PDF Links PDF Links PubReader PubReaderePub Link ePub Link

Park: Advanced Technologies and Applications for Security and Multimedia Computing

1. Introduction

The Journal of Information Processing Systems (JIPS), which is the official international journal of the Korea Information Processing Society, aims to enable researchers and professionals to promote, share, and discuss all major research issues and developments in the field of information processing technologies and other related fields.
JIPS publishes diverse papers, including theoretical research contributions presenting new techniques, concepts, or analyses; experience reports; experiments involving the implementation and application of new theories; and tutorials on state-of-the-art technologies related to information processing systems. The subjects covered by this journal include, but are not limited to, topics related to computer systems and theories, multimedia systems and graphics, communication systems and security, and software systems and applications.
This issue includes an invited paper by Professor Arabnia and his colleagues and 13 peer-reviewed papers. This issue contains diverse papers in the area of advanced technologies and applications for security and multimedia computing, which includes theoretical research presenting new techniques, concepts, or analyses. It also includes experience reports, experiments that involve the implementation and application of new theories, and tutorials on state-of-the-art technologies related to information processing systems.

2. Related Works

Khatamian et al. [1] have introduced a survey on 3D surface reconstruction from 3D point clouds to explain concepts for surface reconstruction and they described the various factors used to evaluate surface reconstruction methods [2]. This surface reconstruction concept is a tradeoff between data resolution or accuracy and processing speed in order to deal with the issue of the raw 3D point cloud data. The authors introduced and explained these research areas by providing an overview of the state-of-the-art methods on surface reconstruction.
Bousmaha et al. [3] proposed the idea for a hybrid approach for the Morpho-lexical disambiguation of Arabic to reduce the ambiguity rate. This disambiguation approach, which is based on the diacritics at the various analysis levels, was used to combine a linguistic approach with a multi-criteria decision, and the authors used both the Nelkel and Shieber [4] and Azmi and Almajed [5] algorithms to get the optimal number of diacritical marks.
The third paper is also about the novel methodology of the two-dimensional joint Bayesian method for face verification by Han et al. [6]. This research shows an improved Joint Bayesian method to separate two symmetric terms from three terms of the JB log likelihood ratio function, and it shows the outperformance more than one percent in the LFW database [7].
Boussaad et al. [8] proposed another face recognition method for determining variations in age based on DCT feature extraction and kernel fisher analysis by combining the three most popular tools that are normally used in pattern recognition. Their combination of methods provided a high identification rate and low EER for verification, thus the combination of AAM and DCT was significant for for allowing various programs to recognize a person’s face regardless of age [9].
Another paper related to the pattern recognition was introduced by Chao and Song [10]. The paper entitled “Landmark-Guided Segmental Speech Decoding for Continuous Mandarin Speech Recognition” proposed a framework to integrate phonetic landmarks into segment-based Mandarin speech recognition [11]. The results showed that approximately 30% of decoding time can be saved without making any computations on recognition accuracy.
Choi et al. [12] proposed an interesting idea in their paper “ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks.” The main idea was inspired by the dangers that are increasingly being exposed due to the various types of internet attacks. Of course, there are some existing methods to detect those kinds of problems. However, the authors proposed a detection method for emulation-based malicious webpages that outperforms other existing methods.
Chantrapornchai and Nusawat [13] introduced machine-learning studies on the prediction of the discharge rate of mobile phones. Their framework to create a battery usage model utilized seven factors, such as CPU, brightness, wireless usage, etc. They performed their test by using various kernel functions to compare the multi-layer perceptron and support vector machine, and various parameters were also used [14]. Based on the different tests that they ran in the different environments, they were able to find the optimal solution to predict the remaining battery charge.
Seo et al. [15] proposed a constituent-based approach for aligning bilingual multiword expressions. Their research takes into account the compositional preferences of multiword expressions. The results showed that the constituent-based approach outperformed the general method for expression extraction in a bilingual multiword [16]. However, improvements are still needed for overcoming accuracy by extending target entries in the evaluation dictionaries.
Ammar et al. [17] introduced another study on the dimensional reduction of 3D face verification. They proposed a novel framework to verify a 3D face by dimensional reduction based on the distinctive local features [18]. The most efficient local descriptors of LBP, LPQ, BSIF, TPLBP, and FPLBP were performed to deliver the most discriminative power.
Lee et al. [19] conducted an interesting research on detecting malware and intrusions based on human behavior analysis. As smart devices are used in many places, the people who use these devices can be exposed to security threats; thus this research was performed to analyze human behaviors in order to detect malware. HB-DIPM, in which the service model detects malware, was proposed to create the novel model. By using this research model, authorized users were able to use services in the environment of secure protocol authentication.
Hou [20] introduced an effective algorithm for the detection of video copy. This research was performed with the use of the OM features and SURF descriptor. Those two algorithms were used to improve the video detection performance with the multi-features. The proposed method was proven to be robust against video copy detection precision, and recall was greatly improved as compared to other existing algorithms.
For network virtualization, VLAN has been used for a long time in places such as campuses and enterprise networks. However, concerns about it have emerged in many places because the use of VLAN is complicated [21], time-consuming, error prone, etc. Thus, software defined networking was introduced as another solution for it. Nguyen and Kim [22] introduced a research case of VLAN management for SDB-based enterprises and campus networks. Their solution provides an interactive graphic user interface for the visualization of VLAN networks.
To deliver the secured data in the network communication, data hiding is used as the basic concept. Ali Al-Hooti et al. [23] used audio files to hide data in the file based on sample value modification using the modulus function. The SVM was used to embed a secret bit within each sample. The quality of the stego audio was almost same as the original output, but it creates secret codes. Thus, this novel method was successfully achieved in terms of capacity, quality, and security.
Finally, Zhu and Lee [24] proposed another security protection framework for cloud computing. The most dominant programming in cloud computing is the MapReduce framework, but it can have security issues in regards to the integrity of the MapReduce data that can generate improper results that attack cloud computing [25]. This can be created by a person who wants to add malicious works. This research was performed to protect the secured framework by detecting malicious workers.

