Cite

1. Lian, S., D. Kanellopoulos. Recent Advances in Multimedia Information Systems Security. – Informatica – An International Journal of Computing and Informatics, Vol. 33, 2009, pp. 3-24.Search in Google Scholar

2. Qureshi, M. A., M. Deriche. A Bibliography of Pixel-Based Blind Image Forgery Detection. – Signal Processing: Image Communication, Vol. 39, 2015, No A, pp. 46-74.10.1016/j.image.2015.08.008Search in Google Scholar

3. Liu, G., J. Wang, S. Lian, Z. Wang. A Passive Image Authentication Scheme for Detecting Region-Duplication Forgery with Rotation. – Journal of Network and Computer Applications, Vol. 34, 2011, No 5, pp. 1557-1565.10.1016/j.jnca.2010.09.001Search in Google Scholar

4. Qazi, T., K. Hayat, S. U. Khan, S. A. Madani, I. A. Khan, J. Kolodziej, H. Li, W. Lin, K. C. Yow, C. Z. Xu. Survey on Blind Image Forgery Detection. – IET Image Processing, Vol. 7, 2013, No 7, pp. 660-670.10.1049/iet-ipr.2012.0388Search in Google Scholar

5. Kang, X., S. Wei. An Efficient Approach to Still Image Copy Detection Based on SVD and Block Partition for Digital Forensics. – In: IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS), 2009, pp. 457-461.10.1109/ICICISYS.2009.5358149Search in Google Scholar

6. Battiato, S., G. M. Farinella, E. Messina, G. Puglisi. Robust Image Alignment for Tampering Detection. – IEEE Transactions on Information Technology Forensics and Security, Vol. 7, 2012, No 4, pp. 1105-1117.10.1109/TIFS.2012.2194285Search in Google Scholar

7. Redi, J. A., W. Taktak, J. A. Dugelay. Digital Image Forensics: A Booklet for Beginners. – Multimedia Tools and Applications, Vol. 51, 2011, No 1, pp. 133-162.10.1007/s11042-010-0620-1Search in Google Scholar

8. Han, B., J. Li. A New Zero-Watermarking Algorithm Resisting Attacks Based on Differences Hashing. – Cybernetics and Information Technologies, Vol. 16, No 2, 2016, pp. 135-147.10.1515/cait-2016-0026Search in Google Scholar

9. Wu, M. N., C. C. Lin, C. C. Chang. Novel Image Copy Detection with Rotating Tolerance. – Journal of Systems and Software, Vol. 80, 2007, No 7, pp. 1057-1069.10.1016/j.jss.2006.12.001Search in Google Scholar

10. Chang, E., J. Z. Wang, C. Li, G. Wiederhold. RIME: A Replicated Image Detector for the World-Wide Web. – In: Proc. in SPIE Multimedia Storage and Archiving Systems III, Vol. 3527, 1998.10.1117/12.325852Search in Google Scholar

11. Hsiao, J. H., C. S. Chen, L. F. Chien, M. S. Chen. A New Approach to Image Copy Detection Based on Extended Feature Sets. – IEEE Transactions on Image Processing, Vol. 16, 2007, No 8, pp. 2069-2079.10.1109/TIP.2007.90009917688212Search in Google Scholar

12. Szucs, G., D. Papp. Content-Based Image Retrieval for Multiple Objects Search. – Cybernetics and Information Technologies, Vol. 17, 2017, No 2, pp. 106-118.10.1515/cait-2017-0020Search in Google Scholar

13. Nassih, B., M. Ngadi, A. Amine, A. El-Attar. New Proposed Fusion between DCT for Feature Extraction and NSVC for Face Classification. – Cybernetics and Information Technologies, Vol. 18, 2018, No 2, pp. 89-97.10.2478/cait-2018-0030Search in Google Scholar

14. Arnia, F., Agustinus, K. Munandi, M. Fujiyoshi, H. Kiya. Content-Based Image Copy Detection Based on Sign of Wavelet Coefficients. – In: International Workshop on Advanced Image Technology, 2011.Search in Google Scholar

