To see the other types of publications on this topic, follow the link: Selected least signified bit.

Journal articles on the topic 'Selected least signified bit'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Selected least signified bit.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Aljidi, Bashar Izzeddin Issa, Sundresan Perumal, and Sakinah Ali Pitchay. "Securing data using deep hiding selected least significant bit and adaptive swarm algorithm." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 3 (2022): 1573–81. https://doi.org/10.11591/ijeecs.v28.i3.pp1573-1581.

Full text
Abstract:
The emphasis on data protection is improved in particular with respect to the transmission protocols utilized. Different research on numerous data protection areas such as authentication, encryption, hiding of data and validation were performed. In addition, a cybersecurity standard, such as IPSEC, and secure sockets layer (SSL), were introduced to solve privacy infringement problems by applying encryption, authorization and protection to data exchanged and data stored in the cloud. This study suggests a new steganography algorithm, a data protection tool used to conceal massive amounts of data from graphic and statistic attacks in color images. The proposed algorithm is a multi-level steganography modified deep hiding/extracting technique (MDHET), which implements a selected least signified bit (SLSB) for color picture dispersal of the information. In addition, an accurate pixel location randomization feature has been applied. After MDHET, the predicted results will effectively conceal data up to 6 bpp (bit per pixel) with high safety levels by improving the quality of images. In addition, MDHET can be useful for encoding a deep series of images into one in which the testing procedure is carried out using regular reference images used in color image processing and compression analysis from different institutions.
APA, Harvard, Vancouver, ISO, and other styles
2

Aljidi, Bashar Izzeddin Issa, Sundresan Perumal, and Sakinah Ali Pitchay. "Securing data using deep hiding selected least significant bit and adaptive swarm algorithm." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 3 (2022): 1573. http://dx.doi.org/10.11591/ijeecs.v28.i3.pp1573-1581.

Full text
Abstract:
The emphasis on data protection is improved in particular with respect to the transmission protocols utilized. Different research on numerous data protection areas such as authentication, encryption, hiding of data and validation were performed. In addition, a cybersecurity standard, such as IP-SEC, and secure sockets layer (SSL), were introduced to solve privacy infringement problems by applying encryption, authorization and protection to data exchanged and data stored in the cloud. This study suggests a new steganography algorithm, a data protection tool used to conceal massive amounts of data from graphic and statistic attacks in color images. The proposed algorithm is a multi-level steganography modified deep hiding/extracting technique (MDHET), which implements a selected least signified bit (SLSB) for color picture dispersal of the information. In addition, an accurate pixel location randomization feature has been applied. After MDHET, the predicted results will effectively conceal data up to 6 bpp (bit per pixel) with high safety levels by improving the quality of images. In addition, MDHET can be useful for encoding a deep series of images into one in which the testing procedure is carried out using regular reference images used in color image processing and compression analysis from different institutions.
APA, Harvard, Vancouver, ISO, and other styles
3

Swain, Gandharba, and Saroj Kumar Lenka. "A Dynamic Approach to Image Steganography Using the Three Least Significant Bits and Extended Hill Cipher." Advanced Materials Research 403-408 (November 2011): 842–49. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.842.

Full text
Abstract:
In this paper we propose a technique for secure communication between sender and receiver. We use both cryptography and steganography. We take image as the carrier to use steganography. We have extended the existing hill cipher to increase its robustness and used it as our cryptography algorithm. By using this extended hill cipher (a new block cipher) which uses a 128 bit key, we encrypt the secret message. Then the cipher text of the secret message is embedded into the carrier image in 6th, 7th and 8th bit locations of some of the selected pixels (bytes). The 8th bit in a pixel (byte) is called as the least significant bit (LSB). The pixel selection is done depending on the bit pattern of the cipher text. So for different messages the embedding pixels will be different. That means to know the pixels of the image where the cipher text is embedded we should know the cipher text bits. Thus it becomes a stronger steganography. As the pixels where we embed are chosen during the run time of the algorithm, so we say that it is dynamic steganography. After embedding the resultant image will be sent to the receiver, the receiver will apply the reverse process what the sender has done and get the secret message.
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Yong, and Dawen Xu. "HEVC Information-Hiding Algorithm Based on Intra-Prediction and Matrix Coding." International Journal of Digital Crime and Forensics 13, no. 6 (2021): 1–15. http://dx.doi.org/10.4018/ijdcf.20211101.oa11.

Full text
Abstract:
Aiming at the problem that the data hiding algorithm of high efficiency video coding (HEVC) has great influence on the video bit rate and visual quality, an information hiding algorithm based on intra prediction mode and matrix coding is proposed. Firstly, 8 prediction modes are selected from 4×4 luminance blocks in I frame to embed the hidden information. Then, the Least Significant Bit (LSB) algorithm is used to modulate the LSB of the last prediction mode. Finally, the modulated luminance block is re-encoded to embed 4 bits secret information. Experimental results show that the algorithm improves the embedding capacity, guarantees the subjective and objective quality of the video, and the bit rate increases by 1.14% on average.
APA, Harvard, Vancouver, ISO, and other styles
5

Sharma, Rajesh R., A. Bagubali, and K. Sasikumar. "Bit Error Rate Analysis of Physical Layer Network Coding Spatially Modulated Full-Duplex Nodes Based Bidirectional Wireless Relay Network." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 9 (2022): 07–14. http://dx.doi.org/10.17762/ijritcc.v10i9.5640.

Full text
Abstract:
In this paper, Physical Layer Network coding (PLNC)-Spatially Modulated Full-Duplex (SMFD) nodes based two-way/bidirectional cooperative wireless relay network is proposed. The PLNC-SMFD-based system is a viable technology in the field of next-generation wireless networks to enhance spectral efficiency. In the proposed system model, both the source nodes and relay nodes are employed with 2 × 2 antenna configurations where 2 bits of information are exchanged between the source nodes through a relay node. Transmit antenna selection at the source nodes is based on the incoming bitstreams. For instance, the transmit antenna is selected at PLNC-SMFD nodes based on the data symbols of the Most Significant Bit (MSB). Whereas the selected transmit antenna sends the Least Significant Bit (LSB) bit of data symbol at any time instance. Further, the self-interference at the transmitting and receiving nodes is modeled as Gaussian with the thermal noise power as a variance. The Bit Error Rate (BER) analytical expressions for both the upper and lower bound are derived in a Rayleigh Fading channel background. It has been graphically shown that the BER performance of the proposed system analyzes the effect of self-interference.
APA, Harvard, Vancouver, ISO, and other styles
6

Abdulhamid, Mohanad, and Mwaniki Muchai. "Performance of Multiple Rank Modulation Based on SM-MIMO." Land Forces Academy Review 24, no. 1 (2019): 61–67. http://dx.doi.org/10.2478/raft-2019-0007.

Full text
Abstract:
Abstract A multiple rank modulation (MRM) scheme is proposed that provides better error performance, enhances the data rate and reduces the system demodulation complexity. Multiple input multiple output (MIMO) scheme is a technique that uses several antennas at the transmitter and receiver to minimize error and optimize data speed. MRM is a novel technique that borrows from spatial modulation-MIMO (SM-MIMO) scheme. The basic idea of this scheme involves the transmitter receiving a group of bits and subdividing them into two blocks; rank index block and signal modulation block. The rank index bit block is used to select the rank to be activated and the rank selected contains at least one active transmit antenna (TA). The signal modulation bit block is encoded in a given modulation scheme for transmission. It is then transmitted through the activated rank that contains at least one active TA. The transmitted encoded signal modulation bit block is received through the receive antenna and a receiver. The receiver estimates a rank index and the transmitted symbol from the signal received. The signal modulation bit block is finally decoded. This paper addresses the performance of MRM scheme based on error performance to run cellular fifth generation (5G). We perform and present simulation results of MIMO systems employing MRM scheme to generate bit error rate (BER) of this system.
APA, Harvard, Vancouver, ISO, and other styles
7

Alshammari, Kaznah. "Exposing the most match parity bit approach (MMPB-A) for data concealment in digital images." International Journal of ADVANCED AND APPLIED SCIENCES 11, no. 8 (2024): 57–65. http://dx.doi.org/10.21833/ijaas.2024.08.007.

Full text
Abstract:
Steganography was originally developed to hide and transmit sensitive information. One major advancement in this field is the ability to hide data within digital images. Significant progress has been made, demonstrating effective methods for concealing data. Various techniques have been used, including statistical steganography, distortion techniques, and the Discrete Cosine Transform (DCT). However, the Least Significant Bit (LSB) method is particularly important and remains the most widely used. Researchers have developed methods based on these principles, such as pseudorandom permutation. This paper introduces the Most Match Parity Bit Approach (MMPB-A), which is based on the LSB method. MMPB-A strategically identifies the parity bits of selected pixels to embed information in cover images. It uses a six-bit encryption for each symbol, allowing ample space to hide information while preserving similarity and secrecy. Additionally, encoding hidden data indices in a three-bit code enhances data concealment and ensures greater confidentiality.
APA, Harvard, Vancouver, ISO, and other styles
8

Jin, Xuesong, Huiyuan Sun, and Yuhang Zhang. "Research on VVC Intra-Frame Bit Allocation Scheme Based on Significance Detection." Applied Sciences 14, no. 1 (2024): 471. http://dx.doi.org/10.3390/app14010471.

