ArticlePDF Available

Intelligent System for Detection of Copyright-Protected Data for Enhanced Data Security

Authors:

Abstract and Figures

In the digital era, the proliferation of digital content has intensified concerns over intellectual property rights infringement, highlighting the need for robust copyright protection solutions. This paper presents a software solution designed to address these challenges by combining advanced algorithms with intuitive user interfaces for effective copyright enforcement. Central to the software's functionality is the Most Significant Bit (MSB) embedding technique, which allows users to imperceptibly embed copyright or trademark information into digital images. This method modifies the MSB of pixel values to encode protection data while maintaining the visual integrity of the images. In the detection phase, the software employs Deep Convolutional Neural Networks (DCNN) to identify instances of unauthorized use or copyright infringement. By analyzing submitted images, the DCNNs use sophisticated pattern recognition algorithms to detect embedded copyright information or trademarks, promptly flagging infringements for further action. The software ensures a seamless user experience with an intuitive interface that guides users through image upload, copyright embedding, and infringement detection processes. This comprehensive approach provides a powerful tool for safeguarding intellectual property rights in the digital landscape, offering users an efficient means to protect and enforce copyright effectively.
Architecture of the Existing System (Yingqian et al., 2023) Yingqian et al. in 2023, proposed a work on diffusion shield: a watermark for data copyright protection against generative diffusion models. The research presented in this work focuses on addressing copyright protection concerns arising from the prolific use of Generative Diffusion Models (GDMs) in generating images. As GDMs gain popularity for their remarkable image generation capabilities, concerns have emerged regarding the unauthorized replication of creative works by artists, such as painters and photographers. In response to these challenges, the authors introduce a novel watermarking scheme called Diffusion Shield. This scheme aims to protect images from copyright infringement by encoding ownership information into an imperceptible watermark, which is then injected into the images. The watermark is designed to be easily learned by GDMs and replicated in their generated images. The proposed method, Diffusion Shield, utilizes uniform watermarks and a joint optimization approach to ensure low distortion of the original image, high watermark detection performance, and the capacity to embed lengthy messages. Rigorous and comprehensive experiments are conducted to demonstrate the effectiveness of Diffusion Shield in defending against copyright infringement by GDMs, establishing its superiority over traditional watermarking methods. Overall, the research provides a practical solution to safeguarding intellectual property in the face of the evolving capabilities of Generative Diffusion Models. In the existing system, Image + W = Copyrighted Image. The initial phase of the system involves a crucial computation, taking place within its first segment. The underlying computational principle employed in this module is known as the Watermarking principle. This methodology, however, exhibits certain drawbacks, particularly in comparison to the more advanced machine learning approaches widely used in the field of data and information security. The Watermarking principle, although historically employed in the realm of security, is considered less reliable in the contemporary technological space. This is attributed to a number of weaknesses inherent in watermarking as an approach to enhancing security systems. Given the rapid evolution of tools designed for breaching security systems, relying solely on watermarking is no longer deemed sufficient for constructing robust security frameworks in today's technology-driven environment. The prevailing recommendation in the development of security systems is the incorporation of multiple algorithms or the adoption of a single, but exceptionally robust, algorithm. This
… 
Content may be subject to copyright.
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
58 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
ABSTRACT: In the digital era, the proliferation of digital
content has intensified concerns over intellectual property rights
infringement, highlighting the need for robust copyright
protection solutions. This paper presents a software solution
designed to address these challenges by combining advanced
algorithms with intuitive user interfaces for effective copyright
enforcement. Central to the software’s functionality is the Most
Significant Bit (MSB) embedding technique, which allows users to
imperceptibly embed copyright or trademark information into
digital images. This method modifies the MSB of pixel values to
encode protection data while maintaining the visual integrity of
the images. In the detection phase, the software employs Deep
Convolutional Neural Networks (DCNN) to identify instances of
unauthorized use or copyright infringement. By analyzing
submitted images, the DCNNs use sophisticated pattern
recognition algorithms to detect embedded copyright information
or trademarks, promptly flagging infringements for further action.
The software ensures a seamless user experience with an intuitive
interface that guides users through image upload, copyright
embedding, and infringement detection processes. This
comprehensive approach provides a powerful tool for
safeguarding intellectual property rights in the digital landscape,
offering users an efficient means to protect and enforce copyright
effectively.
KEYWORDS: DCNN, MSB, Copyright, Data Security.
INTELLIGENT SYSTEM FOR DETECTION OF COPYRIGHT-PROTECTED
DATA FOR ENHANCED DATA SECURITY
Ndueso Udoetor1, Godwin Ansa2, Anietie Ekong3, and Anthony Edet4
1Department of Computer Science, Akwa Ibom State University, Mkpat Enin, Nigeria.
Email: Udoetorndueso55@gmail.com
2Department of Computer Science, Akwa Ibom State University, Mkpat Enin, Nigeria.
Email: godwinansa@aksu.edu.ng
3Department of Computer Science, Akwa Ibom State University, Mkpat Enin, Nigeria.
Email: anietieekong@aksu.edu.ng
4Department of Computer Science, Akwa Ibom State University, Mkpat Enin, Nigeria.
Email: anthonyedet73@gmail.com
Cite this article:
Udoetor, N., Ansa, G., Ekong,
A., Edet, A. (2024), Intelligent
System for Detection of
Copyright-Protected Data for
Enhanced Data Security.
British Journal of Computer,
Networking and Information
Technology 7(4), 58-80. DOI:
10.52589/BJCNIT-
OQQNPPCJ
Manuscript History
Received: 11 Aug 2024
Accepted: 6 Oct 2024
Published: 17 Oct 2024
Copyright © 2024 The Author(s).
This is an Open Access article
distributed under the terms of
Creative Commons Attribution-
NonCommercial-NoDerivatives
4.0 International (CC BY-NC-ND
4.0), which permits anyone to
share, use, reproduce and
redistribute in any medium,
provided the original author and
source are credited.
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
59 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
INTRODUCTION
In the digital age, the exponential growth of unstructured digital data has presented
unprecedented challenges for protecting intellectual property and preventing copyright
infringement (Basma et al., 2020). As individuals and organizations increasingly rely on digital
platforms to create, share, and store diverse forms of content, the need for robust mechanisms
to safeguard copyrights has become paramount. This research focuses on developing advanced
techniques for the protection and detection of copyrights in unstructured digital data, aiming to
enhance overall data security using a combined effort of Most Significant Bit (MSB) and Deep
learning approaches. Traditional methods of copyright protection often fall short when applied
to unstructured data, which includes images, videos, and textual content with varying formats
and structures. The advent of deep learning, particularly Deep Convolutional Neural Networks
(DCNN), offers a promising avenue for addressing these challenges. DCNNs have
demonstrated remarkable capabilities in feature extraction and pattern recognition, making
them well-suited for analyzing complex and diverse data types. By using the power of DCNNs,
this research seeks to devise a sophisticated copyright protection system capable of identifying
and validating copyrighted material across a wide range of digital formats. Deep learning is
particularly effective in handling large datasets and is well-suited for scenarios involving
multiple classes of data, making it a valuable addition to the proposed framework(Yingqian et
al., 2023). Through the integration of DCNN and Most Significant Bit (MSB) technique, the
research aims to create a comprehensive solution that not only enhances copyright protection
but also contributes to the broader field of data security in the digital world(Li et al., 2017).
The implications of successful implementation of the proposed copyright protection system
extend beyond individual content creators and copyright holders. The safeguarding of
intellectual property in unstructured digital data is crucial for fostering innovation, creativity,
and fair compensation for content producers(Ansa et al., 2012). Additionally, as the digital
space continues to evolve, the research outcomes are expected to contribute significantly to the
ongoing discourse surrounding data security and the responsible use of digital content.