3. Conclusions

In this issue, we present 14 important papers from around the world. We introduce research on pattern recognition, such as face detection, to the security problems in the various technical environments. However, first we want to express our gratitude to all of the authors who have contributed to this issue by sharing their valuable research results with us. And we also want to sincerely thank all of the reviewers who kindly accepted our review invitations. Without their hard work, putting together this high-quality journal would not have been possible.

Biography

James J. (Jong Hyuk) Park
jips-12-3-333i1.gif
He received Ph.D. degrees in Graduate School of Information Security from Korea University, Korea and Graduate School of Human Sciences from Waseda University, Japan. From December, 2002 to July, 2007, Dr. Park had been a research scientist of R&D Institute, Hanwha S&C Co., Ltd., Korea. From September, 2007 to August, 2009, He had been a professor at the Department of Computer Science and Engineering, Kyungnam University, Korea. He is now a professor at the Department of Computer Science and Engineering and Department of Interdisciplinary Bio IT Materials, Seoul National University of Science and Technology (SeoulTech), Korea. Dr. Park has published about 200 research papers in international journals and conferences. He has been serving as chair, program committee, or organizing committee chair for many international conferences and workshops. He is a steering chair of international conferences – MUE, FutureTech, CSA, CUTE, UCAWSN, World IT Congress-Jeju. He is editor-in-chief of Human-centric Computing and Information Sciences (HCIS) by Springer, The Journal of Information Processing Systems (JIPS) by KIPS, and Journal of Convergence (JoC) by KIPS CSWRG. He is Associate Editor/Editor of 14 international journals including JoS, JNCA, SCN, CJ, and so on. In addition, he has been serving as a Guest Editor for international journals by some publishers: Springer, Elsevier, John Wiley, Oxford Univ. press, Emerald, Inderscience, MDPI. He got the best paper awards from ISA-08, ITCS-11, IEEE AINA-15 conferences and the outstanding leadership awards from IEEE HPCC-09, ICA3PP-10, IEE ISPA-11, PDCAT-11, and CUTE-15. Furthermore, he got the outstanding research awards from the SeoulTech, 2014. His research interests include IoT, Human-centric Ubiquitous Computing, Information Security, Digital Forensics, Vehicular Cloud Computing, Multimedia Computing, etc. He is a member of the IEEE, IEEE Computer Society, KIPS, and KMMS.

References

1. A. Khatamian, R. Jafri, and HR. Arabnia, "Survey on 3D surface reconstruction," Journal of Information Processing Systems, vol. 12, no. 3, pp. 338-357, 2016.

2. B. Mederos, N. Amenta, L. Velho, and LH. de Figueiredo, "Surface reconstruction for noisy point clouds," in Proceedings of 3rd Eurographics Symposium on Geometry Processing, Vienna, Austria, 2005, pp. 53-62.

3. KZ. Bousmaha, MK. Rahmouni, B. Kouninef, and LH. Belguith, "A hybrid approach of morpho-lexical disambiguation of Arabic," Journal of Information Processing Systems, vol. 12, no. 3, pp. 358-380, 2016.

