Recent Advances in Electrical & Electronic Engineering最新文献

筛选
英文 中文
FOG-RPL: Fog Computing based Routing Protocol for IoT Networks Fog - rpl:基于雾计算的物联网网络路由协议
IF 0.6
Recent Advances in Electrical & Electronic Engineering Pub Date : 2023-05-10 DOI: 10.2174/2352096516666230510125238
Ankit Verma, S. Deswal
{"title":"FOG-RPL: Fog Computing based Routing Protocol for IoT Networks","authors":"Ankit Verma, S. Deswal","doi":"10.2174/2352096516666230510125238","DOIUrl":"https://doi.org/10.2174/2352096516666230510125238","url":null,"abstract":"\u0000\u0000The Internet of Things (IoT) is widely used because of the connectivity of devices with the Internet which provides accessibility, quick transmission, and broader coverage. IoT networks provide vast connectivity but finding the best path for sharing information is a big challenge because of limited resources like limited power and limited bandwidth. The routing protocol for low power lossy network (RPL) is standard protocol but it selects a node that has already been selected in a busty network.\u0000\u0000\u0000\u0000The fog computing technique is combined with RPL and the new objective function is used to design FOG-RPL which is the optimum routing protocol that reduces the network load using the fog computing principle and selects the right node using the new objective function.\u0000\u0000\u0000\u0000The simulation is performed and experimental results show that FOG-RPL gives better results in terms of improvement and in terms of performance parameters.\u0000\u0000\u0000\u0000The FOG-RPL protocol uses the fog computing principle with a new objective function and performance analysis shows that as compared to the existing routing protocol, it is more efficient.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"88 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91132249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent technique for moving object detection from problematic video captured through camera sensor 从摄像机传感器捕获的问题视频中检测运动目标的智能技术
IF 0.6
Recent Advances in Electrical & Electronic Engineering Pub Date : 2023-05-10 DOI: 10.2174/2215083810666230510113140
D. Yadav, Sneha Mishra
{"title":"Intelligent technique for moving object detection from problematic video captured through camera sensor","authors":"D. Yadav, Sneha Mishra","doi":"10.2174/2215083810666230510113140","DOIUrl":"https://doi.org/10.2174/2215083810666230510113140","url":null,"abstract":"\u0000\u0000The significant aim of the proposed work is to develop an adaptive method to compute the threshold during run-time and update it adaptively for each pixel in the testing phase. It classifies motion-oriented pixels from the scene for moving objects using background subtraction and enhances using post-processing.\u0000\u0000\u0000\u0000According to the huge demand for surveillance system, society is towards an intelligent video surveillance system that detects and track moving objects from video captured through a surveillance camera. So, it is very crucial and highly recommended throughout the globe in numerous domains such as video-based surveillance, healthcare, transportation, and many more. Practically, this research area faces lots of challenging issues such as illumination variation, cluttered background, camouflage, etc. So, this paper has developed an adaptive background subtraction method to handle such challenging problems.\u0000\u0000\u0000\u0000• To focus and study the problematic video data captured through the camera sensor.\u0000• To handle challenging issues available in real-time video scenes.\u0000• To develop a background subtraction method and update the background model adap-tively for moving object detection.\u0000\u0000\u0000\u0000The proposed method has been accomplished using the following sections: \u0000• Background model construction \u0000• Automatic generation of threshold \u0000• Background subtraction\u0000• Maintenance of background model\u0000\u0000\u0000\u0000The qualitative analysis of the proposed work is experimented with publicly available datasets and compared with considered state-of-the-art methods. In this work, library sequence (thermal data) of CDNET and other color video frame sequences Foreground aperture, Waving Tree and Camouflage are considered from Microsoft’s Wallflower. The quantitative values depicted in Table-1 this work demonstrate the better performance of the proposed method as compared to state-of-the-art methods. It also generates better outcomes and handles the problem of a dynamic environment and illumination variation.\u0000\u0000\u0000\u0000Currently, the world is demanding computer vision-based security and surveillance-based applications for society. This work has provided a method for the detection of moving information using an adaptive method of background subtraction approach for moving object detection in video scenes. The performance evaluation depicts better average results as compared to considered peer methods.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"55 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86409332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Surplus Force (torque) Control and Compensation of Electro hydraulic Load Simulator 电液负载模拟器剩余力(转矩)控制与补偿研究
