Article
Engineering, Electrical & Electronic
Mingji Yu, Heng Yao, Chuan Qin, Xinpeng Zhang
Summary: Reversible data hiding (RDH) has been studied for over two decades and can be divided into RDH and reversible data hiding in encrypted images (RDHEI) depending on the application scenario. Most studies have focused on gray-scale images, with relatively few conducted on color images and even fewer on palette images. Therefore, a new framework specifically for palette images is proposed, which includes a route selection algorithm followed by a color table reconstruction. Experimental results demonstrate the improvement brought by this route selection to existing RDH/RDHEI methods in palette images.
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY
(2023)
Article
Computer Science, Information Systems
Samrah Mehraj, Subreena Mushtaq, Shabir A. Parah, Kaiser J. Giri, Javaid A. Sheikh, Amir H. Gandomi, Mohammad Hijji, Khan Muhammad
Summary: This study proposes a spatial domain-based blind and robust watermarking scheme for the ownership verification of colored cultural heritage images. By embedding watermarks in the Y element of the YCbCr space, this scheme demonstrates improved robustness and lower computational complexity compared to frequency-domain-based techniques.
Article
Spectroscopy
V. Lazic, M. Romani, L. Pronti, M. Angelucci, M. Cestelli-Guidi, M. Mangano, R. Fantoni
Summary: Small fragments of oil paintings by Bellini and Brughi were analyzed using SEM-EDX, FTIR spectroscopy, and LIBS to determine the elemental and molecular composition of the surface layers. The study helped identify pigments, priming layers, and possible material provenance, as well as distinguish surface contaminations and retouches from the original pictorial materials.
SPECTROCHIMICA ACTA PART B-ATOMIC SPECTROSCOPY
(2023)
Article
Archaeology
Yoonjo Choi, Yun-Jung Yang, Hong-Gyoo Sohn
Summary: Recent developments in geospatial information technology have enabled researchers to utilize geospatial information for decision making in disaster situations. Preservation of cultural properties is crucial as they reflect local characteristics and knowledge, and a method using geospatial information to enhance cultural heritage resilience in disasters has been proposed in this paper. The proposed method has been shown to minimize damage to cultural assets and enhance their resilience in disasters.
JOURNAL OF CULTURAL HERITAGE
(2021)
Article
Chemistry, Analytical
Adriana Marra, Salvatore Gerbino, Alessandro Greco, Giovanni Fabbrocino
Summary: Protecting artistic and cultural heritage presents a major challenge due to unique characteristics and exposure to natural hazards. Utilizing a combination of traditional methods and novel digital technologies is key to assessing and safeguarding these assets effectively.
Article
Green & Sustainable Science & Technology
Karol Krol, Dariusz Zdonek
Summary: New communication channels and methods for retrieving information can provide precise data describing how cultural heritage is perceived, protected, promoted, and shared. This study aimed to identify the context and frequency of cultural heritage topics in Google search engine queries. The research revealed that Polish and English users were interested in similar phrases, suggesting that language might not impact the thought processes of internet users.
Review
Psychology, Multidisciplinary
Sandra Maria Correia Loureiro, Amr Al-Ansi, Hyungseo Bobby Ryu, Antonio Ariza-Montes, Heesup Han
Summary: This study reviews previous research on cultural heritage in tourism and identifies potential threats and issues, such as heritage destruction and protection. It also analyzes the distribution of articles in journals to gain insights into the business and tourism management field.
FRONTIERS IN PSYCHOLOGY
(2022)
Article
Chemistry, Multidisciplinary
Hongkyu Eoh, Youngdoo Jung, Chanho Park, Chang Eun Lee, Tae Hyun Park, Han Sol Kang, Seungbae Jeon, Du Yeol Ryu, June Huh, Cheolmin Park
Summary: This study presents a strategy for developing block copolymer photonic crystal inks with tunable structures by blending two lamellar-forming BCPs. The control of the blending ratio enables the modulation of the periodicity and structure of the photonic crystal thin film, resulting in full-visible-range structural color. The transparent PC inks are used to create full-color structural color paintings, allowing for low-power pattern encryption.
