The present research work attempted to delineate and characterize the reservoir facies from the Dawson Canyon Formation in the Penobscot field,Scotian Basin.An integrated study of instantaneous frequency,P-impedance,v...The present research work attempted to delineate and characterize the reservoir facies from the Dawson Canyon Formation in the Penobscot field,Scotian Basin.An integrated study of instantaneous frequency,P-impedance,volume of clay and neutron-porosity attributes,and structural framework was done to unravel the Late Cretaceous depositional system and reservoir facies distribution patterns within the study area.Fault strikes were found in the EW and NEE-SWW directions indicating the dominant course of tectonic activities during the Late Cretaceous period in the region.P-impedance was estimated using model-based seismic inversion.Petrophysical properties such as the neutron porosity(NPHI)and volume of clay(VCL)were estimated using the multilayer perceptron neural network with high accuracy.Comparatively,a combination of low instantaneous frequency(15-30 Hz),moderate to high impedance(7000-9500 gm/cc*m/s),low neutron porosity(27%-40%)and low volume of clay(40%-60%),suggests fair-to-good sandstone development in the Dawson Canyon Formation.After calibration with the welllog data,it is found that further lowering in these attribute responses signifies the clean sandstone facies possibly containing hydrocarbons.The present study suggests that the shale lithofacies dominates the Late Cretaceous deposition(Dawson Canyon Formation)in the Penobscot field,Scotian Basin.Major faults and overlying shale facies provide structural and stratigraphic seals and act as a suitable hydrocarbon entrapment mechanism in the Dawson Canyon Formation's reservoirs.The present research advocates the integrated analysis of multi-attributes estimated using different methods to minimize the risk involved in hydrocarbon exploration.展开更多
The challenge of transitioning from temporary humanitarian settlements to more sustainable human settlements is due to a significant increase in the number of forcibly displaced people over recent decades, difficultie...The challenge of transitioning from temporary humanitarian settlements to more sustainable human settlements is due to a significant increase in the number of forcibly displaced people over recent decades, difficulties in providing social services that meet the required standards, and the prolongation of emergencies. Despite this challenging context, short-term considerations continue to guide their planning and management rather than more integrated, longer-term perspectives, thus preventing viable, sustainable development. Over the years, the design of humanitarian settlements has not been adapted to local contexts and perspectives, nor to the dynamics of urbanization and population growth and data. In addition, the current approach to temporary settlement harms the environment and can strain limited resources. Inefficient land use and ad hoc development models have compounded difficulties and generated new challenges. As a result, living conditions in settlements have deteriorated over the last few decades and continue to pose new challenges. The stakes are such that major shortcomings have emerged along the way, leading to disruption, budget overruns in a context marked by a steady decline in funding. However, some attempts have been made to shift towards more sustainable approaches, but these have mainly focused on vague, sector-oriented themes, failing to consider systematic and integration views. This study is a contribution in addressing these shortcomings by designing a model-driving solution, emphasizing an integrated system conceptualized as a system of systems. This paper proposes a new methodology for designing an integrated and sustainable human settlement model, based on Model-Based Systems Engineering and a Systems Modeling Language to provide valuable insights toward sustainable solutions for displaced populations aligning with the United Nations 2030 agenda for sustainable development.展开更多
In the field of model-based system assessment,mathematical models are used to interpret the system behaviors.However,the industrial systems in this intelligent era will be more manageable.Various management operations...In the field of model-based system assessment,mathematical models are used to interpret the system behaviors.However,the industrial systems in this intelligent era will be more manageable.Various management operations will be dynamically set,and the system will be no longer static as it is initially designed.Thus,the static model generated by the traditional model-based safety assessment(MBSA)approach cannot be used to accurately assess the dependability.There mainly exists three problems.Complex:huge and complex behaviors make the modeling to be trivial manual;Dynamic:though there are thousands of states and transitions,the previous model must be resubmitted to assess whenever new management arrives;Unreusable:as for different systems,the model must be resubmitted by reconsidering both the management and the system itself at the same time though the management is the same.Motivated by solving the above problems,this research studies a formal management specifying approach with the advantages of agility modeling,dynamic modeling,and specification design that can be re-suable.Finally,three typical managements are specified in a series-parallel system as a demonstration to show the potential.展开更多
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in...Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret information undetectable.To enhance concealment and security,the Steganography without Embedding(SWE)method has proven effective in avoiding image distortion resulting from cover modification.In this paper,a novel encrypted communication scheme for image SWE is proposed.It reconstructs the image into a multi-linked list structure consisting of numerous nodes,where each pixel is transformed into a single node with data and pointer domains.By employing a special addressing algorithm,the optimal linked list corresponding to the secret information can be identified.The receiver can restore the secretmessage fromthe received image using only the list header position information.The scheme is based on the concept of coverless steganography,eliminating the need for any modifications to the cover image.It boasts high concealment and security,along with a complete message restoration rate,making it resistant to steganalysis.Furthermore,this paper proposes linked-list construction schemeswithin theproposedframework,which caneffectively resist a variety of attacks,includingnoise attacks and image compression,demonstrating a certain degree of robustness.To validate the proposed framework,practical tests and comparisons are conducted using multiple datasets.The results affirm the framework’s commendable performance in terms of message reduction rate,hidden writing capacity,and robustness against diverse attacks.展开更多
Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate w...Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services,as they are an essential component of modern smart transportation systems.VANETs steganography has been suggested by many authors for secure,reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection.This paper aims to determine whether using steganography is possible to improve data security and secrecy in VANET applications and to analyze effective steganography techniques for incorporating data into images while minimizing visual quality loss.According to simulations in literature and real-world studies,Image steganography proved to be an effectivemethod for secure communication on VANETs,even in difficult network conditions.In this research,we also explore a variety of steganography approaches for vehicular ad-hoc network transportation systems like vector embedding,statistics,spatial domain(SD),transform domain(TD),distortion,masking,and filtering.This study possibly shall help researchers to improve vehicle networks’ability to communicate securely and lay the door for innovative steganography methods.展开更多
In Saudi Arabia,drones are increasingly used in different sensitive domains like military,health,and agriculture to name a few.Typically,drone cameras capture aerial images of objects and convert them into crucial dat...In Saudi Arabia,drones are increasingly used in different sensitive domains like military,health,and agriculture to name a few.Typically,drone cameras capture aerial images of objects and convert them into crucial data,alongside collecting data from distributed sensors supplemented by location data.The interception of the data sent from the drone to the station can lead to substantial threats.To address this issue,highly confidential protection methods must be employed.This paper introduces a novel steganography approach called the Shuffling Steganography Approach(SSA).SSA encompasses five fundamental stages and three proposed algorithms,designed to enhance security through strategic encryption and data hiding techniques.Notably,this method introduces advanced resistance to brute force attacks by employing predefined patterns across a wide array of images,complicating unauthorized access.The initial stage involves encryption,dividing,and disassembling the encrypted data.A small portion of the encrypted data is concealed within the text(Algorithm 1)in the third stage.Subsequently,the parts are merged and mixed(Algorithm 2),and finally,the composed text is hidden within an image(Algorithm 3).Through meticulous investigation and comparative analysis with existing methodologies,the proposed approach demonstrates superiority across various pertinent criteria,including robustness,secret message size capacity,resistance to multiple attacks,and multilingual support.展开更多
With the escalating flow of information and digital communication,information security has become an increasingly important issue.Traditional cryptographic methods are being threatened by advancing progress in computi...With the escalating flow of information and digital communication,information security has become an increasingly important issue.Traditional cryptographic methods are being threatened by advancing progress in computing,while physical encryption methods are favored as a viable and compelling avenue.Metasurfaces,which are known for their extraordinary ability to manipulate optical parameters at the nanoscale,exhibit significant potential for the revolution of optical devices,making them a highly promising candidate for optical encryption applications.Here,a single-sized metasurface with four independent channels is proposed for conducting steganography and multi-key information encryption.More specifically,plaintext is transformed into a ciphertext image,which is encoded into a metasurface,while the decryption key is discretely integrated into another channel within the same metasurface.Two different keys for steganographic image unveiling are also encoded into the metasurface and can be retrieved with different channels and spatial positions.This distributed multi-key encryption approach can enhance security,while strategically distributing images across distinct spatial zones serves as an additional measure to reduce the risk of information leakage.This minimalist designed metasurface,with its advantages of high information density and robust security,holds promise across applications including portable encryption,high-camouflaged image display,and high-density optical storage.展开更多
Many existing coverless steganography methods establish a mapping relationship between cover images and hidden data.One issue with these methods is that as the steganographic capacity increases,the number of images st...Many existing coverless steganography methods establish a mapping relationship between cover images and hidden data.One issue with these methods is that as the steganographic capacity increases,the number of images stored in the database grows exponentially.This makes it challenging to build and manage a large image database.To improve the image library utilization and anti-attack capability of the steganography system,we propose an efficient coverless scheme based on dynamically matched substrings.We utilize You Only Look Once(YOLO)for selecting optimal objects and create a mapping dictionary between these objects and scrambling factors.Using this dictionary,each image is effectively assigned to a specific scrambling factor,which is then used to scramble the receiver’s sequence key.To achieve sufficient steganography capability with a limited image library,all substrings of the scrambled sequences have the potential to hide data.After matching the secret information,the ideal number of stego images will be obtained from the database.According to experimental results,this technology outperforms most previous works in terms of data load,transmission security,and hiding capacity.It can recover an average of 79.85%of secret information under typical geometric attacks,and only approximately 200 random images are needed to achieve a capacity of 19 bits per image.展开更多
This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)algorithm.Image steganography,a technique of embedding hidden information in digital photographs,shoul...This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)algorithm.Image steganography,a technique of embedding hidden information in digital photographs,should ideally achieve the dual purposes of maximum data hiding and maintenance of the integrity of the cover media so that it is least suspect.The contemporary methods of steganography are at best a compromise between these two.In this paper,we present our approach,entitled Ant Colony Optimization(ACO)-Least Significant Bit(LSB),which attempts to optimize the capacity in steganographic embedding.The approach makes use of a grayscale cover image to hide the confidential data with an additional bit pair per byte,both for integrity verification and the file checksumof the secret data.This approach encodes confidential information into four pairs of bits and embeds it within uncompressed grayscale images.The ACO algorithm uses adaptive exploration to select some pixels,maximizing the capacity of data embedding whileminimizing the degradation of visual quality.Pheromone evaporation is introduced through iterations to avoid stagnation in solution refinement.The levels of pheromone are modified to reinforce successful pixel choices.Experimental results obtained through the ACO-LSB method reveal that it clearly improves image steganography capabilities by providing an increase of up to 30%in the embedding capacity compared with traditional approaches;the average Peak Signal to Noise Ratio(PSNR)is 40.5 dB with a Structural Index Similarity(SSIM)of 0.98.The approach also demonstrates very high resistance to detection,cutting down the rate by 20%.Implemented in MATLAB R2023a,the model was tested against one thousand publicly available grayscale images,thus providing robust evidence of its effectiveness.展开更多
Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into ...Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image.The randomization strategies in data embedding techniques may utilize random domains,pixels,or region-of-interest for concealing secrets into a cover image,preventing information from being discovered by an attacker.The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility,but it is challenging.A systematic approach is used with a standard methodology to carry out this study.This review concentrates on the critical examination of several embedding strategies,incorporating experimental results with state-of-the-art methods emphasizing the robustness,security,payload capacity,and visual quality metrics of the stego images.The fundamental ideas of steganography are presented in this work,along with a unique viewpoint that sets it apart from previous works by highlighting research gaps,important problems,and difficulties.Additionally,it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography.展开更多
A new steganographic method by pixel-value differencing(PVD)using general quantization ranges of pixel pairs’difference values is proposed.The objective of this method is to provide a data embedding technique with a ...A new steganographic method by pixel-value differencing(PVD)using general quantization ranges of pixel pairs’difference values is proposed.The objective of this method is to provide a data embedding technique with a range table with range widths not limited to powers of 2,extending PVD-based methods to enhance their flexibility and data-embedding rates without changing their capabilities to resist security attacks.Specifically,the conventional PVD technique partitions a grayscale image into 1×2 non-overlapping blocks.The entire range[0,255]of all possible absolute values of the pixel pairs’grayscale differences in the blocks is divided into multiple quantization ranges.The width of each quantization range is a power of two to facilitate the direct embedding of the bit information with high embedding rates.Without using power-of-two range widths,the embedding rates can drop using conventional embedding techniques.In contrast,the proposed method uses general quantization range widths,and a multiple-based number conversion mechanism is employed skillfully to implement the use of nonpower-of-two range widths,with each pixel pair being employed to embed a digit in the multiple-based number.All the message bits are converted into a big multiple-based number whose digits can be embedded into the pixel pairs with a higher embedding rate.Good experimental results showed the feasibility of the proposed method and its resistance to security attacks.In addition,implementation examples are provided,where the proposed method adopts non-power-of-two range widths and employsmultiple-based number conversion to expand the data-hiding and steganalysis-resisting capabilities of other PVD methods.展开更多
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s...Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.展开更多
Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden data.This property makes it difficult for steganalysts’powerful data extrac...Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden data.This property makes it difficult for steganalysts’powerful data extraction tools to detect the hidden data and ensures high-quality stego image generation.However,using a seed key to generate non-repeated sequential numbers takes a long time because it requires specific mathematical equations.In addition,these numbers may cluster in certain ranges.The hidden data in these clustered pixels will reduce the image quality,which steganalysis tools can detect.Therefore,this paper proposes a data structure that safeguards the steganographic model data and maintains the quality of the stego image.This paper employs the AdelsonVelsky and Landis(AVL)tree data structure algorithm to implement the randomization pixel selection technique for data concealment.The AVL tree algorithm provides several advantages for image steganography.Firstly,it ensures balanced tree structures,which leads to efficient data retrieval and insertion operations.Secondly,the self-balancing nature of AVL trees minimizes clustering by maintaining an even distribution of pixels,thereby preserving the stego image quality.The data structure employs the pixel indicator technique for Red,Green,and Blue(RGB)channel extraction.The green channel serves as the foundation for building a balanced binary tree.First,the sender identifies the colored cover image and secret data.The sender will use the two least significant bits(2-LSB)of RGB channels to conceal the data’s size and associated information.The next step is to create a balanced binary tree based on the green channel.Utilizing the channel pixel indicator on the LSB of the green channel,we can conceal bits in the 2-LSB of the red or blue channel.The first four levels of the data structure tree will mask the data size,while subsequent levels will conceal the remaining digits of secret data.After embedding the bits in the binary tree level by level,the model restores the AVL tree to create the stego image.Ultimately,the receiver receives this stego image through the public channel,enabling secret data recovery without stego or crypto keys.This method ensures that the stego image appears unsuspicious to potential attackers.Without an extraction algorithm,a third party cannot extract the original secret information from an intercepted stego image.Experimental results showed high levels of imperceptibility and security.展开更多
In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential priority.To overcome these difficulties,different steganography and data encr...In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential priority.To overcome these difficulties,different steganography and data encryption methods have been proposed by researchers to secure communications.Most of the proposed steganography techniques achieve higher embedding capacities without compromising visual imperceptibility using LSB substitution.In this work,we have an approach that utilizes a combinationofMost SignificantBit(MSB)matching andLeast Significant Bit(LSB)substitution.The proposed algorithm divides confidential messages into pairs of bits and connects them with the MSBs of individual pixels using pair matching,enabling the storage of 6 bits in one pixel by modifying a maximum of three bits.The proposed technique is evaluated using embedding capacity and Peak Signal-to-Noise Ratio(PSNR)score,we compared our work with the Zakariya scheme the results showed a significant increase in data concealment capacity.The achieved results of ourwork showthat our algorithmdemonstrates an improvement in hiding capacity from11%to 22%for different data samples while maintaining a minimumPeak Signal-to-Noise Ratio(PSNR)of 37 dB.These findings highlight the effectiveness and trustworthiness of the proposed algorithm in securing the communication process and maintaining visual integrity.展开更多
