Topic Review
Digital Image Watermarking Techniques
Image authentication is an extremely significant concern for the digital revolution, as it is easy to alter any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images. Based on the desired applications, several suitable watermarking techniques have been developed to mitigate this concern. However, it is tough to achieve a watermarking system that is simultaneously robust and secure. This paper gives details of standard watermarking system frameworks and lists some standard requirements that are used in designing watermarking techniques for several distinct applications. The current trends of digital image watermarking techniques are also reviewed to find state-of-the-art methods and their limitations. Some conventional attacks are discussed, and future research directions are given.
  • 3.6K
  • 29 Oct 2020
Topic Review
MPQ (File Format)
MPQ (Mo'PaQ, short for Mike O'Brien Pack, named after its creator), is an archiving file format used in several of Blizzard Entertainment's games. MPQs used in Blizzard's games generally contain a game's data files, including graphics, sounds, and level data. The format's capabilities include compression, encryption, file segmentation, extensible file metadata, cryptographic signature and the ability to store multiple versions of the same file for internationalization, platform-specific differences and patching. MPQ archives can use a variety of compression algorithms which may also be combined.
  • 3.5K
  • 02 Dec 2022
Topic Review
BitTorrent
BitTorrent is a communication protocol for peer-to-peer file sharing (P2P), which enables users to distribute data and electronic files over the Internet in a decentralized manner. To send or receive files, users use a BitTorrent client on their Internet-connected computer. A BitTorrent client is a computer program that implements the BitTorrent protocol. BitTorrent clients are available for a variety of computing platforms and operating systems, including an official client released by Rainberry, Inc. Popular clients include μTorrent, Xunlei Thunder, Transmission, qBittorrent, Vuze, Deluge, BitComet and Tixati. BitTorrent trackers provide a list of files available for transfer and allow the client to find peer users, known as "seeds", who may transfer the files. Programmer Bram Cohen designed the protocol in April 2001, and released the first available version on 2 July 2001. On 15 May 2017, BitTorrent, Inc. (later renamed Rainberry, Inc.) released BitTorrent v2 protocol specification. libtorrent was updated to support the new version on 6 September 2020. BitTorrent is one of the most common protocols for transferring large files, such as digital video files containing TV shows and video clips, or digital audio files containing songs. (As of February 2013) BitTorrent was responsible for 3.35% of all worldwide bandwidth—more than half of the 6% of total bandwidth dedicated to file sharing. In 2019, BitTorrent was a dominant file sharing protocol and generated a substantial amount of Internet traffic, with 2.46% of downstream, and 27.58% of upstream traffic. (As of 2013), BitTorrent had 15–27 million concurrent users at any time. (As of January 2012), BitTorrent is utilized by 150 million active users. Based on this figure, the total number of monthly users may be estimated to more than a quarter of a billion (≈ 250 million). The use of BitTorrent may sometimes be limited by Internet Service Providers (ISPs), on legal or copyright grounds. Users may choose to run seedboxes or virtual private networks (VPNs) to circumvent these restrictions.
  • 3.5K
  • 01 Nov 2022
Topic Review
Roadside Unit Deployment in Internet of Vehicles Systems
The network technology known as Internet of Vehicles (IoV) has been developed to improve road safety and vehicle security, with the goal of servicing the digital demands of car drivers and passengers. The highly dynamical network topology that characterizes these networks, and which often leads to discontinuous transmissions, is one of the most significant challenges of IoV. To address this issue, IoV infrastructure-based components known as roadside units (RSU) are designed to play a critical role by providing continuous transmission coverage and permanent connectivity. The main challenges that arise when deploying RSUs are balancing IoVs’ performances and total cost so that optimal vehicle service coverage is provided with respect to some target Quality of Service (QoS) such as: service coverage, throughput, low latency, or energy consumption.
  • 3.1K
  • 05 May 2022
Topic Review
Internet of Things in the Industry Revolution 4.0
Researchers offers a wide range of information on Industry 4.0, finds research gaps and recommends future directions. Seven research questions are addressed: (i) What are the contributions of WSN in IR 4.0? (ii) What are the contributions of IoT in IR 4.0? (iii) What are the types of WSN coverage areas for IR 4.0? (iv) What are the major types of network intruders in WSN and IoT systems? (v) What are the prominent network security attacks in WSN and IoT? (vi) What are the significant issues in IoT and WSN frameworks? and (vii) What are the limitations and research gaps in the existing work? Researchers mainly focuses on the solutions and new techniques to automate Industry 4.0 and analyzed over 130 articles from 2014 until 2021. The entry covers several aspects of Industry 4.0, from the designing phase to security needs, from the deployment stage to the classification of the network, the difficulties, challenges, and future directions.
  • 3.0K
  • 16 Mar 2022
Topic Review
Background on Computing Paradigms
General overview of the different mentioned paradigms needs to be provided in order to be oriented in the computing field. For clarity and consistency, each paradigm is carefully discussed concisely in the oncoming text. The reason for discussing each of these paradigms is to have an overview that will guide the understanding of the research goal for this entry, which is primarily the information security and privacy aspects for each paradigm.
  • 2.9K
  • 25 Feb 2022
Topic Review
Recognition Technologies of Hand Gesture
Hand gesture recognition plays a significant part in delivering diverse messages using hand gestures in the digital domain. Real-time hand gesture identification is now possible because of advancements in both imaging technology and image processing algorithmic frameworks.
  • 2.9K
  • 17 Jun 2022
Topic Review
2020 Nintendo Data Leak
The 2020 Nintendo data leak, more commonly referred to as the Nintendo Gigaleak is a series of leaks of data from Japanese video game company Nintendo on the anonymous imageboard website 4chan. The releasing of data started in March 2018, but became most prominent in 2020. Nine main sets of data leaked on 4chan, ranging from game and console source code to internal documentation and development tools. The name "Gigaleak" mainly refers to the second leak on July 24, 2020, which was 3 gigabytes in size. The leaks are believed to have come either from companies contracted by Nintendo in the design of these consoles, or from individuals previously convicted of intrusion into Nintendo systems. An earlier, much smaller leak had also occurred in 2018 which had the Nintendo Space World 1997 demos for Pokémon Gold and Silver leaked. The leaks are infamous for the sheer size and the amount of internal material leaked; video game journalists have described the magnitude of the leaks as unprecedented, and suggested that they might have significant effects for emulation and to preservationists, in addition to the legal questions posed by the leak. As of May 2021, Nintendo has not made any official response.
  • 2.8K
  • 14 Oct 2022
Topic Review
IBM Mainframe Utility Programs
IBM mainframe utility programs are utility software supplied with IBM mainframe operating systems such as MVS and zOS to carry out various tasks associated with maintenance of the computer system or datasets. The following list describes utilities distributed with OS/360 and successors. No VSE or VM utilities are included.
  • 2.8K
  • 26 Oct 2022
Topic Review
Integration of Blockchain Technology with Cloud Computing
Blockchain technology’s desirable characteristics are decentralization, integrity, immutability, verification, fault tolerance, anonymity, audibility, and transparency. There are many benefits of blockchain technology concerning cloud computing, including those associated with business data handling, privacy, and encryption. 
  • 2.6K
  • 29 Nov 2022
  • Page
  • of
  • 49