Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into ...Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image.The randomization strategies in data embedding techniques may utilize random domains,pixels,or region-of-interest for concealing secrets into a cover image,preventing information from being discovered by an attacker.The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility,but it is challenging.A systematic approach is used with a standard methodology to carry out this study.This review concentrates on the critical examination of several embedding strategies,incorporating experimental results with state-of-the-art methods emphasizing the robustness,security,payload capacity,and visual quality metrics of the stego images.The fundamental ideas of steganography are presented in this work,along with a unique viewpoint that sets it apart from previous works by highlighting research gaps,important problems,and difficulties.Additionally,it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography.展开更多
In this paper, we report the development of novel smart home system based on ZigBee technique and embedded control system. In a lot of ZigBee technology applied in smart home system at the same time, how to view of th...In this paper, we report the development of novel smart home system based on ZigBee technique and embedded control system. In a lot of ZigBee technology applied in smart home system at the same time, how to view of the existing network terminal equipment, control and management of household field research also in rapid development. Terminal equipment mainly includes joining the network and control commands to send coordinator system combines the environment parameter data acquisition and serial port communication, and other functions. The simulation directly shows the effectiveness of our system visually and numerically.展开更多
A new Runge-Kutta (PK) fourth order with four stages embedded method with error control is presentea m this paper for raster simulation in cellular neural network (CNN) environment. Through versatile algorithm, si...A new Runge-Kutta (PK) fourth order with four stages embedded method with error control is presentea m this paper for raster simulation in cellular neural network (CNN) environment. Through versatile algorithm, single layer/raster CNN array is implemented by incorporating the proposed technique. Simulation results have been obtained, and comparison has also been carried out to show the efficiency of the proposed numerical integration algorithm. The analytic expressions for local truncation error and global truncation error are derived. It is seen that the RK-embedded root mean square outperforms the RK-embedded Heronian mean and RK-embedded harmonic mean.展开更多
Semiconductor GaAs microcrystallites were embedded in SiO_(2) thin films by magnetron rf cosputtering technique.Structures of the thin films were characterized by transmission electron microscopy,x-ray diffraction and...Semiconductor GaAs microcrystallites were embedded in SiO_(2) thin films by magnetron rf cosputtering technique.Structures of the thin films were characterized by transmission electron microscopy,x-ray diffraction and x-ray photoelectron microscopy.Average size of microcrystallites,depending on the substrate temperature during deposition,is 3-10nm.Absorption spectra of the films were measured.Blue shift of absorption edge was observed and discussed according to quantum confinement effect.展开更多
Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate w...Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services,as they are an essential component of modern smart transportation systems.VANETs steganography has been suggested by many authors for secure,reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection.This paper aims to determine whether using steganography is possible to improve data security and secrecy in VANET applications and to analyze effective steganography techniques for incorporating data into images while minimizing visual quality loss.According to simulations in literature and real-world studies,Image steganography proved to be an effectivemethod for secure communication on VANETs,even in difficult network conditions.In this research,we also explore a variety of steganography approaches for vehicular ad-hoc network transportation systems like vector embedding,statistics,spatial domain(SD),transform domain(TD),distortion,masking,and filtering.This study possibly shall help researchers to improve vehicle networks’ability to communicate securely and lay the door for innovative steganography methods.展开更多
基金This research was funded by the Ministry of Higher Education(MOHE)through Fundamental Research Grant Scheme(FRGS)under the Grand Number FRGS/1/2020/ICT01/UK M/02/4,and University Kebangsaan Malaysia for open access publication.
文摘Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image.The randomization strategies in data embedding techniques may utilize random domains,pixels,or region-of-interest for concealing secrets into a cover image,preventing information from being discovered by an attacker.The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility,but it is challenging.A systematic approach is used with a standard methodology to carry out this study.This review concentrates on the critical examination of several embedding strategies,incorporating experimental results with state-of-the-art methods emphasizing the robustness,security,payload capacity,and visual quality metrics of the stego images.The fundamental ideas of steganography are presented in this work,along with a unique viewpoint that sets it apart from previous works by highlighting research gaps,important problems,and difficulties.Additionally,it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography.
文摘In this paper, we report the development of novel smart home system based on ZigBee technique and embedded control system. In a lot of ZigBee technology applied in smart home system at the same time, how to view of the existing network terminal equipment, control and management of household field research also in rapid development. Terminal equipment mainly includes joining the network and control commands to send coordinator system combines the environment parameter data acquisition and serial port communication, and other functions. The simulation directly shows the effectiveness of our system visually and numerically.
基金supported as a part of Technical Quality Improvement Programme (TEQIP)
文摘A new Runge-Kutta (PK) fourth order with four stages embedded method with error control is presentea m this paper for raster simulation in cellular neural network (CNN) environment. Through versatile algorithm, single layer/raster CNN array is implemented by incorporating the proposed technique. Simulation results have been obtained, and comparison has also been carried out to show the efficiency of the proposed numerical integration algorithm. The analytic expressions for local truncation error and global truncation error are derived. It is seen that the RK-embedded root mean square outperforms the RK-embedded Heronian mean and RK-embedded harmonic mean.
文摘Semiconductor GaAs microcrystallites were embedded in SiO_(2) thin films by magnetron rf cosputtering technique.Structures of the thin films were characterized by transmission electron microscopy,x-ray diffraction and x-ray photoelectron microscopy.Average size of microcrystallites,depending on the substrate temperature during deposition,is 3-10nm.Absorption spectra of the films were measured.Blue shift of absorption edge was observed and discussed according to quantum confinement effect.
基金Dr.Arshiya Sajid Ansari would like to thank the Deanship of Scientific Research at Majmaah University for supporting this work under Project No.R-2023-910.
文摘Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services,as they are an essential component of modern smart transportation systems.VANETs steganography has been suggested by many authors for secure,reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection.This paper aims to determine whether using steganography is possible to improve data security and secrecy in VANET applications and to analyze effective steganography techniques for incorporating data into images while minimizing visual quality loss.According to simulations in literature and real-world studies,Image steganography proved to be an effectivemethod for secure communication on VANETs,even in difficult network conditions.In this research,we also explore a variety of steganography approaches for vehicular ad-hoc network transportation systems like vector embedding,statistics,spatial domain(SD),transform domain(TD),distortion,masking,and filtering.This study possibly shall help researchers to improve vehicle networks’ability to communicate securely and lay the door for innovative steganography methods.