Steganography is a technique that is frequently used to hide hidden information in multimedia artifacts including music, video, and images. In order to protect data saved in the cloud, this paper presents a steganogra...Steganography is a technique that is frequently used to hide hidden information in multimedia artifacts including music, video, and images. In order to protect data saved in the cloud, this paper presents a steganography method for encrypting sound utilizing LSB-based computation. By using the least significant bit (LSB) of a byte to represent a message and then substituting each LSB bit with a binary message and encrypting a significant quantity of data. The proposed system uses the LSB technique of picture steganography, Multi-Level Encryption Algorithm (MLEA) and Two-Level Encryption Algorithm (TLEA) data encryption to give the highest level of cloud security. Compared to other current schemes, the performance of the suggested method is 1.732125% better on average.展开更多
The condition of rotor system must be assessed in order to develop condition-based maintenance for rotating machinery. It is determined by multiple variables such as unbalance degree, misalignment degree, the amount o...The condition of rotor system must be assessed in order to develop condition-based maintenance for rotating machinery. It is determined by multiple variables such as unbalance degree, misalignment degree, the amount of bending deformation of the shaft, occurrence of shaft crack of rotor system and so on. The estimation of the degrees of unbalance and misalignment in flexible coupling-rotor system is discussed. The model-based approach is employed to solve this problem. The models of the equivalent external loads for unbalance and misalignment are derived and analyzed. Then, the degrees of unbalance and misalignment are estimated by analyzing the components of the equivalent external loads of which the frequencies are equal to the 1 and 2 times running frequency respectively. The equivalent external loads are calculated according to the dynamic equation of the original rotor system and the differences between the dynamical responses in normal case and the vibrations when the degree of unbalance or misalignment or both changes. The denoise method based on bandpass filter is used to decrease the effect of noise on the estimation accuracy. The numerical examples are given to show that the proposed approach can estimate the degrees of unbalance and misalignment of the flexible coupling-rotor system accurately.展开更多
This paper focuses on the use of models for increasing the precision of estimators in large-area forest surveys. It is motivated by the increasing availability of remotely sensed data, which facilitates the developmen...This paper focuses on the use of models for increasing the precision of estimators in large-area forest surveys. It is motivated by the increasing availability of remotely sensed data, which facilitates the development of models predicting the variables of interest in forest surveys. We present, review and compare three different estimation frameworks where models play a core role: model-assisted, model-based, and hybrid estimation. The first two are well known, whereas the third has only recently been introduced in forest surveys. Hybrid inference mixes design- based and model-based inference, since it relies on a probability sample of auxiliary data and a model predicting the target variable from the auxiliary data.We review studies on large-area forest surveys based on model-assisted, model- based, and hybrid estimation, and discuss advantages and disadvantages of the approaches. We conclude that no general recommendations can be made about whether model-assisted, model-based, or hybrid estimation should be preferred. The choice depends on the objective of the survey and the possibilities to acquire appropriate field and remotely sensed data. We also conclude that modelling approaches can only be successfully applied for estimating target variables such as growing stock volume or biomass, which are adequately related to commonly available remotely sensed data, and thus purely field based surveys remain important for several important forest parameters.展开更多
In previous researches on a model-based diagnostic system, the components are assumed mutually independent. Howerver , the assumption is not always the case because the information about whether a component is faulty ...In previous researches on a model-based diagnostic system, the components are assumed mutually independent. Howerver , the assumption is not always the case because the information about whether a component is faulty or not usually influences our knowledge about other components. Some experts may draw such a conclusion that 'if component m 1 is faulty, then component m 2 may be faulty too'. How can we use this experts' knowledge to aid the diagnosis? Based on Kohlas's probabilistic assumption-based reasoning method, we use Bayes networks to solve this problem. We calculate the posterior fault probability of the components in the observation state. The result is reasonable and reflects the effectiveness of the experts' knowledge.展开更多
In this paper,a novel control structure called feedback scheduling of model-based networked control systems is proposed to cope with a flexible network load and resource constraints.The state update time is adjusted a...In this paper,a novel control structure called feedback scheduling of model-based networked control systems is proposed to cope with a flexible network load and resource constraints.The state update time is adjusted according to the real-time network congestion situation.State observer is used under the situation where the state of the controlled plant could not be acquired.The stability criterion of the proposed structure is proved with time-varying state update time.On the basis of the stability of the novel system structure,the compromise between the control performance and the network utilization is realized by using feedback scheduler. Examples are provided to show the advantage of the proposed control structure.展开更多
In early 2018,the Boliden Garpenberg operation implemented an optimized control strategy as an addition to the existing ventilation on demand system.The purpose of the strategy is to further minimize energy use for ma...In early 2018,the Boliden Garpenberg operation implemented an optimized control strategy as an addition to the existing ventilation on demand system.The purpose of the strategy is to further minimize energy use for main and booster fans,whilst also fulfilling airflow setpoints without violating constraints such as min/max differential pressure over fans and interaction of air between areas in mines.Using air flow measurements and a dynamical model of the ventilation system,a mine-wide coordination control of fans can be carried out.The numerical model is data driven and derived from historical operational data or step changes experiments.This makes both initial deployment and lifetime model maintenance,as the mine evolves,a comparably easy operation.The control has been proven to operate in a stable manner over long periods without having to re-calibrate the model.Results prove a 40%decrease in energy use for the fans involved and a greater controllability of air flow.Moreover,a 15%decrease of the total air flow into the mine will give additional proportional heating savings during winter periods.All in all,the multivariable controller shows a correlation between production in the mine and the ventilation system performance superior to all of its predecessors.展开更多
