Journal of
Systemics, Cybernetics and Informatics
HOME  |   CURRENT ISSUE   |   PAST ISSUES   |   RELATED PUBLICATIONS     IIIS   |   SEARCH     CONTACT US
 


ISSN: 1690-4524 (Online)


Indexed by
EBSCO, Cabell, DOAJ (Directory of Open Access Journals), Academic Journals Database, and Google Scholar


Listed in
Cabell Directory of Publishing Opportunities and in Ulrich’s Periodical Directory


Re-Published in
Academia.edu
(A Community of about 10.000.000 Academics)


Editorial Advisory Board's Chair
William Lesso

Editor-in-Chief
Nagib C. Callaos


Sponsored by
The International Institute of
Informatics and Systemics

www.iiis.org

 

Editorial Advisory Board

Journal's Reviewers
 

Description and Aims

Submission of Articles

Areas and Subareas

Information to Contributors

Editorial Peer Review Methodology


Information Management Processes for Extraction of Student Dropout Indicators in Courses in Distance Mode
Renata Maria Abrantes Baracho, Paloma de Albuqyerque Diesel
(pages: 1-6)

Tools for Teaching Mathematical Functions and Geometric Figures to Tactile Visualization through a Braille Printer for Visual Impairment People
Lorena León, Luiz Cesar Martini, Cristhian Moreno-Chaparro
(pages: 7-10)

A Project-Based Language Learning Model for Improving the Willingness to Communicate of EFL Students
Ibrahim Farouck
(pages: 11-18)

Educating Future Coders with a Holistic ICT Curriculum and New Learning Solutions
Pia Niemelä, Cristiano Di Flora, Martti Helevirta, Ville Isomöttönen
(pages: 19-23)

Challenges with Ethical Behavior and Accountability in Leadership
Laura Thompson
(pages: 24-29)

Biotreatment of Slaughterhouse Wastewater Accompanied with Sustainable Electricity Generation in Microbial Fuel Cell
Zainab Z. Ismail, Ali J. Mohammed
(pages: 30-35)

Towards to a Predictive Model of Academic Performance Using Data Mining in the UTN - FRRe
David L. La Red Martínez, Marcelo Karanik, Mirtha Giovannini, Reinaldo Scappini
(pages: 36-41)

SIGMATA: Storage Integrity Guaranteeing Mechanism against Tampering Attempts for Video Event Data Recorders
Hyuckmin Kwon, Seulbae Kim, Heejo Lee
(pages: 42-47)

Hypertextuality in the Alexander von Humboldt Digital Library
Detlev Doherr, Andreas Jankowski
(pages: 48-53)

The Time Diagram Control Approach for the Dynamic Representation of Time-Oriented Data
Rolf Dornberger, Darjan Hil, Johann Wittwer, Pascal Bürgy
(pages: 54-60)

Q-Learning Multi-Objective Sequential Optimal Sensor Parameter Weights
Raquel Cohen, Mark Rahmes, Kevin Fox, George Lemieux
(pages: 61-66)

Multi-User Virtual Reality Therapy for Post-Stroke Hand Rehabilitation at Home
Daria Tsoupikova, Kristen Triandafilou, Greg Rupp, Fabian Preuss, Derek Kamper
(pages: 67-71)

Adding agility to Enterprise Process and Data Engineering
Sergey Zykov, Pavel Shapkin, Nikolay Kazantsev, Vladimir Roslovtsev
(pages: 72-77)

Automatic Parallelization Tool: Classification of Program Code for Parallel Computing
Mustafa Basthikodi, Waseem Ahmed
(pages: 78-82)

Securing Information Systems in an Uncertain World Enterprise Level Security (Invited Paper)
William R. Simpson
(pages: 83-90)


 

Abstracts

 


ABSTRACT


A Visual Cryptography Based Watermark Technology for Individual and Group Images

Azzam Sleit, Adel Abusitta


The ease by which digital information can be duplicated and distributed has led to the need for effective copyright protection tools. Various techniques including watermarking have been introduced in attempt to address these growing concerns. Most watermarking algorithms call for a piece of information to be hidden directly in media content, in such a way that it is imperceptible to a human observer, but detectable by a computer. This paper presents an improved cryptographic watermark method based on Hwang and Naor-Shamir [1, 2] approaches. The technique does not require that the watermark pattern to be embedded in to the original digital image. Verification information is generated and used to validate the ownership of the image or a group of images. The watermark pattern can be any bitmap image. Experimental results show that the proposed method can recover the watermark pattern from the marked image (or group of images) even if major changes are reflected on the original digital image or any member of the image group such as rotation, scaling and distortion.

Full Text