scholarly journals Hashing based Hybrid Online Voting Using Amazon Web Services

2018 ◽  
Vol 7 (4.10) ◽  
pp. 295
Author(s):  
Murali S ◽  
Manimaran A ◽  
Selvakumar K ◽  
Dinesh Kumar S

The secured web-based voting framework is the need of the present time. We propose another secure authentication for the online voting framework by utilizing face recognition and hashing algorithm. A simple verification process is accomplished during the initial registration process via email and phone. The voter is asked to give a unique identification number (UIN) provided by the election authority and face image at the time of main registration. This UIN is converted into a secret key using the SHA algorithm. The face image that is saved in the Amazon web service (AWS) acts as an authentication mechanism which enables people to cast their vote secretly. The voters, who cast numerous votes amid the way toward voting is guaranteed to be counteracted by encrypted UIN.  The election organizers can see the election parallelly as the voting is saved in the real-time database. The privacy of the voter is maintained as the details are converted into the key. In this system, an individual can vote from outside of his/her allocated constituency.  

Author(s):  
M. Sharif ◽  
K. Ayub ◽  
D. Sattar ◽  
M. Raza ◽  
S. Mohsin

This paper presents a face hashing technique for fast face recognition. The proposed technique employs the two existing algorithms, i.e., 2-D discrete cosine transformation and K-means clustering. The image has to go through different pre-processing phases and the two above-mentioned algorithms must be used in order to obtain the hash value of the face image. The searching process is increased by introducing a modified form of binary search. A new database architecture called Facebases has also been introduced to further speedup the searching process.


Author(s):  
Xiaolin Tang ◽  
Xiaogang Wang ◽  
Jin Hou ◽  
Huafeng Wu ◽  
Ping He

Introduction: Under complex illumination conditions such as poor light sources and light changes rapidly, there are two disadvantages of current gamma transform in preprocessing face image: one is that the parameters of transformation need to be set based on experience; the other is the details of the transformed image are not obvious enough. Objective: Improve the current gamma transform. Methods: This paper proposes a weighted fusion algorithm of adaptive gamma transform and edge feature extraction. First, this paper proposes an adaptive gamma transform algorithm for face image preprocessing, that is, the parameter of transformation generated by calculation according to the specific gray value of the input face image. Secondly, this paper uses Sobel edge detection operator to extract the edge information of the transformed image to get the edge detection image. Finally, this paper uses the adaptively transformed image and the edge detection image to obtain the final processing result through a weighted fusion algorithm. Results: The contrast of the face image after preprocessing is appropriate, and the details of the image are obvious. Conclusion: The method proposed in this paper can enhance the face image while retaining more face details, without human-computer interaction, and has lower computational complexity degree.


IFLA Journal ◽  
2021 ◽  
pp. 034003522110182
Author(s):  
Evans F Wema

This article reviews literature on the use of virtual learning environments by highlighting their potential and the challenges of introducing the same in Tanzania. It introduces the concept of virtual learning environments by demonstrating their applications to support teaching and learning. The article discusses the use of virtual learning environments in teaching information literacy courses by highlighting the success of using such tools in facilitating the teaching of information literacy courses to library users. In this review, special emphasis is placed on attempts by Tanzanian institutions of higher learning to introduce web-based teaching of information literacy and the challenges faced. The review reveals the need for Tanzanian institutions of higher learning to develop virtual learning environments to facilitate the teaching of information literacy courses to students and faculty so as to reach many of those who may not manage to attend the face-to-face information literacy sessions that are offered by librarians on a regular basis.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Takao Fukui ◽  
Mrinmoy Chakrabarty ◽  
Misako Sano ◽  
Ari Tanaka ◽  
Mayuko Suzuki ◽  
...  

AbstractEye movements toward sequentially presented face images with or without gaze cues were recorded to investigate whether those with ASD, in comparison to their typically developing (TD) peers, could prospectively perform the task according to gaze cues. Line-drawn face images were sequentially presented for one second each on a laptop PC display, and the face images shifted from side-to-side and up-and-down. In the gaze cue condition, the gaze of the face image was directed to the position where the next face would be presented. Although the participants with ASD looked less at the eye area of the face image than their TD peers, they could perform comparable smooth gaze shift to the gaze cue of the face image in the gaze cue condition. This appropriate gaze shift in the ASD group was more evident in the second half of trials in than in the first half, as revealed by the mean proportion of fixation time in the eye area to valid gaze data in the early phase (during face image presentation) and the time to first fixation on the eye area. These results suggest that individuals with ASD may benefit from the short-period trial experiment by enhancing the usage of gaze cue.


2011 ◽  
Vol 55-57 ◽  
pp. 77-81
Author(s):  
Hui Ming Huang ◽  
He Sheng Liu ◽  
Guo Ping Liu

In this paper, we proposed an efficient method to address the problem of color face image segmentation that is based on color information and saliency map. This method consists of three stages. At first, skin colored regions is detected using a Bayesian model of the human skin color. Then, we get a chroma chart that shows likelihoods of skin colors. This chroma chart is further segmented into skin region that satisfy the homogeneity property of the human skin. The third stage, visual attention model are employed to localize the face region according to the saliency map while the bottom-up approach utilizes both the intensity and color features maps from the test image. Experimental evaluation on test shows that the proposed method is capable of segmenting the face area quite effectively,at the same time, our methods shows good performance for subjects in both simple and complex backgrounds, as well as varying illumination conditions and skin color variances.