Full text
Abstract:
This research is based on an intra-frame rate control algorithm based on the Versatile Video Coding (VVC) standard, considering that there is the phenomenon of over-allocating the bitrate of the end coding tree units (CTUs) in the bit allocation process, while the front CTUs are not effectively compressed. Fusing a Canny-based edge detection algorithm, a color contrast-based saliency detection algorithm, a Sum of Absolute Transformed Differences (SATD) based CTU coding complexity measure, and a Partial Least Squares (PLS) regression model, this paper proposes a CTU-level bit allocation improvement scheme for intra-mode code rate control of the VVC standard. First, natural images are selected to produce a lightweight dataset. Second, different metrics are utilized to obtain the significance and complexity values of each coding unit, the relatively important coding units in the whole frame are selected, which are adjusted with different weights, and the optimal adjustment multiplicity is supplemented into the dataset. Finally, the PLS regression model was used to obtain regression equations to refine the weights for adjusting the bit allocation. The proposed bit allocation scheme improves the average rate control accuracy by 0.453%, Y-PSNR by 0.05 dB, BD-rate savings by 0.33%, and BD-PSNR by 0.03 dB compared to the VVC standard rate control algorithm.
APA, Harvard, Vancouver, ISO, and other styles
9

Adhimah, Laily Farkhah, Isti Nurhafiyah, Adnan Aditya Muntahar, Fandi Kristiaji, and Dinar Mustofa. "Implementasi Aplikasi Steganografi Berbasis Web Menggunakan Algoritma LSB dan BPCS." Komputa : Jurnal Ilmiah Komputer dan Informatika 12, no. 2 (2023): 100–108. http://dx.doi.org/10.34010/komputa.v12i2.10319.

Full text
Abstract:
Steganography is a method for concealing sensitive information in seemingly unremarkable data. In recent years, the use of steganography in web applications has become popular due to its accessibility and ability to conceal data in various types of media. Implementing a web-based steganography program that makes use of the Bit-Plane Complexity and Least Significant Bit algorithms is the aim of this project. To enable users to access the application through a browser, the system is constructed utilizing web technologies like HTML, CSS, and JavaScript during the design phase. The LSB and BPCS algorithms are employed as methods to embed secret data into user-selected images. The least significant bit of each image pixel is utilized to hold a secret piece of information using the straightforward steganography technique known as LSB. On the other hand, BPCS is a more complex steganography method that combines spatial and frequency domain analysis to hide data within high-quality images. The findings of this study show that the technique of hiding sensitive information within photos is successfully implemented by the web-based steganography program employing the LSB and BPCS algorithms.
APA, Harvard, Vancouver, ISO, and other styles
10

Swain, Gandharba, and Saroj Kumar Lenka. "A Robust Image Steganography Technique Using Dynamic Embedding with Two Least Significant Bits." Advanced Materials Research 403-408 (November 2011): 835–41. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.835.

Full text
Abstract:
In this paper we are proposing a new Image steganography technique for secure communication between sender and receiver. At the sender we follow two steps. In the first step we encrypt the secret information by blowfish algorithm and in second step we embed the cipher text in LSB minus one and LSB (least significant bit) locations of some of the selected pixels (bytes) of the carrier image. One pixel is 8 bits in 8-bit gray scale. The selection of the pixels is done by a dynamic evaluation function. Depending on the cipher text bits, the dynamic evaluation function decides on which pixels the different cipher text bits are to be embedded. At the receiver also two steps are followed, first the cipher bits are retrieved from the image from the said locations and then it is decrypted by using the blowfish algorithm to get the secret information. As the embedding byte locations are decided based on bits of the cipher text, so it is dynamic steganography. This approach provides two levels of security, one at the cryptography level and the other at the steganography level. The proposed technique is experimented through a large number of experiments.
APA, Harvard, Vancouver, ISO, and other styles
11

Lagun, A., and O. Polotai. "FEATURES OF HIDING INFORMATION IN IMAGES WITH USING THE LEAST SIGNIFICANT BIT." Bulletin of Lviv State University of Life Safety 20 (January 23, 2020): 17–22. http://dx.doi.org/10.32447/20784643.20.2019.03.

Full text
Abstract:
In the article has considered the peculiarities of steganographic algorithms implemenation for hiding information in inmoveable images. Authors has described different embedding algorithms which use the method of least significant bit. In particular, the use of digital filtering allows you to better select the necessary pixels for embedding, and the use of a pseudorandom sequence generator allows you to more effectively hide secret information, complicating the search for secret information to the attacker.From the existing color palettes to represent inmoveable images have been selected the most common RGB pal-ette, which contains red, green, and blue intensities to produce image pixels. Colors that are less sensitive to the human eye are used to form the filled steganographic containers to provide additional visual stability.Also, in the paper authors have investigated the features of hiding digital text information in a inmoveable image as a BMP file and have realized an algorithm that for images of different size allows you to hide a text file of the necessary size. In particular, the number of bytes of the secret message is written to the original container to retrieve the required number of characters during searching. In addition, it takes into account the peculiarities of forming a BMP file that contains additional alignment bytes of the string.In general, the algorithm allows you to select a container file of the appropriate size to hide the secret information, as well as the colors of the palette in which the information will be embedded. The extracting of secret information occurs until the number of bytes of the hidden message is reached. This value has recorded at the beginning of the hiding text. You can use encryption or compression algorithms to complication searching of clear text by attacker. Only users those who are aware of the algorithms used and perhaps the keys will be able to read the hidden information correctly.
APA, Harvard, Vancouver, ISO, and other styles
12

Sadiq, B. J. S., V. Yu Tsviatkou та М. N. Bobov. "Аdaptive combined image coding with prediction of arithmetic code volume". Doklady BGUIR 19, № 2 (2021): 31–39. http://dx.doi.org/10.35596/1729-7648-2021-19-2-31-39.

Full text
Abstract:
The problem of increasing the efficiency of coding of halftone images in the space of bit planes of differences in pixel values obtained using differential coding (DPCM – Differential pulse-code modulation) is considered. For a compact representation of DPCM pixel values, it is proposed to use a combined compression encoder that implements arithmetic coding and run-length coding. An arithmetic encoder provides high compression ratios, but has high computational complexity and significant encoding overhead. This makes it effective primarily for compressing the mean-value bit-planes of DPCM pixel values. Run-length coding is extremely simple and outperforms arithmetic coding in compressing long sequences of repetitive symbols that often occur in the upper bit planes of DPCM pixel values. For DPCM bit planes of pixel values of any image, a combination of simple run length coders and complex arithmetic coders can be selected that provides the maximum compression ratio for each bit plane and all planes in general with the least computational complexity. As a result, each image has its own effective combined encoder structure, which depends on the distribution of bits in the bit planes of the DPCM pixel values. To adapt the structure of the combined encoder to the distribution of bits in the bit planes of DPCM pixel values, the article proposes to use prediction of the volume of arithmetic code based on entropy and comparison of the obtained predicted value with the volume of run length code. The entropy is calculated based on the values of the number of repetitions of ones and zero symbols, which are obtained as intermediate results of the run length encoding. This does not require additional computational costs. It was found that in comparison with the adaptation of the combined encoder structure using direct determination of the arithmetic code volume of each bit plane of DPCM pixel values, the proposed encoder structure provides a significant reduction in computational complexity while maintaining high image compression ratios.
APA, Harvard, Vancouver, ISO, and other styles
13

Caballero, Hector, Vianney Muñoz, and Marco A. Ramos-Corchado. "A comparative study of steganography using watermarking and modifications pixels versus least significant bit." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 6 (2023): 6335. http://dx.doi.org/10.11591/ijece.v13i6.pp6335-6350.

Full text
Abstract:
This article presents a steganography proposal based on embedding data expressed in base 10 by directly replacing the pixel values from images red, green blue (RGB) with a novel compression technique based on watermarks. The method considers a manipulation of the object to be embedded through a data compression triple process via LZ77 and base 64, watermark from low-quality images, embedded via discrete wavelet transformation-singular value decomposition (DWT-SVD), message embedded by watermark is recovered with data loss calculated, the watermark image and lost data is compressed again using LZ77 and base 64 to generate the final message. The final message is embedded in portable network graphic (PNG) images taken from the Microsoft common objects in context (COCO), ImageNet and uncompressed color image database (UCID) datasets, through a filtering process pixel of the images, where the selected pixels expressed in base 10, and the final message data is embedded by replacing units’ position of each pixel. In experimentation results an average of 40 dB in peak signal noise to ratio (PSNR) and 0.98 in the similarity structural index metric (SSIM) evaluation were obtained, and evasion steganalysis rates of up to 93% for stego-images, the data embedded average is 3.2 bpp.
APA, Harvard, Vancouver, ISO, and other styles
14

Hector, Caballero, Muñoz Vianney, and A. Ramos-Corchado Marco. "A comparative study of steganography using watermarking and modifications pixels versus least significant bit." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 6 (2023): 6335–50. https://doi.org/10.11591/ijece.v13i6.pp6335-6350.