Ultimately, the development of effective and efficient copyright protection mechanisms is
essential for creating a sustainable and secure environment for the digital exchange of ideas
and information(Hoyle et al., 2020). Copyright serves as the legal foundation for protecting the
intellectual property rights of content creators, granting them exclusive rights to reproduce,
distribute, and display their work. In unstructured digital data, which encompasses a vast array
of multimedia content and text, enforcing copyright becomes increasingly complex due to the
sheer volume and diverse nature of digital materials(Shen et al., 2019). Copyright infringement
in this context involves unauthorized use, reproduction, or distribution of copyrighted content,
posing a significant threat to the livelihoods of creators and the integrity of their work. As
technology advances, so do the methods employed by infringers, necessitating innovative
approaches to copyright protection that can adapt to the intricacies of unstructured digital
data(Ekong et al., 2022). The proliferation of digital content and the ease of sharing information
across online platforms have heightened concerns about data security in the context of
copyright protection. Unauthorized access to copyrighted materials not only infringes on the
rights of content creators but also poses risks to the confidentiality and integrity of sensitive
information. The research at hand recognizes the intricate connection between copyright
protection and data security, striving to develop a robust system that not only identifies and
prevents copyright infringement but also fortifies the overall security of digital assets. By
addressing these intertwined challenges, the research aims to contribute to the establishment of
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
60 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
a digital environment where creators can confidently share and disseminate their work without
compromising the security of their intellectual property. In the era of big data, the sheer volume
and diversity of unstructured digital data make traditional copyright enforcement methods
inadequate. As copyright infringement increasingly occurs on a global scale through online
platforms and peer-to-peer networks, the need for sophisticated technologies to detect and
prevent such activities becomes imperative. The proposed use of Deep Convolutional Neural
Networks and Most Significant Bit (MSB) signify a departure from conventional approaches,
offering a more nuanced and adaptive solution to the multifaceted problem of copyright
protection in unstructured digital data. By exploring the intersection of copyright, copyright
infringement, and data security, this research endeavors to provide a comprehensive framework
that not only safeguards the rights of content creators but also contributes to the broader
discourse on responsible digital content dissemination and the protection of intellectual
property in the digital age.
Research Problem
The escalating volume of unstructured digital data in contemporary society has given rise to a
pressing problem concerning the protection of copyrights and the prevention of infringement.
Traditional methods of copyright enforcement prove inadequate in the face of diverse
multimedia content, such as images, videos, and text, which often lack a standardized structure.
As a result, there is an urgent need for advanced technological solutions that can navigate the
complexities of unstructured digital data to identify and mitigate copyright infringement
effectively. This research addresses the overarching problem of safeguarding intellectual
property in an era where the boundaries between legal and illegal digital content usage are
becoming increasingly blurred. The challenge extends beyond the sheer scale of unstructured
digital data; it encompasses the dynamic nature of copyright infringement mechanisms in the
digital space. Rapid advancements in technology have enabled infringers to employ
sophisticated techniques, necessitating a constant evolution in copyright protection methods.
The statement of the problem recognizes the critical gap in existing approaches and emphasizes
the urgency of developing a comprehensive solution that integrates Deep Convolutional Neural
Networks and Steganograph techiniques. The Most Significant Bit (MSB) technique will be
used to protect the data, while deep learning does detection of the protected digital data.
LITERATURE/THEORETICAL UNDERPINNING
This section outlines the theoretical foundation of the research, providing a clear understanding
of the underlying principles and concepts that support the study. It establishes the basis for the
research framework by discussing key theories, models, and prior studies relevant to the topic,
thereby contextualizing the research objectives and methodology. This theoretical groundwork
enables a comprehensive grasp of how the research is built upon established knowledge and
contributes to the existing body of literature.
Copyright Protection in Digital Data
Copyright protection in the area of digital data is an increasingly critical concern in the wake
of the digital revolution (Edet, et al., 2024). As the creation, distribution, and consumption of
content transition to online platforms, safeguarding intellectual property has become
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
61 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
paramount. Copyright protection in digital data refers to the legal and technological measures
implemented to ensure that creators' rights are respected and that unauthorized use or
reproduction of digital content is prevented. This encompasses a wide range of digital assets,
including text, images, audio, video, and software code, among others (Ekong et al., 2024).
Historically, copyright laws have been established to protect creators by granting exclusive
rights to reproduce, distribute, and display their work. However, the advent of the digital era
has posed new challenges as the ease of copying and disseminating digital content has surged.
In response, legal frameworks have evolved, adapting to the nuances of the online environment.
Digital rights management (DRM) technologies have been developed to enforce copyright
protection by restricting access to or usage of digital content through encryption, access
controls, and other mechanisms. These measures aim to strike a balance between the rights of
content creators and the public's need for access to information. Despite these advancements,
copyright protection in digital data faces ongoing challenges(Edet et al., 2024). The borderless
nature of the internet, coupled with the ease of replication and distribution, makes it challenging
to enforce copyright laws globally. Additionally, emerging technologies such as artificial
intelligence and deep learning introduce new complexities, requiring continuous adaptation of
legal and technological frameworks. The ongoing discourse around copyright protection in
digital data underscores the need for a dynamic and collaborative approach involving legal,
technological, and ethical considerations to ensure the sustainable protection of intellectual
property in the digital age. In the digital space, copyright protection plays a crucial role in
fostering creativity and innovation by providing content creators with the assurance that their
intellectual property will be acknowledged and fairly compensated(Ebong et al., 2024). Digital
data, which encompasses a vast array of creative works, faces unique challenges due to its
intangible and easily replicable nature. The ubiquity of online platforms, social media, and file-
sharing services has amplified concerns about unauthorized use, piracy, and the potential
dilution of creators' rights. Copyright protection in digital data involves not only legal
mechanisms but also technological solutions that can adapt to the rapidly evolving digital
environment (Ekong et al., 2024). Digital copyright protection involves the establishment of
clear legal frameworks and international agreements that govern the rights and responsibilities
of content creators, distributors, and consumers. These legal measures aim to strike a balance
between protecting creators' rights and fostering the free exchange of ideas and information.
The Digital Millennium Copyright Act (DMCA) in the United States and similar legislations
worldwide exemplify attempts to adapt copyright laws to the digital era. Additionally,
international organizations like the World Intellectual Property Organization (WIPO) work
towards establishing standardized copyright protection measures on a global scale.
Technologically, copyright protection employs a variety of methods to safeguard digital
data(Uwah & Edet, 2024). Digital watermarks, encryption, and access controls are employed
to embed ownership information and restrict unauthorized access or distribution. Digital Rights
Management (DRM) systems, although contentious, are widely used to manage access to
digital content. However, the effectiveness of these technologies is often debated, with
concerns about their impact on user privacy and the potential for stifling legitimate usage. As
the digital space continues to evolve, copyright protection in digital data remains a dynamic
field that requires ongoing adaptation. Emerging technologies, such as blockchain, are being
explored to create decentralized and tamper-proof systems for tracking and managing digital
rights(Edet & Ansa, 2023). The conversation around copyright protection in digital data
extends beyond legal and technological aspects, involving discussions on ethical
considerations, fair use, and the balance between protecting creators' rights and ensuring access
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
62 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
to information for the broader public. In navigating these complexities, it is essential to foster
a collaborative and multidisciplinary approach that addresses the challenges and opportunities
presented by the digital age.
Related Literature
Shabou et al., 2020, proposed a work on Algorithmic methods to explore the automation of
the appraisal of structured and unstructured digital data. They conducted an interdisciplinary
and innovative research project in Switzerland at the Geneva School of Business
Administration HES-SO, in collaboration with the State Archives of Neuchâtel (Office des
archives de l’État de Neuchâtel, OAEN). The primary objective of the study was to address the
classical challenge of extracting and discriminating relevant data from a vast and diverse range
of data record formats and contents. The focus was on providing a framework and proof of
concept for a software tool aimed at assisting in defensible decision-making regarding the
retention and disposal of records and data at OAEN. The research was structured around two
axes: the archival axis, which involved proposing archival metrics for the appraisal of
structured and unstructured data, and the data mining axis, which aimed to provide algorithmic
methods as complementary or additional metrics for the appraisal process.
In terms of methodology, the exploratory study designed and tested the feasibility of archival
metrics paired with data mining metrics to advance the digital appraisal process systematically
or even automatically. Under Axis 1, the authors undertook three key steps: conceptual
framework design for records data appraisal with a detailed three-dimensional approach
(trustworthiness, exploitability, representativeness); operationalization of proposed metrics in
terms of variables supported by quantitative methods for measurement and scoring; and
validation of the conceptual framework and metrics through feedback from experienced
professionals. This process aimed to assess the relevance and feasibility of the proposed
metrics, demonstrating their acceptability in real-life archival practice. Parallelly, Axis 2
proposed functionalities covering both macro analysis for data and algorithmic methods to
enable the computation of digital archival and data mining. The study thus represents a
comprehensive and practical approach to enhancing the digital appraisal process for archival
and data management purposes.
