In this study, two techniques are introduced for image steganography in the spatial domain. These systems employ chaos theory to track the addresses of shuffled bits in steganography. The first system is based on the well-known LSB technique, while the second system is based on a recent approach that searches for the identical bits between the secret message and the cover image. A modified logistic map is employed in the chaotic map to generate integer chaotic series to extract the shuffled addresses bits. Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), histogram analysis and correlative analysis are used for testing and evaluating the new levels of security for the proposed techniques. The results show that the proposed methods outperform existing systems.
Coronavirus is considered the first virus to sweep the world in the twenty-first century, it appeared by the end of 2019. It started in the Chinese city of Wuhan and began to spread in different regions around the world too quickly and uncontrollable due to the lack of medical examinations and their inefficiency. So, the process of detecting the disease needs an accurate and quickly detection techniques and tools. The X-Ray images are good and quick in diagnosing the disease, but an automatic and accurate diagnosis is needed. Therefore, this paper presents an automated methodology based on deep learning in diagnosing COVID-19. In this paper, the proposed system is using a convolutional neural network, which is considered one of the mostly prominent techniques used today for its reliability and ability to generate rapid results. The system was trained on a set of X-Ray images taken of the chest area of infected and uninfected people. The CNN structure gave accuracy, Precision, Recall and F-Measure 98%. This model is characterized by its ability to distinguish efficiently and adapt to different cases.
Bézier curve of the first rank is a simple equation in terms of form, but it is characterized by the nature of private transactions making it difficult to use in image encryption because the dispersion of color values is not enough, this results in an encrypted image that gives clear references to the original image. This weakness in the equation does not exist in the case of text encryption where enough to change the numerical values of the components of the text to get a digital matrix representing the encrypted text.Through this algorithm we have used the Bézier curve technique from the first order of image coding we used a new method to generate the coefficients of the equation where we simulated the Bazier equation where it became as follows: • y=x_1*(t-1)+x_2*t • Where 0<t<1 To illustrate the work of this technology in image encoding the core of our work is in choosing a vector (1 × 4) with four numerical components )k_1, k_2, k_3, k_4 ( So that k_1<k_2 and k_3 <k_4, k_1 and k_2 have the same signal, as well as k_3 and k_4 also have the same reference to give them t_1 and t_2 Where t_1=k_1/k_2 and t_2=k_3/k_4 which will ensure that both have t_1 and t_2 have positive values less than 1. We have thus designed the equation of Bézier curve suitable for a scattering of color values of the image process, as well we’ll see it by explaining the way in detail below and tables of readings and global standards that have been inferred by the application of the algorithm
In this search, an important methodology has been presented for communicated information rectification utilizing advanced channel windowing approach. The modern data communication technologies are ensured with numerous challenges because of their unpredictability and arrangement. Various digital transmission topologies in 4G can't fulfill the requirements in future arrangements, therefore, alternative multicarrier modulation (MCM) becoming the nominated approaches among all other data transmission techniques. Wherein prototype filter configuration is a fundamental system based on which the synthesis and analysis filters are derived. This paper presents a complete review on the ongoing advances of finite impulse response (FIR) filter plan procedures in MCM based correspondence frameworks. Initially, the essential issues are tried, taking into consideration the presentation of available data signal applicants and the FIR filter design concept. At that point the techniques for FIR filter configuration are summed up in subtleties and are center around the accompanying three group’s recurrence testing strategies, windowing based strategies and advancement-based techniques. At last, the exhibitions of different FIR structure strategies are assessed and measured by power spectral density (PSD) and bit error rate (BER), and variable MCM plots as well as their potential prototype filters are examined.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.