文摘The present research work attempted to delineate and characterize the reservoir facies from the Dawson Canyon Formation in the Penobscot field,Scotian Basin.An integrated study of instantaneous frequency,P-impedance,volume of clay and neutron-porosity attributes,and structural framework was done to unravel the Late Cretaceous depositional system and reservoir facies distribution patterns within the study area.Fault strikes were found in the EW and NEE-SWW directions indicating the dominant course of tectonic activities during the Late Cretaceous period in the region.P-impedance was estimated using model-based seismic inversion.Petrophysical properties such as the neutron porosity(NPHI)and volume of clay(VCL)were estimated using the multilayer perceptron neural network with high accuracy.Comparatively,a combination of low instantaneous frequency(15-30 Hz),moderate to high impedance(7000-9500 gm/cc*m/s),low neutron porosity(27%-40%)and low volume of clay(40%-60%),suggests fair-to-good sandstone development in the Dawson Canyon Formation.After calibration with the welllog data,it is found that further lowering in these attribute responses signifies the clean sandstone facies possibly containing hydrocarbons.The present study suggests that the shale lithofacies dominates the Late Cretaceous deposition(Dawson Canyon Formation)in the Penobscot field,Scotian Basin.Major faults and overlying shale facies provide structural and stratigraphic seals and act as a suitable hydrocarbon entrapment mechanism in the Dawson Canyon Formation's reservoirs.The present research advocates the integrated analysis of multi-attributes estimated using different methods to minimize the risk involved in hydrocarbon exploration.
文摘The challenge of transitioning from temporary humanitarian settlements to more sustainable human settlements is due to a significant increase in the number of forcibly displaced people over recent decades, difficulties in providing social services that meet the required standards, and the prolongation of emergencies. Despite this challenging context, short-term considerations continue to guide their planning and management rather than more integrated, longer-term perspectives, thus preventing viable, sustainable development. Over the years, the design of humanitarian settlements has not been adapted to local contexts and perspectives, nor to the dynamics of urbanization and population growth and data. In addition, the current approach to temporary settlement harms the environment and can strain limited resources. Inefficient land use and ad hoc development models have compounded difficulties and generated new challenges. As a result, living conditions in settlements have deteriorated over the last few decades and continue to pose new challenges. The stakes are such that major shortcomings have emerged along the way, leading to disruption, budget overruns in a context marked by a steady decline in funding. However, some attempts have been made to shift towards more sustainable approaches, but these have mainly focused on vague, sector-oriented themes, failing to consider systematic and integration views. This study is a contribution in addressing these shortcomings by designing a model-driving solution, emphasizing an integrated system conceptualized as a system of systems. This paper proposes a new methodology for designing an integrated and sustainable human settlement model, based on Model-Based Systems Engineering and a Systems Modeling Language to provide valuable insights toward sustainable solutions for displaced populations aligning with the United Nations 2030 agenda for sustainable development.
基金the National Natural Science Foundation of China(52105070,U21B2074)Department of Science and Technology of Liaoning Province China(2033JH1/10400007).
文摘In the field of model-based system assessment,mathematical models are used to interpret the system behaviors.However,the industrial systems in this intelligent era will be more manageable.Various management operations will be dynamically set,and the system will be no longer static as it is initially designed.Thus,the static model generated by the traditional model-based safety assessment(MBSA)approach cannot be used to accurately assess the dependability.There mainly exists three problems.Complex:huge and complex behaviors make the modeling to be trivial manual;Dynamic:though there are thousands of states and transitions,the previous model must be resubmitted to assess whenever new management arrives;Unreusable:as for different systems,the model must be resubmitted by reconsidering both the management and the system itself at the same time though the management is the same.Motivated by solving the above problems,this research studies a formal management specifying approach with the advantages of agility modeling,dynamic modeling,and specification design that can be re-suable.Finally,three typical managements are specified in a series-parallel system as a demonstration to show the potential.
基金supported in part by the National Natural Science Foundation of China(Nos.62372083,62072074,62076054,62027827,62002047)the Sichuan Science and Technology Innovation Platform and Talent Plan(No.2022JDJQ0039)+2 种基金the Sichuan Science and Technology Support Plan(Nos.2024NSFTD0005,2022YFQ0045,2022YFS0220,2023YFS0020,2023YFS0197,2023YFG0148)the CCF-Baidu Open Fund(No.202312)the Medico-Engineering Cooperation Funds from University of Electronic Science and Technology of China(Nos.ZYGX2021YGLH212,ZYGX2022YGRH012).
文摘Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret information undetectable.To enhance concealment and security,the Steganography without Embedding(SWE)method has proven effective in avoiding image distortion resulting from cover modification.In this paper,a novel encrypted communication scheme for image SWE is proposed.It reconstructs the image into a multi-linked list structure consisting of numerous nodes,where each pixel is transformed into a single node with data and pointer domains.By employing a special addressing algorithm,the optimal linked list corresponding to the secret information can be identified.The receiver can restore the secretmessage fromthe received image using only the list header position information.The scheme is based on the concept of coverless steganography,eliminating the need for any modifications to the cover image.It boasts high concealment and security,along with a complete message restoration rate,making it resistant to steganalysis.Furthermore,this paper proposes linked-list construction schemeswithin theproposedframework,which caneffectively resist a variety of attacks,includingnoise attacks and image compression,demonstrating a certain degree of robustness.To validate the proposed framework,practical tests and comparisons are conducted using multiple datasets.The results affirm the framework’s commendable performance in terms of message reduction rate,hidden writing capacity,and robustness against diverse attacks.
