• Title/Summary/Keyword: SIFT

Search Result 343, Processing Time 0.136 seconds

A Cross-Platform Malware Variant Classification based on Image Representation

  • Naeem, Hamad;Guo, Bing;Ullah, Farhan;Naeem, Muhammad Rashid
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3756-3777
    • /
    • 2019
  • Recent internet development is helping malware researchers to generate malicious code variants through automated tools. Due to this reason, the number of malicious variants is increasing day by day. Consequently, the performance improvement in malware analysis is the critical requirement to stop the rapid expansion of malware. The existing research proved that the similarities among malware variants could be used for detection and family classification. In this paper, a Cross-Platform Malware Variant Classification System (CP-MVCS) proposed that converted malware binary into a grayscale image. Further, malicious features extracted from the grayscale image through Combined SIFT-GIST Malware (CSGM) description. Later, these features used to identify the relevant family of malware variant. CP-MVCS reduced computational time and improved classification accuracy by using CSGM feature description along machine learning classification. The experiment performed on four publically available datasets of Windows OS and Android OS. The experimental results showed that the computation time and malware classification accuracy of CP-MVCS was higher than traditional methods. The evaluation also showed that CP-MVCS was not only differentiated families of malware variants but also identified both malware and benign samples in mix fashion efficiently.

Video Representation via Fusion of Static and Motion Features Applied to Human Activity Recognition

  • Arif, Sheeraz;Wang, Jing;Fei, Zesong;Hussain, Fida
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3599-3619
    • /
    • 2019
  • In human activity recognition system both static and motion information play crucial role for efficient and competitive results. Most of the existing methods are insufficient to extract video features and unable to investigate the level of contribution of both (Static and Motion) components. Our work highlights this problem and proposes Static-Motion fused features descriptor (SMFD), which intelligently leverages both static and motion features in the form of descriptor. First, static features are learned by two-stream 3D convolutional neural network. Second, trajectories are extracted by tracking key points and only those trajectories have been selected which are located in central region of the original video frame in order to to reduce irrelevant background trajectories as well computational complexity. Then, shape and motion descriptors are obtained along with key points by using SIFT flow. Next, cholesky transformation is introduced to fuse static and motion feature vectors to guarantee the equal contribution of all descriptors. Finally, Long Short-Term Memory (LSTM) network is utilized to discover long-term temporal dependencies and final prediction. To confirm the effectiveness of the proposed approach, extensive experiments have been conducted on three well-known datasets i.e. UCF101, HMDB51 and YouTube. Findings shows that the resulting recognition system is on par with state-of-the-art methods.

Localization Algorithm for Lunar Rover using IMU Sensor and Vision System (IMU 센서와 비전 시스템을 활용한 달 탐사 로버의 위치추정 알고리즘)

  • Kang, Hosun;An, Jongwoo;Lim, Hyunsoo;Hwang, Seulwoo;Cheon, Yuyeong;Kim, Eunhan;Lee, Jangmyung
    • The Journal of Korea Robotics Society
    • /
    • v.14 no.1
    • /
    • pp.65-73
    • /
    • 2019
  • In this paper, we propose an algorithm that estimates the location of lunar rover using IMU and vision system instead of the dead-reckoning method using IMU and encoder, which is difficult to estimate the exact distance due to the accumulated error and slip. First, in the lunar environment, magnetic fields are not uniform, unlike the Earth, so only acceleration and gyro sensor data were used for the localization. These data were applied to extended kalman filter to estimate Roll, Pitch, Yaw Euler angles of the exploration rover. Also, the lunar module has special color which can not be seen in the lunar environment. Therefore, the lunar module were correctly recognized by applying the HSV color filter to the stereo image taken by lunar rover. Then, the distance between the exploration rover and the lunar module was estimated through SIFT feature point matching algorithm and geometry. Finally, the estimated Euler angles and distances were used to estimate the current position of the rover from the lunar module. The performance of the proposed algorithm was been compared to the conventional algorithm to show the superiority of the proposed algorithm.

