scholarly journals Comprehensive Survey of Multimedia Steganalysis: Techniques, Evaluations, and Trends in Future Research

Symmetry ◽  
2022 ◽  
Vol 14 (1) ◽  
pp. 117
Author(s):  
Doaa A. Shehab ◽  
Mohmmed J. Alhaddad

During recent years, emerging multimedia processing techniques with information security services have received a lot of attention. Among those trends are steganography and steganalysis. Steganography techniques aim to hide the existence of secret messages in an innocent-looking medium, where the medium before and after embedding looks symmetric. Steganalysis techniques aim to breach steganography techniques and detect the presence of invisible messages. In the modern world, digital multimedia such as audio, images, and video became popular and widespread, which makes them perfect candidates for steganography. Monitoring this huge multimedia while the user communicates with the outside world is very important for detecting whether there is a hidden message in any suspicious communication. However, steganalysis has a significant role in many fields, such as to extract the stego-message, to detect suspicious hidden messages and to evaluate the robustness of existing steganography techniques. This survey provides the general principles of hiding secret messages using digital multimedia as well as reviewing the background of steganalysis. In this survey, the steganalysis is classified based on many points of view for better understanding. In addition, it provides a deep review and summarizes recent steganalysis approaches and techniques for audio, images, and video. Finally, the existing shortcomings and future recommendations in this field are discussed to present a useful resource for future research.

2017 ◽  
pp. 1278-1302
Author(s):  
Zahoor Uddin ◽  
Nadir Shah ◽  
Ayaz Ahmad ◽  
Waqar Mehmood ◽  
Farooq Alam

Basic concept of a smart grid is to have monitoring capability with data integration, advanced analysis to support system control, enhanced power security and effective communication to meet the power demand and reduce the energy consumption and cost. Implementing the smart grid will require intelligent interaction between the power generating and consuming devices that can be achieved by installing devices capable of processing data and communicating it to various parts in the grid. In short, we can say that the modern efficient data processing and communication technologies require advance digital signal processing techniques used in smart grid. This chapter first provides a comprehensive survey on the applications of signal processing techniques in smart grid. The challenges and limitations of signal processing techniques regarding the smart grid are also presented. Literature review of the recent advances in smart grid is also presented. This chapter also outlines some future research directions related to the field of applications of signal processing techniques in smart grid.


Author(s):  
Zahoor Uddin ◽  
Nadir Shah ◽  
Ayaz Ahmad ◽  
Waqar Mehmood ◽  
Farooq Alam

Basic concept of a smart grid is to have monitoring capability with data integration, advanced analysis to support system control, enhanced power security and effective communication to meet the power demand and reduce the energy consumption and cost. Implementing the smart grid will require intelligent interaction between the power generating and consuming devices that can be achieved by installing devices capable of processing data and communicating it to various parts in the grid. In short, we can say that the modern efficient data processing and communication technologies require advance digital signal processing techniques used in smart grid. This chapter first provides a comprehensive survey on the applications of signal processing techniques in smart grid. The challenges and limitations of signal processing techniques regarding the smart grid are also presented. Literature review of the recent advances in smart grid is also presented. This chapter also outlines some future research directions related to the field of applications of signal processing techniques in smart grid.


Author(s):  
Dzhyhil Yu. ◽  

Residential architecture has one of the most conservative styles based on its specifics. However, today this type of architecture seeks to actively respond to changes in the modern world. These changes are caused by multiple factors, among them are: technological and information progress; lack of resources and environmental pollution; military conflicts and population migration etc. The purpose of this article is to summarize the experience of the Department of Architectural Environment of Lviv Polytechnic National University over housing issues and outline the methodological principles of innovation in designing both individual houses and the architectural environment of residential formations. While writing this article, we analyzed the 15-year experience of Architectural Environment's Department diploma projects. The unique feature of these projects is the priority on the design of the environment. The evolution of diploma project topics is revealed on multiple distinctive examples such as the reconstruction of old buildings in Lviv and the construction of prefabricated homes and container-type housing. Futuristic settlements are represented in projects such as “The Ocean Settlements” and “Prykarpatsk - the City of Future”. Research projects were developed to study current trends in housing design and the impact of innovative technologies on planning decisions. These projects discoursed the protection of housing from traffic noise and issues related to environmental preservation. Innovative architectural ideas of future housing, developed by students in these projects, are based on a combination of aesthetic, technical, and social components of architecture. The conclusion indicates that when educating future architects, it is important to teach them the basics of the craft, as well as the ability to defend their innovative ideas. The emphasis is placed on the importance of educating the architect's personal responsibility for their own design solutions. It is stated that professional motivation and the ability to constantly renew previously acquired knowledge and skills will be among the main tasks in training future architects.