Full text
Abstract:
This article presents a steganography proposal based on embedding data expressed in base 10 by directly replacing the pixel values from images red, green blue (RGB) with a novel compression technique based on watermarks. The method considers a manipulation of the object to be embedded through a data compression triple process via LZ77 and base 64, watermark from low-quality images, embedded via discrete wavelet transformation-singular value decomposition (DWT-SVD), message embedded by watermark is recovered with data loss calculated, the watermark image and lost data is compressed again using LZ77 and base 64 to generate the final message. The final message is embedded in portable network graphic (PNG) images taken from the Microsoft common objects in context (COCO), ImageNet and uncompressed color image database (UCID) datasets, through a filtering process pixel of the images, where the selected pixels expressed in base 10, and the final message data is embedded by replacing units’ position of each pixel. In experimentation results an average of 40 dB in peak signal noise to ratio (PSNR) and 0.98 in the similarity structural index metric (SSIM) evaluation were obtained, and evasion steganalysis rates of up to 93% for stego-images, the data embedded average is 3.2 bpp
APA, Harvard, Vancouver, ISO, and other styles
15

Nearchou, Andreas C. "Path planning of a mobile robot using genetic heuristics." Robotica 16, no. 5 (1998): 575–88. http://dx.doi.org/10.1017/s0263574798000289.

Full text
Abstract:
A genetic algorithm for the path planning problem of a mobile robot which is moving and picking up loads on its way is presented. Assuming a findpath problem in a graph, the proposed algorithm determines a near-optimal path solution using a bit-string encoding of selected graph vertices. Several simulation results of specific task-oriented variants of the basic path planning problem using the proposed genetic algorithm are provided. The results obtained are compared with ones yielded by hill-climbing and simulated annealing techniques, showing a higher or at least equally well performance for the genetic algorithm.
APA, Harvard, Vancouver, ISO, and other styles
16

Agbozo, Faith, Doris Ocansey, Prosper Atitto, and Albrecht Jahn. "Compliance of a Baby-Friendly Designated Hospital in Ghana With the WHO/UNICEF Baby and Mother-Friendly Care Practices." Journal of Human Lactation 36, no. 1 (2019): 175–86. http://dx.doi.org/10.1177/0890334419848728.

Full text
Abstract:
Background: Although the Baby-Friendly Hospital Initiative has improved breastfeeding rates globally, weak monitoring still affects hospital-level implementation. Research aim: To reassess compliance of a Baby-Friendly Hospital with the Ten Steps to Successful Breastfeeding, International Code of Marketing of Breast-milk Substitutes, HIV and Infant Feeding, and Mother-Friendly Care following the WHO/UNICEF global criteria. Methods: In this cross-sectional, prospective, mixed-methods study ( N = 180), clinical staff ( n = 60), pregnant women ( n = 40), postpartum mothers ( n = 60), and mothers of babies in intensive care ( n = 20) were randomly selected from one urban secondary-level public hospital in Ghana designated as Baby-Friendly in 2004 but never reassessed. Data were collected through interviews, document reviews, and observations using the revised WHO/UNICEF external reassessment tool and analyzed quantitatively using the Baby-Friendly Hospital Initiative computer tool. Scores higher than 80% signified a pass (high compliance). Scores rated as low (< 50%) and moderate (50–80%) signified noncompliance. Results: The facility passed the criteria for full compliance with the International Code (86%) but failed other components. Compliance with the Ten Steps was moderate (55%). Step 7 about rooming-in (84%) and Step 9 about human milk substitutes (100%) were passed, whereas Step 1 about written breastfeeding policies (0%), Step 2 about staff training (7%), and Step 4 about early breastfeeding initiation (31%) were met the least. Compliance with Mother-Friendly Care (34%) and HIV and Infant Feeding (47%) were low. Main implementation gaps were unavailability of policies and staff’s inadequate knowledge about Baby-Friendly practices. Conclusions: Improving staff training and maternal counseling, routinely reassessing designated facilities, and providing technical support in problematic areas might sustain implementation.
APA, Harvard, Vancouver, ISO, and other styles
17

Banham, Gary. "PrefaceThe ‘Deconstruction of Christianity’: A Special Issue." Derrida Today 6, no. 1 (2013): 1–10. http://dx.doi.org/10.3366/drt.2013.0048.

Full text
Abstract:
The theme of the ‘deconstruction of Christianity’, which was selected for this special issue of Derrida Today, is one that arises not from the work of Derrida himself in the first instance but instead from that of Jean-L Nancy. Not only is this so but Derrida's ([2000] 2005) own view of the notion of the ‘deconstruction of Christianity’ seems, on the evidence available, to be at least open to quite a bit of interpretation given the ambiguous nature of some of his comments on the question. Given this is so it might not be thought at all obvious why this theme should be selected for a special issue of Derrida Today and in this introduction I want to address both this possible disquiet and also provide some background to the arrival of concern with this topic.
APA, Harvard, Vancouver, ISO, and other styles
18

Artiemjew, Piotr, and Aleksandra Kislak-Malinowska. "Indiscernibility Mask Key for Image Steganography." Computers 9, no. 2 (2020): 38. http://dx.doi.org/10.3390/computers9020038.

Full text
Abstract:
Our concern in this paper is to explore the possibility of using rough inclusions for image steganography. We present our initial research using indiscernibility relation as a steganographic key for hiding information into the stego carrier by means of a fixed mask. The information can be embedded into the stego-carrier in a semi-random way, whereas the reconstruction is performed in a deterministic way. The information shall be placed in selected bytes, which are indiscernible with the mask to a fixed degree. The bits indiscernible with other ratios (smaller or greater) form random gaps that lead to somehow unpredictable hiding of information presence. We assume that in our technique it can modify bits, the change of which does not cause a visual modification detectable by human sight, so we do not limit ourselves to the least significant bit. The only assumption is that we do not use the position when the mask we define uses it. For simplicity’s sake, in this work we present its operation, features, using the Least Significant Bit (LSB) method. In the experimental part, we have implemented our method in the context of hiding image into the image. The LSB technique in its simplest form is not resistant to stegoanalisys, so we used the well-known LSB matching method to mask the presence of our steganographic key usage. To verify the resistance to stegoanalisys we have conducted and discussed Chi-square and LSB enhancement test. The positive features of our method include its simplicity and speed, to decode a message we need to hide, or pass to another channel, a several-bit mask, degree of indiscernibility and size of the hidden file. We hope that our method will find application in the art of creating steganographic keys.
APA, Harvard, Vancouver, ISO, and other styles
19

Halboos, Estabraq Hussein Jasim, and Abbas M. Albakry. "Hiding text using the least significant bit technique to improve cover image in the steganography system." Bulletin of Electrical Engineering and Informatics 11, no. 6 (2022): 3258–71. http://dx.doi.org/10.11591/eei.v11i6.4337.

Full text
Abstract:
One of the highest priorities in the era of information technology is to achieve an accurate and effective system for hiding security data. One of the goals of steganography is imperceptability to intruder. So this paper work to increase the imperceptibility on image, which has weaknesses in previous studies, as well as to avoid statistical attacks such as chi-square. A method has been proposed that includes calculating the color contrasts in the homogeneous areas of the image and dividing them according to the color contrast and exploiting the data of pixels that have a high impact to embed on the two first and third bits of least significant bit (LSB) to increase the amount of embedded data, impact regions (IR) classify according to selected features extracted in advance by using the support vector machine (SVM) classifier. Work was done on standard images taken from a standard dataset (USC-SIPI) for two types of gray and color images. The results showed the worth of the proposed method through a high peak signal to noise ratio (PSNR) that reached 89.5 dB due to the distribution of data on pixels according to the proposed method
APA, Harvard, Vancouver, ISO, and other styles
20

Estabraq, Hussein Jasim Halboos, and M. Albakry Abbas. "Hiding text using the least significant bit technique to improve cover image in the steganography system." Bulletin of Electrical Engineering and Informatics 11, no. 6 (2022): 3258~3271. https://doi.org/10.11591/eei.v11i6.4337.

Full text
Abstract:
One of the highest priorities in the era of information technology is to achieve an accurate and effective system for hiding security data. One of the goals of steganography is imperceptability to intruder. So this paper work to increase the imperceptibility on image, which has weaknesses in previous studies, as well as to avoid statistical attacks such as chi-square. A method has been proposed that includes calculating the color contrasts in the homogeneous areas of the image and dividing them according to the color contrast and exploiting the data of pixels that have a high impact to embed on the two first and third bits of least significant bit (LSB) to increase the amount of embedded data, impact regions (IR) classify according to selected features extracted in advance by using the support vector machine (SVM) classifier. Work was done on standard images taken from a standard dataset (USC-SIPI) for two types of gray and color images. The results showed the worth of the proposed method through a high peak signal to noise ratio (PSNR) that reached 89.5 dB due to the distribution of data on pixels according to the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
21

Devlin, Maurice. "A Bit of the ‘Other’: Media Representations of Young People's Sexuality." Irish Journal of Sociology 12, no. 2 (2003): 86–106. http://dx.doi.org/10.1177/079160350301200206.