15. Wang, Y. G., Y. Lei, J. Huang. An Image Copy Detection Scheme Based on Radon Transform. – In: IEEE 17th International Conference on Image Processing, 2010, pp. 1009-1012.10.1109/ICIP.2010.5653456Search in Google Scholar

16. Kim, C. Content-Based Image Copy Detection. – Signal Processing: Image Communication, Vol. 18, 2003, No 3, pp. 169-184.10.1016/S0923-5965(02)00130-3Search in Google Scholar

17. Sebe, N., Y. Liu, Y. Zhuang, T. Huang, S. F. Chang. Blind Passive Media Forensics: Motivation and Opportunity. – In: International Conference on Multimedia Content Analysis and Mining, Vol. 4577, 2007, pp. 57-59.Search in Google Scholar

18. Tang, Z., F. Yang, L. Huang, X. Zhang. Robust Image Hashing with Dominant DCT Coefficients. – Optik, Vol. 125, 2014, No 18, pp. 5102-5107.10.1016/j.ijleo.2014.05.015Search in Google Scholar

19. Tang, Z., X. Zhang, X. Dai, J. Yang, T. Wu. Robust Image Hash Function Using Local Color Features. – International Journal of Electronics and Communications (AEU), Vol. 67, 2013, No 8, pp. 717-722.10.1016/j.aeue.2013.02.009Search in Google Scholar

20. Ouyang, J., G. Coatrieux, H. Shu. Robust Hashing or Image Authentication Using Quaternion Discrete Fourier Transform and Log-Polar Transform. – Digital Signal Processing, Vol. 41, 2015, pp. 98-109.10.1016/j.dsp.2015.03.006Search in Google Scholar

21. Tang, Z., Y. Dai, X. Zhang, L. Huang, F. Yang. Robust Image Hashing via Colour Vector Angles and Discrete Wavelet Transform. – IET Image Processing, Vol. 8, 2014, No 3, pp. 142-149.10.1049/iet-ipr.2013.0332Search in Google Scholar

22. Tang, Z., L. Ruan, C. Qin, X. Zhang, C. Yu. Robust Image Hashing with Embedding Vector Variance of LLE. – Digital Signal Processing, Vol. 43, 2015, pp. 17-27.10.1016/j.dsp.2015.05.002Search in Google Scholar

23. Lei, Y., Y. Wang, J. Huang. Robust Image Hash in Radon Transform Domain for Authentication. – Signal Processing: Image Communication, Vol. 26, 2011, No 6, pp. 280-288.10.1016/j.image.2011.04.007Search in Google Scholar

24. Tang, Z., X. Zhang, X. Li, S. Zhang. Robust Image Hashing with Ring Partition and Invariant Vector Distance. – IEEE Transactions on Information Forensics and Security, Vol. 11, 2016, No 1, pp. 200-214.10.1109/TIFS.2015.2485163Search in Google Scholar

25. Tang, Z., Z. Y. Dai, X. Zhang. Perceptual Hashing for Color Images Using Invariant Moments. – Applied Mathematics and Information Sciences, Vol. 6, 2012, No 2S, pp. 643S-650S.Search in Google Scholar

26. Al-Qershi, O. M., B. E. Khoo. Passive Detection of Copy-Move Forgery in Digital Images: State-of-the-art. – Forensic Science International, Vol. 231, 2013, No 1-3, pp. 284-295.10.1016/j.forsciint.2013.05.02723890651Search in Google Scholar

27. Kailasanathan, C., R. S. Naini, P. Ogunbona. Compression Tolerant DCT Based Image Hash. – In: Proc. of 23rd International Conference Distributed Computing Systems Workshop, 2003, pp. 562-567.Search in Google Scholar

28. Roover, C. D., C. D. Vleeschouwer, F. Lefebvre, B. Macq. Robust Video Hashing Based on Radial Projections of Keyframes. – IEEE Transactions on Signal Processing, Vol. 53, 2005, No 10, pp. 4020-4037.10.1109/TSP.2005.855414Search in Google Scholar

29. Tang, Z., S. Wan, X. Zhang. Lexicographical Framework for Image Hashing with Implementation Based on DCT and NMF. – Multimedia Tools and Applications, Vol. 52, 2010, No 2-3, pp. 325-345.10.1007/s11042-009-0437-ySearch in Google Scholar

