Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access

    REVIEW

    Randomization Strategies in Image Steganography Techniques: A Review

    AFM Zainul Abadin1,2,*, Rossilawati Sulaiman1, Mohammad Kamrul Hasan1

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3139-3171, 2024, DOI:10.32604/cmc.2024.050834 - 15 August 2024

    Abstract Image steganography is one of the prominent technologies in data hiding standards. Steganographic system performance mostly depends on the embedding strategy. Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image. The randomization strategies in data embedding techniques may utilize random domains, pixels, or region-of-interest for concealing secrets into a cover image, preventing information from being discovered by an attacker. The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility, but it is challenging. A systematic approach is More >

  • Open Access

    ARTICLE

    A Recursive High Payload Reversible Data Hiding Using Integer Wavelet and Arnold Transform

    Amishi Mahesh Kapadia*, P. Nithyanandam

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 537-552, 2023, DOI:10.32604/iasc.2023.027070 - 06 June 2022

    Abstract Reversible data hiding is an information hiding technique that requires the retrieval of the error free cover image after the extraction of the secret image. We suggested a technique in this research that uses a recursive embedding method to increase capacity substantially using the Integer wavelet transform and the Arnold transform. The notion of Integer wavelet transforms is to ensure that all coefficients of the cover images are used during embedding with an increase in payload. By scrambling the cover image, Arnold transform adds security to the information that gets embedded and also allows embedding… More >

  • Open Access

    ARTICLE

    Down to Zero Size of VoIP Packet Payload

    Mosleh M. Abualhaj*, Qusai Y. Shambour, Abdelrahman H. Hussein, Qasem M. Kharma

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1271-1283, 2021, DOI:10.32604/cmc.2021.014928 - 22 March 2021

    Abstract Voice over Internet Protocol (VoIP) is widely used by companies, schools, universities, and other institutions. However, VoIP faces many issues that slow down its propagation. An important issue is poor utilization of the VoIP service network bandwidth, which results from the large header of the VoIP packet. The objective of this study is to handle this poor utilization of the network bandwidth. Therefore, this study proposes a novel method to address this large header overhead problem. The proposed method is called zero size payload (ZSP), which aims to reemploy and use the header information (fields) More >

  • Open Access

    ARTICLE

    Payload Capacity Scheme for Quran Text Watermarking Based on Vowels with Kashida

    Ali A.R. Alkhafaji1,*, Nilam Nur Amir Sjarif1, M.A Shahidan1, Nurulhuda Firdaus Mohd Azmi1, Haslina Md Sarkan1, Suriayati Chuprat1, Osamah Ibrahim Khalaf2, Ehab Nabiel Al-Khanak3

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3865-3885, 2021, DOI:10.32604/cmc.2021.015803 - 01 March 2021

    Abstract The most sensitive Arabic text available online is the digital Holy Quran. This sacred Islamic religious book is recited by all Muslims worldwide including non-Arabs as part of their worship needs. Thus, it should be protected from any kind of tampering to keep its invaluable meaning intact. Different characteristics of Arabic letters like the vowels (), Kashida (extended letters), and other symbols in the Holy Quran must be secured from alterations. The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio… More >

  • Open Access

    ARTICLE

    Multiple Images Steganography of JPEG Images Based on Optimal Payload Distribution

    Yang Pei1,2, Xiangyang Luo1,2,*, Yi Zhang2, Liyan Zhu2

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.1, pp. 417-436, 2020, DOI:10.32604/cmes.2020.010636 - 18 September 2020

    Abstract Multiple images steganography refers to hiding secret messages in multiple natural images to minimize the leakage of secret messages during transmission. Currently, the main multiple images steganography algorithms mainly distribute the payloads as sparsely as possible in multiple cover images to improve the detection error rate of stego images. In order to enable the payloads to be accurately and efficiently distributed in each cover image, this paper proposes a multiple images steganography for JPEG images based on optimal payload redistribution. Firstly, the algorithm uses the principle of dynamic programming to redistribute the payloads of the… More >

  • Open Access

    ARTICLE

    Using Object Detection Network for Malware Detection and Identification in Network Traffic Packets

    Chunlai Du1, Shenghui Liu1, Lei Si2, Yanhui Guo2, *, Tong Jin1

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1785-1796, 2020, DOI:10.32604/cmc.2020.010091 - 30 June 2020

    Abstract In recent years, the number of exposed vulnerabilities has grown rapidly and more and more attacks occurred to intrude on the target computers using these vulnerabilities such as different malware. Malware detection has attracted more attention and still faces severe challenges. As malware detection based traditional machine learning relies on exports’ experience to design efficient features to distinguish different malware, it causes bottleneck on feature engineer and is also time-consuming to find efficient features. Due to its promising ability in automatically proposing and selecting significant features, deep learning has gradually become a research hotspot. In More >

  • Open Access

    ARTICLE

    Vibration Damping Design and Testing Research of Space Payload Cabinet

    Haitao Luo1, Jia Fu1, Rong Chen1, Peng Wang2

    Intelligent Automation & Soft Computing, Vol.25, No.4, pp. 855-864, 2019, DOI:10.31209/2019.100000089

    Abstract Space payloads which installed on spacecraft such as satellites and airships are usually experienced random vibrations and low-frequency sinusoidal vibrations during launching. In this paper, a space payload cabinet is introduced, and the damping design is carried out by applying constrained viscoelastic damping layer to the surfaces of the cabinet to ensure that the space payloads can withstand the above-mentioned mechanical environmental conditions. A reliable connection between the space payload cabinet and the shaking table is achieved through the vibration test fixture. The basic requirements for the function and design of the vibration test fixture More >

  • Open Access

    ABSTRACT

    Vibration Isolation for Sensitive Payloads of Spacecrafts Via Stewart Platform With the X-Shape Supporting Structure

    Xin Wang1,*, Xiaokui Yue1, Honghua Dai1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.21, No.2, pp. 25-25, 2019, DOI:10.32604/icces.2019.04851

    Abstract With the rapid development of space technologies, the requirements of precise pointing and extreme stability increase a lot for spacecrafts. For some spacecrafts, sensitive payloads, including space telescopes, imaging sensors, space-borne optical interferometers are essential for the missions, which require a relatively quiet working environment. Generally, a spacecraft includes multiple instruments, including reaction wheels, cryogenic coolers, control moment gyroscopes and solar array drives, which can produce micro-vibrations. However, the micro-vibrations from the spacecraft and orbital perturbations both have a serious influence on the performance of sensitive payloads. For the sensitive payloads, performance requirements of low… More >

Displaying 1-10 on page 1 of 8. Per Page