Full text
Abstract:
Media representations of young people are an important part of society's ongoing discussion with itself about ‘the state of its youth’. This article sets out to explore how the Irish media address the issue of young people and sexuality. Adopting a broadly social constructionist perspective, it presents qualitative case studies of the verbal and visual content of selected feature items in the press and concludes that, at least where sexuality is at issue, young people are envisaged and presented as ‘Other’, as something puzzling and mysterious. The tabloid and broadsheet press employ similar sets of rhetorical devices to construct this representation and to ‘make a spectacle’ of the young, often with marked gender differences. There is a consistent ‘metaphor of discovery’: the ‘lifting of a lid’ on what young people are ‘getting up to’, unknown to their parents. There is a pervasive sense of alarm, dismay, of loss and even (ambivalently) of betrayal. It is suggested that in consistently treating young people as ‘Other’, as predominantly different and difficult, these media representations may themselves be helping to construct and sustain the ‘problem’ of intergenerational relations.
APA, Harvard, Vancouver, ISO, and other styles
22

Kim, Cheonshik, Luis Cavazos Quero, Ki-Hyun Jung, and Lu Leng. "Advanced Dual Reversible Data Hiding: A Focus on Modification Direction and Enhanced Least Significant Bit (LSB) Approaches." Applied Sciences 14, no. 6 (2024): 2437. http://dx.doi.org/10.3390/app14062437.

Full text
Abstract:
In this study, we investigate advances in reversible data hiding (RDH), a critical area in the era of widespread digital data sharing. Recognizing the inherent vulnerabilities such as unauthorized access and data corruption during data transmission, we introduce an innovative dual approach to RDH. We use the EMD (Exploiting Modification Direction) method along with an optimized LSB (Least Significant Bit) replacement strategy. This dual method, applied to grayscale images, has been carefully developed to improve data hiding by focusing on modifying pixel pairs. Our approach sets new standards for achieving a balance between high data embedding rates and the integrity of visual quality. The EMD method ensures that each secret digit in a 5-ary notational system is hidden by 2 cover pixels. Meanwhile, our LSB strategy finely adjusts the pixels selected by EMD to minimize data errors. Despite its simplicity, this approach has been proven to outperform existing technologies. It offers a high embedding rate (ER) while maintaining the high visual quality of the stego images. Moreover, it significantly improves data hiding capacity. This enables the full recovery of the original image without increasing file size or adding unnecessary data, marking a significant breakthrough in data security.
APA, Harvard, Vancouver, ISO, and other styles
23

Bedelean, Bogdan, Mihai Ispas, and Sergiu Răcășan. "Combining Artificial Neural Network and Response Surface Methodology to Optimize the Drilling Operating Parameters of MDF Panels." Forests 14, no. 11 (2023): 2254. http://dx.doi.org/10.3390/f14112254.

Full text
Abstract:
Most of the parts of furniture made of medium density fiberboards (MDF) require at least one hole to be assembled. The drilling technological parameters influence the quality of holes. Factors such as tip angle of the drill bit, feed rate, type and diameter of the drill bit, and spindle rotational speed could affect the drilling process. Therefore, the right choosing of drilling parameters is a mandatory condition to improve the drilling efficiency that is expressed through tool durability, cost, and quality of the drilling. Thus, in this work, we are proposed an approach that consists in combining two modelling techniques, which were successfully applied in various fields, namely artificial neural network (ANN) and response surface methodology (RSM), to analyze and optimize the drilling process of MDF boards. Four artificial neural network models with a reasonable accuracy were developed to predict the analyzed responses, namely delamination factor at inlet, delamination factor at outlet, thrust force, and drilling torque. These models were used to complete the experimental design that was requested by the RSM. The optimum values of the selected factors and their influence on the drilling process of the MDF boards were revealed. A part of optimum combinations among analyzed factors could be used both during the drilling of the MDF boards and prelaminated wood particleboards.
APA, Harvard, Vancouver, ISO, and other styles
24

Guan, Qing Yang, Xuan Li, and Xiao Yu Lan. "An Improved Frequency Offset Cancellation for Uplink Multi-User OFDMA System Based on TF-RLS Algorithm." Applied Mechanics and Materials 577 (July 2014): 1004–7. http://dx.doi.org/10.4028/www.scientific.net/amm.577.1004.

Full text
Abstract:
Time and frequency recursive least squares algorithm (TF-RLS) is proposed to cancel the interference due to the frequency offset (FO) in uplink Orthogonal Frequency Division Multiple Access (OFDMA) system. TF-RLS algorithm is composed of two stages, which is TD-RLS scheme and FD-RLS scheme. In the first stage, TD-RLS scheme is selected to pre-cancel the frequency offset in the time domain, and then the interference induced by residual frequency offset has been eliminated by the FD-RLS scheme in the frequency domain. The result of bit error rate (BER) shows that its performance is robust for cancellation as comparison criteria, even though the frequency offset is 0.45. The 16QAM constellation figures are also simulated to observe the improvements from the proposed suppression schemes.
APA, Harvard, Vancouver, ISO, and other styles
25

Hossain, Mohammad Makbul, Sabarin Ahamed, Khalifa Mahmud Tarik, Md Yousuf Hira, and Partha Shekhar Roy. "The Effect of Analgesia in Fast Track Pediatric Cardiac Patient." Scholars Journal of Applied Medical Sciences 10, no. 12 (2022): 2455–59. http://dx.doi.org/10.36347/sjams.2022.v10i12.064.

Full text
Abstract:
Background: Rapid tracheal extubation after cardiac surgery is not novel. "Fast-track management" has gained popularity in recent years, and the provision of cost-effective treatment is now included in with other factors as a means of assessing the success of various surgical procedures. Objective: In this study our main goal is to evaluate the effect of Analgesia in fast track pediatric cardiac patient. Method: This retrospective study was done at Bangladesh Shishu Hospital and Institute, Bangladesh, from January 2021 to January 2022. A total of 100 patients considered suitable for fast-track care were selected prior to surgery. The criteria for the selection of fast-track patients included low- risk cardiac surgery and the absence of other associated complex defects, either a weight over 10 kg or at least 6 months of age, the absence of complex non-cardiac issues and no significant history of repeat chest infections or obstructive airway disease. Results: during the study, mean age group was 5.7 years, followed by 55 cases were male, mean weight was 15.5 kg. 50% had a trial septal defect followed by 15% Ventricular septal defect, 11% Partial anomalous pulmonary, 9% congenital sabaortic stenosis, 10% had Atrioventricular septal defect. While reviewing post-operative faces pain score in day-1, 15% had no hurts followed by 60% had hurts a little bit, 10% had hurts more, 5% had hurts even more, 5% had hurts whole lot, 5% had hurts worst In day-2 25% had no hurts, 50% had hurts a bit, 12% had hurts a little more, 6% had hurts even more. In day-3 40% had no hurts, 40% had hurts a little bit, 20% had hurts little more. However, in day-4 15% had hurts little bit and 10% had hurts little more. In addition, 90% of the patients had between excellent and satisfactory analgesia. Moreover, 48% had vomiting and 2% had itching. Conclusion: The treatment of congenital heart disease after surgery is projected to become more reliant on "fast-track" care as the healthcare system ....
APA, Harvard, Vancouver, ISO, and other styles
26

Zalata, Mohamad K. Abu, Mohamad T. Barakat, and Ziad A. Alqadi. "Carrier Image Rearrangement to Enhance the Security Level of LSB Method of Data Steganography." International Journal of Computer Science and Mobile Computing 11, no. 1 (2022): 182–93. http://dx.doi.org/10.47760/ijcsmc.2022.v11i01.024.

Full text
Abstract:
Least significant bit method is one of the most popular methods of data steganography, this method is very simple and provides good values for MSE and PSNR. LSB method is not secure enough and the embedded secret message can be easily hacked by any person with any programming experience. To enhance the security level of LSB and to protect the secret message from being hacked and addition stage is recommended. This stage adds a necessary protection without affecting the quality parameters and the efficiency of LSB. The protection process is based on using a complex private key, this key is generated by sender depending on the block size and the selected image size and kept in secret to be used by the receiver, the private key can be changed or updated any time, when the needs arise.
APA, Harvard, Vancouver, ISO, and other styles
27

Praminatih, Gusti Ayu. "A DIACHRONIC STUDY OF THE AUTHORIAL IDENTITY IN TOURISM RESEARCH ARTICLES." MOZAIK HUMANIORA 20, no. 2 (2021): 145. http://dx.doi.org/10.20473/mozaik.v20i2.18935.

Full text
Abstract:
The use of first-person pronouns (I, we) in writing research articles was remaining problematic for both inexperienced and advanced authors. Nevertheless, some research suggested that the FPPs were increasingly used in writing research articles (RAs) to indicate the authorial identity. This research aimed to investigate types, functions, and correlation of the FPPs in tourism RAs by employing the diachronic corpus linguistics method. The data of this research were accessed and downloaded through five open access journals published by Elsevier. There were 80 selected tourism RAs from the year 2015 to 2020 that classified into five corpora. AntConc was software that was employed to retrieve the FPPs from the corpora. This research discovered the FPPs I and we were constructed as six types of authorial identity that range from the least to the strongest authoritative identity in the past five years. The constructed authorial identity had three main functions for the authors of tourism RAs, tourism as an academic discipline, and the readers of tourism RAs. The statistical calculation showed that the correlation was 0.87 that signified the use of the FPPs was increasing in the following year. Keywords: authorial identity, diachronic corpus linguistics, the first-person pronouns, tourism research articles.
APA, Harvard, Vancouver, ISO, and other styles
28

khaled, Mayar, and Ahmed H. Abu El-Atta. "Developing Algorithms for Image Steganography and Increasing the Capacity Depending on Choosing the Best Pixels." International journal of Computer Networks & Communications 14, no. 4 (2022): 99–115. http://dx.doi.org/10.5121/ijcnc.2022.14406.