4. R. Nelken, and SM. Shieber, "Arabic diacritization using weighted finite-state transducers," in Proceedings of the ACL Workshop on Computational Approaches to Semitic Languages, Ann Arbor, MI, 2005, pp. 79-86.
crossref
5. AM. Azmi, and RS. Almajed, "A survey of automatic Arabic diacritization techniques," Natural Language Engineering, vol. 21, no. 3, pp. 477-495, 2015.
crossref
6. S. Han, IY. Lee, and JH. Ahn, "Two-dimensional joint Bayesian method for face verification," Journal of Information Processing Systems, vol. 12, no. 3, pp. 381-391, 2016.

7. GB. Huang, M. Ramesh, T. Berg, and E. Learned-Miller, in Labeled faces in the wild: a database for studying face recognition in unconstrained environments, University of Massachusetts, Amherst: Technical Report 07-49, 2007.

8. L. Boussaad, M. Benmohammed, and R. Benzid, "Age invariant face recognition based on DCT feature extraction and kernel Fisher analysis," Journal of Information Processing Systems, vol. 12, no. 3, pp. 392-409, 2016.

9. TF. Cootes, GJ. Edwards, and CJ. Taylor, "Active appearance models," IEEE Transactions on pattern Analysis and Machine Intelligence, vol. 23, no. 6, pp. 681-685, 2001.
crossref
10. H. Chao, and C. Song, "Landmark-guided segmental speech decoding for continuous mandarin speech recognition," Journal of Information Processing Systems, vol. 12, no. 3, pp. 410-421, 2016.

11. SA. Liu, "Landmark detection for distinctive feature-based speech recognition," Journal of the Acoustical Society of America, vol. 100, no. 5, pp. 3417-3430, 1996.
crossref
12. SY. Choi, D. Kim, and YM. Kim, "ELPA: emulation-based linked page map analysis for the detection of drive-by download attacks," Journal of Information Processing Systems, vol. 12, no. 3, pp. 422-435, 2016.

13. C. Chantrapornchai, and P. Nusawat, "Two machine learning models for mobile phone battery discharge rate prediction based on usage patterns," Journal of Information Processing Systems, vol. 12, no. 3, pp. 436-454, 2016.

14. N. Vallina-Rodriguez, and J. Crowcroft, "Energy management techniques in modern mobile handsets," IEEE Communications Surveys & Tutorials, vol. 15, no. 1, pp. 179-198, 2013.
crossref
15. HW. Seo, H. Kwon, MA. Cheon, and JH. Kim, "Bilingual multiword expression alignment by constituent-based similarity score," Journal of Information Processing Systems, vol. 12, no. 3, pp. 455-467, 2016.

16. F. Smadja, K. McKeown, and V. Hatzivassiloglou, "Translating collocations for bilingual lexicons: a statistical approach," Computational Linguistics, vol. 22, no. 1, pp. 1-38, 1996.

17. C. Ammar, B. Mebarka, O. Abdelmalik, and B. Salah, "Evaluation of Histograms Local Features and Dimensionality Reduction for 3D Face Verification," Journal of Information Processing Systems, vol. 12, no. 3, pp. 468-488, 2016.

18. Y. Ming, "Rigid-area orthogonal spectral regression for efficient 3D face recognition," Neurocomputing, vol. 129, pp. 445-457, 2014.
crossref
19. JK. Lee, SY. Moon, and JH. Park, "HB-DIPM: human behavior analysis-based malware detection and intrusion prevention model in the future internet," Journal of Information Processing Systems, vol. 12, no. 3, pp. 489-501, 2016.

20. Y. Hou, X. Wang, and S. Liu, "A multiple features video copy detection algorithm based on a SURF descriptor," Journal of Information Processing Systems, vol. 12, no. 3, pp. 502-510, 2016.

21. M. Yu, J. Rexford, X. Sun, S. Rao, and N. Feamster, "A survey of virtual LAN usage in campus networks," IEEE Communications Magazine, vol. 49, no. 7, pp. 98-103, 2011.
crossref
22. VG. Nguyen, and YH. Kim, "SDN-based enterprise and campus networks: a case of VLAN management," Journal of Information Processing Systems, vol. 12, no. 3, pp. 511-524, 2016.

23. MHA. Al-Hooti, S. Djanali, and T. Ahmad, "Audio data hiding based on sample value modification using modulus function," Journal of Information Processing Systems, vol. 12, no. 3, pp. 525-537, 2016.

24. W. Zhu, and C. Lee, "A security protection framework for cloud computing," Journal of Information Processing Systems, vol. 12, no. 3, pp. 538-547, 2016.

25. SN. Srirama, P. Jakovits, and E. Vainikko, "Adapting scientific computing problems to clouds using MapReduce," Future Generation Computer Systems, vol. 28, no. 1, pp. 184-192, 2012.
crossref