With the rapid development of information technology, people have entered the era of information explosion. The cooperation, competition and trust between people are all based on information. Information resources are...
详细信息
Emotion recognition is an emerging field of research and modalities like images, videos, speech, text, physiological signals, and EEG are used for the same. In this work, EEG based emotion recognition has been propose...
详细信息
Face mask detection is the process of identifying whether a person is wearing a face mask or not in real-time through the use of computer vision and machine learning algorithms. This technology can be used in various ...
详细信息
The increasing demand for personalized products and a global presence complicates inventory management, requiring accurate and timely stock information. To address this, businesses must leverage Internet of Things (Io...
详细信息
This overview paper explains several kinds of Reversible Data Hiding (RDH) methods. Reversible data hiding involves concealing data within host media, such as audio, video, and image files. RDH, or lossless data hidin...
详细信息
The Hidden Markov Model is widely used in weather forecasting, Bioinformatics, disease diagnosis, signal processing, stock market, interpretation of clinical results, etc. The model provides probabilistic information ...
详细信息
Due to the fast development of information technology, secure communication is important. To ensure secure communication we need to send an encrypted message so that it can be read only by the expected recipient. Ther...
详细信息
ISBN:
(纸本)9783031545467;9783031545474
Due to the fast development of information technology, secure communication is important. To ensure secure communication we need to send an encrypted message so that it can be read only by the expected recipient. There is some existing method which is used for secure communication like cryptography and its limitation is adversary knows about your message and it impacts its security level. In order to overcome the above limitation, a proposed DNA steganography method provides a greater level of security and the adversary has no idea about you hiding something. The proposed steganography method consists of DNA computing, RSA algorithm, and LSB embedding. DNA computing is a branch of computing that performs computations using DNA molecules. The RSA algorithm is a frequently used public key cryptographic algorithm for secure communication. Finally, the proposed DNA computing-based steganography was implemented using Xilinx and MATLAB and the RSA and DNA mapping have been done in Verilog and LSB embedding has been done in MATLAB. The RSA and DNA mapping have been simulated using Questa Sim-64 10.6c and implemented on vertex 7 using Xilinx ISE 14.7. The LSB embedding is implemented using MATLAB program in MATLAB R2022a.
Voice spoofing has become a serious security concern due to advancements in voice cloning technologies. This review paper examines recent advances in machine learning, such as deep learning, adversarial approaches, an...
详细信息
This universe shows mood through facial expressions. Every expression conveys emotions. AI allows us differentiate different emotions, even though everyone has a unique face expression and emotional repertoire. Deep l...
详细信息
Internet of Things has developed, one of its most beneficial uses in cloud computing has been data sharing. Even though this technology has attracted attention, one of its ongoing challenges is data security since imp...
详细信息
暂无评论