Full text
Abstract:
Steganography is a vital technique for transferring confidential information via an insecure network. In addition, digital images are used as a cover to communicate sensitive information. The Least Significant Bit (LSB) method is one of the simplest ways to insert secret data into a cover image. In this paper, the secret text is compressed twice by an Arithmetic coding algorithm, and the resulting secret bits are hidden in the cover pixels of the image corresponding to the pixels of each of the following three methods, one of three methods is used in each experiment: The first method, the edges of the image are modified to increase the number of edges, in the second method the lighter-colored regions are selected, and in the third method, the two methods are combined together to increase security and keep the secret message unrecognized. Hiding in each of the previous methods is done by using the LSB technique in the last 2-bit. The correction approach is used to increase the stego image's imperceptibility. The experimental results show that with an average message size of 29.8 kb, the average Peak Signal-to-Noise Ratio (PSNR) for the second proposed (Light regions) method equals 62.76 dB and for the third proposed (Edge and region) method equals 62.72 dB, which is a reasonable result when compared to other steganographic techniques.
APA, Harvard, Vancouver, ISO, and other styles
29

Yi, Donghee, Heetae Jin, Moon Chan Kim, and Suk Chan Kim. "An Ultrasonic Object Detection Applying the ID Based on Spread Spectrum Technique for a Vehicle." Sensors 20, no. 2 (2020): 414. http://dx.doi.org/10.3390/s20020414.

Full text
Abstract:
When an ultrasonic sensor generates an ultrasonic wave and detects an obstacle from a reflected wave, a signal transmitted by other ultrasonic sensors would be interference. In this paper, to overcome the interference, a transducer transmits a signal with a unique ID modulated. The interference is ignored by verifying that the reflected signal includes its ID. The ID verification process uses a correlation between the received signal and the ID. Therefore, the ID is selected from orthogonal codes with good cross-correlation. Long code has the advantage of being more robust to interference. However, the reflected wave from nearby obstacles might return before the transmission ends. Therefore, the 7-bit Barker code is applied for near obstacle detection and a 31-bit Gold code is used for distant obstacle detection. The modulation technique is DQPSK, which is available in a narrow bandwidth and has a simple receiver structure. In ID recognition based on correlation, a near–far problem occurs due to a large amplitude difference between the received wave and interference. The addition of a zero-crossing detector solves this problem. The hardware is implemented based on the algorithm proposed in this paper. The simulation showed a detection rate of at least 90% and the the result of the real measurement represented a detection rate of 97.3% at 0.5 m and 94.5% at 2 m.
APA, Harvard, Vancouver, ISO, and other styles
30

Owenga, John Timon Odhiambo, Peter J. O. Aloka, and Pamela A. Raburu. "Relationship between Selected Personal Determinants and Examination Cheating among Kenyan Secondary School Students." Academic Journal of Interdisciplinary Studies 7, no. 1 (2018): 73–82. http://dx.doi.org/10.2478/ajis-2018-0007.

Full text
Abstract:
AbstractThe present study investigated the relationship between selected personal determinants and examination cheating among Kenyan secondary school students. This study used a Sequential Explanatory design. The target population was 51,900 students in Kisumu County within 153 public secondary schools categorized as 2 National secondary schools, 21 extra county schools, and 130 county and sub-county schools. A simple random sampling technique was used to determine sample size which comprised of 380 respondents since the study was confined within specific ecological boundary which was public secondary schools. Data collection instruments included questionnaires, for general data collection from the respondents and in-depth interview schedules for one to one interview of respondents. The finding of the study shows that there was statistically significant positive correlation (r=.592, n=360, p<.05) between Personal determinants and overall perceived level of exams cheating. It is evident from the model that student personal characteristics accounted for 35.1%, as signified by coefficient R2= .351, of the variation in perceived level of examinations cheating among students in secondary schools. it is evident that gender made the highest (Beta=.467) contribution as personal determinant on explaining the dependent variable, when the variance explained by all other variables in the model was controlled for. Student self-esteem had the least effect (Beta=.048) on examinations cheating. However, all the personal determinants had statistically significant influence on examinations cheating among the secondary schools students. The calculated effect size (eta squared=.3514) indicate that there was quite a substantial amount of variance in level of examinations cheating caused by variability in the personal determinants of the students. This suggests that 35.1% of the variance in the perceived exams cheating was accounted for by the personal determinants of the secondary school students, when other variables were controlled. Teacher counselors to assess and identify those students at risk and change their perception on examination cheating due to low self-efficacy.
APA, Harvard, Vancouver, ISO, and other styles
31

Khan, Shoab. "Multi-Image Steganography." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem32607.

Full text
Abstract:
Steganography is the practice of concealing information within various types of data, encompassing the embedding of confidential content like messages, images, audio, or video within a cover image. The primary objective involves hiding the secret message or image within the selected image through the utilization of the Least Significant Bit (LSB) technique. To ensure the safeguarding and security of the concealed content, the Advanced Encryption Standard (AES) Algorithm is implemented. The comparison of different image formats, each varying in text length or image size, is conducted. The algorithm's efficacy is evaluated through metrics such as Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE), with a higher PSNR value indicating a superior image quality. Steganography assumes a vital role in numerous applications, including but not limited to medical, military, One Time Password (OTP), and copyright protection. Key Words: Image steganography, LSB, Advanced Encryption Standard, PSNR Ratio, MSE
APA, Harvard, Vancouver, ISO, and other styles
32

Barakat, Mohamad Tariq, Rushdi Abu Zneit, and Ziad A. Alqadi. "Crypto-Steganographic Method to Protect Secret Messages." International Journal of Computer Science and Mobile Computing 10, no. 12 (2021): 46–61. http://dx.doi.org/10.47760/ijcsmc.2021.v10i12.007.

Full text
Abstract:
Multiple methods are used to hide secret messages in digital color images, and the most important and most common is the least significant bit (LSB) method. The LSB method is a known and exposed method, and anyone with programming experience can retrieve the secret message embedded in the digital image. In this paper research we will add some enhancements to improve the security level of LSB method to protect the embedded secret message from being hacked. A simple method of secret message cryptography will be used to encrypt the secret message before bedding it using LSB method. The method will be based on using color image as an image_key; this image_key will be resized to generate the needed secret private key used to encrypt-decrypt secret message. The length and the contents of the generated private key will dynamically change depending on the message length and the selected image_key. The selected image_key will be kept in secret without transmission and will be known only by the sender and receiver and it can be changed any time when needed. The proposed crypto_steganographic method will be implemented to show how it will increase the level o secret message protection.
APA, Harvard, Vancouver, ISO, and other styles
33

Gupta, Aparna, Vijay Sharma, and Lalit Singh. "Process variable studies for preparation of optimized system for bupropion hydrochloride using CCD." Journal of Drug Delivery and Therapeutics 9, no. 2-s (2019): 281–90. http://dx.doi.org/10.22270/jddt.v9i2-s.2513.

Full text
Abstract:
Aim of present work is to develop optimized sustained release dosage form of Bupropion hydrochloride using Formulation by Design (FbD) approach. Development and optimization of formulation batches was done by design experiment using Central Composite Design (CCD). Tablets were formulated by direct compression technique and evaluated. The impact of independent variables like concentration of Hydroxypropyl Methyl Cellulose (HPMC K4M) and Carbopol (CP 934P) were observed on dependent variable like hardness of tablet, drug release in 12 h (Q12h) and the time for fifty percent release of drug (T50%). Polynomial equations were generated using multiple linear regression analysis (MLRA), response surface plots and contour plots were drawn, optimum formulations were selected by brute force method. The hardness and Q12h was found in the range of 4.4- 4.7 Kg/cm2 and 88.19- 96.7% respectively, while T50% was found in the range of 3.5- 5.5h. Validation of optimization study performed using four confirmatory experimental runs which indicated very high degree of prognostic ability of FbD methodology with percentage error varied between -0.024% and 0.024 %. The overlaying of all these plots provided an overlay plot, which signified the region of optimization. Thus, central composite design (CCD) is a useful tool in the development of optimized dosage form along with the significance of independent variable as well as least investment of money, manpower and time. Keywords: Formulation by Design, Central Composite Design, Bupropion Hydrochloride.
APA, Harvard, Vancouver, ISO, and other styles
34

Alqobaty, Dr/Abdulmalek. "A Robust Audio Steganography Method Using Partial Knight Tour for Concealing Messages of Text and Image." مجلة جامعة السعيد للعلوم الانسانية و التطبيقية 3, no. 2 (2023): 10. http://dx.doi.org/10.59325/sjhas.v3i2.67.