Implementation of a Single Image Detection and Tracking System in Multiple Images (다중 이미지에서 단일 이미지 검출 및 추적 시스템 구현)

  • Choi, Jaehak;Park, Inho;Kim, Seongyoon;Lee, Yonghwan;Kim, Youngseop
    • Journal of the Semiconductor & Display Technology
    • /
    • v.16 no.3
    • /
    • pp.78-81
    • /
    • 2017
  • Augmented Reality(AR) is the core technology of the future knowledge service industry. It is expected to be used in various fields such as medical, education, entertainment etc. Briefly, augmented reality technology is a technique in which a mapped virtual object is augmented when a real-world object is viewed through a device after mapping a real-world object and a virtual object. In this paper, we implemented object detection and tracking system, which is a key technology of augmented reality. To speed up the object tracking, the ORB algorithm, which is a lightweight algorithm compared to the detection algorithm, is applied. In addition, KNN classifier, which is a machine learning algorithm, was applied to detect a single object by learning multiple images.

  • PDF

Face Spoofing Attack Detection Using Spatial Frequency and Gradient-Based Descriptor

  • Ali, Zahid;Park, Unsang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.892-911
    • /
    • 2019
  • Biometric recognition systems have been widely used for information security. Among the most popular biometric traits, there are fingerprint and face due to their high recognition accuracies. However, the security system that uses face recognition as the login method are vulnerable to face-spoofing attacks, from using printed photo or video of the valid user. In this study, we propose a fast and robust method to detect face-spoofing attacks based on the analysis of spatial frequency differences between the real and fake videos. We found that the effect of a spoofing attack stands out more prominently in certain regions of the 2D Fourier spectra and, therefore, it is adequate to use the information about those regions to classify the input video or image as real or fake. We adopt a divide-conquer-aggregate approach, where we first divide the frequency domain image into local blocks, classify each local block independently, and then aggregate all the classification results by the weighted-sum approach. The effectiveness of the methodology is demonstrated using two different publicly available databases, namely: 1) Replay Attack Database and 2) CASIA-Face Anti-Spoofing Database. Experimental results show that the proposed method provides state-of-the-art performance by processing fewer frames of each video.

Hardware Accelerated Design on Bag of Words Classification Algorithm

  • Lee, Chang-yong;Lee, Ji-yong;Lee, Yong-hwan
    • Journal of Platform Technology
    • /
    • v.6 no.4
    • /
    • pp.26-33
    • /
    • 2018
  • In this paper, we propose an image retrieval algorithm for real-time processing and design it as hardware. The proposed method is based on the classification of BoWs(Bag of Words) algorithm and proposes an image search algorithm using bit stream. K-fold cross validation is used for the verification of the algorithm. Data is classified into seven classes, each class has seven images and a total of 49 images are tested. The test has two kinds of accuracy measurement and speed measurement. The accuracy of the image classification was 86.2% for the BoWs algorithm and 83.7% the proposed hardware-accelerated software implementation algorithm, and the BoWs algorithm was 2.5% higher. The image retrieval processing speed of BoWs is 7.89s and our algorithm is 1.55s. Our algorithm is 5.09 times faster than BoWs algorithm. The algorithm is largely divided into software and hardware parts. In the software structure, C-language is used. The Scale Invariant Feature Transform algorithm is used to extract feature points that are invariant to size and rotation from the image. Bit streams are generated from the extracted feature point. In the hardware architecture, the proposed image retrieval algorithm is written in Verilog HDL and designed and verified by FPGA and Design Compiler. The generated bit streams are stored, the clustering step is performed, and a searcher image databases or an input image databases are generated and matched. Using the proposed algorithm, we can improve convenience and satisfaction of the user in terms of speed if we search using database matching method which represents each object.

An Efficient Comparing and Updating Method of Rights Management Information for Integrated Public Domain Image Search Engine

  • Kim, Il-Hwan;Hong, Deok-Gi;Kim, Jae-Keun;Kim, Young-Mo;Kim, Seok-Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.57-65
    • /
    • 2019
  • In this paper, we propose a Rights Management Information(RMI) expression systems for individual sites are integrated and the performance evaluation is performed to find out an efficient comparing and updating method of RMI through various image feature point search techniques. In addition, we proposed a weighted scoring model for both public domain sites and posts in order to use the most latest RMI based on reliable data. To solve problem that most public domain sites are exposed to copyright infringement by providing inconsistent RMI(Rights Management Information) expression system and non-up-to-date RMI information. The weighted scoring model proposed in this paper makes it possible to use the latest RMI for duplicated images that have been verified through the performance evaluation experiments of SIFT and CNN techniques and to improve the accuracy when applied to search engines. In addition, there is an advantage in providing users with accurate original public domain images and their RMI from the search engine even when some modified public domain images are searched by users.

