Hyperspectral imaging (HSI) is a technique that captures and analyzes multiple spectral bands for each pixel in an image. Convolutional neural networks (CNNs) effectively extract local features for HSI classification ...
详细信息
In recent years, there is a surfeit of digital currencies, virtual currencies, and cryptocurrencies. These currencies serve as alternatives to fiat currencies in the form of physical currencies or deposits in banks. S...
详细信息
In this work, we study the parallel complexity of the geometric minimum-weight bipartite perfect matching (GWBPM) problem in 2. Here our graph is the complete bipartite graph G on two sets of points A and B in 2 (|A| ...
详细信息
Hausdorff Φ-dimension is a notion of Hausdorff dimension developed using a restricted class of coverings of a set. We introduce a constructive analogue of Φ-dimension using the notion of constructive Φ-s-supergales...
详细信息
Reversible data hiding (RDH) has become a critical topic in modern information security, as it allows for secure communication by embedding secret data into a cover medium. Importantly, RDH also ensures that the hidde...
详细信息
This paper presents the 'Workplace Wingman,' an innovative autonomous system designed for workplace environments. Our solution integrates advanced features to optimize indoor operations. The system navigates c...
详细信息
The security of integrated circuits is crucial due to their wide range of applications in modern gadgets. An unauthorized access (i.e., third-party access) or a security breach in the logic-locked system can pose a gr...
详细信息
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a signifi...
详细信息
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a significant *** development of secure communication methods that keep recipient-only data transmissions secret has always been an area of ***,several approaches,including steganography,have been developed by researchers over time to enable safe data *** this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,*** have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)*** this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this *** encoding the data and embedding it into a carry image,this review verifies that it has been ***,embedded text in photos conveys crucial signals about the *** review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data *** the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.
We investigate tolerant testing and distance estimation problems in distribution testing when the amount of memory is limited. In particular, our aim is to provide a good estimate of the distance measure (in total var...
详细信息
Reliable and low-cost hardware accelerator design and its security countermeasures are crucial to safeguard not only the end consumer but also the intellectual property (IP) vendor and system-on-chip (SoC) integrator....
详细信息
暂无评论