Full text
Abstract:
The rapid growth in transfer of data over the Internet realized the need to secured data transmission. Moreover, there is a need to send message that contains a text and image. The steganography is the most promising technique for facilitating the secure communication without affecting the data quality. In this paper, we propose a robust audio steganography approach that hides secret messages of text and image in an audio WAV file using partial knight tour positions in 4×8 square blocks. The cover audio is divided into 4×8 (or 32) audio sample blocks. The secret data are converted to bits and selected 4×8 audio bytes then can hide ASCII codes of 4 characters. The hiding of secret data block is based on a random selected starting audio byte, and on a random selected tour of 32 predefined tours. The algorithm changes the least significant bit (LSB) of the audio bytes based, as mentioned, on randomly selected tours and randomly selected starting audio byte. The resulted stego file can be, then, transmitted over the communication channel such as Internet to the receiver side. After receiving, the extraction process is performed to extract the secret message. The proposed algorithm is implemented us[ing C# programming languages. The PSNR and MSE parameters are used to evaluate the efficiency of the proposed algorithm and they will be checked after implementation. The proposed technique provides a high quality of Peak Signal-to-Noise Ratio (PSNR) and Signal to Noise Ratio (SNR).
APA, Harvard, Vancouver, ISO, and other styles
35

Balli, Keerthana, and Dr Ch D. V. Subba Rao. "Secure Video Steganography using ChaCha20 Encryption and Adaptive LSB." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 1961–68. https://doi.org/10.22214/ijraset.2025.68656.

Full text
Abstract:
Abstract: Video steganography is a robust method for concealing confidential information within video files, ensuring data privacy, and safeguarding against unauthorized access. This study presents a secure video steganography technique incorporating the ChaCha20 encryption algorithm to bolster data security before embedding. ChaCha20, recognized for its agility and resilience to cryptographic threats, encrypts the hidden data before it is inserted into chosen video frames using the Least Significant Bit (LSB) method. This ensures minimal misrepresentation and preserves the perceptual quality of the video while providing a strong layer of security. In this proposed system, once input files are selected, the ChaCha20 algorithm automatically generates a key file. This key file is then used to retrieve the concealed information, ensuring a smooth and secure decryption process. The concealed data is extracted and decrypted accurately at the receiver's end. Experimental results demonstrate that the proposed method achieves high noiselessness, low computational overhead, and vigorous security, making it a reliable solution for secure video-based communication
APA, Harvard, Vancouver, ISO, and other styles
36

Alobaidi, Taif, and Wasfy Mikhael. "An Adaptive Steganography Insertion Technique Based on Cosine Transform." Iraqi Journal for Electrical and Electronic Engineering 20, no. 2 (2024): 45–58. http://dx.doi.org/10.37917/ijeee.20.2.4.

Full text
Abstract:
In the last couple decades, several successful steganography approaches have been proposed. Least Significant Bit (LSB) Insertion technique has been deployed due to its simplicity in implementation and reasonable payload capacity. The most important design parameter in LSB techniques is the embedding location selection criterion. In this work, LSB insertion technique is proposed which is based on selecting the embedding locations depending on the weights of coefficients in Cosine domain (2D DCT). The cover image is transformed to the Cosine domain (by 2D DCT) and predefined number of coefficients are selected to embed the secret message (which is in the binary form). Those weights are the outputs of an adaptive algorithm that analyses the cover image in two domains (Haar and Cosine). Coefficients, in the Cosine transform domain, with small weights are selected. The proposed approach is tested with samples from the BOSSbase, and a custom-built databases. Two metrics are utilized to show the effectiveness of the technique, namely, Root Mean Squared Error (RMSE), and Peak Signal-to-Noise Ratio (PSNR). In addition, human visual inspection of the result image is also considered. As shown in the results, the proposed approach performs better, in terms of (RMSE, and PSNR) than commonly employed truncation and energy based methods.
APA, Harvard, Vancouver, ISO, and other styles
37

Rushton, Laura, Andrea Sass, Adam Baldwin, Christopher G. Dowson, Denise Donoghue, and Eshwar Mahenthiralingam. "Key Role for Efflux in the Preservative Susceptibility and Adaptive Resistance of Burkholderia cepacia Complex Bacteria." Antimicrobial Agents and Chemotherapy 57, no. 7 (2013): 2972–80. http://dx.doi.org/10.1128/aac.00140-13.

Full text
Abstract:
ABSTRACTBacteria from theBurkholderia cepaciacomplex (Bcc) are encountered as industrial contaminants, and little is known about the species involved or their mechanisms of preservative resistance. Multilocus sequence typing (MLST) revealed that multiple Bcc species may cause contamination, withB. lata(n= 17) andB. cenocepacia(n= 11) dominant within the collection examined. At the strain level, 11 of the 31 industrial sequence types identified had also been recovered from either natural environments or clinical infections. Minimal inhibitory (MIC) and minimum bactericidal (MBC) preservative concentrations varied across 83 selected Bcc strains, with industrial strains demonstrating increased tolerance for dimethylol dimethyl hydantoin (DMDMH). Benzisothiazolinone (BIT), DMDMH, methylisothiazolinone (MIT), a blend of 3:1 methylisothiazolinone-chloromethylisothiazolinone (M-CMIT), methyl paraben (MP), and phenoxyethanol (PH), were all effective anti-Bcc preservatives; benzethonium chloride (BC) and sodium benzoate (SB) were least effective. SinceB. latawas the dominant industrial Bcc species, the type strain, 383T(LMG 22485T), was used to study preservative tolerance. Strain 383 developed stable preservative tolerance for M-CMIT, MIT, BIT, and BC, which resulted in preservative cross-resistance and altered antibiotic susceptibility, motility, and biofilm formation. Transcriptomic analysis of theB. lata383 M-CMIT-adapted strain demonstrated that efflux played a key role in its M-CMIT tolerance and elevated fluoroquinolone resistance. The role of efflux was corroborated using the inhibitorl-Phe-Arg-β-napthylamide, which reduced the MICs of M-CMIT and ciprofloxacin. In summary, intrinsic preservative tolerance and stable adaptive changes, such as enhanced efflux, play a role in the ability of Bcc bacteria to cause industrial contamination.
APA, Harvard, Vancouver, ISO, and other styles
38

Feshki, Fatemeh, Abdolali Banaeifar, and Mehdi Kasbparast. "The Effects of a 6-Week Selected Balance and Cawthorne-Cooksey Exercises on Static Balance and Mobility in Female Patients With Multiple Sclerosis." Physical Treatments - Specific Physical Therapy 10, no. 3 (2020): 169–76. http://dx.doi.org/10.32598/ptj.10.3.449.1.

Full text
Abstract:
Purpose: This quasi-experimental and applied research was conducted in 2019. The statistical population of this study included female patients with Multiple Sclerosis (MS) who were members of the Iranian MS Association. Methods: The study subjects were selected among those with a moderate level of disability (between grades 2 & 5). From the statistical population, initially, 60 individuals were selected by a simple and accessible method; however, for some reason, some samples dropped out during the research. In total, 14, 15, and 19 individuals included the balance, Cawthorne-Cooksey, and control groups, respectively. They were selected based on the study inclusion and exclusion criteria. The three groups were evaluated for static balance by the stork test; then, their mobility was measured by the Timed Up and Go (TUG) test at the pretest phase. Next, the two experimental groups performed the exercises for 6 weeks and 3 sessions per week. Besides, at the end of the exercise protocol, the three groups conducted the mentioned test again at the posttest step. To compare the between-groups data at the posttest, one-way Analysis of Variance (ANOVA) and Least Significant Difference (LSD) test were used to compare the differences between the research groups at a significance level 0.05. Results: The present research results indicated that the balance and Cawthorne-Cooksey exercises performed in the experimental groups revealed statistically significant changes in the two studied factors (both P=0.001). Moreover, the LSD test results signified that in the mobility test, there was a significant difference between the control group and balance exercises group (P=0.001) and the control group and Cawthorne-Cooksey exercises group (P=0.001). Additionally, in the static balance test, a significant difference was observed between the control group and balance exercises group (P=0.003) and the control group and Cawthorne-Cooksey exercises group (P=0.001). Finally, it was revealed that female patients with MS presented better balance and mobility after performing the exercise sessions. Conclusion: The obtained data suggested that specialists could use the explored selected balance exercises and Cawthorne-Cooksey exercises to improve balance and mobility in patients with MS.
APA, Harvard, Vancouver, ISO, and other styles
39

Roy, Sodip. "Student Cabinet and Curricular Activities: A Case Study of a Secondary School in Bangladesh." Journal of Education and Research 10, no. 2 (2020): 7–26. http://dx.doi.org/10.3126/jer.v10i2.32718.

Full text
Abstract:
Student leadership is well-known for enhancing student engagement in extra-curricular activities of the schools. But very little research has been pursued- particularly in Bangladesh on how the student leadership contributes to curricular activities and improves better learning experiences of students in secondary schools. In 2015, the Government of Bangladesh introduced Student Cabinet in the secondary schools with a view to inculcate democratic values among the pupils and to foster learning environment in schools. And, in this study, I examine how the Student Cabinet as a leadership tool influences academic activities: classroom and non-classroom activities and supports for an effective learning atmosphere in the school. To that purpose, I follow the qualitative methodology of in-depth interview, focus group discussion, and observation of the student cabinet’s actions in a selected school in Dhaka city. After an examination of its activities, the study reveals that it promotes many curricular activities of the school and minimizes the gaps of learning experiences at least a bit; however, their several activities are likely to link to traditional student politics in Bangladesh in future.
APA, Harvard, Vancouver, ISO, and other styles
40

Hebbache, Khaled, Belal Khaldi, Oussama Aiadi, and Ali Benziane. "A DWT-Based Approach with Gradient Analysis for Robust and Blind Medical Image Watermarking." Applied Sciences 14, no. 14 (2024): 6199. http://dx.doi.org/10.3390/app14146199.