Haonan et al., 2023 proposed a work on Copyright Protection and Accountability of Generative
AI: Attack, Watermarking and Attribution. This paper focuses on addressing the escalating
concerns surrounding the protection of Intellectual Property Rights (IPR) in the context of
Generative AI, particularly Generative Adversarial Networks (GANs). With the increasing
popularity of Generative AI, the paper highlights the potential risks related to IPR, specifically
in relation to images (toxic images) and models (poisoned models) generated by GANs. The
authors propose an evaluation framework to comprehensively assess the current state of
copyright protection measures for GANs. The evaluation encompasses a diverse range of GAN
architectures and aims to identify factors influencing performance as well as suggest future
research directions. The findings suggest that existing IPR protection methods for input images,
model watermarking, and attribution networks are generally effective for a broad spectrum of
GANs. However, the paper emphasizes the need for increased attention to protecting training
sets, noting that current approaches lack robust IPR protection and provenance tracing for
training data. Overall, the research provides valuable insights into the current state of copyright
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
63 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
protection in the realm of Generative AI, offering directions for improvement and emphasizing
the importance of addressing potential vulnerabilities in training sets.
Cui et al., 2023, proposed a work on diffusion shield: a watermark for data copyright protection
against generative diffusion models. The research presented in this work focuses on addressing
copyright protection concerns arising from the prolific use of Generative Diffusion Models
(GDMs) in generating images. As GDMs gain popularity for their remarkable image generation
capabilities, concerns have emerged regarding the unauthorized replication of creative works
by artists, such as painters and photographers. In response to these challenges, the authors
introduce a novel watermarking scheme called Diffusion Shield. This scheme aims to protect
images from copyright infringement by encoding ownership information into an imperceptible
watermark, which is then injected into the images. The watermark is designed to be easily
learned by GDMs and replicated in their generated images. The proposed method, Diffusion
Shield, utilizes uniform watermarks and a joint optimization approach to ensure low distortion
of the original image, high watermark detection performance, and the capacity to embed
lengthy messages. Rigorous and comprehensive experiments are conducted to demonstrate the
effectiveness of Diffusion Shield in defending against copyright infringement by GDMs,
establishing its superiority over traditional watermarking methods. Overall, the research
provides a practical solution to safeguarding intellectual property in the face of the evolving
capabilities of Generative Diffusion Models.
Liu et al. (2020) concluded several privacy issues of online image sharing. In this paper, the
authors focused on the unawareness of privacy during image sharing. There are two main types
of methods to deal with the risk of unawareness of privacy. The first type of method mainly
adopts classification models to identify private images
Zerr, Siersdorfer, and Hare (2012) proposed a privacy-aware classifer based on vi
sual features like face and color histograms. Buschek et al. (2015) proposed a multi-modal
method that assigns privacy labels to the images based on visual features and metadata like
location and publication time. Tonge, Caragea, and Squicciarini (2018) utilized another kind
of metadata, tag, and Tonge and Caragea (2019) further derived features of the object, scene,
and tags for privacy-leaking image detection. Yang et al. (2020) extracted a knowledge graph
from the images and identifed private images based on object detection and graph neural
networks.
The second type of method focuses on sensitive regions in the images, including approaches
like object detection and semantic segmentation. Some detected private
attributes such as faces (Sun, Wu, and Hoi 2018), license plates (Zhou et al. 2012), and social
relationship (Li et al. 2017a). Orekondy, Schiele, and Fritz (2017) defned a list of privacy
attributes and detected them simultaneously. Some works attempted to protect privacy-leaking
image based on blurring (Fan 2018), blocking (Li et al. 2017b), cartooning (Hasan et al. 2017),
and perturbation (Oh, Fritz, and Schiele 2017). Shetty, Fritz, and Schiele (2018) removed
private objects from the images based on a generative method. However, a person may be
recognized even his face is not visible (Oh et al. 2016), and the redacted image may be
recovered (Shen et al. 2019). As the usage of shared images is almost uncontrollable, it is better
to prevent the risk from the beginning. Therefore, we follow the first type of method to solve
the issue of privacy-leaking images by classification.
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
64 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
In exploring Machine Learning capabilities in prediction problems, (Odikwa, Ekong &
Okpako, 2021) demonstrated the use of Fuzzy Logic in the design of Chat-bot Messenger for
Home Intelligent System with Multiple Sensors.Also, (Ekong, James and & Edet, 2022)
proposed a work on Supervised Machine Learning Model For Effective classification Of
Patients With Covid-19 Symptoms-based On Bayesian Belief Network with a focus on the
identification of patients with Covid-19 symptoms. Ekong et al., 2023, used machine learning
algorithm, particularly, the Random Forest algorithm to address a cybersecurity problem. In
another research, Ekong et al., 2023, proposed a work on Machine Learning based Model for
the Prediction of Fasting Blood Sugar Level towards Cardiovascular Disease Control for the
Enhancement of Public Health.In the research, Logistcs Model was adopted for the prediction
of fasting blood sugar level which enabled the control of Cardivascular diseases which in turn
enhanced public health. (Inyang & Umoren, 2023) proposed a work using NLP. This research
employs a Framework-Based Method (FBM) to classify infectious diseases based on ecological
risk factors, providing a structured and reproducible approach. Various machine learning
models are utilized, including XGBoost, Random Forest (RF), Support Vector Machine
(SVM), Artificial Neural Network (ANN), Linear Discriminant Analysis (LDA), Gradient
Boosting Machine (GBM), k-Nearest Neighbors (KNN), and Decision Tree (DT). The results
indicate varying levels of accuracy and Kappa statistics for each model. The study reveals the
performance metrics for each model, with XGBoost and LDA achieving relatively high
accuracy and Kappa values. Additionally, a Deep Learning model, BERT, is integrated with
XGBoost to create an interactive interface for users, enhancing the practical application of
machine learning and Natural Language Processing (NLP) in ecological disease classification.
The research emphasizes the importance of considering ecological risk factors in infectious
disease classification and explores the potential of machine learning techniques for this
purpose. Ekong et al., 2023, proposed a work on Machine Learning Approach for Classification
of SickleCell Anemia in Teenagers Based on Bayesian Network. In this study, a Bayesian
network approach was employed for the classification of sickle cell anemia in teenagers based
on diverse medical data. The research utilized probabilistic graphical models to represent
relationships among various medical parameters, incorporating Bayesian principles for
adaptive predictions. The Bayesian network demonstrated exceptional accuracy (99%) in
classifying teenagers as either positive or negative for sickle cell anemia. Key features
contributing to the classification were identified, offering valuable insights for early detection
and intervention. The findings highlight the diagnostic significance of sickle cell anemia
classification in teenagers, contributing to medical informatics and computational biology. The
Bayesian network proves to be a reliable decision support system for clinicians, aiding in
informed decisions and timely interventions.(Edet and Ansa, 2023), in this research, the authors
proposed a Machine Learning Enabled System for Intelligent Classification of Host-based
Intrusion Severity to effectively manage intrusion events, particularly those initiated by internal
workers. The model comprises three phases: detecting intrusion severity, conducting source
analysis, and providing security recommendations using counterfactual reasoning. The dataset
was gathered from user interactions over time, captured in an activity log. Bayesian Network
achieved an 82% accuracy in the intrusion severity classification. The system includes an API
for scalability, aiming to assist IT firms in analyzing and managing the impact of intrusions
effectively.
