Digital image steganography technique based on hiding the secret data behind of cover image in such a way that it is not detected by the human visual *** paper presents an image scrambling method that is very useful f...
详细信息
Digital image steganography technique based on hiding the secret data behind of cover image in such a way that it is not detected by the human visual *** paper presents an image scrambling method that is very useful for grayscale secret *** this method,the secret image decomposes in three parts based on the pixel’s threshold *** division of the color image into three parts is very easy based on the color channel but in the grayscale image,it is difficult to *** proposed image scrambling method is implemented in image steganography using discrete wavelet transform(DWT),singular value decomposition(SVD),and sorting *** is no visual difference between the stego image and the cover *** extracted secret image is also similar to the original secret *** proposed algorithm outcome is compared with the existed image steganography *** comparative results show the strength of the proposed technique.
This paper aims to introduce a dynamic model for a photovoltaic/thermal system, highlighting an approach and synthesis of existing dynamic models to depict the full photovoltaic/thermal system. The model was validated...
详细信息
The neuron doctrine defines the neuron as the basic unit of the nervous system, which drives the dynamic behavior of our organs. This has led to neurons becoming the focus of modern neuroscience research and to the ri...
详细信息
Heat, ventilation, and air conditioning (HVAC) systems account for the majority of energy consumption in buildings. People's behavior and occupancy patterns differ greatly from day to day and even seasonally, whic...
详细信息
weA number of machine learning applications involve time series prediction, and in some cases additional information about dynamical constraints on the target time series may be available. For instance, it might be kn...
The increasing integration of renewable energy sources (RES) and variable loads can stress the operation of the distribution grid during certain times of the day. In another way, electric vehicles, which are assumed t...
详细信息
The prevalence of Deep Learning in healthcare has revolutionized medical diagnostics, yet the vulnerability of these models to adversarial attacks threatens their security. This study investigates the susceptibility o...
详细信息
electrical energy distribution faces the significant issue of losses, with power theft being a main factor contributing to these losses. This difficulty is not limited to Pakistan but is also prevalent in several othe...
详细信息
With the advancement of computational intelligence, autonomous driving has become the future development trend of the automotive industry. Since the safety is commonly considered as the first priority of self-driving ...
详细信息
This paper discusses the importance of securing modern society's critical infrastructure in the face of physical and digital threats. It emphasizes the vulnerabilities introduced by programmable logic controllers ...
详细信息
暂无评论