Image data hiding schemes based on metaheuristic optimization: a review
The digital content exchange on the Internet is associated with information security risks.
Hiding data in digital images is a promising direction in data protection and is an alternative …
Hiding data in digital images is a promising direction in data protection and is an alternative …
A lightweight hybrid scheme for hiding text messages in colour images using LSB, Lah transform and Chaotic techniques
Data security can involve embedding hidden images, text, audio, or video files within other
media to prevent hackers from stealing encrypted data. Existing mechanisms suffer from a …
media to prevent hackers from stealing encrypted data. Existing mechanisms suffer from a …
Enabling unmanned aerial vehicle borne secure communication with classification framework for industry 5.0
The fifth industrial revolution (Industry 5.0) integrates humans and machines to satisfy the
increasing customization demands of the manufacturing complexity using an optimized …
increasing customization demands of the manufacturing complexity using an optimized …
An enhanced segmentation technique and improved support vector machine classifier for facial image recognition
N Patil - International Journal of Intelligent Computing and …, 2021 - emerald.com
Purpose One of the challenging issues in computer vision and pattern recognition is face
image recognition. Several studies based on face recognition were introduced in the past …
image recognition. Several studies based on face recognition were introduced in the past …
Improved face recognition method using SVM-MRF with KTBD based KCM segmentation approach
Rangayya, Virupakshappa, N Patil - International Journal of System …, 2024 - Springer
Digital image processing is a technique for visually analyzing images that can be
manipulated using different approaches. It can also be used to improve image quality and …
manipulated using different approaches. It can also be used to improve image quality and …
An optimized deep learning-based trust mechanism In VANET for selfish node detection
N Jyothi, R Patil - International Journal of Pervasive Computing and …, 2021 - emerald.com
Purpose This study aims to develop a trust mechanism in a Vehicular ad hoc Network
(VANET) based on an optimized deep learning for selfish node detection …
(VANET) based on an optimized deep learning for selfish node detection …
Modified Otsu thresholding based level set and local directional ternary pattern technique for liver tumor segmentation
DS Uplaonkar, Virupakshappa, N Patil - International Journal of System …, 2024 - Springer
In recent times, the liver tumors are one of the leading causes of death, hence automated
segmentation of liver tumors helps physicians in early diagnosis and treatment options. In …
segmentation of liver tumors helps physicians in early diagnosis and treatment options. In …
[HTML][HTML] Privacy preserving steganography based biometric authentication system for cloud computing environment
Recently, cloud computing (CC) received significant interest among organizations and
individuals. Despite the significant benefits of CC, security and privacy are considered as the …
individuals. Despite the significant benefits of CC, security and privacy are considered as the …
Ultrasound liver tumor segmentation using adaptively regularized kernel-based fuzzy C means with enhanced level set algorithm
DS Uplaonkar, N Patil - International Journal of Intelligent Computing …, 2022 - emerald.com
Purpose The purpose of this study is to develop a hybrid algorithm for segmenting tumor
from ultrasound images of the liver. Design/methodology/approach After collecting the …
from ultrasound images of the liver. Design/methodology/approach After collecting the …
An enhanced color visual cryptography scheme based on the binary dragonfly algorithm
DR Ibrahim, R Abdullah, JS Teh - International Journal of …, 2022 - Taylor & Francis
Visual cryptography is an encryption technique that decomposes a secret image into
multiple shares that are digitally 'overlapped'based on logical operations to recover the …
multiple shares that are digitally 'overlapped'based on logical operations to recover the …