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
65 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
Fig. 1: Architecture of the Existing System (Yingqian et al., 2023)
Yingqian et al. in 2023, proposed a work on diffusion shield: a watermark for data copyright
protection against generative diffusion models. The research presented in this work focuses on
addressing copyright protection concerns arising from the prolific use of Generative Diffusion
Models (GDMs) in generating images. As GDMs gain popularity for their remarkable image
generation capabilities, concerns have emerged regarding the unauthorized replication of
creative works by artists, such as painters and photographers. In response to these challenges,
the authors introduce a novel watermarking scheme called Diffusion Shield. This scheme aims
to protect images from copyright infringement by encoding ownership information into an
imperceptible watermark, which is then injected into the images. The watermark is designed to
be easily learned by GDMs and replicated in their generated images. The proposed method,
Diffusion Shield, utilizes uniform watermarks and a joint optimization approach to ensure low
distortion of the original image, high watermark detection performance, and the capacity to
embed lengthy messages. Rigorous and comprehensive experiments are conducted to
demonstrate the effectiveness of Diffusion Shield in defending against copyright infringement
by GDMs, establishing its superiority over traditional watermarking methods. Overall, the
research provides a practical solution to safeguarding intellectual property in the face of the
evolving capabilities of Generative Diffusion Models. In the existing system, Image + W =
Copyrighted Image. The initial phase of the system involves a crucial computation, taking
place within its first segment. The underlying computational principle employed in this module
is known as the Watermarking principle. This methodology, however, exhibits certain
drawbacks, particularly in comparison to the more advanced machine learning approaches
widely used in the field of data and information security. The Watermarking principle, although
historically employed in the realm of security, is considered less reliable in the contemporary
technological space. This is attributed to a number of weaknesses inherent in watermarking as
an approach to enhancing security systems. Given the rapid evolution of tools designed for
breaching security systems, relying solely on watermarking is no longer deemed sufficient for
constructing robust security frameworks in today's technology-driven environment. The
prevailing recommendation in the development of security systems is the incorporation of
multiple algorithms or the adoption of a single, but exceptionally robust, algorithm. This
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
66 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
strategic combination enhances the overall resilience and effectiveness of the security system.
In contrast, the existing system relies solely on the Watermarking principle, exposing it to
potential vulnerabilities. For the system to remain viable and secure in today's dynamic
technology space, a substantial improvement is imperative. The enhancement should involve
the integration of advanced algorithms, capable of withstanding the sophisticated tools and
techniques employed by malicious actors in attempting to compromise security systems. By
embracing a more comprehensive and sophisticated approach, the system can better adapt to
the evolving landscape of technological threats and ensure its functionality and reliability in
safeguarding sensitive data and information.
Weaknesses of the Existing System
1. Watermarking (Diffusion shield) approach is not robust for copyrighting and protection
of digital images as it relies on obfuscating or altering the image at the pixel level to
protect it.
2. The security level of the existing system is weak and the file is vulnerable or susceptible
to reverse engineering.
3. The process of embedding protective data or watermarks can degrade the quality of the
original image, which might be unacceptable in high-quality or professional applications.
4. Diffusion shield techniques can introduce distortions or artifacts into the image,
potentially affecting its quality or usability. This could be a concern in scenarios where
image fidelity is important.
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
67 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
Fig. 3: Conceptual Framework of the Proposed System
Input Image to be
Protected
Upload Trade Mark
Calculate MSB of Image to
be Protected
Place Trade Mark in
MSB of Image to be
Protected
IMAGE + W = COPYRIGHTED IMAGE
INPUT CONFLICTING
DIGITAL IMAGE
Gather
Metadata
(DCNN)
Image Feature
Analysis
Image
Preprocessing
Protected Not Protected
Show Trademark/Copyright Text
Detect Payload
Storage
External
Users
Usage
Appropriate Authorities
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
68 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
This research focuses on digital image files and the potential risks associated with sharing
unprotected images on the internet. The act of creating and disseminating images without
implementing means of identification not visible to the human eye can jeopardize the rights
to those images. Without proper protection, individuals may lose control over their images,
emphasizing the need for robust security measures in the digital space. Building upon the
work of Yingqian et al. in 2023, this study represents an advancement in image copyright
protection and detection. While the previous work utilized a watermarking approach, a
critical review of existing literature highlights the limitations of watermarking in providing
the necessary security infrastructure for creators and organizations to implement copyright,
safeguard, identify, or detect their digital images on the internet. Consequently, this research
aims to extend and enhance the existing methodology
Fig. 2: Flowchart of the Conceptual System
Trademark
Text
Start
Login
Open MSB
Upload
MSB
Upload
Tradema
Upload
Data
Apply
Decision
Menu
Infring
ement?
Copyright
Text
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
69 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
In this new approach, Deep Learning and Most Significant Bit (MSB) are employed to fortify
digital information by embedding copyright details. This ensures that the original owner can
assert their rights to the image without encountering conflicts. The main system comprises
three distinct modules: the copyright protection module handled by Most Significant Bit
(MSB), copyright detection module handled by machine learning, and file summary module
to further help in the analysis of the image. The file summary module serves as a pivotal point
displaying digital image metadata upon uploading to the main system.
METHODOLOGY
In the proposed system, the Deep Convolutional Neural Network (DCNN) plays a pivotal role
in the development of the copyright protection and detection system. DCNN, renowned for its
effectiveness in image processing and recognition tasks, is harnessed to enhance the system's
capabilities in safeguarding digital images (Ekong et al., 2023). Through its sophisticated
architecture, DCNN is adept at learning hierarchical spatial features from input data, making it
a valuable tool for tasks related to image identification and protection. This approach ensures
that the system benefits from the strengths of DCNN, leveraging the it for image-related tasks
and for effective copyrighted image classification. The integration of deep learning enhances
the system's capacity to detect and protect copyrighted material, thereby providing a well-
rounded solution for digital content security. Most Significant Bit (MSB) is a data security
technique that hides one data in another data allowing it to be hidden from the eyes and
perception of the general public.
1. Deep Convolutional Neural Networks (DCNN)
Deep Convolutional Neural Networks (DCNNs) are a type of artificial neural network designed
for tasks involving visual data, such as image recognition and computer vision. The
mathematical representation of a DCNN involves several components, including convolutional
layers, pooling layers, fully connected layers, and activation functions. Below is a basic outline
of the mathematical operations commonly used in a DCNN:
1.Convolutional Operation:
Input Volume: ( I ) (Image or Feature Map)
Convolutional Filter (Kernel):( K )
Convolution Operation (with Stride ( S )):
[ (I * K)_{i,j} = \sum_m \sum_n I_{(i . S + m),(j . S + n)} K_{m,n}]
Output Feature Map:( O )
[ O_{i,j} = (\sum_m \sum_n I_{(i . S + m),(j . S + n)} K_{m,n} + b)]
where ( f ) is an activation function (e.g., ReLU), and ( b ) is the bias term.
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
70 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
2. Pooling Operation:
Max Pooling:
[{MaxPooling}(I)_{i,j} = \max_{m,n} I_{(i . S + m),(j . S + n)}]
Average Pooling:
[ {AvgPooling}(I)_{i,j} = {1}/{m . n} \sum_{m,n} I_{(i . S + m),(j . S + n)}]
3. Fully Connected Layer:
Input Vector: ( X ) (flattened output from previous layers)
Weight Matrix: ( W)
Bias Vector: ( b)
Output Vector:( Y)
[ Y = f(WX + b)]
4. Activation Function:
Commonly used activation functions include ReLU (Rectified Linear Unit):
[ {ReLU}(x) = \max(0, x) ]
and Sigmoid:
[ {Sigmoid}(x) = {1}/{1 + e^{-x}}] ( Ekong et al., 2022)
These mathematical operations are applied across the layers of a DCNN to progressively learn
hierarchical features from the input data (Edet et al., 2024). The network is trained using
backpropagation and optimization algorithms to minimize a defined loss function, ensuring
that the network's output aligns with the ground truth labels for the training data.
2. MSB Algorithm
The Most Significant Bit (MSB) algorithm is a straightforward technique used for data
embedding in digital images. Below is a simple algorithm outlining the steps involved in the
MSB embedding process:
Input:
- Original digital image (represented as a matrix of pixel values)
- Copyright or trademark information to be embedded (binary data)
Output:
- Payload digital image
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
71 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
Steps:
1. Convert Copyright Information to Binary:
Convert the copyright or trademark information into binary format. Each character in the
copyright information is represented by its corresponding binary value using ASCII or Unicode
encoding.
2. Iterate Through Image Pixels:
Iterate through each pixel in the digital image, row by row and column by column.
3. Embed Copyright Information:
For each pixel, retrieve the grayscale value or color channels (e.g., RGB values). Since the
MSB is the highest-order bit, it has the least effect on the pixel's intensity or color perception.
Therefore, overwrite the MSB of each pixel's binary representation with the bits of the
copyright information. Repeat this process for each bit of the copyright information until all
bits are embedded.
4. Update Pixel Values:
Update the pixel values in the image matrix with the modified binary representations
containing the embedded copyright information.
5. Output Payload Image:
The resulting image now contains the embedded copyright or trademark information in its
MSB. This image is the output of the MSB embedding algorithm.