IF 0.6
Recent Advances in Electrical & Electronic Engineering Pub Date : 2023-05-05 DOI: 10.2174/2352096516666230505111206
Bing-Tuan Gao, Wei Zhang, Lin Zheng, Bin Xu
{"title":"Research on Surplus Force (torque) Control and Compensation of Electro hydraulic Load Simulator","authors":"Bing-Tuan Gao, Wei Zhang, Lin Zheng, Bin Xu","doi":"10.2174/2352096516666230505111206","DOIUrl":"https://doi.org/10.2174/2352096516666230505111206","url":null,"abstract":"\u0000\u0000The electro-hydraulic load simulator can simulate any force (torque) load required by the loaded object under test conditions, which greatly reduces the equipment development time and cost. However, the process of force loading inevitably creates a surplus force (torque). The existence of surplus force (torque) in the system will seriously interfere with the loading accuracy of the system and even damage the equipment in serious cases.\u0000\u0000\u0000\u0000In this paper, based on the research status of the suppression and compensation of the surplus force (torque) in the electro-hydraulic load simulator, the effective control strategies and methods to overcome the surplus force (torque) in the system are summarized.\u0000\u0000\u0000\u0000This paper analyzes the generation mechanism of the surplus force (torque), and summarizes the effective strategies to overcome the surplus force (torque) of the system in structural compensation and control compensation.\u0000\u0000\u0000\u0000Using the control method to compensate for the surplus force (torque) has the advantages of simple structure, convenient debugging, and strong universality. It is widely used in the electro-hydraulic load simulator to suppress the surplus force (torque).\u0000\u0000\u0000\u0000With the development of control theory, more and more control strategies and methods are applied to restrain and compensate for the surplus force (torque) in the electro-hydraulic load simulator, which not only restrains the surplus force (torque) in the system but also improves the loading accuracy and anti-interference.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"78 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77419527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
APT Attack Detection of a New Power System Based on DPI-Transformer 基于dpi变压器的新型电力系统APT攻击检测
IF 0.6
Recent Advances in Electrical & Electronic Engineering Pub Date : 2023-05-04 DOI: 10.2174/2352096516666230504111123
Yuancheng Li, Yazhuo Zhang
{"title":"APT Attack Detection of a New Power System Based on DPI-Transformer","authors":"Yuancheng Li, Yazhuo Zhang","doi":"10.2174/2352096516666230504111123","DOIUrl":"https://doi.org/10.2174/2352096516666230504111123","url":null,"abstract":"\u0000\u0000In recent years, the frequent occurrence of network security attacks in the power field has brought huge risks to the production, transmission, and supply of power systems, and Advanced Persistent Threat (APT) is a covert advanced network security attack, which has become one of the network security risks that cannot be ignored in the construction of new power systems.\u0000\u0000\u0000\u0000This study aims to resist the increasing risk of APT attacks in the construction of new power systems, this paper proposes an attack detection model based on Deep Packet Inspection (DPI) and Transformer\u0000\u0000\u0000\u0000Firstly, we extracted 606 traffic characteristics from the original traffic data through the extended CIC Flowmeter and used them all to train the Transformer network. Then, we used the DPI-Transformer model and traffic labels to perform feature analysis on the traffic data and finally obtained the APT-Score. If the APT-Score is greater than the threshold, the alarm module is triggered.\u0000\u0000\u0000\u0000By analyzing the headers and payloads of the network traffic in the APT-2020 dataset, the experimental results show that the detection accuracy of APT attacks by the DPI-Transformer detection model is significantly higher than that of the current mainstream APT attack detection algorithms.\u0000\u0000\u0000\u0000Combined with the characteristics of the new power system and APT attacks, this paper proposes an attack detection model DPI-Transformer, which proves that the model has greatly improved the detection accuracy.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"33 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81884223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Objective Optimization in the Presence of OGIPFC using NSMMP Algorithm 基于NSMMP算法的OGIPFC多目标优化
