Surviving geometric attacks in image authentication is considered to be of great importance. This is because of the vulnerability of classical watermarking and digital signature based schemes to geometric image manipulations, particularly local geometric attacks. In this paper, we present a general framework for image content authentication using salient feature points. We first develop an iterative feature detector based on an explicit modeling of the human visual system. Then, we compare features from two images by developing a generalized Hausdorff distance measure. The use of such a distance measure is crucial to the robustness of the scheme, and accounts for feature detector failure or occlusion, which previously proposed methods do not address. The proposed algorithm withstands standard benchmark (e.g. Stirmark) attacks including compression, common signal processing operations, global as well as local geometric transformations, and even hard to model distortions such as print and scan. Content changing (malicious) manipulations of image data are also accurately detected.
The reason at the back of data overloading dilemma faced by internet users on internet includes: excessive web information and billions of users around worldwide. Because of this, providing the internet users with more intended data is a challenging task in web applications. The lots
of information available on internet are a fertile field for applying data mining techniques. This is what we call Web Mining (WM). The research in WM deals with research from many fields like database, Artificial Intelligence (machine learning [supervised, semi supervised, unsupervised and
reinforcement], neural network and natural language processing (NLP)) and information retrieval. Here, research related to web mining and their categories is highlighted. We also situate comparison of most popular algorithms used from the field of data mining in pattern discovery phase of
the WM.
When internet is overwhelmed with infinite options then you need intelligent program like recommendation system to help you dug out and prioritize relevant facts. Everyone is confronted with information flood phenomena and the recommendation engine alleviate Information flood on internet. Personalizing information, to each individual is the solution of information flood, is performed by these intelligent systems through searching web. Texts here trace out diverse characteristics concerned with recommendation system and highlight possible recommendation-methodologies capacity in this arena
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.