Full text
Abstract:
The growing adoption of telemedicine necessitates robust security measures for medical images during transmission. This paper proposes a novel blind watermarking system for medical images that utilizes both image gradients and the Discrete Wavelet Transform (DWT). Image gradients, acting as spatial derivatives, provide a “topological map” of the image, aiding in the identification of areas susceptible to disruption. The DWT, with its multi-resolution analysis, offers a favorable balance between robustness and imperceptibility. The proposed method embeds the watermark within the low–low band (LL) of the DWT-decomposed image, specifically in 3 × 3 block regions selected based on gradient information. The mathematical relationships between the gradient’s direction and magnitude are employed to extract the corresponding blocks and their codes adequately. These codes are then XORed with the watermark and embedded into the chosen blocks using the least significant bit (LSB) technique. Extensive experimentation on a medical image dataset evaluates the system’s performance against some attacks like filtering, noise, and scaling. The results demonstrate the efficacy of the proposed approach in hiding information while ensuring the security and integrity of watermarked medical images.
APA, Harvard, Vancouver, ISO, and other styles
41

Jiménez Rodríguez, Maricela, Carlos Eduardo Padilla Leyferman, Juan Carlos Estrada Gutiérrez, María Guadalupe González Novoa, Horacio Gómez Rodríguez, and Octavio Flores Siordia. "Steganography applied in the origin claim of pictures captured by drones based on chaos." Ingeniería e Investigación 38, no. 2 (2018): 61–69. http://dx.doi.org/10.15446/ing.investig.v38n2.64509.

Full text
Abstract:
In this work, steganography is implemented in photographs captured by an unmanned aerial vehicle (drone), with the purpose of adding an identifier that indicates which device they are taken from so it works for the recovery of the origin. In the system, a new technique that modifies the least significant bit (LSB) is applied, using a mathematical model to generate the chaotic orbits, one of the parts selects the RGB channel (Red, Green or Blue) where the LSB is changed and the other is implemented to calculate the random position of the sub pixel to be modified in the selected channel. In addition, a comparison between the bit to be hidden and the LSB of the pixel of the image is performed to verify if it is not necessary to modify it, which lessens the alterations in the container image. It is a tool to capture photos remotely with the Ar.Drone 2.0, with the features needed to perform an analysis that uses correlation diagrams and histograms to verify if the integrity of the message is guaranteed or if changes in the stego-image are visible to the naked eye. On the other hand, a test was done on the Baboon image to compare the robustness of the proposed system with other investigations, evaluating the correlation, contrast, energy, homogeneity, MSE, PSNR and quality index. The results generated were compared with the work of other authors concluding our system provides greater security, integrity, high sensitivity to the keys, it is not linked to a single chaotic system and can be applied to hide imperceptibly all kinds of information, in: radiographs, videos, files, official documents, and other types of containers.
APA, Harvard, Vancouver, ISO, and other styles
42

Papadakis, Nikolaos M., Ioanna Aroni, and Georgios E. Stavroulakis. "Effectiveness of MP3 Coding Depends on the Music Genre: Evaluation Using Semantic Differential Scales." Acoustics 4, no. 3 (2022): 704–19. http://dx.doi.org/10.3390/acoustics4030042.

Full text
Abstract:
MPEG-1 Layer 3 (MP3) is one of the most popular compression formats used for sound and especially for music. However, during the coding process, the MP3 algorithm negatively affects the spectral and dynamic characteristics of the audio file being compressed. The aim of this study is to evaluate the effect the MP3 coding format for different music genres and different bitrates via listening tests in which the original uncompressed files and the compressed files are compared. For this purpose, five different music genres were selected (rock, jazz, electronic, classical and solo instrument), and the files were compressed in three different bitrates (96 kbps, 160 kbps and 320 kbps). The semantic differential method was used, and ten bipolar scales were selected for the listening tests (e.g., better–worse, more distortion–less distortion, etc.). The following are the most important findings of this study: classical music was negatively affected the most among the genres due to the MP3 compression (lowest ratings in 8 out of 10 bipolar scales), the solo instrument was least affected among the genres (highest rating in 7 out of 10 bipolar scales), and for higher bit rates, the differences in ratings were small for all music genres. The findings of this study could be used to optimize and adapt the standard, depending on the music genre and the musical piece that needs to be encoded.
APA, Harvard, Vancouver, ISO, and other styles
43

Gulášová, Michala, and Matúš Jókay. "Steganalysis of Stegostorage Library." Tatra Mountains Mathematical Publications 67, no. 1 (2016): 99–116. http://dx.doi.org/10.1515/tmmp-2016-0034.

Full text
Abstract:
Abstract The main goal of this research is the detection of the secret messages hidden in JPEG files, which were embedded by StegoStorage library. This tool allows the user to embed any type of information into a folder of images. Sequential, pseudo-random or Hamming code-based embedding into the least significant bit (LSB) of DCT coefficients is possible. It is possible to choose what fraction of capacity of the cover files are filled. The aim of this contribution is to test the statistical LSB embedding model (modified weighted-stego analysis) for all modes of embedding which StegoStorage library offers, and for all cover files’ capacities, respectively. Another goal is to implement a more appropriate type of steganalytic attack for Hamming codes and test it. For this purpose, the RS (Regular/Singular) steganalysis was selected. The detectability of the LSB embedding model of sequential embedding is possible if the cover files are filled to at least one percent of capacity. In the case of pseudo-random embedding, the secret message can be detected if the cover files are filled to at least 10% of their capacity. Hamming codes were undetectable using this type of an attack. In the case of attack by RS steganalysis, another situation arose. When sequential or pseudo-random embeddings were used, the results indicated the detectability was possible if the cover files were filled up at least 5 percent of capacity. The capacity filling of 5 percent corresponds to 2.5 percent of DCT coefficient changes from the original media in the case of sequential embedding. This value, 2.5%, is the threshold for the utilization of Hamming codes, too. Therefore, Hamming codes (7, 4), (15, 11) and (32, 26) indicated the detectability, because they exceeded that limit.
APA, Harvard, Vancouver, ISO, and other styles
44

Tudorache, Alexandru-Gabriel, Vasile Manta, and Simona Caraiman. "Integration of a Quantum Voting Scheme into Grayscale Images Using the Novel Enhanced Quantum Representation and Qiskit Framework." Modelling and Simulation in Engineering 2022 (April 19, 2022): 1–11. http://dx.doi.org/10.1155/2022/8128754.

Full text
Abstract:
This paper illustrates the way a proposed quantum voting scheme can be designed in combination with a steganography technique called Least Significant Bit (LSB), by modifying a small number of pixels in multiple grayscale images. It combines the voting scheme with the novel enhanced quantum representation (NEQR) of an image, where the LSBs of these pixels represent the vote for each entity that takes part in the voting process. A server is also used, not only to count but also to guarantee the integrity of the votes (which is done inherently, by its design and quantum properties). The superdense coding circuit is part of the design, allowing each voter to use one qubit in order to transmit two classical bits (the vote value). The selected platform for testing this scheme is IBM Quantum Experience, together with the open-source framework called Qiskit (written in Python). This framework allows users to create various quantum circuits, using a wide selection of quantum gates, and then to simulate them, either on a simulator or on a real quantum device. The quantum circuits and the measurement results are also presented in this paper.
APA, Harvard, Vancouver, ISO, and other styles
45

A. Jassim, H., Z. K. Taha, M. A. Alsaedi, and B. M. Albaker. "Enhancing data transfer architecture using LSB steganography combined with reed solomon code." International Journal of Engineering & Technology 7, no. 2.29 (2018): 24. http://dx.doi.org/10.14419/ijet.v7i2.29.13119.

Full text
Abstract:
In this paper, new steganographic systems employing least significant bit technique and wavelet transform for embedding are proposed. These systems incorporate threshold level technique to enhance the performance of embedding scheme. Further, Forward error correcting code is used to improve the system performance. In the proposed system, the cover image is a gray image and the wavelet transform is applied directly. The secret image is coded using Reed Solomon code for preparing to embedding process. The locations of embedding are randomly selected according to pseudorandom number sequence. The combination between the ciphering process and steganography gives the system high level of security. This idea makes unauthorized retrieval is difficult. The simulation results show that the stego image is visually similar to the original one and does not have any suspension about embedded image. The extracted secret image is similar to the original secret image. The results indicate that using one-level Haar wavelet transform increases the capacity of the secret image that can be embedded. Hence, the steganographic goals are achieved in these systems. The proposed systems are simulated using MATLAB® software package.
APA, Harvard, Vancouver, ISO, and other styles
46

Sharif, Md Jamil, and Shawrin Ahmed Khan. "Determinants of Effective Tax Rate: Empirical Evidence From Selected Manufacturing Industries in Bangladesh." Accounting Analysis Journal 12, no. 3 (2024): 177–89. http://dx.doi.org/10.15294/aaj.v12i3.70826.