IF 0.6
Recent Advances in Electrical & Electronic Engineering Pub Date : 2023-05-04 DOI: 10.2174/2352096516666230504105054
Balasubbareddy Mallala, Venkata Prasad Papana, Kowstubha Palle
{"title":"Multi-Objective Optimization in the Presence of OGIPFC using NSMMP Algorithm","authors":"Balasubbareddy Mallala, Venkata Prasad Papana, Kowstubha Palle","doi":"10.2174/2352096516666230504105054","DOIUrl":"https://doi.org/10.2174/2352096516666230504105054","url":null,"abstract":"\u0000\u0000Customers expect quality, uninterrupted power with cost-effective electricity in the latest trend. However, outages, severe storms, old infrastructure, and cost pressures can lead to ambiguity in power generation and transmission. To improve line power transmission capability, the right flexible AC transmission systems (FACTS) device may save millions of dollars.\u0000\u0000\u0000\u0000In this study, a FACTS controller named Optimal Generalized Interline Power Flow Controller (OGIPFC) was developed. Furthermore, for optimization, the Modified Marine Predator Algorithm (MMPA), which is a modification of the recently developed Marine Predator Algorithm (MPA), was used. The optimum technique was used to evaluate a set of prioritized considered objective minimizations. A variety of factors must be maximized, such as generation cost, emissions, and power loss.\u0000\u0000\u0000\u0000The performance of the proposed algorithm was analysed on benchmark test functions, and then single objective optimization problems of standard IEEE-30 bus system were solved and compared with the existing algorithms. The proposed algorithm was restricted to solving the single objective problem only, so it was further implemented with non-dominating sorting to solve the multi-objective optimization problem. The proposed multi-objective version is named as Non-dominating Sorting Modified Marine Predator Algorithm (NSMMPA), and it was validated on benchmark test functions and the IEEE-30 bus system.\u0000\u0000\u0000\u0000Finally, the OPF problem was solved with the incorporation of OGIPFC using the proposed methods, which resulted in better solutions and made the system more effective in operation.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"27 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89313756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Permittivity- Customizable Low-Cost Laminated PET Sheet Multilayer Substrate to Design Flexible and Conformal Planar Inverted F Antenna 介电常数-可定制的低成本层压PET片多层基板,用于设计柔性和共形平面倒F天线
IF 0.6
Recent Advances in Electrical & Electronic Engineering Pub Date : 2023-05-03 DOI: 10.2174/2352096516666230503150934
Sachin Maithani, Shivam Bansal, G. Saini, Balwinder Singh Dhaliwal
{"title":"Permittivity- Customizable Low-Cost Laminated PET Sheet Multilayer Substrate to Design Flexible and Conformal Planar Inverted F Antenna","authors":"Sachin Maithani, Shivam Bansal, G. Saini, Balwinder Singh Dhaliwal","doi":"10.2174/2352096516666230503150934","DOIUrl":"https://doi.org/10.2174/2352096516666230503150934","url":null,"abstract":"\u0000\u0000In this article, a Planar Inverted F Antenna (PIFA) has been designed using low-cost commercially available transparent laminated sheets. Energy Dispersive X-ray (EDX) analysis is used to acquire the element composition of the transparent laminated sheet.\u0000\u0000\u0000\u0000The flexibility is attained using a market-available low-cost Polyethylene Terephthalate (PET) sheet as a substrate. The dielectric properties of this non-conventional laminated sheet need to be identified for antenna design and the microstrip ring resonator test method is used to determine the dielectric properties of the multilayer PET sheets.\u0000\u0000\u0000\u0000The linear match has been observed on multilayer laminated PET sheets for dielectric properties and radiation characteristics. Adhesive copper foil of a thickness of 0.08 mm has been used as for conducting layer on the PET lamination sheet. As per the literature survey, it is evident that this is the first attempt to use the reported methodology for PIFA design application. The gain of proposed antenna is 5.2dB.\u0000\u0000\u0000\u0000The designed flexible antenna has been developed for wearable and IoT applications in 2.45 GHz ISM band. A good match has been observed between the simulated and measured characteristics.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"13 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82635273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Matrix Inverse-based Highly Payload Novel Approach for Covert Transmission 基于矩阵逆的高有效载荷隐蔽传输新方法
