the chain. The presented solution does not require any additional files except the images themselves. It supports multiple file formats and embedding methods, which makes it portable and user-friendly. At the same time, the scheme provides a high level of security and resistance to forgery. This is achieved by hashing the whole file with embedded data, so the image cannot be altered or removed from the chain without losing integrity. This article describes the basic concept of an imagechain together with building blocks and applications. The two most important issues are embedding methods and block structure.

10.
Entropy (Basel) ; 22(6)2020 May 28.
Article in English | MEDLINE | ID: mdl-33286372

ABSTRACT

This paper shows how to diffuse a message and hide it in multiple PDF files. Presented method uses dereferenced objects and secret splitting or sharing algorithms. It is applicable to various types of PDF files, including text documents, presentations, scanned images etc. Because hiding process is based on structure manipulation, the solution may be easily combined with content-dependent steganographic techniques. The hidden pages are not visible in typical application usage, which was tested with seven different programs.

11.
Sensors (Basel) ; 20(12)2020 Jun 18.
Article in English | MEDLINE | ID: mdl-32570956

ABSTRACT

This paper will present the authors' own techniques of secret data management and protection, with particular attention paid to techniques securing data services. Among the solutions discussed, there will be information-sharing protocols dedicated to the tasks of secret (confidential) data sharing. Such solutions will be presented in an algorithmic form, aimed at solving the tasks of protecting and securing data against unauthorized acquisition. Data-sharing protocols will execute the tasks of securing a special type of information, i.e., data services. The area of data protection will be defined for various levels, within which will be executed the tasks of data management and protection. The authors' solution concerning securing data with the use of cryptographic threshold techniques used to split the secret among a specified group of secret trustees, simultaneously enhanced by the application of linguistic methods of description of the shared secret, forms a new class of protocols, i.e., intelligent linguistic threshold schemes. The solutions presented in this paper referring to the service management and securing will be dedicated to various levels of data management. These levels could be differentiated both in the structure of a given entity and in its environment. There is a special example thereof, i.e., the cloud management processes. These will also be subject to the assessment of feasibility of application of the discussed protocols in these areas. Presented solutions will be based on the application of an innovative approach, in which we can use a special formal graph for the creation of a secret representation, which can then be divided and transmitted over a distributed network.

12.
Sensors (Basel) ; 17(11)2017 Nov 10.
Article in English | MEDLINE | ID: mdl-29125560

ABSTRACT

The aim of this paper is to propose and evaluate the novel method of template generation, matching, comparing and visualization applied to motion capture (kinematic) analysis. To evaluate our approach, we have used motion capture recordings (MoCap) of two highly-skilled black belt karate athletes consisting of 560 recordings of various karate techniques acquired with wearable sensors. We have evaluated the quality of generated templates; we have validated the matching algorithm that calculates similarities and differences between various MoCap data; and we have examined visualizations of important differences and similarities between MoCap data. We have concluded that our algorithms works the best when we are dealing with relatively short (2-4 s) actions that might be averaged and aligned with the dynamic time warping framework. In practice, the methodology is designed to optimize the performance of some full body techniques performed in various sport disciplines, for example combat sports and martial arts. We can also use this approach to generate templates or to compare the correct performance of techniques between various top sportsmen in order to generate a knowledge base of reference MoCap videos. The motion template generated by our method can be used for action recognition purposes. We have used the DTW classifier with angle-based features to classify various karate kicks. We have performed leave-one-out action recognition for the Shorin-ryu and Oyama karate master separately. In this case, 100 % actions were correctly classified. In another experiment, we used templates generated from Oyama master recordings to classify Shorin-ryu master recordings and vice versa. In this experiment, the overall recognition rate was 94.2 % , which is a very good result for this type of complex action.


Subject(s)
Motion , Algorithms , Athletes , Biomechanical Phenomena , Humans , Martial Arts
13.
J Med Syst ; 40(6): 137, 2016 Jun.
Article in English | MEDLINE | ID: mdl-27106581

ABSTRACT

The main novelty of this paper is presenting the adaptation of Gesture Description Language (GDL) methodology to sport and rehabilitation data analysis and classification. In this paper we showed that Lua language can be successfully used for adaptation of the GDL classifier to those tasks. The newly applied scripting language allows easily extension and integration of classifier with other software technologies and applications. The obtained execution speed allows using the methodology in the real-time motion capture data processing where capturing frequency differs from 100 Hz to even 500 Hz depending on number of features or classes to be calculated and recognized. Due to this fact the proposed methodology can be used to the high-end motion capture system. We anticipate that using novel, efficient and effective method will highly help both sport trainers and physiotherapist in they practice. The proposed approach can be directly applied to motion capture data kinematics analysis (evaluation of motion without regard to the forces that cause that motion). The ability to apply pattern recognition methods for GDL description can be utilized in virtual reality environment and used for sport training or rehabilitation treatment.


Subject(s)
Motion , Pattern Recognition, Automated , Programming Languages , Rehabilitation , Algorithms , Computer Simulation , Humans , Rehabilitation/statistics & numerical data
14.
Comput Biol Med ; 41(6): 402-10, 2011 Jun.
Article in English | MEDLINE | ID: mdl-21531402

ABSTRACT

This paper presents a novel method of detecting and describing pathological changes that can be visualized on dynamic computer tomography brain maps (perfusion CT). The system was tested on a set of dynamic perfusion computer tomography maps. Each set consisted of two perfusion maps (CBF, CBV and TTP for testing the irregularity detection algorithm) and one CT brain scan (for the registration algorithm) from 8 different patients with suspected strokes. In 36 of the 84 brain maps, abnormal perfusion was diagnosed. The results of the algorithm were compared with the findings of a team of two radiologists. All of the CBF and CBV maps that did not show a diagnosed asymmetry were classified correctly (i.e. no asymmetry was detected). In four of the TTP maps the algorithm found asymmetries, which were not classified as irregularities in the medical diagnosis; 84.5% of the maps were diagnosed correctly (85.7% for the CBF, 85.7% for the CBV and 82.1% for the TTP); 75% of the errors in the CBF maps and 100% of the errors in the CBV and the TTP maps were caused by the excessive detection of asymmetry regions. Errors in the CBFs and the CBVs were eliminated in cases in which the symmetry axis was selected manually. Subsequently, 96.4% of the CBF maps and 100% of the CBV maps were diagnosed correctly.


