Results 91 to 100 of about 54,446 (214)

Text Data Security Using LCG and CBC with Steganography Technique on Digital Image

open access: yesJournal of Applied Informatics and Computing
This research proposes a text data security method using a combination of Linear Congruential Generator (LCG), Advanced Encryption Standard (AES) Cipher Block Chaining (CBC) mode, and Least Significant Bit (LSB) steganography technique on digital images.
Muhammad Wildan, Wahid Miftahul Ashari
doaj   +1 more source

Computational intelligence-based steganalysis comparison for RCM-DWT and PVA-MOD methods

open access: yesAutomatika, 2019
This research article proposes data hiding technique for improving the data hiding procedure and securing the data transmission with the help of contrast mapping technique along with advanced data encryption standard.
T. D. Sairam, K. Boopathybagan
doaj   +1 more source

A UAV‐based deep learning pipeline for intertidal macrobenthos monitoring: Behavioral and age classification in Tachypleus tridentatus

open access: yesRemote Sensing in Ecology and Conservation, EarlyView.
The endangered tri‐spine horseshoe crab (Tachypleus tridentatus), a “living fossil” crucial to coastal ecology and biomedical research, is experiencing severe population declines. Effective conservation requires efficient monitoring, which traditional methods cannot deliver at scale. We develop an integrated UAV deep learning framework tailored to this
Xiaohai Chen   +7 more
wiley   +1 more source

Image denoising of coal dust based on fractional calculus adaptive algorithm

open access: yesGong-kuang zidonghua, 2014
In view of problem of long iteration process, unsatisfactory image denoising effect and poor texture retention capacity of traditional denoising method of coal dust image, the paper improved existing method and built an adaptive denoising algorithm based
WANG Zheng, MA Xianmi
doaj   +1 more source

Quantifying the Full Damage Profile of Focused Ion Beams via 4D‐STEM Precession Electron Diffraction and PSNR Metrics

open access: yesSmall Methods, EarlyView.
Four‐dimensional scanning transmission electron microscopy (4D‐STEM) is used to acquire multiple convergent beam electron diffraction (CBED) patterns around focused ion beam (FIB) dwelled spots. Peak signal‐to‐noise ratio (PSNR) analysis, following calibration with well‐known implantation dose squares, enables full quantification of the FIB profile ...
Mateus G. Masteghin   +6 more
wiley   +1 more source

An IPVO-based reversible data hiding scheme using floating predictors

open access: yesMathematical Biosciences and Engineering, 2019
This work optimizes an improved high-fidelity reversible data hiding scheme of Peng et al. which is based on improved pixel-value-ordering (IPVO) and prediction-error expansion.
Rong Li   +4 more
doaj   +1 more source

Pengiriman Citra pada Komunikasi Cahaya Tampak IEEE 802.15.7 Lapisan Fisik II.f-n

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi, 2016
Visible light communication (VLC) is a communication technology using visible light as a transmission medium that can have larger bandwidth than other wireless communications. VLC has a standard of IEEE 802.15.7 which has two layers. One of the layers is
Eny Sukani Rahayu   +2 more
doaj   +1 more source

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch   +4 more
wiley   +1 more source

Multi‐Scale Transformer for Image Restoration

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Although Transformer‐based image restoration methods have demonstrated impressive performance, existing Transformers still insufficiently exploit multiscale information. Previous non‐Transformer‐based studies have shown that incorporating multiscale features is crucial for improving restoration results.
Wuzhen Shi   +6 more
wiley   +1 more source

Towards Interpretable Face Morphing via Unsupervised Learning of Layer‐Wise and Local Features

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Discovering meaningful face morphing is critical for applications in image synthesis. Traditional unsupervised methods rely on global or layer‐wise representations, neglecting finer local details and thus limiting the control over specific facial attributes.
Cheng Yu, Chuan Chen, Wenmin Wang
wiley   +1 more source

Home - About - Disclaimer - Privacy