ADVANCED FUNCTIONAL MATERIALS
(2022)
Article
Computer Science, Information Systems
Ying Liu
Summary: This paper discusses the application of modern information technology in the protection of intangible cultural heritage, analyzes the problems and characteristics of digital protection of intangible cultural heritage, explores methods to establish a protection platform and management mechanism, and proposes the application prospect of computer digital technology in the protection of intangible cultural heritage.
MOBILE INFORMATION SYSTEMS
(2022)
Article
Environmental Studies
Ching-Ching Kuo, Ching-Hsiewn Ou, Wen-Yan Chiau, Chao-Shing Lee
Summary: The study examines Taiwan's legislative background and current practices regarding the preservation of underwater cultural heritage (UCH) and compares it with the 2001 Convention on the Protection of the Underwater Cultural Heritage. Taiwan, despite not being a contracting state, has enacted its own Underwater Cultural Heritage Preservation Act in 2015 and developed relevant sub-laws to establish a preservation system. However, implementation faces challenges due to lack of manpower, experience, and administrative complexities. The article discusses the UCHA provisions, recent UCH research in Taiwan, and challenges in delineating and managing UCH protection zones. Reference is made to the U.S. national system of marine protected areas.
Article
Environmental Sciences
Nicola Lercari, Denise Jaffke, Arianna Campiani, Anais Guillem, Scott McAvoy, Gerardo Jimenez Delgado, Alexandra Bevk Neeb
Summary: This study examines the feasibility of using modern technologies to protect cultural resources in California, and validates the effectiveness of the method through a specific case study.
Article
Chemistry, Multidisciplinary
Srushti Goud, Vincenzo Lombardo, Tsvi Kuflik, Alan Wecker
Summary: The paper focuses on integrating cultural heritage values into information content for meaningful communication. Through an eight-stage process, cultural heritage values were successfully included in the communication at the Hecht Museum, garnering appreciation from both visitors and experts.
APPLIED SCIENCES-BASEL
(2022)
Article
Computer Science, Software Engineering
Imanol Munoz-Pandiella, Carlos Andujar, Begonya Cayuela, Xavier Pueyo, Carles Bosch
Summary: Digital color restitution aims to restore the original colors of a painting through digital means. To address the limitations of existing image editing applications, we propose an automated workflow that only requires input of representative source and target colors from art historians. This approach allows for the restoration of colors in large collections of paintings or different regions of the same painting.
COMPUTERS & GRAPHICS-UK
(2023)
Article
Humanities, Multidisciplinary
Hengyi Li, Hiromu Ito
Summary: Research on digital cultural heritage focuses on the implementation of projection mapping technologies, projection viewing, and interactive programs at cultural heritage sites. The effectiveness and relevance of using projection mapping at these sites to enhance the visitor experience and promote cultural understanding have been widely discussed. However, previous evaluations have been limited by methodological shortcomings. This study proposes an original system for evaluating visitors' cultural experiences and provides guidelines for applying projection mapping that enhance cultural understanding. Data from a trial run of the system in a digital media campaign are presented as a reference for comparable cultural heritage and tourism sites.
Article
Green & Sustainable Science & Technology
Jaione Korro Banuelos, Alvaro Rodriguez Miranda, Jose Manuel Valle-Melon, Ainara Zornoza-Indart, Manuel Castellano-Roman, Roque Angulo-Fornos, Francisco Pinto-Puerto, Pilar Acosta Ibanez, Patricia Ferreira-Lopes
Summary: This paper discusses the importance of information management in heritage restoration and conservation and proposes a conceptual framework to explore this relationship. Through the analysis of several specific cases, it emphasizes that while the availability of information and tools is growing, further progress is needed in terms of interoperability, outreach, and reuse of different solutions.
Article
Computer Science, Information Systems
Vincent Itier, Olivier Strauss, Laurent Morel, William Puech
Summary: This paper proposes a method to detect and localize image tampering by analyzing the correlation of image noise across the RGB color channels. By detecting blocks spanning across two areas with different color noise correlations and introducing a learning phase using a Random Forest Classifier, the experimental results on the Columbia database show very good results compared to other state-of-the-art methods.
