In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential *** overcome these difficulties,different steganography and data encryption m...
详细信息
In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential *** overcome these difficulties,different steganography and data encryption methods have been proposed by researchers to secure *** of the proposed steganography techniques achieve higher embedding capacities without compromising visual imperceptibility using LSB *** this work,we have an approach that utilizes a combinationofMost SignificantBit(MSB)matching andLeast Significant Bit(LSB)*** proposed algorithm divides confidential messages into pairs of bits and connects them with the MSBs of individual pixels using pair matching,enabling the storage of 6 bits in one pixel by modifying a maximum of three *** proposed technique is evaluated using embedding capacity and Peak Signal-to-Noise Ratio(PSNR)score,we compared our work with the Zakariya scheme the results showed a significant increase in data concealment *** achieved results of ourwork showthat our algorithmdemonstrates an improvement in hiding capacity from11%to 22%for different data samples while maintaining a minimumPeak Signal-to-Noise Ratio(PSNR)of 37 *** findings highlight the effectiveness and trustworthiness of the proposed algorithm in securing the communication process and maintaining visual integrity.
作者:
Yesugade, KiranJadhav, Rohini
College of Engineering Department of Computer Engineering Pune India
College of Engineering Department of Information Technology Pune India
This work investigates the use and assessment of ResNet-50 and VGG16 deep learning models for detecting deepfake images using the Labelled Faces in the Wild (LFW) dataset. The methodology encompassed thorough preparat...
详细信息
Advancement of web 2.0 results in the expeditious growth of services in repositories and service portals, which raises the demand for service management. With the clusters of services, different processes like discove...
详细信息
SciAR Labs presents a science education Augmented Reality (AR) application in response to the changing landscape of educational technologies. Thorough studies of the research demonstrate how AR can improve student mot...
详细信息
Power semiconductor devices cascaded topology is one of the most common solutions for solid-state circuit breakers(SSCBs)working in medium-voltage DC ***,when the number of cascaded devices is large,current series tec...
详细信息
Power semiconductor devices cascaded topology is one of the most common solutions for solid-state circuit breakers(SSCBs)working in medium-voltage DC ***,when the number of cascaded devices is large,current series technologies of power semiconductor devices will be difficult to be applied since with uneven voltage sharing ***,this paper proposes a novel cascade method of multi-SiC JFETs based on modules *** method consists of two parts:one is a single-gate driver cascaded SiC JFETs topology which is used to form the module,the other one is an active clamp control strategy which ensures that each module is protected from overvoltage when modules are *** proposed cascade method can effectively suppress voltage overshoot of cascading power devices in the switching *** on the proposed cascade method,a 5kV/63A SSCB prototype is ***,an experiment is conducted based on the designed *** results validate the effectiveness of the proposed cascaded method for SSCB.
Reviews and ratings significantly impact businesses, either boosting their reputation or harming competitors. To manipulate these outcomes, some businesses falsify product reviews. This paper introduces a transformer-...
详细信息
The proliferation of deluding data such as fake news and phony audits on news web journals,online publications,and internet business apps has been aided by the availability of the web,cell phones,and social *** can qu...
详细信息
The proliferation of deluding data such as fake news and phony audits on news web journals,online publications,and internet business apps has been aided by the availability of the web,cell phones,and social *** can quickly fabricate comments and news on social *** most difficult challenge is determining which news is real or ***,tracking down programmed techniques to recognize fake news online is *** an emphasis on false news,this study presents the evolution of artificial intelligence techniques for detecting spurious social media *** study shows past,current,and possible methods that can be used in the future for fake news *** different publicly available datasets containing political news are utilized for performing *** supervised learning algorithms are used,and their results show that conventional Machine Learning(ML)algorithms that were used in the past perform better on shorter text *** contrast,the currently used Recurrent Neural Network(RNN)and transformer-based algorithms perform better on longer ***,a brief comparison of all these techniques is provided,and it concluded that transformers have the potential to revolutionize Natural Language Processing(NLP)methods in the near future.
Besides the enhancement of the Internet of Things (IoT) distributed environment, anomalous activities are also escalating rapidly. Therefore, improving the trustworthiness of distributed networks is required for the e...
详细信息
Detection of a staircase is an important task in the fields of both assistive technology and autonomous navigation with an aim to enable substantial improvement in safety and accessibility for both those with limited ...
详细信息
Wearable computers can be used in different domains including healthcare. However, due to suffering from challenges such as faults their applications may be limited in real practice. So, in designing wearable devices,...
详细信息
暂无评论