Source camera identification has emerged as a vital solution to unlock incidents involving critical cases like terrorism, violence, and other criminal activities. The ability to trace the origin of an image/video can ...
详细信息
With extensive research and development in blockchain technology, the concern about scalability, security, and decentralization is still evident. Blockchain trilemma describes that it is realistically impossible to si...
详细信息
Big climate change data have become a pressing issue that organizations face with methods to analyze data generated from various data types. Moreover, storage, processing, and analysis of data generated from climate c...
详细信息
December 2019 witnessed the outbreak of a novel coronavirus, thought to have started in the Chinese city of Wuhan. The situation worsened owing to its quick spread across the globe, leading to a worldwide pandemic tha...
详细信息
The growing use of digital media or social media has given a platform to the people to deliver their ideas and viewpoints openly. It is facilitating the rapid spread of contrasting opinions openly. Ultimately, this ha...
详细信息
Virtual Reality (VR) and Augmented Reality (AR) have witnessed a surge in popularity, revolutionizing various industries and enhancing user experiences. As these technologies continue to evolve, ensuring secure user i...
详细信息
Recommender systems aim to filter information effectively and recommend useful sources to match users' requirements. However, the exponential growth of information in recent social networks may cause low predictio...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information,and these methods have made it feasible to handle a wide range of problems associated with image *** with little information or low payload are used by information embedding methods,but the goal of all contemporary research is to employ high-payload images for *** address the need for both low-and high-payload images,this work provides a machine-learning approach to steganography image classification that uses Curvelet transformation to efficiently extract characteristics from both type of *** Vector Machine(SVM),a commonplace classification technique,has been employed to determine whether the image is a stego or *** Wavelet Obtained Weights(WOW),Spatial Universal Wavelet Relative Distortion(S-UNIWARD),Highly Undetectable Steganography(HUGO),and Minimizing the Power of Optimal Detector(MiPOD)steganography techniques are used in a variety of experimental scenarios to evaluate the performance of the *** WOW at several payloads,the proposed approach proves its classification accuracy of 98.60%.It exhibits its superiority over SOTA methods.
Federated Learning (FL) offers significant advancements in user/data privacy, learning quality, model efficiency, scalability, and network communication latency. However, it faces notable security challenges, particul...
详细信息
This paper presents an intelligent waste sorting system that utilizes computer vision and deep learning to accurately categorize waste items. Moreover, the system incentivizes proper waste disposal through a rewards s...
详细信息
暂无评论