30. Yu, Y., S. Sun. Image Robust Hashing Based on DCT Sign. – In: Proc. of 2006 International Conference Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP’06), 2006.10.1109/IIH-MSP.2006.264971Search in Google Scholar

31. Qin, C., C. Chang. Robust Image Hashing Using Non-Uniform Sampling in Discrete Fourier Domain. – Digital Signal Processing, Vol. 23, 2013, No 2, pp. 578-585.10.1016/j.dsp.2012.11.002Search in Google Scholar

32. Swaminathan, A. Robust and Secure Image Hashing. – IEEE Transactions on Information Forensics and Security, Vol. 1, 2006, No 2, pp. 215-230.10.1109/TIFS.2006.873601Search in Google Scholar

33. Swaminathan, A., Y. Mao, M. Wu. Image Hashing Resilient to Geometric and Filtering Operations. – In: IEEE 6th Workshop on Multimedia Signal Processing, 2004, pp. 355-358.Search in Google Scholar

34. Ahmed, F., M. Y. Siyal, V. U. Abbas. A Secure and Robust Hash-Based Scheme for Image Authentication. – Signal Processing, Vol. 90, 2010, No 5, pp. 1456-1470.10.1016/j.sigpro.2009.05.024Search in Google Scholar

35. Lu, C. S., C. Y. Hsu. Geometric Distortion Resilient Image Hashing Scheme and Its Applications on Copy Detection and Authentication. – Multimedia Systems, Vol. 11, 2005, No 2, pp. 159-173.10.1007/s00530-005-0199-ySearch in Google Scholar

36. Lu, C. S., C. Y. Hsu, S. W. Sun, P. C. Chang. Robust Mesh-Based Hashing for Copy Detection and Tracing of Images. – In: IEEE International Conference on Multimedia and Expo (ICME), 2004, pp. 731-734.Search in Google Scholar

37. Meixner, A., A. Uhl. Robustness and Security of a Wavelet-Based CBIR Hashing Algorithm. – In: Proc. of 8th Workshop on Multimedia and Security, 2006, pp. 140-145.10.1145/1161366.1161392Search in Google Scholar

38. Michak, M. K., R. Venkatesan. New Iterative Geometric Methods for Robust Perceptual Image Hashing. – ACM Workshop: Security and Privacy on Digital Rights Management DRM, 2001, pp. 13-21.10.1007/3-540-47870-1_2Search in Google Scholar

39. Monga, V., B. L. Evans. Perceptual Image Hashing via Feature Points: Performance Evaluation and Tradeoffs. – IEEE Transactions on Image Processing, Vol. 15, 2006, No 11, pp. 3453-3466.10.1109/TIP.2006.881948Search in Google Scholar

40. Venkatesan, R., S. M. Koon, M. H. Jakubowski, P. Moulin. Robust Image Hashing. – In: International Conference on Image Processing, 2000, pp. 664-666.Search in Google Scholar

41. Yang, S. H., C. F. Chen. Robust Image Hashing Based on SPIHT. – In: Proc. of IEEE International Conference Information Technology: Research & Education (IIH-MSP’06), 2006, pp. 110-114.Search in Google Scholar

42. Karsh, R. K., R. H. Laskar, Aditi. Robust Image Hashing through DWT-SVD and Spectral Residual Method. – EURASIP Journal on Image and Video Processing, Vol. 2017, 2017, No 31, pp. 1-17.10.1186/s13640-017-0179-0Search in Google Scholar

43. Lefebvre, F., J. Cryz, B. Macq. A Robust Soft Hash Algorithm for Digital Image Signature. – In: Proc. of IEEE International Conference Image Processing, 2003, pp. 495-498.Search in Google Scholar

44. Lefebvre, F., B. Macq, J. D. Legat. RASH: RAdon Soft Hash Algorithm. – In: 11th European Signal Processing Conference, 2002, pp. 1-4.Search in Google Scholar

45. Malkin, M. R. Venkatesan. The Randlet Transform: Applications to Universal Perceptual Hashing and Image Authentication. – In: Proc. of Allerton Conference, 2004.Search in Google Scholar

