Reference Hub2
Design and Implementation of a Cognitive Tool to Detect Malicious Images Using the Smart Phone

Design and Implementation of a Cognitive Tool to Detect Malicious Images Using the Smart Phone

Hiroyuki Nishiyama, Fumio Mizoguchi
Copyright: © 2014 |Volume: 6 |Issue: 2 |Pages: 11
ISSN: 1942-9045|EISSN: 1942-9037|EISBN13: 9781466656819|DOI: 10.4018/ijssci.2014040102
Cite Article Cite Article

MLA

Nishiyama, Hiroyuki, and Fumio Mizoguchi. "Design and Implementation of a Cognitive Tool to Detect Malicious Images Using the Smart Phone." IJSSCI vol.6, no.2 2014: pp.30-40. http://doi.org/10.4018/ijssci.2014040102

APA

Nishiyama, H. & Mizoguchi, F. (2014). Design and Implementation of a Cognitive Tool to Detect Malicious Images Using the Smart Phone. International Journal of Software Science and Computational Intelligence (IJSSCI), 6(2), 30-40. http://doi.org/10.4018/ijssci.2014040102

Chicago

Nishiyama, Hiroyuki, and Fumio Mizoguchi. "Design and Implementation of a Cognitive Tool to Detect Malicious Images Using the Smart Phone," International Journal of Software Science and Computational Intelligence (IJSSCI) 6, no.2: 30-40. http://doi.org/10.4018/ijssci.2014040102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In this study, the authors design a cognitive tool to detect malicious images using a smart phone. This tool can learn shot images taken with the camera of a smart phone and automatically classify the new image as a malicious image in the smart phone. To develop the learning and classifier tool, the authors implement an image analysis function and a learning and classifier function using a support vector machine (SVM) with the smart phone. With this tool, the user can collect image data with the camera of a smart phone, create learning data, and classify the new image data according to the learning data in the smart phone. In this study, the authors apply this tool to a user interface of a cosmetics recommendation service system and demonstrate its effectiveness by in reducing the load of the diagnosis server in this service and improving the user service.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.