A brief information about yourself. (Names of authors, Works, Education, affiliation and brief summary)
ISAAC BAFFOUR SENKYIRE received the B. Sc. degree from the Department of Computer Science, Kwame Nkrumah University of Science and Technology (KNUST), Ghana in 2009, and the M. Sc. degree from the Department of Computing and Information Systems, University of Greenwich, UK in 2014. He is a lecturer with the Computer Science Department of Ghana Communication Technology University (GCTU) and he is currently pursuing a Ph.D. degree with the school of Computer Science and Telecommunication Engineering, Jiangsu University, China. His research interest includes image processing and analysis, machine learning, deep learning, cybersecurity, and information security. He is a member of the Cyber Security Division, and the Ghana Directorate of Information Assurance and Intelligence Research of the Center for Research, Information, Technology and Advanced Computing ( CRITAC, Ghana), Association of Computing Machinery, and Ghana Chapter of Internet Society (ISOC). He is also a Scientific Peer Reviewer for Publons (Web of Science|Clarivate Analytics)
How well does the study design address a problem in the community?
Excesses of digital images are produced in this digital age. Whiles, they may be for social or personal purposes, others especially sensitive digital images such as Satellite images are an integral part of the correspondences of sensitive institutions. These sensitive images need to be secured during their acquisition, processing, compression, storage, broadcasting, and reproduction. Unauthorized access and manipulation of the sensitive images can result in a breach of sensitive content and illegality hence, the study comes in handy to contribute to the authentication of such images.
How is this paper going to help you in your future academic works/findings?
In the future, this academic work can be applied to the authentication of images processed by autonomous vehicles.
What are your future expectations with this research work?
I expect this research work to contribute to law enforcement, security, and intelligent agencies forensic analysis.