MULTIMEDIA TOOLS AND APPLICATIONS
(2021)
Review
Entomology
Paul Tresson, Philippe Tixier, William Puech, Dominique Carval
Summary: The banana weevil, a major pest of banana and plantain, poses challenges for biological control due to its behavior and resistance. Traditional methods have limitations, leading to a shift towards conservation biological control with a focus on ants. There is currently a lack of information on the role of vertebrates in regulating the banana weevil.
JOURNAL OF APPLIED ENTOMOLOGY
(2021)
Article
Computer Science, Information Systems
Pauline Puteaux, SimYing Ong, KokSheik Wong, William Puech
Summary: This article discusses the issues involved in handling encrypted multimedia data, with a focus on reversible data hiding in encrypted images. It summarizes the birth and evolution of these methods over the past 12 years and provides insights into future applications and research topics in the field.
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION
(2021)
Article
Biodiversity Conservation
Laura Mannocci, Sebastien Villon, Marc Chaumont, Nacim Guellati, Nicolas Mouquet, Corina Iovan, Laurent Vigliola, David Mouillot
Summary: The study proposes a method to use social media videos for training deep-learning models to detect rare megafauna species in the field, demonstrating that social media images can effectively train deep-learning models, and the addition of a small number of field images can significantly improve detection accuracy.
CONSERVATION BIOLOGY
(2022)
Article
Engineering, Electrical & Electronic
Pauline Puteaux, William Puech
Summary: This article introduces a new encryption mode called CFB-then-ECB, and proposes a new method for correcting noisy encrypted images, which can correct incorrect pixel blocks in encrypted images while preserving image structure without increasing data size.
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY
(2021)
Article
Computer Science, Information Systems
Bianca Jansen Van Rensburg, William Puech, Jean-Pierre Pedeboy
Summary: 3D objects are crucial in industry and often need to be compressed, especially for web uploads and real-time rendering. Google's Draco system is becoming the industry standard for compressing geometric mesh or point cloud structured 3D objects. This paper proposes a new method that integrates encryption into Draco compression by adding an AES encryption step. The proposed method is efficient and results in a reconstructed 3D object identical to standard Draco compression.
Article
Biodiversity Conservation
L. Desgarnier, D. Mouillot, L. Vigliola, M. Chaumont, L. Mannocci
Summary: This study utilized deep learning technology to automatically detect and map vulnerable eagle rays in aerial videos, offering a potential breakthrough for monitoring ray populations in coral reef ecosystems.
BIOLOGICAL CONSERVATION
(2022)
Article
Astronomy & Astrophysics
J. Machicao, A. Ben Abbes, L. Meneguzzi, P. L. P. Correa, A. Specht, R. David, G. Subsol, D. Vellenich, R. Devillers, S. Stall, N. Mouquet, M. Chaumont, L. Berti-Equille, D. Mouillot
Summary: The challenges of reproducibility and replicability in computer science experiments, particularly those involving deep learning techniques, have attracted attention in recent years. This article evaluates the reproducibility of three deep learning experiments analyzing visual indicators from satellite and street imagery, and proposes a checklist to improve reproducibility based on FAIR principles.
EARTH AND SPACE SCIENCE
(2022)
Letter
Dermatology
Hugo Bonnefille, Marwan Abbas, Pascal Roger, Francois Habib, Farzaneh Masset, Marc Chaumont, Gerard Subsol, Pierre E. Stoebner
JOURNAL OF THE EUROPEAN ACADEMY OF DERMATOLOGY AND VENEREOLOGY
(2023)
Article
Computer Science, Information Systems
Bianca Jansen Van Rensburg, Pauline Puteaux, William Puech, Jean-Pierre Pedeboy
Summary: In this article, a new method is proposed to obtain a watermarked 3D object from high-capacity data hiding in the encrypted domain. The method utilizes the homomorphic properties of the Paillier cryptosystem and allows embedding multiple secret messages in the encrypted domain, which can be extracted in the plain-text domain after decryption.