3. Strength of MSB and DCNN over the Existing Approach
In this section, we state five potential advantages of using the MSB and DCNN methods over
traditional watermarking techniques for copyright protection in digital images, intellectual
property, trademarks, etc.:
1. Higher Capacity for Data Embedding:
The MSB and DCNN methods can embed more information compared to traditional
watermarking techniques that often use the least significant bits (LSBs). By leveraging the most
significant bits and DCNN, the methods allows for embedding and checking a larger amount
of data without significantly affecting the image quality.
2. Enhanced Robustness:
The MSB and DCNN methods are generally more robust against various types of attacks,
such as compression, noise addition, and other common image processing operations. Since
data is embedded in the more critical parts of the data, it is less likely to be destroyed by such
operations.
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
72 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
3. Improved Security:
By embedding data in the most significant bits, the MSB method can offer enhanced security
against unauthorized removal or tampering. Modifying or removing the embedded data without
noticeably altering the image quality can be more challenging for attackers.
4. Better Visual Quality:
The MSB method can maintain better visual quality, especially when the data is spread over
multiple MSBs in a controlled manner. This can result in less noticeable changes compared to
some traditional watermarking methods that may introduce visible distortions.
5. Easier Detection and Verification:
Data embedded using the MSB method can be more easily detected and verified, as it is less
susceptible to loss or degradation during common image processing. This simplifies the process
of verifying copyright and ownership, making it faster and more reliable.
RESULTS/FINDINGS
In this section, the output of the system is presented. Below are the output of the copyright
protection and detection system.
Fig. 3: Application Loading Screen
As the application initiates, it undergoes a meticulous loading process, systematically gathering
essential files and resources vital for its seamless operation. Beginning from index 0 and
progressing sequentially to 100, each file is meticulously retrieved and integrated into the
application's runtime environment. This loading phase ensures that all requisite components,
including libraries, configuration files, and data sets, are efficiently accessed and initialized,
laying a robust foundation for the subsequent execution of the application's functionalities.
During the loading sequence, the application meticulously verifies the integrity and
completeness of each file, performing validation checks to ascertain their authenticity and
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
73 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
compatibility with the runtime environment. This rigorous validation process helps mitigate
potential errors or inconsistencies that may arise during runtime, fostering stability and
reliability in the application's execution. Additionally, the loading phase serves as a critical
preparatory stage, setting the stage for the application to deliver optimal performance and
functionality while adhering to established quality standards and best practices.
Fig. 5: Login Screen
The login screen serves as the gateway to the application's functionalities, ensuring secure
access through robust authentication mechanisms. Upon accessing the login screen, users are
prompted to input their credentials, including a username and password. The system
meticulously validates these credentials against predefined criteria, verifying the correctness
of the provided username and password combination. Only upon successful validation of the
credentials does the login screen grant access to authorized users, enabling them to proceed to
utilize the application's features and functionalities, while maintaining the integrity and
confidentiality of the system.
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
74 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
Fig. 6: Menu Screen
The menu screen presents users with a pivotal choice, offering two distinct options to tailor
their interaction with the application's functionalities. Users are empowered to select between
protecting and detecting digital images embedded with textual copyright information or those
embedded with trademark images. This clear and intuitive interface design provides users with
flexibility, allowing them to align their actions with their specific copyright protection and
detection needs. Whether opting to safeguard textual content or visual trademarks, users can
seamlessly navigate through the application's features, ensuring comprehensive protection and
detection of their digital assets. By offering these distinct pathways, the menu screen enhances
user engagement and efficiency, enabling users to make informed decisions that align with
their copyright management objectives.
Fig. 7: Screen for Protection of Digital Data with Copyright Text Information
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
75 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
The screen dedicated to the protection of digital data with copyright text information provides
users with a streamlined interface tailored for seamless integration of copyright information
into their digital assets. Upon accessing this screen, users are prompted to upload the image
they intend to safeguard, facilitating a straightforward process for embedding copyright text
for enhanced protection. Additionally, users are prompted to input a password, bolstering
security measures to ensure authorized access to the embedding process. Once the image and
password are provided, the MSB algorithm seamlessly embeds the copyright text into the
digital image, leveraging imperceptible alterations to preserve visual integrity. Following the
embedding process, the image is securely saved as a payload carrying the copyright
information, effectively encapsulating the copyright text within the image's metadata. This
encapsulation ensures that the copyright information remains seamlessly integrated with the
image, serving as a robust identifier in the event of conflict or infringement. By equipping
digital assets with embedded copyright text, users fortify their ability to assert ownership and
defend against unauthorized usage or reproduction. The interface's user-centric design
prioritizes simplicity and efficacy, empowering users to safeguard their intellectual property
with confidence and ease.
Fig. 8: Protection of Digital Data with Trademark Information
The protection of digital data with trademark information follows a meticulous process,
blending the efficiency of the Most Significant Bit (MSB) method with the advanced
capabilities of Deep Convolutional Neural Networks (DCNN) for detection. Users engaging in
this protection process are guided through an interface optimized for seamless integration of
trademark information into their digital assets. With an intuitive design, users are prompted to
upload the image intended for protection, initiating a process where the MSB algorithm
delicately embeds the trademark information into the image's binary data. This embedding
process is conducted with precision, ensuring that the trademark remains discreetly integrated
while maintaining the image's visual fidelity. Upon completion of the embedding process, the
image is fortified with trademark information, serving as a distinct identifier for the protected
asset. During the subsequent detection phase, powered by DCNN, the system rigorously scans
digital content to identify instances of trademark infringement or unauthorized usage.
Leveraging the robust pattern recognition capabilities of DCNN, the system efficiently
identifies trademarked elements within digital assets, providing users with invaluable insights
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
76 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
into potential copyright violations. By integrating the MSB embedding method with DCNN-
based detection, users can effectively safeguard their digital assets, preemptively detecting and
addressing instances of trademark infringement with precision and confidence. This
harmonious fusion of algorithms empowers users to assert ownership rights over their
intellectual property in the digital landscape, ensuring comprehensive protection and
enforcement capabilities.
Fig. 9: Detection of Copyright infringement using DCNN
The Detection of Copyright Infringement using Deep Convolutional Neural Networks (DCNN)
screen provides users with a swift and reliable means to ascertain the copyright status of digital
images, enabling proactive identification of potential infringement or conflicts. Through an
intuitive interface, users can effortlessly upload images for analysis, leveraging the powerful
capabilities of DCNN for copyright detection. Upon submission, the system rigorously
analyzes the uploaded images, employing sophisticated pattern recognition algorithms to
identify copyrighted elements or trademarks embedded within the digital content. This
comprehensive analysis enables users to swiftly determine the copyright status of images,
empowering them to take appropriate action in cases of infringement or conflict. With its user-
friendly design and efficient processing capabilities, the DCNN-based detection screen serves
as a valuable tool for safeguarding intellectual property rights in the digital domain, facilitating
proactive enforcement and protection measures with ease.
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
77 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
Fig. 10: Program files from folder
The program files necessary for system programming are meticulously organized within
designated folders, ensuring efficient development and maintenance workflows. These folders
house a comprehensive array of files essential for the system's functionality, including source
code, libraries, configuration files, and documentation.
IMPLICATION TO RESEARCH AND PRACTICE
The implications of this research to practice are significant, as it offers a practical framework
for enhancing copyright protection and detection in the digital domain. By integrating advanced
algorithms like the Most Significant Bit (MSB) embedding technique and Deep Convolutional
Neural Networks (DCNNs), the software provides a robust solution for safeguarding
intellectual property rights against unauthorized use. Practitioners can utilize this technology
to efficiently embed copyright information into digital images and detect potential
infringements, thus streamlining enforcement processes and reducing the risk of intellectual
property theft. This practical application empowers individuals and organizations to better
protect their digital assets and uphold their rights, contributing to a more secure and equitable
digital nvironment.
