Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Computer Engineering
Matthew Gaber: Peekaboo, Matthew Gaber, Mohiuddin Ahmed, Helge Janicke
Matthew Gaber: Peekaboo, Matthew Gaber, Mohiuddin Ahmed, Helge Janicke
Research Datasets
Cyber-attacks continue to evolve, increasing in frequency and sophistication where Artificial Intelligence (AI) is becoming essential in detecting modern malware. However, the accuracy of AI in malware detection is dependent on the quality of the features it is trained with. Static and dynamic analysis of malware is limited by the widespread use of obfuscation and anti-analysis techniques employed by malware authors, where if an analysis environment is detected the malware will hide its malicious behavior. However, Dynamic Binary Instrumentation (DBI) allows deep and precise control of the malware sample, thereby facilitating the extraction of authentic features from sophisticated and evasive …
An Entropy-Histogram Approach For Image Similarity And Face Recognition, Mohammed Aljanabi, Zahir Hussain, Song F. Lu
An Entropy-Histogram Approach For Image Similarity And Face Recognition, Mohammed Aljanabi, Zahir Hussain, Song F. Lu
Research outputs 2014 to 2021
Image similarity and image recognition are modern and rapidly growing technologies because of their wide use in the field of digital image processing. It is possible to recognize the face image of a specific person by finding the similarity between the images of the same person face and this is what we will address in detail in this paper. In this paper, we designed two new measures for image similarity and image recognition simultaneously. The proposed measures are based mainly on a combination of information theory and joint histogram. Information theory has a high capability to predict the relationship between …