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS
(2023)
Article
Astronomy & Astrophysics
Anass Bairouk, Marc Chaumont, Dominique Fouchez, Jerome Paquet, Frederic Comby, Julian Bautista
Summary: The treatment of astronomical image time series has gained attention due to the increase in surveys and the availability of large amounts of data. This study proposes a deep learning approach called ConvEntion for classifying space objects directly using images. The results show an increase in classification accuracy compared to state-of-the-art approaches.
ASTRONOMY & ASTROPHYSICS
(2023)
Article
Engineering, Electrical & Electronic
Pauline Puteaux, Felix Yriarte, William Puech
Summary: With the rise of cloud and social networks, JPEG images have become important in image transmission and storage. This paper proposes a secret JPEG image sharing approach that ensures visual security and solves the issue of secret key loss. It uses Shamir's secret sharing scheme over Galois fields during the JPEG Huffman coding step.
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY
(2023)
Article
Computer Science, Information Systems
Salma Ben Mamia, Pauline Puteaux, William Puech, Kais Bouallegue
Summary: Over the past decade, the transmission and archiving of images over digital and social networks has greatly increased. To ensure their security, a new color image encryption scheme based on a single scroll chaotic system is proposed in this paper, using neurons with two dendrites. Three different approaches are developed based on this scheme, demonstrating that color pixel component scrambling can act as both a permutation and a substitution, ensuring confusion and diffusion properties. Experimental results show that encrypted color images can be efficiently obtained using the proposed scheme, with comparable attack analyses to current state-of-the-art methods.
Article
Computer Science, Information Systems
Paul Tresson, Dominique Carval, Philippe Tixier, William Puech
Summary: The study introduces a robust method based on hierarchical classification for performing small object detection in the presence of constraints in biological datasets. The proposed method outperforms a global detector in terms of less confusion between classes, smaller impact, and obtaining a higher mAP.
Article
Computer Science, Information Systems
Pauline Puteaux, William Puech
Summary: The proposed method in this study introduces a new technique for reversible data hiding in encrypted images with high payload, involving recursive processing of all bit-planes in the image, prediction errors, reversible adaptation, encryption, and embedding without the need for preprocessing steps.
IEEE TRANSACTIONS ON MULTIMEDIA
(2021)
Review
Computer Science, Software Engineering
Orvila Sarker, Asangi Jayatilaka, Sherif Haggag, Chelsea Liu, M. Ali Babar
Summary: This study provides a comprehensive view of the challenges and critical success factors in the design, implementation, and evaluation stages of phishing education, training, and awareness (PETA). The findings highlight the need to address human-centric issues, bridge users' knowledge gaps, and adopt personalized approaches to enhance defense against phishing attacks.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Carlos Araujo, Meuse Oliveira Jr., Bruno Nogueira, Paulo Maciel, Eduardo Tavares
Summary: This paper proposes a method based on stochastic Petri nets for evaluating the consistency levels of storage systems based on NoSQL DBMS. The method takes into account different consistency levels and redundant nodes, and estimates the system's availability, throughput, and the probability of accessing the newest data. Experimental results demonstrate the practical feasibility of this approach.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Review
Computer Science, Software Engineering
L. Giamattei, A. Guerriero, R. Pietrantuono, S. Russo, I. Malavolta, T. Islam, M. Dinga, A. Koziolek, S. Singh, M. Armbruster, J. M. Gutierrez-Martinez, S. Caro-Alvaro, D. Rodriguez, S. Weber, J. Henss, E. Fernandez Vogelin, F. Simon Panojo
Summary: This article presents the results of a systematic study on the available monitoring tools for DevOps and microservices. It provides a classification and analysis of these tools, aiming to be a useful reference for researchers and practitioners in this field.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Jessica Diaz, Jorge Perez, Isaque Alves, Fabio Kon, Leonardo Leite, Paulo Meirelles, Carla Rocha
Summary: This paper presents empirical research on the structure of DevOps teams in software-producing organizations to better understand the organizational structure and characteristics of teams adopting DevOps. A theory of DevOps taxonomies is built through analysis, and its consistency with other taxonomies is tested.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Sinan Sigurd Tanilkan, Jo Erskine Hannay