基金Dr.Arshiya Sajid Ansari would like to thank the Deanship of Scientific Research at Majmaah University for supporting this work under Project No.R-2023-910.
文摘Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services,as they are an essential component of modern smart transportation systems.VANETs steganography has been suggested by many authors for secure,reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection.This paper aims to determine whether using steganography is possible to improve data security and secrecy in VANET applications and to analyze effective steganography techniques for incorporating data into images while minimizing visual quality loss.According to simulations in literature and real-world studies,Image steganography proved to be an effectivemethod for secure communication on VANETs,even in difficult network conditions.In this research,we also explore a variety of steganography approaches for vehicular ad-hoc network transportation systems like vector embedding,statistics,spatial domain(SD),transform domain(TD),distortion,masking,and filtering.This study possibly shall help researchers to improve vehicle networks’ability to communicate securely and lay the door for innovative steganography methods.
基金funded by the Research Deanship of the Islamic University of Madinah under grant number 966.
文摘In Saudi Arabia,drones are increasingly used in different sensitive domains like military,health,and agriculture to name a few.Typically,drone cameras capture aerial images of objects and convert them into crucial data,alongside collecting data from distributed sensors supplemented by location data.The interception of the data sent from the drone to the station can lead to substantial threats.To address this issue,highly confidential protection methods must be employed.This paper introduces a novel steganography approach called the Shuffling Steganography Approach(SSA).SSA encompasses five fundamental stages and three proposed algorithms,designed to enhance security through strategic encryption and data hiding techniques.Notably,this method introduces advanced resistance to brute force attacks by employing predefined patterns across a wide array of images,complicating unauthorized access.The initial stage involves encryption,dividing,and disassembling the encrypted data.A small portion of the encrypted data is concealed within the text(Algorithm 1)in the third stage.Subsequently,the parts are merged and mixed(Algorithm 2),and finally,the composed text is hidden within an image(Algorithm 3).Through meticulous investigation and comparative analysis with existing methodologies,the proposed approach demonstrates superiority across various pertinent criteria,including robustness,secret message size capacity,resistance to multiple attacks,and multilingual support.
基金supported by the National Natural Science Foundation of China(12204359 and 12174292)the China Postdoctoral Science Foundation(2022TQ0243 and 2022M722448)+1 种基金the Natural Science Foundation of Hubei Province(2022CFB641)the Natural Science Foundation of Jiangsu Province(BK20231210).
文摘With the escalating flow of information and digital communication,information security has become an increasingly important issue.Traditional cryptographic methods are being threatened by advancing progress in computing,while physical encryption methods are favored as a viable and compelling avenue.Metasurfaces,which are known for their extraordinary ability to manipulate optical parameters at the nanoscale,exhibit significant potential for the revolution of optical devices,making them a highly promising candidate for optical encryption applications.Here,a single-sized metasurface with four independent channels is proposed for conducting steganography and multi-key information encryption.More specifically,plaintext is transformed into a ciphertext image,which is encoded into a metasurface,while the decryption key is discretely integrated into another channel within the same metasurface.Two different keys for steganographic image unveiling are also encoded into the metasurface and can be retrieved with different channels and spatial positions.This distributed multi-key encryption approach can enhance security,while strategically distributing images across distinct spatial zones serves as an additional measure to reduce the risk of information leakage.This minimalist designed metasurface,with its advantages of high information density and robust security,holds promise across applications including portable encryption,high-camouflaged image display,and high-density optical storage.
文摘Many existing coverless steganography methods establish a mapping relationship between cover images and hidden data.One issue with these methods is that as the steganographic capacity increases,the number of images stored in the database grows exponentially.This makes it challenging to build and manage a large image database.To improve the image library utilization and anti-attack capability of the steganography system,we propose an efficient coverless scheme based on dynamically matched substrings.We utilize You Only Look Once(YOLO)for selecting optimal objects and create a mapping dictionary between these objects and scrambling factors.Using this dictionary,each image is effectively assigned to a specific scrambling factor,which is then used to scramble the receiver’s sequence key.To achieve sufficient steganography capability with a limited image library,all substrings of the scrambled sequences have the potential to hide data.After matching the secret information,the ideal number of stego images will be obtained from the database.According to experimental results,this technology outperforms most previous works in terms of data load,transmission security,and hiding capacity.It can recover an average of 79.85%of secret information under typical geometric attacks,and only approximately 200 random images are needed to achieve a capacity of 19 bits per image.
