Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Physical Sciences and Mathematics
Image Subset Communication For Resource-Constrained Applications In Wirelesssensor Networks, Sajid Nazir, Omar Alzubi, Mohammad Kaleem, Hassan Hamdoun
Image Subset Communication For Resource-Constrained Applications In Wirelesssensor Networks, Sajid Nazir, Omar Alzubi, Mohammad Kaleem, Hassan Hamdoun
Turkish Journal of Electrical Engineering and Computer Sciences
JPEG is the most widely used image compression standard for sensing, medical, and security applications. JPEG provides a high degree of compression but field devices relying on battery power must further economize on data transmissions to prolong deployment duration with particular use cases in wireless sensor networks. Transmitting a subset of image data could potentially enhance the battery life of power-constrained devices and also meet the application requirements to identify the objects within an image. Depending on an application's needs, after the first selected subset is received at the base station, further transmissions of the image data for successive refinements …
A Novel Grouping Proof Authentication Protocol For Lightweight Devices:Gpapxr+, Ömer Aydin, Gökhan Dalkiliç, Cem Kösemen
A Novel Grouping Proof Authentication Protocol For Lightweight Devices:Gpapxr+, Ömer Aydin, Gökhan Dalkiliç, Cem Kösemen
Turkish Journal of Electrical Engineering and Computer Sciences
Radio frequency identification (RFID) tags that meet EPC Gen2 standards are used in many fields such as supply chain operations. The number of the RFID tags, smart cards, wireless sensor nodes, and Internet of things devices is increasing day by day and the areas where they are used are expanding. These devices are very limited in terms of the resources they have. For this reason, many security mechanisms developed for existing computer systems cannot be used for these devices. In order to ensure secure communication, it is necessary to provide authentication process between these lightweight devices and the devices they …
Analysis Of Biometric Data Using Watermarking Techniques, Foday Jorh, Bariş Özyer, Claude Fachkha
Analysis Of Biometric Data Using Watermarking Techniques, Foday Jorh, Bariş Özyer, Claude Fachkha
Turkish Journal of Electrical Engineering and Computer Sciences
This paper evaluates and analyses the discrete wavelet transform (DWT) frequency bands for embedding and extracting of the biometric data using DWT single level and multilevel watermarking approach with and without the use of alpha blending approach. In addition, singular value decomposition (SVD) combined with DWT is used to embed and extract the watermark image. The performance of compression and decompression approaches has been analyzed to examine the robustness and to check whether the compression function does destroy the integrity of the watermarked image. We investigate the proposed approach to understand how robust the watermarked on different sub-band is against …