2018 ◽  
Vol 15 (1) ◽  
pp. 44-48 ◽  
Author(s):  
Melanie Copenhaver ◽  
Chack-Yung Yu ◽  
Robert P. Hoffman

Introduction: Increased systemic inflammation plays a significant role in the development of adult cardiometabolic diseases such as insulin resistance, dyslipidemia, atherosclerosis, and hypertension. The complement system is a part of the innate immune system and plays a key role in the regulation of inflammation. Of particular importance is the activation of complement components C3 and C4. C3 is produced primarily by the liver but is also produced in adipocytes, macrophages and endothelial cells, all of which are present in adipose tissues. Dietary fat and chylomicrons stimulate C3 production. Adipocytes in addition to producing C3 also have receptors for activated C3 and other complement components and thus also respond to as well as produce a target for complement. C3adesArg, also known as acylation stimulation factor, increases adipocyte triglyceride synthesis and release. These physiological effects play a significant role in the development of metabolic syndrome. Epidemiologically, obese adults and non-obese adults with cardiometabolic disease who are not obese have been shown to have increased complement levels. C4 levels also correlate with body mass index. Genetically, specific C3 polymorphisms have been shown to predict future cardiovascular events and. D decreased C4 long gene copy number is associated with increased longevity. Conclusion: Future research is clearly needed to clarify the role of complement in the development of cardiovascular disease and mechanisms for its action. The complement system may provide a new area for intervention in the prevention of cardiometabolic diseases.


Author(s):  
Chunyan Ji ◽  
Thosini Bamunu Mudiyanselage ◽  
Yutong Gao ◽  
Yi Pan

AbstractThis paper reviews recent research works in infant cry signal analysis and classification tasks. A broad range of literatures are reviewed mainly from the aspects of data acquisition, cross domain signal processing techniques, and machine learning classification methods. We introduce pre-processing approaches and describe a diversity of features such as MFCC, spectrogram, and fundamental frequency, etc. Both acoustic features and prosodic features extracted from different domains can discriminate frame-based signals from one another and can be used to train machine learning classifiers. Together with traditional machine learning classifiers such as KNN, SVM, and GMM, newly developed neural network architectures such as CNN and RNN are applied in infant cry research. We present some significant experimental results on pathological cry identification, cry reason classification, and cry sound detection with some typical databases. This survey systematically studies the previous research in all relevant areas of infant cry and provides an insight on the current cutting-edge works in infant cry signal analysis and classification. We also propose future research directions in data processing, feature extraction, and neural network classification fields to better understand, interpret, and process infant cry signals.


Entropy ◽  
2021 ◽  
Vol 23 (6) ◽  
pp. 664
Author(s):  
Nikos Kanakaris ◽  
Nikolaos Giarelis ◽  
Ilias Siachos ◽  
Nikos Karacapilidis

We consider the prediction of future research collaborations as a link prediction problem applied on a scientific knowledge graph. To the best of our knowledge, this is the first work on the prediction of future research collaborations that combines structural and textual information of a scientific knowledge graph through a purposeful integration of graph algorithms and natural language processing techniques. Our work: (i) investigates whether the integration of unstructured textual data into a single knowledge graph affects the performance of a link prediction model, (ii) studies the effect of previously proposed graph kernels based approaches on the performance of an ML model, as far as the link prediction problem is concerned, and (iii) proposes a three-phase pipeline that enables the exploitation of structural and textual information, as well as of pre-trained word embeddings. We benchmark the proposed approach against classical link prediction algorithms using accuracy, recall, and precision as our performance metrics. Finally, we empirically test our approach through various feature combinations with respect to the link prediction problem. Our experimentations with the new COVID-19 Open Research Dataset demonstrate a significant improvement of the abovementioned performance metrics in the prediction of future research collaborations.


Author(s):  
Kylie Litaker ◽  
Christopher B. Mayhorn

People regularly interact with automation to make decisions. Research shows that reliance on recommendations can depend on user trust in the decision support system (DSS), the source of information (i.e. human or automation), and situational stress. This study explored how information source and stress affect trust and reliance on a DSS used in a baggage scanning task. A preliminary sample of sixty-one participants were given descriptions for a DSS and reported trust before and after interaction. The DSS gave explicit recommendations when activated and participants could choose to rely or reject the choice. Results revealed a bias towards self-reliance and a negative influence of stress on trust, particularly for participants receiving help from automation. Controlling for perceived reliability may have eliminated trust biases prior to interaction, while stress may have influenced trust during the task. Future research should address potential differences in task motivation and include physiological measures of stress.