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
78 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
CONCLUSION
In conclusion, this research has developed and evaluated a software solution designed to
address the growing concerns of copyright infringement in the digital landscape. The software
employs a dual-faceted approach: during the protection phase, it utilizes the Most Significant
Bit (MSB) embedding technique to subtly integrate copyright or trademark information into
digital images, ensuring that this data is not perceptible while maintaining the image's visual
quality. During the detection phase, the software leverages Deep Convolutional Neural
Networks (DCNNs) to rigorously analyze images for signs of unauthorized use or copyright
violations. This methodology combines advanced image processing with sophisticated pattern
recognition to offer a comprehensive tool for protecting and enforcing intellectual property
rights. The results of this research demonstrate the effectiveness of the proposed solution in
both embedding copyright information and detecting infringement. The MSB embedding
technique proved to be efficient in encoding protection data without compromising image
integrity, while the DCNN-based detection algorithm successfully identified instances of
copyright violations with high accuracy. This combination of methodologies not only enhances
the capability to safeguard digital assets but also streamlines the enforcement process for users.
The software’s intuitive interface ensures that users can navigate these functionalities with
ease, making it a valuable asset for individuals and organizations seeking to protect their
intellectual property in an increasingly digital world.
FUTURE RESEARCH
Future research should explore integrating additional machine learning models and encryption
techniques to further enhance the robustness and adaptability of copyright protection and
detection mechanisms .
REFERENCES
Anietie Ekong, Blessing Ekong and Anthony Edet (2022), Supervised Machine Learning
Model for EffectiveClassification of Patients with Covid-19 Symptoms Based on
Bayesian Belief Network, Researchers Journal ofScience and Technology(2022),2, pp-
27-33.
Ansa, G., Cruickshank, H., & Sun, Z. (2012). An Energy-Efficient Technique to Combat DOS
Attacks in Delay Tolerant Networks. EAI Endorsed Transactions on Ubiquitous
Environments, 1, (1),.
Basma, M. S., Julien, Tièche, J. K. & Arnaud, G. (2020). Algorithmic methods to explore the
automation of the appraisal of structured and unstructured digital data, Records
Management Journal,30(2), 175-200.
Buschek, D., Bader, M., von Zezschwitz, E., & Luca, A. (2015). Automatic privacy
classification of personal photos. In IFIP Conference on Human-Computer Interaction,
428435.
Ebong, O., Edet, A., Uwah, A., & Udoetor, N. (2024). Comprehensive Impact Assessment of
Intrusion Detection and Mitigation Strategies Using Support Vector Machine
Classification. Research Journal of Pure Science and Technology, 7,(2), 50-69.
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
79 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
Edet, A. E. and Ansa, G. O. (2023). Machine learning enabled system for intelligent
classification of host-based intrusion severity. Global Journal of Engineering and
Technology Advances,16(03), 041050.
Edet, A., Ekong, B. and Attih, I. (2024). Machine Learning Enabled System for Health Impact
Assessment of Soft Drink Consumption Using Ensemble Learning Technique.
International Journal Of Computer Science And Mathematical Theory,10(1):79-101,
DOI: 10.56201/ijcsmt.v10.no1.2024.pg79.101
Edet, A., Silas, A., Ekaetor, E., Ebong, O., Isaac, E., & Udoetor, N. (2024). DATA-DRIVEN
FRAMEWORK FOR CLASSIFICATION AND MANAGEMENT OF START-UP
RISK FOR HIGH INVESTMENT RETURNS. Advanced Journal of Science,
Technology and Engineering, 4,(2),81-102.
Edet, A., Udonna, U., Attih, I., and Uwah, A. (2024). Security Framework for Detection of
Denial of Service (DoS) Attack on Virtual Private Networks for Efficient Data
Transmission. Research Journal of Pure Science and Technology, 7(1),71-81. DOI:
10.56201/rjpst.v7.no1.2024.pg71.81
Ekong, A., James, G., Ekpe, G., Edet, A., & Dominic, E. A (2024). Model For The
Classification Of Bladder State Based On Bayesian Network. International Journal of
Engineering and Artificial Intelligence, 5 ,(2) 3347
Ekong, B., Edet, A., Udonna, U., Uwah, A.,and Udoetor, N. (2024), Machine Learning Model
for Adverse Drug Reaction Detection Based on Naive Bayes and XGBoost Algorithm.
British Journal of Computer, Networking and Information Technology 7(2), 97-114.DOI:
10.52589/BJCNIT-35MFFBC6
Ekong, B., Ekong, O., Silas, A., Edet, A., & William, B. (2023). Machine Learning Approach
for Classification of Sickle Cell Anemia in Teenagers Based on Bayesian Network.
Journal of Information Systems and Informatics, 5(4), 1793-1808.
https://doi.org/10.51519/journalisi.v5i4.629.
Haonan, Z. , Jiamin, C., Ziyue, Y., Tingmin, W., Pathum, C. M. A. , Chehara, P., & Minhui,
X. (2023). Copyright Protection and Accountability of Generative AI: Attack,
Watermarking and Attribution. University of New South Wales, Australia.
Hasan, R., Shaffer, P., Crandall, D., Apu Kapadia, E. T., et al. (2017). Cartooning for enhanced
privacy in lifelogging and streaming videos. In Proceedings of the IEEE Conference on
Computer Vision and Pattern Recognition Workshops, 2938.
Henry, O., Ekong, A., Okpako, E. (2021). A Fuzzy-Based Chat-bot Messenger for Home
Intelligent System with Multiple Sensors. International Journal of Advanced Trends in
Computer Science and Engineering,10,(2),1026-1038.
Hoyle, R., Stark, L., Ismail, Q., Crandall, D., Kapadia, A., and Anthony, D. (2020). Privacy
Norms and Preferences for Photos Posted Online. ACM Transactions on Computer
Human Interaction, 27(4): 127.
Li, J., Wong, Y., Zhao, Q., and Kankanhalli, M. S. (2017a). Dual-glance model for deciphering
social relationships. In Proceedings of the IEEE International Conference on Computer
Vision, 26502659.
Liu, C., Zhu, T., Zhang, J., and Zhou, W. (2020). Privacy Intelligence: A Survey on Image
Sharing on Online Social Networks. arXiv preprint arXiv:2008.12199.
Oh, S. J., Benenson, R., Fritz, M., & Schiele, B. (2016). Faceless person recognition: Privacy
implications in social media. In European Conference on Computer Vision, 19 35.
British Journal of Computer, Networking and Information Technology
ISSN: 2689-5315
Volume 7, Issue 4, 2024 (pp. 58-80)
80 Article DOI: 10.52589/BJCNIT-OQQNPPCJ
DOI URL: https://doi.org/10.52589/BJCNIT-OQQNPPCJ
www.abjournals.org
Oh, S. J., Fritz, M.,& Schiele, B. (2017). Adversarial image perturbation for privacy protection
a game theory perspective. In Proceedings of the IEEE International Conference on
Computer Vision, 14911500.
Orekondy, T., Schiele, B., and Fritz, M. (2017). Towards a visual privacy advisor:
Understanding and predicting privacy risks in images. In Proceedings of the IEEE
International Conference on Computer Vision, 36863695.
Shabou, B., Tièche, J., Knafou, J., Gaudinat, A. (2020). Algorithmic methods to explore the
automation of the appraisal of structured and unstructured digital data. Records
Management Journal. DOI: 10.1108/RMJ-09-2019-0049
Shen, L., Hong, R., Zhang, H., Zhang, H., and Wang, M. (2019). Single-shot Semantic Image
Inpainting with Densely Connected Generative Networks. In Proceedings of the 27th
ACM International Conference on Multimedia, 18611869.
Shetty, R. R., Fritz, M., and Schiele, B. (2018). Adversarial scene editing: Automatic object
removal from weak supervision. In Advances in Neural Information Processing Systems,
77067716.
Sun, X., Wu, P., and Hoi, S. C. (2018). Face detection using deep learning: An improved faster
RCNN approach. Neurocomputing, 299: 4250.
Tonge, A., and Caragea, C. (2019). Dynamic deep multimodal fusion for image privacy
prediction. In The World Wide Web Conference, 18291840.
Tonge, A., Caragea, C., and Squicciarini, A. (2018). Uncovering scene context for predicting
privacy of online shared images. In Proceedings of the 32nd AAAI Conference on
Artifcial Intelligence, 81678168.
Uwah, A. and Edet, A. (2024).Customized Web Application for Addressing Language
ModelMisalignment through Reinforcement Learning from HumanFeedback. World
Journal of Innovation And Modern Technology,8,(1), 62-71. DOI:
10.56201/wjimt.v8.no1.2024.pg62.71.
Yang, G., Cao, G., Chen, Z., Guo, J., & Li, J. (2020). Graph-based neural networks for
explainable image privacy inference, Pattern Recognition, Volume 105,
https://doi.org/10.1016/j.patcog.2020.107360.