46. Seo, J. S., J. Haitsma, T. Kalker, C. D. Yoo. A Robust Image Fingerprinting System Using the Radon Transform. – Signal Processing: Image Communication, Vol. 19, 2006, No 4, pp. 325-339.10.1016/j.image.2003.12.001Search in Google Scholar

47. Wu, D., X. Zhou, X. Niu. A Novel Image Hash Algorithm Resistant to Print-Scan. – Signal Processing, Vol. 89, 2009, No 12, pp. 2415-2424.10.1016/j.sigpro.2009.05.016Search in Google Scholar

48. Chen, C. C., S. L. Hsieh. Using Binarization and Hashing for Efficient SIFT Matching. – Journal of Visual Communication & Image Representation, Vol. 30, 2015, pp. 86-93.10.1016/j.jvcir.2015.02.014Search in Google Scholar

49. Ling, H., L. Yan, F. Zou, C. Liu, H. Feng. Fast Image Copy Detection Approach Based on Local Fingerprint Defined Visual Words. – Signal Processing, Vol. 93, 2013, No 8, pp. 2328-2338.10.1016/j.sigpro.2012.08.011Search in Google Scholar

50. Lv, X., Z. J. Wang. Perceptual Image Hashing Based on Shape Contexts and Local Feature Points. – IEEE Transactions on Information Forensics and Security, Vol. 7, 2012, No 3, pp. 1081-1093.10.1109/TIFS.2012.2190594Search in Google Scholar

51. Li, Y., Z. Lu, C. Zhu, X. Niu. Robust Image Hashing Based on Random Gabor Filtering and Dithered Lattice Vector Quantization. – IEEE Transactions on Image Processing, Vol. 21, 2012, No 4, pp. 1963-1980.10.1109/TIP.2011.217169821997268Search in Google Scholar

52. Liu, F., L. Cheng, H. Leung, Q. Fu. Wave Atom Transform Generated Strong Image Hashing Scheme. – Optical Communications, Vol. 285, 2012, No 24, pp. 5008-5018.10.1016/j.optcom.2012.08.007Search in Google Scholar

53. Liu, Y. L., Y. Xiao. A Robust Image Hashing Algorithm Resistant against Geometrical Attacks. – Radio Engineering, Vol. 22, 2013, No 4, pp. 1072-1081.Search in Google Scholar

54. Wang, L., X. Jiang, D. Hu, D. Ye, S. Lian. Robust Perceptual Image Hash Using Gabor Filters. – In: International Conference on Multimedia Information Networking and Security, 2009, pp. 53-56.10.1109/MINES.2009.138Search in Google Scholar

55. Yang, B., F. Gu, X. Niu. Block Mean Value Based Image Perceptual Hashing. – In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2006, pp. 167-172.10.1109/IIH-MSP.2006.265125Search in Google Scholar

56. Hernandez, R. A. P., B. M. Kurkoski. Robust Image Hashing Using Image Normalization and SVD Decomposition. – In: IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS), 2011, pp. 1-4.10.1109/MWSCAS.2011.6026372Search in Google Scholar

57. Kozat, S. S., R. Venkatesan, M. K. Michak. Robust Perceptual Image Hashing via Matrix Invariants. – IEEE International Conference on Image Processing (ICIP), 2004, pp. 3443-3446.Search in Google Scholar

58. Lv, X., Z. J. Wang. An Extended Image Hashing Concept: Content-Based Fingerprinting Using FJLT. – EURASIP Journal on Information Security, 2009, pp. 1-17.10.1186/1687-417X-2009-859859Search in Google Scholar

59. Monga, V., M. K. Michak. Robust and Secure Image Hashing via Non-Negative Matrix Factorizations. – IEEE Transactions on Information Forensics and Security, Vol. 2, 2007, No 3, pp. 376-390.10.1109/TIFS.2007.902670Search in Google Scholar

60. Tang, Z., S. Wang, X. Zhang, W. Wei, S. Su. Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization. – Journal of Ubiquitous Convergence and Technology, Vol. 2, 2008, No 1, pp. 18-26.Search in Google Scholar