文摘This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)algorithm.Image steganography,a technique of embedding hidden information in digital photographs,should ideally achieve the dual purposes of maximum data hiding and maintenance of the integrity of the cover media so that it is least suspect.The contemporary methods of steganography are at best a compromise between these two.In this paper,we present our approach,entitled Ant Colony Optimization(ACO)-Least Significant Bit(LSB),which attempts to optimize the capacity in steganographic embedding.The approach makes use of a grayscale cover image to hide the confidential data with an additional bit pair per byte,both for integrity verification and the file checksumof the secret data.This approach encodes confidential information into four pairs of bits and embeds it within uncompressed grayscale images.The ACO algorithm uses adaptive exploration to select some pixels,maximizing the capacity of data embedding whileminimizing the degradation of visual quality.Pheromone evaporation is introduced through iterations to avoid stagnation in solution refinement.The levels of pheromone are modified to reinforce successful pixel choices.Experimental results obtained through the ACO-LSB method reveal that it clearly improves image steganography capabilities by providing an increase of up to 30%in the embedding capacity compared with traditional approaches;the average Peak Signal to Noise Ratio(PSNR)is 40.5 dB with a Structural Index Similarity(SSIM)of 0.98.The approach also demonstrates very high resistance to detection,cutting down the rate by 20%.Implemented in MATLAB R2023a,the model was tested against one thousand publicly available grayscale images,thus providing robust evidence of its effectiveness.
基金This research was funded by the Ministry of Higher Education(MOHE)through Fundamental Research Grant Scheme(FRGS)under the Grand Number FRGS/1/2020/ICT01/UK M/02/4,and University Kebangsaan Malaysia for open access publication.
文摘Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image.The randomization strategies in data embedding techniques may utilize random domains,pixels,or region-of-interest for concealing secrets into a cover image,preventing information from being discovered by an attacker.The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility,but it is challenging.A systematic approach is used with a standard methodology to carry out this study.This review concentrates on the critical examination of several embedding strategies,incorporating experimental results with state-of-the-art methods emphasizing the robustness,security,payload capacity,and visual quality metrics of the stego images.The fundamental ideas of steganography are presented in this work,along with a unique viewpoint that sets it apart from previous works by highlighting research gaps,important problems,and difficulties.Additionally,it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography.
文摘A new steganographic method by pixel-value differencing(PVD)using general quantization ranges of pixel pairs’difference values is proposed.The objective of this method is to provide a data embedding technique with a range table with range widths not limited to powers of 2,extending PVD-based methods to enhance their flexibility and data-embedding rates without changing their capabilities to resist security attacks.Specifically,the conventional PVD technique partitions a grayscale image into 1×2 non-overlapping blocks.The entire range[0,255]of all possible absolute values of the pixel pairs’grayscale differences in the blocks is divided into multiple quantization ranges.The width of each quantization range is a power of two to facilitate the direct embedding of the bit information with high embedding rates.Without using power-of-two range widths,the embedding rates can drop using conventional embedding techniques.In contrast,the proposed method uses general quantization range widths,and a multiple-based number conversion mechanism is employed skillfully to implement the use of nonpower-of-two range widths,with each pixel pair being employed to embed a digit in the multiple-based number.All the message bits are converted into a big multiple-based number whose digits can be embedded into the pixel pairs with a higher embedding rate.Good experimental results showed the feasibility of the proposed method and its resistance to security attacks.In addition,implementation examples are provided,where the proposed method adopts non-power-of-two range widths and employsmultiple-based number conversion to expand the data-hiding and steganalysis-resisting capabilities of other PVD methods.
文摘Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.
文摘Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden data.This property makes it difficult for steganalysts’powerful data extraction tools to detect the hidden data and ensures high-quality stego image generation.However,using a seed key to generate non-repeated sequential numbers takes a long time because it requires specific mathematical equations.In addition,these numbers may cluster in certain ranges.The hidden data in these clustered pixels will reduce the image quality,which steganalysis tools can detect.Therefore,this paper proposes a data structure that safeguards the steganographic model data and maintains the quality of the stego image.This paper employs the AdelsonVelsky and Landis(AVL)tree data structure algorithm to implement the randomization pixel selection technique for data concealment.The AVL tree algorithm provides several advantages for image steganography.Firstly,it ensures balanced tree structures,which leads to efficient data retrieval and insertion operations.Secondly,the self-balancing nature of AVL trees minimizes clustering by maintaining an even distribution of pixels,thereby preserving the stego image quality.The data structure employs the pixel indicator technique for Red,Green,and Blue(RGB)channel extraction.The green channel serves as the foundation for building a balanced binary tree.First,the sender identifies the colored cover image and secret data.The sender will use the two least significant bits(2-LSB)of RGB channels to conceal the data’s size and associated information.The next step is to create a balanced binary tree based on the green channel.Utilizing the channel pixel indicator on the LSB of the green channel,we can conceal bits in the 2-LSB of the red or blue channel.The first four levels of the data structure tree will mask the data size,while subsequent levels will conceal the remaining digits of secret data.After embedding the bits in the binary tree level by level,the model restores the AVL tree to create the stego image.Ultimately,the receiver receives this stego image through the public channel,enabling secret data recovery without stego or crypto keys.This method ensures that the stego image appears unsuspicious to potential attackers.Without an extraction algorithm,a third party cannot extract the original secret information from an intercepted stego image.Experimental results showed high levels of imperceptibility and security.
基金in part by the Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(NRF-2021R1A6A1A03039493)by the 2024 Yeungnam University Research Grant.
