Journal of
Systemics, Cybernetics and Informatics
HOME  |   CURRENT ISSUE   |   PAST ISSUES   |   RELATED PUBLICATIONS     IIIS   |   SEARCH     CONTACT US
 


ISSN: 1690-4524 (Online)


Indexed by
EBSCO, Cabell, DOAJ (Directory of Open Access Journals), ), Academic Journals Database, and Google Scholar


Listed in
Cabell Directory of Publishing Opportunities and in Ulrich’s Periodical Directory


Re-Published in
Academia.edu
(A Community of about 10.000.000 Academics)


Editorial Advisory Board's Chair
William Lesso

Editor-in-Chief
Nagib C. Callaos


Sponsored by
The International Institute of
Informatics and Systemics

www.iiis.org

 

Editorial Advisory Board

Journal's Reviewers
 

Description and Aims

Submission of Articles

Areas and Subareas

Information to Contributors

Editorial Peer Review Methodology


The Impact of Virtual Reality Environments on Body Movement and Concentration Skills. A Successful Attempt at Teaching Novice Computer Users
Esther Zaretsky
(pages: 1-7)

A Language Exchange Program: Sustainability Innovation in Language and Culture Engagement
Trinidad Fernández, Grisel García-Pérez, Joaquin Santiago
(pages: 8-12)

Secondary Schools Students’ Language Literacy Skills Aided by the Use of Computer Tools
Odette Bourjaili Radi
(pages: 13-20)

Using an Interdisciplinary Course to Teach Intercultural Communication: Helping Students and Faculty Bridge Disciplinary Divides
Madelyn Flammia, Houman Sadri
(pages: 21-26)

Trends in Information Security for Mexican Companies, is the Cloud Computing the Answer?
Sandra-Dinora Orantes-Jiménez, Graciela Vázquez-Álvarez, Alejandro Zavala-Galindo
(pages: 27-33)

Visibility of Open Acces Repositories of Digital University Libraries: A Case Study of the EU Visegrád Group
Erzsebet Dani
(pages: 34-40)

Conflict Resolution and Concensus Development among Inherently Contradictory Agents Using Fuzzy Linguistic Variables
Terrence P. Fries
(pages: 41-48)

A Comparison of Functional and Imperative Programming Techniques for Mathematical Software Development
Scott Frame, John W. Coffey
(pages: 49-53)

Personalized System of Instruction and Mobile-Learning Models 2014 and Beyond
Laura Thompson, Richard Johnson
(pages: 54-62)

The Co-Existence of Presenteeism and Commitment Organizational: An Institute of Technical and Technological Education Perspective (Short Report)
Marcus Vinicius Dantas de Assunção, Renata Lissa Soares da Silva, Miler Franco Danjour, Patrícia Whebber S. de Oliveira
(pages: 63-66)

Functional Magnetic Resonance Imaging of Goal-Directed Reaching in Children with Autism Spectrum Disorders: A Feasibility Study
Nicole M. G. Salowitz, Bridget Dolan, Rheanna Remmel, Amy Vaughan Van Hecke, Kristine Mosier, Lucia Simo, Robert A. Scheidt
(pages: 67-73)

Authentication and Data Security in ITS Telecommunications Solutions
Tomas Zelinka, Michal Jerabek, Zdenek Lokaj
(pages: 74-80)

Measurement of Pressure between Upper Airway Tract and Laryngoscope Blade during Orotracheal Intubation with Film of Microcapsules
Shigehiro Hashimoto, Tianyuan Wang
(pages: 81-85)

Development of a Web Application: Recording Learners’ Mouse Trajectories and Retrieving their Study Logs to Identify the Occurrence of Hesitation in Solving Word-Reordering Problems
Mitsumasa Zushi, Yoshinori Miyazaki, Ryosuke Miki, Ken Norizuki
(pages: 86-91)


 

Abstracts

 


ABSTRACT


A Visual Cryptography Based Watermark Technology for Individual and Group Images

Azzam Sleit, Adel Abusitta


The ease by which digital information can be duplicated and distributed has led to the need for effective copyright protection tools. Various techniques including watermarking have been introduced in attempt to address these growing concerns. Most watermarking algorithms call for a piece of information to be hidden directly in media content, in such a way that it is imperceptible to a human observer, but detectable by a computer. This paper presents an improved cryptographic watermark method based on Hwang and Naor-Shamir [1, 2] approaches. The technique does not require that the watermark pattern to be embedded in to the original digital image. Verification information is generated and used to validate the ownership of the image or a group of images. The watermark pattern can be any bitmap image. Experimental results show that the proposed method can recover the watermark pattern from the marked image (or group of images) even if major changes are reflected on the original digital image or any member of the image group such as rotation, scaling and distortion.

Full Text