Virtual Reality (VR) has existed for many years;however, it has only recently gained wide spread popularity and commercial use. This change comes from the innovations in head mounted displays (HMDs) and from the work ...
详细信息
The success and safety of block cipher systems heavily depend on how efficient and secure their Key Schedule Algorithms (KSAs) are, especially when fighting against cryptanalytic attacks. This paper proposes a novel K...
详细信息
Watermarking is a technique used to assert ownership over an image, and can be categorized into visible and invisible forms based on the detectability of the watermark. Visible watermarking is more user-friendly and i...
Watermarking is a technique used to assert ownership over an image, and can be categorized into visible and invisible forms based on the detectability of the watermark. Visible watermarking is more user-friendly and intuitive than invisible methods since it allows individuals to identify image ownership with their own eyes rather than relying on machine-based watermark decoders. To enhance the visual quality of watermarked images and ensure the original images can be fully recovered after visible watermark authentication, a visible watermark removal approach using deep learning-based inpainting is proposed in this paper. Experimental results demonstrate that the watermarked images carrying the visible watermark and auxiliary information achieve peak signal-to-noise ratios (PSNRs) ranging from 41.89 dB to 43.17 dB and structural similarity indices (SSIMs) up to 0.97 to 0.98. Furthermore, our hybrid recovery operations enable the complete restoration of the original images, making them easily readable.
Traffic has been a major concern in most of the cities. Monitoring cameras are used to track, detect and count vehicles in real-time to ensure proper management of traffic. Counting of vehicles like cars, trucks and t...
详细信息
CycleGAN, a significant deep learning model, has transformed medical imaging by providing a remedy for translating MRI images between different modalities. Its ability to transform T1-weighted to T2-weighted images is...
详细信息
ISBN:
(数字)9798350370249
ISBN:
(纸本)9798350370270
CycleGAN, a significant deep learning model, has transformed medical imaging by providing a remedy for translating MRI images between different modalities. Its ability to transform T1-weighted to T2-weighted images is crucial in healthcare environments where obtaining multiple scans can be time-consuming and burdensome for patients. This can be achieved by utilizing CycleGAN, which generates images that contains vital information that will help the healthcare professionals to diagnose the patient without exposing them to further radiations. This unleashes an effective and safer way of diagnosing patients. The adaptability of CycleGAN also allows scalability and the ability to customize it for different types of medical images, where scanning can be achieved with less exposure to radiation, without loosing or compromising any important information.
Since last couple of the years, credit card frauds have been inclining abruptly. These frauds can be stated as the illicit usage of card, uncommon transaction activity, or swapping of an inert card. In other words, il...
详细信息
The bacteria Mycobacterium tuberculosis is responsible for the infectious illness tuberculosis (TB). Although the lungs are the primary organs affected, the kidneys, bones, and brain may also be affected. Whenever an ...
详细信息
The adoption of decentralized energy market models facilitates the exchange of surplus power among local nodes in peer-to-peer settings. However, decentralized energy transactions within untrusted and non-transparent ...
详细信息
ISBN:
(数字)9798350318555
ISBN:
(纸本)9798350318562
The adoption of decentralized energy market models facilitates the exchange of surplus power among local nodes in peer-to-peer settings. However, decentralized energy transactions within untrusted and non-transparent energy markets in modern Smart Grids expose vulnerabilities and are susceptible to attacks. One such attack is the False Data Injection Attack, where malicious entities intentionally inject misleading information into the system. To address this threat, this paper proposes GridWatch, an effective real-time in-network intelligent framework to detect false data injection attacks. Gridwatch operates in a hybrid model. It deploys inference model in the programmable network devices and also on the server to detect false data injection attacks. GridWatch was evaluated using a real-world dataset from Austin, Texas, and can detect false data injection attacks with 94.8% accuracy. GridWatch on average performs 4 billions transactions per second in less than 1.8 microsecond latency.
An imbalance in electrical signal flow among neurons causes epilepsy, a complex brain disease that affects other parts of the body and results in seizures. Researchers and neurologists have put their efforts into devi...
详细信息
Wireless Sensor Network (WSN) gadgets began with limited-scope WSNs and have expanded to larger-scope and Internet of Things -based WSNs. Clustering increases WSN activity. Before picking Cluster Heads (CHs), Nodes ar...
详细信息
暂无评论