文摘In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential priority.To overcome these difficulties,different steganography and data encryption methods have been proposed by researchers to secure communications.Most of the proposed steganography techniques achieve higher embedding capacities without compromising visual imperceptibility using LSB substitution.In this work,we have an approach that utilizes a combinationofMost SignificantBit(MSB)matching andLeast Significant Bit(LSB)substitution.The proposed algorithm divides confidential messages into pairs of bits and connects them with the MSBs of individual pixels using pair matching,enabling the storage of 6 bits in one pixel by modifying a maximum of three bits.The proposed technique is evaluated using embedding capacity and Peak Signal-to-Noise Ratio(PSNR)score,we compared our work with the Zakariya scheme the results showed a significant increase in data concealment capacity.The achieved results of ourwork showthat our algorithmdemonstrates an improvement in hiding capacity from11%to 22%for different data samples while maintaining a minimumPeak Signal-to-Noise Ratio(PSNR)of 37 dB.These findings highlight the effectiveness and trustworthiness of the proposed algorithm in securing the communication process and maintaining visual integrity.
文摘Steganography is a technique that is frequently used to hide hidden information in multimedia artifacts including music, video, and images. In order to protect data saved in the cloud, this paper presents a steganography method for encrypting sound utilizing LSB-based computation. By using the least significant bit (LSB) of a byte to represent a message and then substituting each LSB bit with a binary message and encrypting a significant quantity of data. The proposed system uses the LSB technique of picture steganography, Multi-Level Encryption Algorithm (MLEA) and Two-Level Encryption Algorithm (TLEA) data encryption to give the highest level of cloud security. Compared to other current schemes, the performance of the suggested method is 1.732125% better on average.
基金supported by National Natural Science Foundation of China(Grant No. 10772061)Heilongjiang Provincial Natural Science Foundation of China(Grant No. ZJG0704)
文摘The condition of rotor system must be assessed in order to develop condition-based maintenance for rotating machinery. It is determined by multiple variables such as unbalance degree, misalignment degree, the amount of bending deformation of the shaft, occurrence of shaft crack of rotor system and so on. The estimation of the degrees of unbalance and misalignment in flexible coupling-rotor system is discussed. The model-based approach is employed to solve this problem. The models of the equivalent external loads for unbalance and misalignment are derived and analyzed. Then, the degrees of unbalance and misalignment are estimated by analyzing the components of the equivalent external loads of which the frequencies are equal to the 1 and 2 times running frequency respectively. The equivalent external loads are calculated according to the dynamic equation of the original rotor system and the differences between the dynamical responses in normal case and the vibrations when the degree of unbalance or misalignment or both changes. The denoise method based on bandpass filter is used to decrease the effect of noise on the estimation accuracy. The numerical examples are given to show that the proposed approach can estimate the degrees of unbalance and misalignment of the flexible coupling-rotor system accurately.
文摘This paper focuses on the use of models for increasing the precision of estimators in large-area forest surveys. It is motivated by the increasing availability of remotely sensed data, which facilitates the development of models predicting the variables of interest in forest surveys. We present, review and compare three different estimation frameworks where models play a core role: model-assisted, model-based, and hybrid estimation. The first two are well known, whereas the third has only recently been introduced in forest surveys. Hybrid inference mixes design- based and model-based inference, since it relies on a probability sample of auxiliary data and a model predicting the target variable from the auxiliary data.We review studies on large-area forest surveys based on model-assisted, model- based, and hybrid estimation, and discuss advantages and disadvantages of the approaches. We conclude that no general recommendations can be made about whether model-assisted, model-based, or hybrid estimation should be preferred. The choice depends on the objective of the survey and the possibilities to acquire appropriate field and remotely sensed data. We also conclude that modelling approaches can only be successfully applied for estimating target variables such as growing stock volume or biomass, which are adequately related to commonly available remotely sensed data, and thus purely field based surveys remain important for several important forest parameters.
文摘In previous researches on a model-based diagnostic system, the components are assumed mutually independent. Howerver , the assumption is not always the case because the information about whether a component is faulty or not usually influences our knowledge about other components. Some experts may draw such a conclusion that 'if component m 1 is faulty, then component m 2 may be faulty too'. How can we use this experts' knowledge to aid the diagnosis? Based on Kohlas's probabilistic assumption-based reasoning method, we use Bayes networks to solve this problem. We calculate the posterior fault probability of the components in the observation state. The result is reasonable and reflects the effectiveness of the experts' knowledge.
文摘In this paper,a novel control structure called feedback scheduling of model-based networked control systems is proposed to cope with a flexible network load and resource constraints.The state update time is adjusted according to the real-time network congestion situation.State observer is used under the situation where the state of the controlled plant could not be acquired.The stability criterion of the proposed structure is proved with time-varying state update time.On the basis of the stability of the novel system structure,the compromise between the control performance and the network utilization is realized by using feedback scheduler. Examples are provided to show the advantage of the proposed control structure.
文摘In early 2018,the Boliden Garpenberg operation implemented an optimized control strategy as an addition to the existing ventilation on demand system.The purpose of the strategy is to further minimize energy use for main and booster fans,whilst also fulfilling airflow setpoints without violating constraints such as min/max differential pressure over fans and interaction of air between areas in mines.Using air flow measurements and a dynamical model of the ventilation system,a mine-wide coordination control of fans can be carried out.The numerical model is data driven and derived from historical operational data or step changes experiments.This makes both initial deployment and lifetime model maintenance,as the mine evolves,a comparably easy operation.The control has been proven to operate in a stable manner over long periods without having to re-calibrate the model.Results prove a 40%decrease in energy use for the fans involved and a greater controllability of air flow.Moreover,a 15%decrease of the total air flow into the mine will give additional proportional heating savings during winter periods.All in all,the multivariable controller shows a correlation between production in the mine and the ventilation system performance superior to all of its predecessors.