In this study, we demonstrated light shift detection in a running atomic clock using the multi-photodetection method. This method enables the observation of atomic resonances with different intensities using the inten...
详细信息
In today’s digital world, keeping data safe is a top priority. Two common methods used to protect data are steganography and cryptography. Steganography hides secret data within everyday files (like images, GIFs or v...
In today’s digital world, keeping data safe is a top priority. Two common methods used to protect data are steganography and cryptography. Steganography hides secret data within everyday files (like images, GIFs or videos), while cryptography scrambles the data into an unreadable format. This paper introduces a new way to hide data using a technique called Perfect Square Quotient Differencing. Instead of embedding data in a straight sequence, the method hides information in two steps within the components of an image pixel (called the quotient and remainder). In the first step, a perfect square quantization technique is applied to the quotient part. In the second step, the Two Least Significant Bit (2LSB) method is used on the remainder part. A new range-table is also introduced to help determine how much data can be hidden in the first step. This two-step approach allows a large amount of data to be hidden (about 3 bits per pixel on average). The method was tested on many animated color images, and its performance was measured using tools like Peak-Signal-to-Noise-Ratio (PSNR), Mean Square Error (MSE), Universal Image Quality Index (UIQI), and Payload Curve. The results show that this method works better than several modern steganography techniques. Additionally, tests were conducted to ensure the method is secure against potential attacks. This new algorithm could be particularly useful for protecting digital documents stored in cloud-based platforms, offering a robust and efficient way to keep data safe.
Transfer learning is a common method to improve the performance of the model on a target task via pre-training the model on pretext tasks. Different from the methods using monolingual corpora for pre-training, in this...
详细信息
作者:
Kutti, M. BeulaKarthick, T.Srmist
Department of Computer Science And Engineering Chennai Kattankulathur India School of Computing
Srmist Department of Datascience And Business System Chennai Kattankulathur India
Effective identification and severity analysis of two serious respiratory diseases-pneumonia and corona-are desperately needed, and this study attempts to fill that gap. Early diagnosis and treatment of many condition...
详细信息
Given the rising cost of power and growing environmental concerns, optimizing energy utilization in manufacturing workshops has become increasingly significant. However, conventional approaches often neglect the poten...
详细信息
Brain-inspired computing methods have shown remarkable efficiency and robustness compared to deep neural networks (DNN). In particular, HyperDimensional Computing (HDC) and Vision Transformer (ViT) have demonstrated p...
详细信息
We are dwelling in the golden age of science development. Smart domestic automation has now ended up in the middle of enchantment in the lookup field. The guide machine of switching every so often motives an excessive...
详细信息
The use of the Vehicular Internet of Things (VIoT) has been rapidly increasing in recent years, which has led to the development of various routing protocols to facilitate communication among vehicles. In this paper, ...
详细信息
Crop disease control is crucial for food security since plant illnesses diminish agricultural production. Crop productivity and quality depend on leaf diseases like tomatoes. Early plant disease identification utilizi...
详细信息
The limited autonomy of flight has long been considered a significant constraint in drone systems. In the context of drone inspections of power lines, this study focuses on a drone equipped with a coil designed for au...
详细信息
暂无评论