2009 Second International Conference on Computer…
2009
Botnet is most widespread and occurs commonly in today's cyber attacks, resulting in serious threats to our network assets and organization's properties. Botnets are collections of compromised… (More)
One of the most important topics in information security today is user authentication. There is a good security when using the text-based strong password schemes but often memorizing the password is… (More)
With the increased popularity of touchscreen mobile phones, touch gesture behavior is becoming more and more important. Increasing demand for safer access in touch screen mobile phones, ancient… (More)
Steganography has proven to be one of the practical ways of securing data. It is a new kind of secret communication used mainly to hide secret data inside other innocent digital mediums. Most of… (More)
1 Department of Computer Engineering, Faculty of Engineering and Natural Science, Istanbul Sabahattin Zaim University, Kucukcekmece, 34303 Istanbul, Turkey 2Department of Computer Engineering,… (More)
A digital watermark embeds an imperceptible signal into data such as audio, video and images, for different purposes including authentication and tamper detection. A real-time video surveillance… (More)
225 Abstract—In this paper, a general approach is developed to estimate the ripeness level without touching the fruit. The two techniques has been used for this purpose are color image segmentation… (More)
Several similarity measures such as Euclidean Distance, Histogram Intersection, Cosine or Quadratic Distances are usually used to calculate the images similarity rating. However, each of the… (More)
Knowledge Based authentication is still the most widely used and accepted technique for securing resources from unauthorized access for its simplicity, ease of revocation and legacy deployment which… (More)
Different evaluator entities, either human agents (e.g., experts) or software agents (e.g., monitoring services), are involved in the assessment of QoS parameters of candidate services, which leads… (More)