A novel mutation in GJC2 associated with hypomyelinating leukodystrophy type 2 disorder

  • Komachali, Sajad Rafiee;Sheikholeslami, Mozhgan;Salehi, Mansoor
    • Genomics & Informatics
    • /
    • v.20 no.2
    • /
    • pp.24.1-24.8
    • /
    • 2022
  • Hypomyelinating leukodystrophy type 2 (HLD2), is an inherited genetic disease of the central nervous system caused by recessive mutations in the gap junction protein gamma 2 (GJC2/GJA12). HLD2 is characterized by nystagmus, developmental delay, motor impairments, ataxia, severe speech problem, and hypomyelination in the brain. The GJC2 sequence encodes connexin 47 protein (Cx47). Connexins are a group of membrane proteins that oligomerize to construct gap junctions protein. In the present study, a novel missense mutation gene c.760G>A (p.Val254Met) was identified in a patient with HLD2 by performing whole exome sequencing. Following the discovery of the new mutation in the proband, we used Sanger sequencing to analyze his affected sibling and parents. Sanger sequencing verified homozygosity of the mutation in the proband and his affected sibling. The autosomal recessive inheritance pattern was confirmed since Sanger sequencing revealed both healthy parents were heterozygous for the mutation. PolyPhen2, SIFT, PROVEAN, and CADD were used to evaluate the function prediction scores of detected mutations. Cx47 is essential for oligodendrocyte function, including adequate myelination and myelin maintenance in humans. Novel mutation p.Val254Met is located in the second extracellular domain of Cx47, both extracellular loops are highly conserved and probably induce intramolecular disulfide interactions. This novel mutation in the Cx47 gene causes oligodendrocyte dysfunction and HLD2 disorder.

Framework Implementation of Image-Based Indoor Localization System Using Parallel Distributed Computing (병렬 분산 처리를 이용한 영상 기반 실내 위치인식 시스템의 프레임워크 구현)

  • Kwon, Beom;Jeon, Donghyun;Kim, Jongyoo;Kim, Junghwan;Kim, Doyoung;Song, Hyewon;Lee, Sanghoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1490-1501
    • /
    • 2016
  • In this paper, we propose an image-based indoor localization system using parallel distributed computing. In order to reduce computation time for indoor localization, an scale invariant feature transform (SIFT) algorithm is performed in parallel by using Apache Spark. Toward this goal, we propose a novel image processing interface of Apache Spark. The experimental results show that the speed of the proposed system is about 3.6 times better than that of the conventional system.

A Study on the Policy Convergence of Forest Policy : A Paradigm Sift to Convergence between Forest Development and Preservation (산림정책융합에 관한 연구 : 산림이용·개발 및 보전의 융합패러다임으로의 변화)

  • Chang, Je-Won;Park, Yong-Sung
    • Journal of Digital Convergence
    • /
    • v.13 no.6
    • /
    • pp.13-28
    • /
    • 2015
  • In accordance with importance of the economic value of forests and forest use, the paradigm of development and use has emerged as the dominant paradigm of forest policy. As forests are recognized as an important means of Wellness, the government pursues a policy convergence between forest use and conservation. So, this article analyzed whether the change of forestry convergence paradigm is reflected in policy or not. The purpose of this study was to analyze through content analysis and network analysis, whether the new combined text value are fused in how forest policy. According to the results, the function of utilization which is off the traditional forestry industry and recreation, wellness are acquired a greater importance in the 5th plan than 4th plan. But the 5th plan is insufficient to establish of foundation for forestry management and welfare functions. The evidence suggest a sign of sustained paradigm convergency in forest policy of Korea. As the policy implication in establishing national forest master plan, it is necessary to strengthen policy capability to pursue sustainable forestry utilization, which can converge forest use and conservation.