2021 ◽  
Vol 54 (4) ◽  
pp. 1-34
Author(s):  
Pengzhen Ren ◽  
Yun Xiao ◽  
Xiaojun Chang ◽  
Po-yao Huang ◽  
Zhihui Li ◽  
...  

Deep learning has made substantial breakthroughs in many fields due to its powerful automatic representation capabilities. It has been proven that neural architecture design is crucial to the feature representation of data and the final performance. However, the design of the neural architecture heavily relies on the researchers’ prior knowledge and experience. And due to the limitations of humans’ inherent knowledge, it is difficult for people to jump out of their original thinking paradigm and design an optimal model. Therefore, an intuitive idea would be to reduce human intervention as much as possible and let the algorithm automatically design the neural architecture. Neural Architecture Search ( NAS ) is just such a revolutionary algorithm, and the related research work is complicated and rich. Therefore, a comprehensive and systematic survey on the NAS is essential. Previously related surveys have begun to classify existing work mainly based on the key components of NAS: search space, search strategy, and evaluation strategy. While this classification method is more intuitive, it is difficult for readers to grasp the challenges and the landmark work involved. Therefore, in this survey, we provide a new perspective: beginning with an overview of the characteristics of the earliest NAS algorithms, summarizing the problems in these early NAS algorithms, and then providing solutions for subsequent related research work. In addition, we conduct a detailed and comprehensive analysis, comparison, and summary of these works. Finally, we provide some possible future research directions.


2020 ◽  
Vol 13 (1) ◽  
pp. 79-113
Author(s):  
Farrah Neumann ◽  
Matthew Kanwit

AbstractSince many linguistic structures are variable (i. e. conveyed by multiple forms), building a second-language grammar critically involves developing sociolinguistic competence (Canale and Swain. 1980. Theoretical bases of communicative approaches to second language teaching and testing. Applied Linguistics 1(1). 1–47), including knowledge of contexts in which to use one form over another (Bayley and Langman. 2004. Variation in the group and the individual: Evidence from second language acquisition. International Review of Applied Linguistics in Language Teaching 42(4). 303–318). Consequently, researchers interested in such competence have increasingly analyzed the study-abroad context to gauge learners’ ability to approximate local norms following a stay abroad, due to the quality and quantity of input to which learners may gain access (Lafford. 2006. The effects of study abroad vs. classroom contexts on Spanish SLA: Old assumptions, new insights and future research directions. In Carol Klee & Timothy Face (eds.), Selected proceedings of the 7th conference on the acquisition of Spanish and Portuguese as first and second languages, 1–25. Somerville, MA: Cascadilla Proceedings Project). Nevertheless, the present study is the first to examine native or learner variation between imperative (e. g. ven ‘come’) and optative Spanish commands (e. g. que vengas ‘come’). We first performed a corpus analysis to determine the linguistic factors to manipulate in a contextualized task, which elicited commands from learners before and after four weeks abroad in Alcalá de Henares, Spain. Their overall rates of selection and predictive factors were compared to local native speakers (NSs) and a control group of at-home learners.Results revealed that the abroad learners more closely approached NS rates of selection following the stay abroad. Nonetheless, for both learner groups conditioning by independent variables only partially approximated the NS system, which was more complex than previously suggested.


2021 ◽  
Vol 54 (3) ◽  
pp. 1-35
Author(s):  
Boubakr Nour ◽  
Hakima Khelifi ◽  
Rasheed Hussain ◽  
Spyridon Mastorakis ◽  
Hassine Moungla

Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean-slate approach for Internet communication. NDN provides intrinsic content security where security is directly provided to the content instead of communication channel. Among other security aspects, Access Control (AC) rules specify the privileges for the entities that can access the content. In TCP/IP-based AC systems, due to the client-server communication model, the servers control which client can access a particular content. In contrast, ICN-based networks use content names to drive communication and decouple the content from its original location. This phenomenon leads to the loss of control over the content, causing different challenges for the realization of efficient AC mechanisms. To date, considerable efforts have been made to develop various AC mechanisms in NDN. In this article, we provide a detailed and comprehensive survey of the AC mechanisms in NDN. We follow a holistic approach towards AC in NDN where we first summarize the ICN paradigm, describe the changes from channel-based security to content-based security, and highlight different cryptographic algorithms and security protocols in NDN. We then classify the existing AC mechanisms into two main categories: Encryption-based AC and Encryption-independent AC . Each category has different classes based on the working principle of AC (e.g., Attribute-based AC, Name-based AC, Identity-based AC). Finally, we present the lessons learned from the existing AC mechanisms and identify the challenges of NDN-based AC at large, highlighting future research directions for the community.


Sign in / Sign up

Export Citation Format

Share Document