Open Issues and Challenges

2022 ◽  
pp. 301-314
Author(s):  
Ngoc Thanh Thuy Tran ◽  
Thi Dieu Hien Nguyen ◽  
Thi Han Nguyen ◽  
Ming-Fa Lin
Keyword(s):  
Author(s):  
Mohd Dilshad Ansari ◽  
Ekbal Rashid ◽  
S Siva Skandha ◽  
Suneet Kumar Gupta

Background: image forensics deal with the problem of authentication of pictures or their origins. There are two types of forensics techniques namely active and passive. Passive forgery is also known as blind forensics technique. In passive forgery, copy-move (cloning) image forensics is most common forgery technique. In this approach, an object or region of a picture is copied and positioned somewhere else in the same image. Active method used watermarking to solve picture genuineness problem. It has limitations like human involvement or particularly equipped cameras. To overwhelm these limitations, numerous passive authentication approaches have been developed. Moreover, both approaches do not require any prior information about the picture. Objective: The prime objective of this survey is to provide an inclusive summary as well as recent advancement, challenges and future direction in image forensics. In Today’s digital era the digital pictures and videos are having great impact on our life as well as society, as they became the important source of information. Though earlier it was very difficult to doctor the picture, nowadays digital pictures can be doctored easily with the help of editing tools and internet. These practices make pictures as well as videos genuineness deceptive. Conclusion: This paper presents the current state-of- the-art of passive (cloning) image forensics techniques, challenges and future direction of this research domain. Further, the major open issues in developing a robust cloning image forensics detector with their performance are discussed. Lastly, the available benchmark datasets are also discussed


2018 ◽  
Vol 3 (1) ◽  
pp. 22-32 ◽  
Author(s):  
Ernest Ezema ◽  
Azizol Abdullah ◽  
Nor Fazlida Binti Mohd

The concept of the Internet of Things (IoT) has evolved over time. The introduction of the Internet of Things and Services into the manufacturing environment has ushered in a fourth industrial revolution: Industry 4.0. It is no doubt that the world is undergoing constant transformations that somehow change the trajectory and history of humanity. We can illustrate this with the first and second industrial revolutions and the information revolution. IoT is a paradigm based on the internet that comprises many interconnected technologies like RFID (Radio Frequency Identification) and WSAN (Wireless Sensor and Actor Networks) to exchange information. The current needs for better control, monitoring and management in many areas, and the ongoing research in this field, have originated the appearance and creation of multiple systems like smart-home, smart-city and smart-grid. The IoT services can have centralized or distributed architecture. The centralized approach provides is where central entities acquire, process, and provide information while the distributed architectures, is where entities at the edge of the network exchange information and collaborate with each other in a dynamic way. To understand the two approaches, it is necessary to know its advantages and disadvantages especially in terms of security and privacy issues. This paper shows that the distributed approach has various challenges that need to be solved. But also, various interesting properties and strengths. In this paper we present the main research challenges and the existing solutions in the field of IoT security, identifying open issues, the industrial revolution and suggesting some hints for future research.


Author(s):  
Mehdi Sookhak ◽  
Mohammad Reza Jabbarpour ◽  
Nader Sohrabi Safa ◽  
F. Richard Yu

Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3035
Author(s):  
Néstor J. Jarque-Bou ◽  
Joaquín L. Sancho-Bru ◽  
Margarita Vergara

The role of the hand is crucial for the performance of activities of daily living, thereby ensuring a full and autonomous life. Its motion is controlled by a complex musculoskeletal system of approximately 38 muscles. Therefore, measuring and interpreting the muscle activation signals that drive hand motion is of great importance in many scientific domains, such as neuroscience, rehabilitation, physiotherapy, robotics, prosthetics, and biomechanics. Electromyography (EMG) can be used to carry out the neuromuscular characterization, but it is cumbersome because of the complexity of the musculoskeletal system of the forearm and hand. This paper reviews the main studies in which EMG has been applied to characterize the muscle activity of the forearm and hand during activities of daily living, with special attention to muscle synergies, which are thought to be used by the nervous system to simplify the control of the numerous muscles by actuating them in task-relevant subgroups. The state of the art of the current results are presented, which may help to guide and foster progress in many scientific domains. Furthermore, the most important challenges and open issues are identified in order to achieve a better understanding of human hand behavior, improve rehabilitation protocols, more intuitive control of prostheses, and more realistic biomechanical models.


2021 ◽  
Vol 13 (7) ◽  
pp. 165
Author(s):  
Paulo Rupino Cunha ◽  
Paulo Melo ◽  
Helder Sebastião

We analyze the path from cryptocurrencies to official Central Bank Digital Currencies (CBDCs), to shed some light on the ultimate dematerialization of money. To that end, we made an extensive search that resulted in a review of more than 100 academic and grey literature references, including official positions from central banks. We present and discuss the characteristics of the different CBDC variants being considered—namely, wholesale, retail, and, for the latter, the account-based, and token-based—as well as ongoing pilots, scenarios of interoperability, and open issues. Our contribution enables decision-makers and society at large to understand the potential advantages and risks of introducing CBDCs, and how these vary according to many technical and economic design choices. The practical implication is that a debate becomes possible about the trade-offs that the stakeholders are willing to accept.


Sign in / Sign up

Export Citation Format

Share Document