Full text
Abstract:
Purpose: The objective of this study is to conduct an empirical investigation of financial and operational firm specific factors that have an impact on the effective tax rate (ETR) for Bangladeshi manufacturing firms operating in a variety of industries. Method: The study solely focused on three different production industries: Pharmaceuticals and Chemicals, Engineering, and Ceramics. At least six years’ set of panel data have been collected from each industry between 2016 and 2021 in order to conduct an analysis of the panel corrected standard error model (PCSE). Thus, the PCSE model is used to conduct an analysis on a total of 265 observations derived from 44 different company listed in DSE. Findings: Out of eight financial and operational factors, firm size and profitability has a significant positive correlation with ETR in practically every sector separately and collectively. The findings are supported by political cost theory that suggests large firms have to pay more taxes due to political attention. One exception has been found regarding Ceramics sector where firm size has insignificant negative impact on ETR. This is reinforced by the political power theory, which states that politically influential corporations are less likely to voluntarily pay taxes because of the incentives provided by the power they wield in politics. On the other hand, Interest coverage ratio, Interest to sales ratio, capital intensity, firm age leverage has also significant impact on the effective tax rate in both model ETR1 and ETR2 differently across sectors. This study also concludes that there is variation among industry to industry and little bit of year indicators. Novelty: The study investigates the factors of manufacturing companies empirically and contributes to the variety of taxation issues among various manufacturing sectors. According to the authors’ best knowledge, there has been very little research on taxes, hence this study is a completely new contribution to Bangladesh’s manufacturing sector. Keywords: Effective Tax Rate; Dhaka Stock Exchange; Political Cost Theory; Political Power Theory
APA, Harvard, Vancouver, ISO, and other styles
47

Jaikishun, Sirpaul, Shikui Song, and Zhenbiao Yang. "Screening for Salt Tolerance in Chenopodium quinoa Genotype Seedlings through Germination in a Hydroponic System." Journal of Applied Life Sciences International 26, no. 6 (2023): 75–87. http://dx.doi.org/10.9734/jalsi/2023/v26i6629.

Full text
Abstract:
Quinoa (Chenopodium quinoa Willd.) is poised to be a global life changer with its ability to adapt to a wide range of abiotic stresses and as a highly nutritious and sustainable food source. A trial on screening of salt tolerance was conducted at the germination and seedling stages of 69 quinoa genotypes in different concentrations of NaCl 0 (CK), 100, 200, 300, 400, and 500 mM for 21 days in the MS/2 mixture. This results in 16 genotypes with >50% germination at 400 mM NaCl. These were reassessed in germination indices and relative growth. Results indicated that Chadmo had the highest germinability of 97% and 32.76% relative height among the 16 genotypes. Considering the germination indices, Chadmo had significantly different values (3.05±0.19 day-1) in mean germination time, coefficient of variation of the germination time (38.76±1.97%), the velocity of germination (0.23±0.01 day-1), the uncertainty of germination (0.54±0.08 bit), synchrony of germination (0.42±0.05 and Timson’s index (48.89) with significant differences (P<0.05) among the genotypes. Moreover, Chadmo had the highest membrane stability index (MSI) (60.03±11.84) at 400 mM NaCl and the least relative change between the CK and 400 mM NaCl with 30.87±2.01%. Assessing the stress inhibitory effect of the 16 genotypes, Chadmo had the least relative difference between the CK and 400 mM NaCl with shoot length of 34.34%, root length of 25.57%, fresh weight of 22.05%, dry weight of 3.62% and moisture content of 1.99% with Tukey analyses identifying significant differences (p<0.05). To select the salt-sensitive genotype, an assessment was done on five genotypes that exhibited the least germination at 200 mM NaCl. Kankolla had the least germinability with 12 and 4% at 100 and 200 mM NaCl, respectively. Considering all these parameters, Chadmo and Kankolla were selected as salt-tolerant and salt-sensitive for further analyses.
APA, Harvard, Vancouver, ISO, and other styles
48

Méndez-Naranjo, Pablo, and Andrés Cisneros-Barahona. "Evaluación de la propuesta algorítmica criptográfica con la incorporación de la esteganografía en imágenes. // Evaluation of the cryptographic algorithmic proposal with the incorporation of steganography into images." Ciencia Unemi 10, no. 25 (2018): 134. http://dx.doi.org/10.29076/issn.2528-7737vol10iss25.2017pp134-147p.

Full text
Abstract:
El presente trabajo de tipo aplicativo, cuasi experimental, integró dos campos de la seguridad: la criptografía que cifra el mensaje y la esteganografía que oculta el mensaje tras un medio multimedia, lo cual fortalece el nivel de seguridad. El software utilizado para la investigación fue: Netbeans como ambiente de desarrollo, Beyond Compare, para comparar el código hexadecimal de las imágenes, Ion Forge Image Diff para comparar las diferencias entre imágenes pixel a pixel y Cyptool para las pruebas de criptoanálisis. El algoritmo criptográfico utilizado como base fue el AES (Advanced Encryption Standard) y para la técnica esteganográfica en imágenes se seleccionó LSB (Least Significant Bit). Se implementó y evaluó nuevas funciones que fueron incluidas en el Prototipo II, y se compararon los resultados obtenidos ejecutando criptoanálisis a los mensajes cifrados entre el Prototipo II que utiliza el nuevo algoritmo criptográfico denominado NAES y el Prototipo I que utiliza el algoritmo AES base, a los cuales se les incorporó la técnica esteganográfica en imágenes LSB. Se concluyó, que el nuevo algoritmo criptográfico NAES con la incorporación de la técnica LSB mejoró la seguridad, en comparación con el algoritmo criptográfico AES base, ya que el mensaje es más difuso. AbstractThe present study was quasi experimental, applicative and integrated two fields of security: the cryptography that encrypts the message and the steganography that hides the message behind a multimedia medium, which strengthens the level of security. Netbeans was the software used for the research as a development environment, Beyond Compare to compare the hexadecimal code of the images, Ion Forge Image Diff to compare the differences between pixel to pixel images and Cyptool for the cryptanalysis tests. The AES (Advanced Encryption Standard) cryptographic algorithm was used as the basis and LSB (Least Significant Bit) was selected for the steganographic technique in images. New functions that were included in Prototype II were implemented and evaluated, and results obtained by running cryptanalysis were compared to the encrypted messages between Prototype II, that uses the new cryptographic algorithm named NAES, and Prototype I, that uses the AES base algorithm, to which incorporated the steganographic technique into LSB images. It was concluded that the new cryptographic algorithm NAES with the incorporation of the LSB technique improved the security, in comparison with the AES cryptographic algorithm, since the message is more diffuse.
APA, Harvard, Vancouver, ISO, and other styles
49

Diem, Chuzaimah D., Nova T. Yuniarti, and Soni Mirizon. "What Could the Big6 Strategy Do to Students’ English and Information Literacies?" Studies in Linguistics and Literature 3, no. 1 (2019): 30. http://dx.doi.org/10.22158/sll.v3n1p30.

Full text
Abstract:
<em>This study was aimed to investigate what the Big6 strategy could do to the development of both students’ proficiency in English literacy and information literacy. To achieve the purpose, an experimental study with time series design was conducted. Forty-five students of a private secondary school in Palembang were randomly selected for intervention based on their levels of reading. To collect the data, both English literacy and information literacy tests were given to the students. The results of paired-sample-t test analysis show that both students’ English and information literacies improved significantly. However, the students’ level of English Literacy was only a little bit above average and their information literacy was proficient. When regression analysis was used, only students’ speaking skill of English Literacy and the ethics aspect of information literacy contributed the least to the total achievement of each variable. These imply that the Big6 strategy is able to make a difference in students’ English and information literacies. It also deserves to be used in ELT classrooms in the future for students to enhance their English literacy including their oral expression skill and to familiarize themselves with ethical aspect of information literacy from their puberty.</em>
APA, Harvard, Vancouver, ISO, and other styles
50

Gui, Guan, Zhang-xin Chen, Li Xu, Qun Wan, Jiyan Huang, and Fumiyuki Adachi. "Variable Is Better Than Invariable: Sparse VSS-NLMS Algorithms with Application to Adaptive MIMO Channel Estimation." Scientific World Journal 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/274897.

Full text
Abstract:
Channel estimation problem is one of the key technical issues in sparse frequency-selective fading multiple-input multiple-output (MIMO) communication systems using orthogonal frequency division multiplexing (OFDM) scheme. To estimate sparse MIMO channels, sparseinvariable step-size normalized least mean square(ISS-NLMS) algorithms were applied to adaptive sparse channel estimation (ACSE). It is well known that step-size is a critical parameter which controls three aspects: algorithm stability, estimation performance, and computational cost. However, traditional methods are vulnerable to cause estimation performance loss because ISS cannot balance the three aspects simultaneously. In this paper, we propose two stablesparse variable step-sizeNLMS (VSS-NLMS) algorithms to improve the accuracy of MIMO channel estimators. First, ASCE is formulated in MIMO-OFDM systems. Second, different sparse penalties are introduced to VSS-NLMS algorithm for ASCE. In addition, difference between sparse ISS-NLMS algorithms and sparse VSS-NLMS ones is explained and their lower bounds are also derived. At last, to verify the effectiveness of the proposed algorithms for ASCE, several selected simulation results are shown to prove that the proposed sparse VSS-NLMS algorithms can achieve better estimation performance than the conventional methods via mean square error (MSE) and bit error rate (BER) metrics.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!