People are widely using Internet reviews like an information source before making each and every kind of purchases. Genuine evaluations usually have a big affect on subsequent brand purchases. With our approach, we go...
详细信息
Predicting brain age from MRI scans is crucial for understanding neurological development and aging-related disorders. Robust preprocessing methods and flexible model architectures are required because variations in i...
详细信息
Data collection from the mobile vehicle is the most vulnerable task. In an open network of vehicles, device identities must be protected. Our work in this paper describes a proof-of-authentication-based blockchain to ...
详细信息
Face recognition is one of the most effective image-processing applications and is essential in the technological era. The identification of the facial image is a current problem for authentication purposes, particula...
详细信息
Clinical trials can make use of healthcare data to find novel treatments, promote health equity, and ultimately enhance patient outcomes. It is undeniable that current and reliable clinical data are crucial for medica...
详细信息
This study's main goal is to improve deep fake image identification accuracy by using convolutional neural networks (CNN) and contrasting the outcomes with decision tree algorithms. Examining methods like feature ...
详细信息
Currently, there exist effective strategies for providing practical recommendations crucial in many industries, this encompasses a range of online platforms, such as electronic commerce, social networking sites, and v...
详细信息
Crop yield prediction is a crucial task in agricultural science, involving the classification of potential yield into various levels. This is vital for both farmers and policymakers. The features considered for this t...
详细信息
The intact data transmission to the authentic user is becoming crucial at every moment in the current ***;is a technique for concealing the hidden message in any cover media such as image,video;and audio to increase t...
详细信息
The intact data transmission to the authentic user is becoming crucial at every moment in the current ***;is a technique for concealing the hidden message in any cover media such as image,video;and audio to increase the protection of *** resilience and imperceptibility are improved by choosing an appropriate embedding *** paper gives a novel system to immerse the secret information in different videos with different *** audio and video steganography with novel amalgamations are implemented to immerse the confidential auditory information and the authentic user’s face image.A hidden message is first included in the audio from the multimedia file;using LSB *** Stego-video is created in the second stage by merging the authorized user’s face into the frame of the video;by using PVD ***-audio is linked again with the stego-video in the third *** incorporated perspective techniques(LSB-SS and PVD-SS algorithms)with more significant data immersing capacity,good robustness and imperceptibility are proposed in this research *** spread spectrum approach is used to increase the complexity of secret data *** different video files are tested with different voice files with the results such as PSNR,SSIM,RMSE and MSE as 52.3,0.9963,0.0024 and 0.0000059,respectively.
In today's world, web application attacks have become a major concern as they can lead to unauthorized access to important information and even disruption of online services. In the context of web application atta...
详细信息
暂无评论