Yingqian, C., Jie, R., Han, X., Pengfei, H., Hui, L., Lichao, S., Yue, X., Jiliang, T. (2023).
Diffusionshield: a Watermark For Data CopyRight Protection Against Generative
Diffusion Models.
Yingqian, C., Jie, R., Han, X., Pengfei, H., Hui, L., Lichao, S., Yue, X., Jiliang, T. (2023).
Diffusionshield: a Watermark For Data CopyRight Protection Against Generative
Diffusion Models.
Zerr, S., Siersdorfer, S., Hare, J., and Demidova, E. (2012). Privacy-aware image classifcation
and search. In Proceedings of the 35th International ACM SIGIR Conference on Research
and Development in Information Retrieval, 3544.
Zhou, W., Li, H., Lu, Y., and Tian, Q. (2012). Principal visual word discovery for automatic
license plate detection. IEEE Transactions on Image Processing, 21(9): 42694279.
... Furthermore, in the field of precision engineering, machine learning fosters a culture of continuous improvement. It helps in fine-tuning construction processes, optimizing material use, and ensuring quality control with remarkable accuracy [29]. This human-machine collaboration means engineers no longer have to choose between speed and accuracy they can have both. ...
Article
Full-text available
This research investigates the influence of soil type variations on the compressive strength and settlement behavior of spread footing foundations. Soil properties such as moisture content, dry density, void ratio, cohesion, and internal friction angle play a crucial role in determining how foundations respond to applied loads. Variations in these properties can lead to uneven settlements and structural instability, posing significant challenges in construction. The study aims to provide a comprehensive understanding of these interactions to enhance foundation design and prevent structural failures. We applied machine learning techniques for data analysis and visualized patterns using Power BI, enabling a detailed exploration of the relationships between soil characteristics, compressive strength, and settlement behavior. The results showed that soil cohesion and internal friction angle had the most significant impact on compressive strength, while moisture content and void ratio were key contributors to settlement behavior. The optimized model achieved high accuracy of 82% in classifying settlement levels, reinforcing the dataset's reliability. This research highlights the importance of thorough soil testing and data-driven modeling in foundation design. We recommend integrating predictive models into geotechnical practice to support safer, more resilient structures, especially in areas with diverse soil profiles. The findings provide a valuable tool for engineers to make informed decisions, reducing the risk of foundation failure and enhancing the long-term stability of infrastructure.
... This bottom-up approach fosters a safety culture where everyone-from project managers to laborers-actively participates in identifying risks and contributing to overall safety. Also, DCNN algorithms could be used to model hazards being that they are good when working on image data [8] In recent years, machine learning (ML) has emerged as a game-changing technology in the realm of hazard identification and risk management within the construction industry. These algorithms-part of the broader field of artificial intelligence-enable construction professionals to sift through massive amounts of data, identify patterns, and make informed predictions. ...
Article
Full-text available
This research delves into the crucial area of hazard detection and risk severity assessment within the construction industry, using machine learning techniques. The dataset utilized is from the Chinese Construction Company (CCECC), Uyo, Nigeria. Comprising over 100,000 instances, it captures various hazard categories prevalent in construction sites, providing a comprehensive foundation for predictive analysis. In the first phase of the study, the system is designed to detect hazards present in construction sites. Leveraging these data, the machine learning models are trained to predict potential hazards based on the information provided. Through TF-IDF vectorization, a feature extraction technique, the textual data is transformed into numerical representations. Multinomial Naive Bayes is employed for hazard classification due to its efficacy in handling text data, and with it, an accuracy of 0.99 was obtained. Subsequently, the trained model was evaluated to assess its performance and the severity of identified hazards are evaluated. The system quantifies the potential risk posed by each hazard using the risk severity attribute. Using the Linear Regression algorithm, the model predicts the severity of risks based on textual descriptions of a hazard. In practical application, the research stresses the significance of risk management strategies in the construction industry to mitigate potential harm to personnel and infrastructure. This research contributes to advancing safety protocols within the construction sector, advocating for a culture of vigilance and precaution to address risks effectively.
Article
Full-text available
This research explores the classification of startup risks to achieve high investment returns using Random Forest Regression. The study aims to identify and predict potential risks faced by startups, thereby aiding investors in making informed decisions. We analyzed a dataset comprising various features such as funding levels, market size, expenses, team experience, product development stage, customer satisfaction scores, and revenue streams. We employed a Random Forest Regression model to evaluate the predictive power of these features. The model's performance was assessed using several metrics: Mean Squared Error (MSE), R-squared, Mean Absolute Error (MAE), Mean Squared Logarithmic Error (MSLE), and Explained Variance Score.The model demonstrated robust predictive capabilities, with an MSE of 0.255, R-squared of 0.9515, MAE of 0.782, MSLE of 0.219, and an Explained Variance Score of 0.915. These results indicate that the model effectively captures the variance in startup risks and predicts them with high accuracy. Feature importance analysis revealed that expenses and funding levels were the most critical factors influencing startup risk classification. The distribution of risks identified 12.4% Strategic Risks, 12.6% Financial Risks, 13.1% Operational Risks, 13.7% Market Risks, and 48.2% of activities with no significant risks.Based on our findings, we recommend that investors focus on key features as outlined in this research when assessing startup risks. By employing the insights provided by our model, investors can better identify high-potential startups, optimize resource allocation, and improve their investment strategies.The Random Forest Regression model offers a reliable tool for predicting and classifying startup risks, providing valuable insights that can enhance investment decision-making and ultimately lead to higher returns.
Article
Full-text available
Adverse drug effects, commonly referred to as adverse drug reactions (ADRs), represent undesirable and unintended responses to medications or pharmaceutical products when used at recommended doses for therapeutic purposes. These effects can range from mild, tolerable symptoms to severe, life-threatening conditions and can manifest in various ways, affecting different organ systems within the human body. ADE analysis plays a pivotal role in prioritizing patient safety. By meticulously examining the relationship between drug administration and patient responses, healthcare providers can tailor medications to individual profiles, minimizing risks of adverse reactions. This ensures a patient-centric approach to treatment, where prescriptions are finely tuned to maximize efficacy while minimizing potential harm. This research aims to address this challenge by developing a machine learning system utilizing the Naive Bayes and XGBoost algorithms to enhance the categorization of drugs with adverse effects, ultimately contributing to improved patient safety and healthcare decision-making. In our approach, we made a system that detects ADR to effectively combine and collate patient medical history and drug information to detect if a patient would suffer adverse effects or reaction after taking the medication in its correct expert prescribed dose. The XGBoost algorithm gave a 75% accuracy score while Naive Bayes algorithm gave a score of 99%.
Article
Full-text available
The bladder, a crucial organ for urine storage, can be considered as an Overactive Bladder (OAB), a dysfunction causing an urgent and sudden urge to urinate. OAB significantly impacts various aspects of daily life, affecting interpersonal interactions and routine activities such as work, travel, exercise, sleep, and leisure. The updated Global Constipation societal definition of OAB emphasizes its characteristics, encompassing sexual pressure, periodicity, nocturia, and sudden urination without evident urinary tract infection or other pathological signs. Recognizing the profound influence of OAB on physical and social functioning, vitality, and emotional well-being, this research addresses the imperative need for an effective diagnostic model. We aim to develop a supervised Machine Learning Model capable of classifying patients' bladders as either overactive (BAD) or not overactive (GOOD). Bayesian Beliefs Network (BBN) emerges as the preferred classification model due to its unique ability to model causation and correlation. In pursuit of this goal, an artificial intelligence system was developed to detect OAB issues. The employed algorithm estimates the probability of OAB based on input data, assuming mutual independence exclusivity among predictor variables during design and implementation. The results obtained demonstrate the successful classification of bladders into overactive or non-overactive categories, showcasing the potential of Bayesian Networks as a robust tool for addressing OAB diagnostic challenges. Notably, the Bayesian Network achieved a classification accuracy of 68%, underscoring its effectiveness in OAB classification. By recognizing the intricate relationship between fluid choices, age, urinary symptoms, and gender, the way for more targeted interventions is paved, personalized treatment plans and a refined clinical approach to addressing the prevalence of Overactive Bladder as a global health concern are modeled showing major improvement over existing approaches.
