Image data hiding schemes based on metaheuristic optimization: a review

A Melman, O Evsutin - Artificial Intelligence Review, 2023 - Springer
The digital content exchange on the Internet is associated with information security risks.
Hiding data in digital images is a promising direction in data protection and is an alternative …

A lightweight hybrid scheme for hiding text messages in colour images using LSB, Lah transform and Chaotic techniques

IQ Abduljaleel, ZA Abduljabbar, MA Al Sibahee… - Journal of Sensor and …, 2022 - mdpi.com
Data security can involve embedding hidden images, text, audio, or video files within other
media to prevent hackers from stealing encrypted data. Existing mechanisms suffer from a …

Enabling unmanned aerial vehicle borne secure communication with classification framework for industry 5.0

DK Jain, Y Li, MJ Er, Q Xin, D Gupta… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The fifth industrial revolution (Industry 5.0) integrates humans and machines to satisfy the
increasing customization demands of the manufacturing complexity using an optimized …

An enhanced segmentation technique and improved support vector machine classifier for facial image recognition

N Patil - International Journal of Intelligent Computing and …, 2021 - emerald.com
Purpose One of the challenging issues in computer vision and pattern recognition is face
image recognition. Several studies based on face recognition were introduced in the past …

Improved face recognition method using SVM-MRF with KTBD based KCM segmentation approach

Rangayya, Virupakshappa, N Patil - International Journal of System …, 2024 - Springer
Digital image processing is a technique for visually analyzing images that can be
manipulated using different approaches. It can also be used to improve image quality and …

An optimized deep learning-based trust mechanism In VANET for selfish node detection

N Jyothi, R Patil - International Journal of Pervasive Computing and …, 2021 - emerald.com
Purpose This study aims to develop a trust mechanism in a Vehicular ad hoc Network
(VANET) based on an optimized deep learning for selfish node detection …

Modified Otsu thresholding based level set and local directional ternary pattern technique for liver tumor segmentation

DS Uplaonkar, Virupakshappa, N Patil - International Journal of System …, 2024 - Springer
In recent times, the liver tumors are one of the leading causes of death, hence automated
segmentation of liver tumors helps physicians in early diagnosis and treatment options. In …

[HTML][HTML] Privacy preserving steganography based biometric authentication system for cloud computing environment

D Prabhu, SV Bhanu, S Suthir - Measurement: Sensors, 2022 - Elsevier
Recently, cloud computing (CC) received significant interest among organizations and
individuals. Despite the significant benefits of CC, security and privacy are considered as the …

Ultrasound liver tumor segmentation using adaptively regularized kernel-based fuzzy C means with enhanced level set algorithm

DS Uplaonkar, N Patil - International Journal of Intelligent Computing …, 2022 - emerald.com
Purpose The purpose of this study is to develop a hybrid algorithm for segmenting tumor
from ultrasound images of the liver. Design/methodology/approach After collecting the …

An enhanced color visual cryptography scheme based on the binary dragonfly algorithm

DR Ibrahim, R Abdullah, JS Teh - International Journal of …, 2022 - Taylor & Francis
Visual cryptography is an encryption technique that decomposes a secret image into
multiple shares that are digitally 'overlapped'based on logical operations to recover the …