2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Secure and efficient authentication mechanism becomes a major concern in cloud computing due to the data sharing among cloud server and user through internet. This paper proposed an efficient Hashing, Encryption and Chebyshev HEC-based authentication in order to provide security among data communication. With the formal and the informal security analysis, it has been demonstrated that the proposed HEC-based authentication approach provides data security more efficiently in cloud. The proposed approach amplifies the security issues and ensures the privacy and data security to the cloud user. Moreover, the proposed HEC-based authentication approach makes the system more robust and secured and has been verified with multiple scenarios. However, the proposed authentication approach requires less computational time and memory than the existing authentication techniques. The performance revealed by the proposed HEC-based authentication approach is measured in terms of computation time and memory as 26ms, and 1878bytes for 100Kb data size, respectively.


Author(s):  
Hamza Sajjad Ahmad ◽  
Muhammad Junaid Arshad ◽  
Muhammad Sohail Akram

To send data over the network, devices need to authenticate themselves within the network. After authentication, the device will be able to send the data in-network. After authentication, secure communication of devices is an important task that is done with an encryption method. IoT network devices have a very small circuit with low resources and low computation power. By considering low power, less memory, low computation, and all the aspect of IoT devices, an encryption technique is needed that is suitable for this type of device. As IoT networks are heterogeneous, each device has different hardware properties, and all the devices are not on one scale. To make IoT networks secure, this paper starts with the secure authentication mechanism to verify the device that wants to be a part of the network. After that, an encryption algorithm is presented that will make the communication secure. This encryption algorithm is designed by considering all the important aspects of IoT devices (low computation, low memory, and cost).


2021 ◽  
Author(s):  
Yongtai Liu ◽  
Zhijun Yin ◽  
Zhiyu Wan ◽  
Chao Yan ◽  
Weiyi Xia ◽  
...  

BACKGROUND As direct-to-consumer genetic testing (DTC-GT) services have grown in popularity, the public has increasingly relied upon online forums to discuss and share their test results. Initially, users did so under a pseudonym, but more recently, they have included face images when discussing DTC-GT results. When these images truthfully represent a user, they reveal the identity of the corresponding individual. Various studies have shown that sharing images in social media tends to elicit more replies. However, users who do this clearly forgo their privacy. OBJECTIVE This study aimed to investigate the face image sharing behavior of DTC-GT users in an online environment and determine if there exists the association between face image sharing and the attention received from others. METHODS This study focused on r/23andme, a subreddit dedicated to discussing DTC-GT results and their implications. We applied natural language processing to infer the themes associated with posts that included a face image. We applied a regression analysis to learn the association between the attention that a post received, in terms of the number of comments and karma scores (defined as the number of upvotes minus the number of downvotes), and whether the post contains a face image. RESULTS We collected over 15,000 posts from the r/23andme subreddit published between 2012 and 2020. Face image posting began in late 2019 and grew rapidly, with over 800 individuals’ revealing their faces by early 2020. The topics in posts including a face were primarily about sharing or discussing ancestry composition, and sharing family reunion photos with relatives discovered via DTC-GT. On average, posts including a face received 60% (5/8) more comments than other posts, and these posts had karma scores 2.4 times higher than other posts. CONCLUSIONS DTC-GT consumers in the r/23andme subreddit are increasingly posting face images and testing reports on social platforms. The association between face image posting and a greater level of attention suggests that people are forgoing their privacy in exchange for attention from others. To mitigate the risk of face image posting, platforms, or at least subreddit organizers, should inform users about the consequence of such behavior for identity disclosure.


2009 ◽  
pp. 1334-1349
Author(s):  
Elizabeth Avery Gomez ◽  
Dezhi Wu ◽  
Katia Passerini ◽  
Michael Bieber

Team-based learning is an active learning instructional strategy used in the traditional face-to-face classroom. Web-based computer-mediated communication (CMC) tools complement the face-toface classroom and enable active learning between face-to-face class times. This article presents the results from pilot assessments of computer-supported team-based learning. The authors utilized pedagogical approaches grounded in collaborative learning techniques, such as team-based learning, and extended these techniques to a Web-based environment through the use of computer-mediated communications tools (discussion Web-boards). This approach was examined through field studies in the course of two semesters at a US public technological university. The findings indicate that the perceptions of team learning experience such as perceived motivation, enjoyment, and learning in such a Web-based CMC environment are higher than in traditional face-to-face courses. In addition, our results show that perceived team members’ contributions impact individual learning experiences. Overall, Web-based CMC tools are found to effectively facilitate team interactions and achieve higher-level learning.


Sign in / Sign up

Export Citation Format

Share Document