61. Karsh, R. K., R. H., Laskar, B. B. Richhariya. Robust Image Hashing Using Ring Partition-PGNMF and Local Features. – SpringerPlus, Vol. 5, 2016, No 1, pp. 1-20.10.1186/s40064-016-3639-6511838127933251Search in Google Scholar

62. Monga, V., B. L. Evans. Robust Perceptual Image Hashing Using Feature Points. – In: IEEE International Conference on Image Processing, 2004, pp. 677-680.Search in Google Scholar

63. Roy, S., Q. Su. Robust Hashfor Detecting and Localizing Image Tampering. – In: IEEE International Conference on Image Processing, 2007, pp. 117-120.10.1109/ICIP.2007.4379535Search in Google Scholar

64. Tang, Z., S. Wang, X. Zhang, W. Wei. Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection. – Fundamenta Informaticae, Vol. 106, 2011, No 1, pp. 75-91.10.3233/FI-2011-377Search in Google Scholar

65. Xiaofeng, W., P. Kemu, Z. Xiaorui, Z. Wang, L. Lu, X. Jianru. A Visual Model Based Perceptual Image Hash for Content Authentication. – IEEE Transactions on Information Forensics Security, Vol. 10, 2015, No 7, pp. 1336-1349.10.1109/TIFS.2015.2407698Search in Google Scholar

66. Chen, Y., W. Yu, J. Feng. Robust Image Hashing Using Invariants of Tchebichef Moments. – Optik, Vol. 125, 2014, No 19, pp. 5582-5587.10.1016/j.ijleo.2014.07.006Search in Google Scholar

67. Zhao, Y., S. Wang, X. Zhang, H. Yao. Robust Hashing for Image Authentication Using Zernike Moments and Local Features. – IEEE Transactions on Information Forensics and Security, Vol. 8, 2013, No 1, pp. 55-63.10.1109/TIFS.2012.2223680Search in Google Scholar

68. Zhao, Y., W. Wei. Perceptual Image Hash for Tampering Detection Using Zernike Moments. – In: Proc. of IEEE International Conference on Progress in Informatics and Computing, 2010, pp. 738-742.Search in Google Scholar

69. Tang, Z., L. Huang, Y. Dai, F. Yang. Robust Image Hashing Based on Multiple Histograms. – International Journal of Digital Content Technology and its Applications (JDCTA), Vol. 6, 2013, No 23, pp. 39-47.10.4156/jdcta.vol6.issue23.5Search in Google Scholar

70. Tang, Z., X. Zhang, L. Huang, Y. Dai. Robust Image Hashing Using Ring-Based Entropies. – Signal Processing, Vol. 93, 2013, No 7, pp. 2061-2069.10.1016/j.sigpro.2013.01.008Search in Google Scholar

71. Tang, Z., X. Zhang, S. Zhang. Robust Perceptual Image Hashing Based on Ring Partition and NMF. – IEEE Transactions on Knowledge and Data Engineering, Vol. 26, 2014, No 3, pp. 711-724.10.1109/TKDE.2013.45Search in Google Scholar

72. Gerold, L., U. Andreas. Key-Dependent JPEG2000 Based Robust Hashing for Secure Image Authentication. – EURASIP Journal on Information Technology, Vol. 8, 2008, No 1, pp. 1-19.10.1155/2008/895174Search in Google Scholar

73. Hadmi, A., W. Puech, B. A. Es Said, A. A. Ouahman. A Robust and Secure Perceptual Hashing System Based on Quantization Step Analysis. – Signal Processing: Image Communications, Vol. 28, 2013, No 8, pp. 929-948.10.1016/j.image.2012.11.009Search in Google Scholar

74. Johnson, M., K. Ramchandran. Dither Based Secure Image Hashing Using Distributed Coding. – In: Proceedings of IEEE International Conference Image Processing, 2003, pp. 751-754.Search in Google Scholar

75. Kang, L., C. Lu, C. Hsu. Compressive Sensing Based Image Hashing. – In: Proc. of IEEE International Conference on Image Processing, 2009, pp. 1285-1288.10.1109/ICIP.2009.5413606Search in Google Scholar

76. Khelifi, F., J. Jiang. Perceptual Image Hashing Based on Virtual Watermark Detection. – IEEE Transactions on Image Processing, Vol. 19, 2010, No 4, pp. 981-994.10.1109/TIP.2009.203863720007047Search in Google Scholar