Summary: When deciding to develop new software, it is important to have a clear understanding of the intended benefits. However, our research shows that stakeholders' understanding of benefits often fluctuates during the development process, leading to uncertainty. Therefore, we recommend focusing on helping practitioners embrace changes in their understanding of benefits.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Pingyan Wang, Shaoying Liu, Ai Liu, Wen Jiang
Summary: This paper presents an approach that combines static analysis tools and manual audits to effectively detect various types of security vulnerabilities. By using a special Petri net representation, the proposed method is able to assist in the detection of taint-style vulnerabilities.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Edgar Sarmiento-Calisaya, Julio Cesar Sampaio do Prado Leite
Summary: This research introduces an automated requirements analysis approach that combines natural language processing, Petri-nets, and visualization techniques to improve the quality of scenario-based specifications, identify defects, and anticipate inconsistencies.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Jian Hu
Summary: This paper proposes a two-stage trace matrix optimization method for fault localization, which addresses the challenges of coincidental correctness and data imbalance in the current trace matrix. Through extensive experiments, significant improvements in fault localization effectiveness are demonstrated.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Fan Zhang, Manman Peng, Yuanyuan Shen, Qiang Wu
Summary: This study proposes a novel method called HFEDR that utilizes the hierarchical features of Transformer models and reorganizes training data to improve code search performance. Experimental results demonstrate the effectiveness and rationality of the proposed approach.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Tong Wang, Bixin Li
Summary: Software architecture erosion has a negative impact on software quality, performance, and evolution cost. This paper proposes an approach called EsArCost to locate the causes of architecture erosion and estimate the repair cost of each erosion problem. Experimental results show that EsArCost can effectively and efficiently estimate repair costs.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Xiajing Wang, Rui Ma, Wei Huo, Zheng Zhang, Jinyuan He, Chaonan Zhang, Donghai Tian
Summary: This paper proposes a new potential-aware fuzzing scheme called SYNTONY that measures seed potential using multiple objectives and prioritizes promising seeds to increase the number of unique crashes and coverage. Experimental results show that SYNTONY outperforms other fuzzing tools and has high compatibility and expansibility.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Stefano Lambiase, Gemma Catolino, Fabiano Pecorelli, Damian A. Tamburri, Fabio Palomba, Willem-Jan van den Heuvel, Filomena Ferrucci
Summary: This paper contributes to the existing body of knowledge on factors affecting productivity in software development by studying the cultural and geographical dispersion of a development community. The results show that cultural and geographical dispersion significantly impact productivity, suggesting that managers and practitioners should consider these aspects throughout the software development lifecycle.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Elaine Venson, Bradford Clark, Barry Boehm
Summary: The software industry has been under pressure to adopt security practices and reduce software vulnerabilities. This study quantifies the effort required to develop secure software in increasing levels of rigor and scope and provides validated cost multipliers for practitioners to estimate proper resources for adopting security practices.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Yangyang Zhao, Mingyue Jiang, Yibiao Yang, Yuming Zhou, Hanjie Ma, Zuohua Ding
Summary: Previous studies have ignored the potential associations between modules involved in the same defect, and this comprehensive study explores the implications of intra-defect associations for defect prediction. The majority of defects occur across functions, with implicit dependencies between the modules. By considering intra-defect associations and merging modules, the proposed data processing approach significantly improves defect prediction performance.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)
Article
Computer Science, Software Engineering
Meira Levy, Irit Hadar
Summary: This research sheds new light on how students learn and practice hybrid work in educational settings through two educational studies. The findings show the benefits of new educational programs in fostering empathy and innovation among students, while also highlighting the challenges and opportunities in addressing real challenges.
JOURNAL OF SYSTEMS AND SOFTWARE
(2024)