Subject(s)
Brain Mapping/methods , Diagnosis, Computer-Assisted/methods , Image Processing, Computer-Assisted/methods , Perfusion Imaging/methods , Tomography, X-Ray Computed/methods , Algorithms , Brain/anatomy & histology , Brain/pathology , Humans , Radiographic Image Interpretation, Computer-Assisted/methods , Reproducibility of Results , Stroke/diagnosis
15.
Comput Med Imaging Graph ; 33(2): 154-70, 2009 Mar.
Article in English | MEDLINE | ID: mdl-19124224

ABSTRACT

This paper presents a new approach to gallbladder ultrasonic image processing and analysis towards detection of disease symptoms on processed images. First, in this paper, there is presented a new method of filtering gallbladder contours from USG images. A major stage in this filtration is to segment and section off areas occupied by the said organ. In most cases this procedure is based on filtration that plays a key role in the process of diagnosing pathological changes. Unfortunately ultrasound images present among the most troublesome methods of analysis owing to the echogenic inconsistency of structures under observation. This paper provides for an inventive algorithm for the holistic extraction of gallbladder image contours. The algorithm is based on rank filtration, as well as on the analysis of histogram sections on tested organs. The second part concerns detecting lesion symptoms of the gallbladder. Automating a process of diagnosis always comes down to developing algorithms used to analyze the object of such diagnosis and verify the occurrence of symptoms related to given affection. Usually the final stage is to make a diagnosis based on the detected symptoms. This last stage can be carried out through either dedicated expert systems or more classic pattern analysis approach like using rules to determine illness basing on detected symptoms. This paper discusses the pattern analysis algorithms for gallbladder image interpretation towards classification of the most frequent illness symptoms of this organ.


Subject(s)
Gallbladder/diagnostic imaging , Gallbladder/pathology , Image Processing, Computer-Assisted/methods , Pattern Recognition, Automated/methods , Ultrasonography/methods , Cholecystitis/diagnostic imaging , Cholecystitis/pathology , Cholecystolithiasis/diagnostic imaging , Cholecystolithiasis/pathology , Expert Systems , Gallbladder Neoplasms/diagnostic imaging , Gallbladder Neoplasms/pathology , Gallstones/diagnostic imaging , Gallstones/pathology , Humans , Knowledge Bases , Subtraction Technique
16.
Comput Biol Med ; 38(4): 501-7, 2008 Apr.
Article in English | MEDLINE | ID: mdl-18339366

ABSTRACT

This paper presents the way of application of structural methods of Artificial Intelligence-in particular, linguistic mechanisms of semantic meaning reasoning-for development of intelligent medical information systems. They also facilitate an in-depth analysis of the meaning presented in Diagnosis Support Information Systems used in analysis of selected medical examinations. This paper will present the mechanisms of pattern meaning description on selected examples of spinal cord image analysis. Presented approach for semantic reasoning will be based on the model of cognitive resonance, which will be applied to the task of interpreting the meaning of selected diagnostic images from the central nervous system. Such algorithms are aimed to construct an intelligent analysis module in medical IS. The application presented in this paper is of a research character and it serves the preparation of efficient lesion detection methods applied to a data set originating from magnetic and resonance examinations of the spine and spinal cord structures.


Subject(s)
Algorithms , Artificial Intelligence , Decision Support Techniques , Diagnosis, Computer-Assisted , Medical Informatics Computing , Cysts/diagnosis , Humans , Intervertebral Disc Displacement , Pattern Recognition, Automated , Programming Languages , Spinal Cord/pathology , Spinal Diseases/diagnosis , Spinal Neoplasms/diagnosis , Spinal Stenosis/diagnosis
17.
Artif Intell Med ; 26(1-2): 145-159, 2002.
Article in English | MEDLINE | ID: mdl-12234721

ABSTRACT

This paper presents a new approach to the application of structural pattern recognition methods for image understanding, based on content analysis and knowledge discovery performed on medical images. This presents in particular computer analysis and recognition of local stenoses of the coronary arteries lumen. These stenoses are the result of the appearance of arteriosclerosis plaques, which in consequence lead to different forms of ischemic cardiovascular diseases. Such diseases may be seen in the form of stable or unstable disturbances of heart rhythm or infarctions. Analysis of the correct morphology of these arteries lumen is possible with the application of the syntactic analysis and pattern recognition methods, in particular with the attributed grammar of LALR type. In the paper, we shall describe all stages of analysis and understanding of images in the context of obtained features, and we shall also present the proper algorithm of syntactic reasoning based on the acquired knowledge.


Subject(s)
Artificial Intelligence , Coronary Artery Disease/diagnosis , Coronary Stenosis/diagnosis , Pattern Recognition, Automated , Algorithms , Arrhythmias, Cardiac/diagnosis , Humans , Image Processing, Computer-Assisted
SELECTION OF CITATIONS
SEARCH DETAIL
...