77. Lv, X., Z. J. Wang. Compressed Binary Image Hashes Based on Semisupervised Spectral Embedding. – IEEE Transactions on Information Forensics and Security, Vol. 8, 2013, No 11, pp. 1838-1849.10.1109/TIFS.2013.2281219Search in Google Scholar

78. Skrepth, C. J., A. Uhl. Robust Hash Functions for Visual Data: An Experiment Comparison. – Pattern Recognition and Image Analysis, Vol. 2652, 2003, pp. 986-993.10.1007/978-3-540-44871-6_114Search in Google Scholar

79. Sun, R., X. Yan, Z. Ding. Robust Image Hashing Using Locally Linear Embedding. – In: International Conference on Computer Science and Service System, 2011, pp. 715-718.Search in Google Scholar

80. Xiang, S., H. J. Kim, J. Huang. Histogram-Based Image Hashing Scheme Robust against Geometric Deformations. – In: Proc. of 9th Workshop on Multimedia & Security, 2007, pp. 121-128.10.1145/1288869.1288886Search in Google Scholar

81. Zou, F., H. Feng, H. Ling, C. Liu, L. Yan, P. Li, D. Li. Nonnegative Sparse Coding Induced Hashing for Image Copy Detection. – Neurocomputing, Vol. 105, 2013, pp. 81-89.10.1016/j.neucom.2012.06.042Search in Google Scholar

82. Tang, Z., L. Huang, X. Zhang, H. Lao. Robust Image Hashing Based on Color Vector Angles and Canny Operator. – International Journal of Electronics and Communications(AEU), Vol. 70, 2016, No 6, pp. 833-841.10.1016/j.aeue.2016.03.010Search in Google Scholar

83. Fridrich, J., M. Goljan. Robust Hash Functions for Digital Watermarking. – In: Proc. on IEEE International Conference on Information Technology: Coding and Computing, 2000, pp. 178-183.Search in Google Scholar

84. Guo, X. C., D. Hatzinakos. Content-Based Image Hashing via Wavelet and Radon Transform. – In: Advances in Multimedia Information Processing – PCM 2007, LNCS, 4810, 2007, pp. 755-764.10.1007/978-3-540-77255-2_91Search in Google Scholar

85. Laraji, I. H., L. Ghouti, E. H. Khiari. Perceptual Hashing of Color Images Using Hyper Complex Representation. – In: Proc. of the IEEE International Conference on Image Processing (ICIP’13), 2013, pp. 4402-4406.10.1109/ICIP.2013.6738907Search in Google Scholar

86. Michak, M. K., R. Venkatesan. A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding. – In: Proc. of 4th International Workshop on Information Hiding, Springer-Verlag, 2001, pp. 51-65.10.1007/3-540-45496-9_5Search in Google Scholar

87. Monga, V., D. Vats, B. L Evans. Image Authentication under Geometric Attacks via Structure Matching. –In: IEEE International Conference Multimedia and Expo, 2005.Search in Google Scholar

88. Ou, Y., K. H. Rhee. A Key-Dependent Secure Image Hashing Scheme by Using Radon Transform. – 2009 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS), 2009, pp. 595-598.10.1109/ISPACS.2009.5383770Search in Google Scholar

89. Rey, C., J. L. Dugelay. A Survey of Watermarking Algorithms for Image Authentication. – EURASIP Journal on Applied Signal Processing, Vol. 1, 2002, pp. 613-621.10.1155/S1110865702204047Search in Google Scholar

90. Sun, Q., S. F. Chang. A Robust and Secure Media Signature Scheme for JPEG Images. – Journal of VLSI Signal Processing Systems for Signal, Image and Video Technology, Vol. 41, 2005, No 3, pp. 305-317.10.1007/s11265-005-4154-0Search in Google Scholar

91. Tang, Z., Y. Dai, X. Zhang, S. Zhang. Perceptual Image Hashing with Histogram of Color Vector Angles. – In: 8th International Conference on Active Media Technology(AMT’12), 2012, pp. 237-246.10.1007/978-3-642-35236-2_24Search in Google Scholar

eISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology