

Survey: Recent Trends and Techniques in Image Co-Segmentation Challenges, Issues and Its Applications |
Pages: 99-114 (16) | [Full Text] PDF (528 KB) |
T Daryanto, S Ari, S Yang |
Computer Science Faculty, Universitas Mercu Buana Jakarta, IndonesiaSchool of Computer Science, Beijing Institute of Technology, Beijing 100081, ChinaDepartment of Information and Communication Engineering, Beijing Institute of Technology, Beijing 100081, China |
Abstract - The processing on semantic and visual information has always been a challenging task and co-segmentation is one of them. Co-segmentation is a classic, demanding and most studied topic in literature of computer vision not only because of its challenging nature but also due to its countless applications. During the past 20 years, several general-purpose algorithms and techniques have been developed publicly available benchmarks, as well as the progress in the development of robust computer vision algorithms. In this paper, we review the current activities and recent advances in real-world image co-segmentation methodologies and techniques. These techniques are roughly categorized into two general schemes: Unsupervised and Interactive. Which are mainly based on energy optimization, clustering, random walk, heat diffusion based and others. This paper also explains the features, weaknesses and computational complexity of the different methods. Additionally, we also discuss some important issues, applications and future of the image co-segmentation. |
Index Terms - Image segmentation, Image co-segmentation, supervised learning, Interactive learning, computer vision |
C itation - T Daryanto, S Ari, S Yang. "Survey: Recent Trends and Techniques in Image Co-Segmentation Challenges, Issues and Its Applications." International Journal of Computer Science and Software Engineering 7, no. 5 (2018): 99-114. |
Enhancing the Security of Simplified DES Algorithm Using Transposition and Shift Rows |
Pages: 115-119 (5) | [Full Text] PDF (494 KB) |
A Akhtar, MZU Baig, W haider |
MS Computer Science, MAJU, Pakistan |
Abstract - Security is playing a very important and crucial role in the field of network communication system and Internet. Simplified Data encryption standard (S-DES) is a private key cryptography system that provides the security in communication system but now days the advancement in the computational power the S-DES seems to be weak against the brute force attacks. To improve the security of S- DES algorithm the transposition and shift row techniques are added before the S-DES algorithm to perform its process. By using an Enhanced S-DES algorithm the security has been improved which is very crucial in the communication and field of Internet. If the transposition and shift row technique are used before the original S-DES algorithm then the intruder required first to break the original S-DES algorithm and then transposition and shift rows techniques. So the security is approximately double as compared to a simple S-DES algorithm. |
Index Terms - DES Algorithm, Transposition, Shift Rows, S-DES |
C itation - A Akhtar, MZU Baig, W haider. "Enhancing the Security of Simplified DES Algorithm Using Transposition and Shift Rows." International Journal of Computer Science and Software Engineering 7, no. 5 (2018): 115-119. |
Enhancing Electronic Banking Security in Nigeria Using Finger Vein Biometric |
Pages: 120-129 (10) | [Full Text] PDF (1.35 MB) |
D Imanah, S Konyeha |
Computer Science Department, University of Benin, Benin City, Edo State, 300001, Nigeria |
Abstract - Every banking customer is exposed to electronic banking terminal fraud due to non-repudiation with existing model. Currently, security status like Password, PIN, OTP, etc are been compromised and has proved not to be 100% safe. We integrated the Hitachi H1 FV scanner to our application to act as a deterrent for any form of transaction. A Proto-Type water tight secured banking application was designed using ArgoUML and VISUAL STUDIO TOOLS alongside HeidiSQL. The vein authentication is the last security protocol check before transaction access is authorized (credit and debit transaction) on any customers account. Our implementation proved that each of a person’s finger vein are totally different from each other, no one finger could authenticate for another finger. Finger vein biometric authentication security proved to be the safest method to enhance electronic banking security system. Our design is a panacea to local and global money laundering. |
Index Terms - Electronic banking, Non-repudiation, Biometric, Finger vein, Hitachi H1 FV Scanner |
C itation - D Imanah, S Konyeha. "Enhancing Electronic Banking Security in Nigeria Using Finger Vein Biometric." International Journal of Computer Science and Software Engineering 7, no. 5 (2018): 120-129. |