Article
Full-text available
Cybersecurity remains a paramount concern in today's interconnected digital space, necessitating continual evaluation and refinement of intrusion detection and mitigation strategies. This study presents a comprehensive impact assessment of various intrusion detection and mitigation methods, adopting Support Vector Machine (SVM) classification for analysis. Through critical examination of diverse techniques, including signature-based, behavior-based, and anomaly-based approaches, the research evaluates their effectiveness in combating cyber threats. Notably, SVM classification achieves an accuracy score of 87%, revealing its utility in discerning subtle patterns indicative of malicious activity. Furthermore, the study highlights the significance of proactive measures such as user training, network segmentation, and multi-factor authentication in fortifying defense mechanisms. By providing valuable insights into the strengths and limitations of different approaches, this work contributes to the ongoing efforts to safeguard digital ecosystems against evolving cyber threats.
Article
Full-text available
This study delves into the problem of detecting Denial-of-Service (DoS) attacks on Virtual Private Network (VPN) servers and the detrimental impact of such attacks on network functionality. A DoS attack aims to overwhelm a server, rendering it incapable of providing services to legitimate users. A VPN, on the other hand, serves as a secure conduit for data transmission over the internet. DoS attacks on VPN servers disrupt the seamless flow of communication, causing potential data breaches and compromising the confidentiality, integrity, and availability of network resources. The adverse effects of DoS attacks on VPN servers are profound, ranging from service degradation to complete unavailability. Such disruptions can lead to a breakdown in communication channels, hindering user access to critical resources. Our approach to tackling this challenge involves a meticulous examination of key data features, including Traffic-Volume, Packet-Rate, Traffic-Diversity, Connection-Attempts, Connection-Duration, Protocol-Analysis, and Packet-Size-Distribution. Our dataset is sourced directly from a live server, our study employs the K-Nearest Neighbors (KNN) classification algorithm, to model and identify patterns associated with DoS attacks. Our findings reveal a high accuracy of 94% in detecting DoS attacks using the KNN model, showcasing the efficacy of our approach. The utilization of real-world data enhances the relevance and applicability of our research in practical cybersecurity scenarios.
Article
Full-text available
Soft drinks, often high in added sugars, have raised significant public health concerns due to their association with adverse health effects such as obesity, type 2 diabetes, and cardiovascular diseases. The aim of this study is to investigate the health impact of soft drink consumption, particularly focusing on the implications of excessive sugar intake. To address this concern, we employed four Ensemble Learning approaches to assess the health risks associated with soft drink consumption, specific Ensemble Learning approaches such as LightGBM, CatBoost, XGBoost, and Random Forest we adopted. Our findings indicate that older individuals may not require as much soft drink consumption, and the general population should limit their daily intake to a single bottle, approximately 35g per day. The study reveals that using Ensemble Learning techniques, including LightGBM, CatBoost, XGBoost, and Random Forest, yielded promising results, with CatBoost emerging as the top-performing model with a model accuracy score of 97%, surpassing the performance of Random Forest and XGBoost algorithms. The research reveals the importance of limiting the consumption of sugary beverages and opting for healthier alternatives to mitigate the risk of adverse health outcomes associated with excessive sugar consumption. Overall, our findings contribute valuable insights into understanding the health implications of soft drink consumption and highlight the efficacy of Ensemble Learning approaches in assessing and addressing public health concerns. This study provides actionable recommendations for individuals and health organizations to promote healthier dietary habits and mitigate the risk of sugar-related health complications, emphasizing the importance of evidence-based interventions in safeguarding public health.
Article
Full-text available
Recent years have seen tremendous progress in the field of artificial intelligence, which has sparked the creation of cutting-edge tools like OpenAI ChatGPT. The OpenAI GPT-3 family of big language models serves as the foundation for ChatGPT, which is enhanced through the use of supervised and reinforcement learning methodologies. Its goal is to produce text that can't be distinguished from human-written information. It can hold conversations with users in a way that is surprisingly clear-cut and uncomplicated. Reinforcement Learning from Human Feedback (RLHF) is the technique employed. Human input and machine learning methods (Supervised Learning) are used to train the model. It is employed in the training phases to reduce biased, damaging, and false outputs. The resulting InstructGPT models are much better at following instructions than GPT-3. Above all, customized ChatGPT web application that can fine-tune a given input and generate text that is of high quality, harmless, truthful and appropriate, without biased outputs. A key motivation for our work is to increase helpfulness and truthfulness output while mitigating the harms and biases of language models. In conclusion, our results show that reinforcement learning from human feedback (RLHF) techniques is effective at significantly improving the alignment of general-purpose AI systems with human intentions.
Article
Full-text available
In this study, we employed a Bayesian network approach for the classification of sickle cell anemia in teenagers based on their medical data. Sickle cell anemia is a hereditary blood disorder characterized by the presence of abnormal hemoglobin, leading to distorted red blood cells. Early detection and classification of this condition are crucial for timely intervention and improved patient outcomes. Our research focused on leveraging the algorithmic power of Bayesian network to model and analyze a diverse set of medical parameters in teenagers, including age, platelet count, mean corpuscular hemoglobin concentration (MCHC), red blood cell count, packed cell volume etc. The Bayesian network method employed for the classification of sickle cell anemia involves using a probabilistic graphical model to represent the relationships among different medical parameters. The model incorporates Bayesian principles to update and refine its predictions as new information is introduced. The method identifies key features in the dataset that contribute significantly to the classification, providing valuable insights for early detection and intervention. The Bayesian network demonstrated remarkable efficacy in accurately classifying teenagers as either positive for sickle cell anemia or negative, achieving an impressive 99% accuracy rate. This high level of accuracy indicates the robustness of the model in discerning intricate patterns within the medical data. Key features contributing to the classification are found in the dataset, shedding light on their relevance in distinguishing between positive and negative cases of sickle cell anemia, especially in teenagers. Our findings provide valuable insights into the potential diagnostic significance of sickle cell anemia classification in the teenage population. This research contributes to the growing body of knowledge in the field of medical informatics and computational biology, offering an efficient and reliable tool for healthcare practitioners in the early identification of sickle cell anemia in teenagers. The demonstrated accuracy of the Bayesian network shows its potential as an effective decision support system, aiding clinicians in making informed decisions and facilitating timely interventions for improved patient care.
Article
Full-text available
Intrusion severity classification or the analysis of the impact of intrusion is a much needed solution to effectively manage intrusion events in an organization. A lot of intrusion scenarios have been carried out by systems administrators or the internal workers over the years in different organizations and the external hackers are berated for it. Many deliberate inversions have happened from the internal actors with top management board members only swinging into actions to manage the effect of it without digging into the inversion to apprehend the actors or the source of the intrusion. So, this work has been designed to assist IT firms to effectively carry out the analysis of the impact of intrusion, especially those from the internal workers. In this work, we proposed a Machine Learning Enabled System for Intelligent Classification of Host-based Intrusion Severity. The proposed model is aimed at detecting the severity of intrusion problems, carryout source analysis and give security recommendation for effective management of intrusion problems. The model is divided into three phases; the detection of intrusion severity, source analysis and security recommendation using counterfacatual reasoning Model.We built a system that aided us to gather user interaction over time, we captured these interaction in the activity log, our dataset was extracted from these activity log data.We used Bayesian Network to design the intrusion severity classification system, source analysis is carried out immediately, then counterfactual model is employed to give security recommendation. The accuracy of Bayesian Network in the intrusion severity classification model is 82%. An API was generated and deployed to allow scalability.
Article
Recently, Generative Diffusion Models (GDMs) have shown remarkable abilities in learning and generating images, fostering a large community of GDMs. However, the unrestricted proliferation has raised serious concerns on copyright issues. For example, artists become concerned that GDMs could effortlessly replicate their unique artworks without permission. In response to these challenges, we introduce a novel watermark scheme, Diffusion Shield, against GDMs. It protects images from infringement by encoding the ownership message into an imperceptible watermark and injecting it into images. This watermark can be easily learned by GDMs and will be reproduced in generated images. By detecting the watermark in generated images, the infringement can be exposed with evidence. Benefiting from the uniformity of the watermarks and the joint optimization method, Diffusion Shield ensures low distortion of the original image, high watermark detection performance, and lengthy encoded messages. We conduct rigorous and comprehensive experiments to show its effectiveness in defending against infringement by GDMs and its superiority over traditional watermark methods.