UPSI Digital Repository (UDRep)
|
|
|
Abstract : Universiti Pendidikan Sultan Idris |
Pixel value access control (PVAC) was introduced to deliver a secure and simple graphical password method where it requires users to load their image as their password. PVAC extracts the image to obtain a three-octet 8-bits Red-Green-Blue (RGB) value as its password to authenticate a user. The pixel value must be matched with the record stored in the database or otherwise, the user is failed to authenticate. However, users which prefer to store images on cloud storage would unintentionally alter and as well as the pixel value due to media compression and caused faulty pixels. Thus, the K-Means clustering algorithm is adapted to fix the issue where the faulty pixel value would be recognized as having the same pixel value cluster as the original. However, most of K-Means algorithm works were mainly developed for content-based image retrieval (CBIR) which having opposite characteristics from PVAC. Thus, this study was aimed to investigate the crucial criteria of PVAC and its compatibility with the K-Means algorithm for the problem. The theoretical analysis is used for this study where the suitable characteristics of K-Means are analyze based on PVAC requirements. The compliance analysis might become a referencing work for digital image clustering techniques adaptation on security system such as image filtering, image recognition, and object detection since most of image clustering works was focused on less sensitive image retrieval. ? 2021 J.J. Strossmayer University of Osijek , Faculty of Electrical Engineering, Computer Science and Information Technology. All rights reserved. |
References |
Azam, M., & Bouguila, N. (2019). Bounded laplace mixture model with applications to image clustering and content based image retrieval. Paper presented at the Proceedings - 17th IEEE International Conference on Machine Learning and Applications, ICMLA 2018, 558-563. doi:10.1109/ICMLA.2018.00090 Retrieved from www.scopus.com Irfan, S., Dwivedi, G., & Ghosh, S. (2018). Optimization of K-means clustering using genetic algorithm. Paper presented at the 2017 International Conference on Computing and Communication Technologies for Smart Nation, IC3TSN 2017, , 2017-October 156-161. doi:10.1109/IC3TSN.2017.8284468 Retrieved from www.scopus.com Kamper, H., Anastassiou, A., & Livescu, K. (2019). Semantic query-by-example speech search using visual grounding. Paper presented at the ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, , 2019-May 7120-7124. doi:10.1109/ICASSP.2019.8683275 Retrieved from www.scopus.com Kumari, R., Sheetanshu, Singh, M. K., Jha, R., & Singh, N. K. (2016). Anomaly detection in network traffic using K-mean clustering. Paper presented at the 2016 3rd International Conference on Recent Advances in Information Technology, RAIT 2016, 387-393. doi:10.1109/RAIT.2016.7507933 Retrieved from www.scopus.com Li, C., Bai, J., Yi, C., & Luo, Y. (2019). Resource and replica management strategy for optimizing financial cost and user experience in edge cloud computing system. Inform.Sci., Retrieved from www.scopus.com MacQueen, J. (1967). Some methods for classification and analysis of multivariate observations. Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, 1, 281-297. Retrieved from www.scopus.com Nayini, S. E. Y., Geravand, S., & Maroosi, A. (2018). A novel threshold-based clustering method to solve K-means weaknesses. Paper presented at the 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing, ICECDS 2017, 47-52. doi:10.1109/ICECDS.2017.8389496 Retrieved from www.scopus.com Sammut, C., & Webb, G. I. (2017). Online controlled experiments and a/b testing. Encyclopedia of Machine Learning and Data Mining, , 922-929. Retrieved from www.scopus.com Shukran, M. A. M., Ahmad, N. S. M., Ramli, S., & Rahmat, F. (2019). Melanoma cancer diagnosis device using image processing techniques. International Journal of Recent Technology and Engineering, 7(5), 490-494. Retrieved from www.scopus.com Shukran, M. A. M., & Yunus, M. S. F. M. (2018). Method and System for Authenticating User using Graphical Password for Access Control, Retrieved from www.scopus.com Shukran, M. A. M., & Yunus, M. S. F. M. (2018). Pixel value graphical password scheme: Fake passpix attempt on hexadecimal password style. International Journal of Information and Communication Sciences, 3(3), 104. Retrieved from www.scopus.com Shukran, M. A. M., Yunus, M. S. F. M., Abdullah, M. N., Ismail, M. N., & Isa, M. R. M. (2019). Pixel value graphical password: A passpix clustering technique for password fault tolerance. International Journal of Recent Technology and Engineering, 8(3), 2973-2976. doi:10.35940/ijrte.C4817.098319 Slamet, C., Rahman, A., Ramdhani, M. A., & Dharmalaksana, W. (2016). Clustering the verses of the holy qur'an using K-means algorithm. Asian Journal of Information Technology, 15(24), 5159-5162. Retrieved from www.scopus.com Widjaja, A. E., Chen, J. V., Sukoco, B. M., & Ha, Q. -. (2019). Understanding users’ willingness to put their personal information on the personal cloud-based storage applications: An empirical study. Computers in Human Behavior, 91, 167-185. doi:10.1016/j.chb.2018.09.034 Wu, K., Vassileva, J., & Zhao, Y. (2017). Understanding users' intention to switch personal cloud storage services: Evidence from the chinese market. Computers in Human Behavior, 68, 300-314. doi:10.1016/j.chb.2016.11.039 Yunus, M. S. F. M. (2020). A Novel Graphical Password Clustering Method for Fault Tolerance Mechanism, Retrieved from www.scopus.com Yunus, M. S. F. M., Shukran, M. A. M., & Abdullah, M. N. (2019). Pixel-Based Graphical Password Scheme: Password from Digital Image File, Retrieved from www.scopus.com Zloof, M. M. (1975). QUERY BY EXAMPLE. AFIPS Natl Comput Conf Expo Conf Proc, 44, 431-438. Retrieved from www.scopus.com |
This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials. You may use the digitized material for private study, scholarship, or research. |