IF 0.6
Recent Advances in Electrical & Electronic Engineering Pub Date : 2023-05-02 DOI: 10.2174/2352096516666230502145422
Ravinder Saini, Kamaldeep Joshi, Rainu Nandal, Rajkumar Yadav, D. Kumari
{"title":"Matrix Inverse-based Highly Payload Novel Approach for Covert Transmission","authors":"Ravinder Saini, Kamaldeep Joshi, Rainu Nandal, Rajkumar Yadav, D. Kumari","doi":"10.2174/2352096516666230502145422","DOIUrl":"https://doi.org/10.2174/2352096516666230502145422","url":null,"abstract":"\u0000\u0000The necessity for data security is demanding in the digital age. The main\u0000technique for achieving data security is Steganography. The technique of camouflaging the secret\u0000object behind another cover object is known as Steganography. A novel, robust, high payload, and\u0000imperceptible image steganography approach using matrix inverse in the spatial domain are proposed\u0000in this manuscript. The basic idea is to devise a robust novel approach against various image\u0000processing attacks, like cropping, compression, filters, and noise.\u0000\u0000\u0000\u0000The study's objective is to develop a novel data-hiding approach that increases imperceptibility\u0000and payload capacity and is robust against various image processing attacks, like filters,\u0000compression, cropping, and noise.\u0000\u0000\u0000\u0000The matrix inverse procedure is used for the insertion and extraction of data. The symmetry\u0000feature of the matrix inverse makes the task of insertion of data simple and efficient. It also\u0000increases the hiding capacity while maintaining a finer level of imperceptibility and robustness.\u0000MATLAB is used for the implementation of the new technique and results analysis.The matrix inverse procedure is used for the insertion and extraction of data. The symmetry\u0000feature of the matrix inverse makes the task of insertion of data simple and efficient. It also\u0000increases the hiding capacity while maintaining a finer level of imperceptibility and robustness.\u0000MATLAB is used for the implementation of the new technique and results analysis.\u0000\u0000\u0000\u0000The proposed method's robustness has been analyzed against image processing assaults\u0000such as the inclusion of various noises, cropping, a variety of filters, and compression assaults.\u0000The imperceptibility of the approach has been tested successfully using PSNR, BER, and NCC\u0000metrics. The proposed method has been compared with the other two techniques. The experimental\u0000and comparison results depict that the proposed approach provides high hiding capacity,\u0000finer robustness, and imperceptibility.\u0000\u0000\u0000\u0000A novel, robust and imperceptible approach has been developed in this manuscript.\u0000The proposed method has been compared with the methods developed by Jung & Yoo and Joshi\u0000& Gill. The experimental findings show that the proposed technique offers better resilience, payload\u0000capacity, and finer imperceptibility.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"43 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87421484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Meet the Editorial Board Member 认识编辑委员会成员
IF 0.6
Recent Advances in Electrical & Electronic Engineering Pub Date : 2023-05-01 DOI: 10.2174/235209651603230224104014
B. Francesco
{"title":"Meet the Editorial Board Member","authors":"B. Francesco","doi":"10.2174/235209651603230224104014","DOIUrl":"https://doi.org/10.2174/235209651603230224104014","url":null,"abstract":"<jats:sec>\u0000<jats:title />\u0000<jats:p />\u0000</jats:sec>","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"47 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90180982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vehicle Detection in High Density Traffic Surveillance Data UsingYOLO.v5 基于yolo .v5的高密度交通监控数据车辆检测
IF 0.6
Recent Advances in Electrical & Electronic Engineering Pub Date : 2023-04-28 DOI: 10.2174/2352096516666230428103829
Sneha Mishra, D. Yadav
{"title":"Vehicle Detection in High Density Traffic Surveillance Data Using\u0000YOLO.v5","authors":"Sneha Mishra, D. Yadav","doi":"10.2174/2352096516666230428103829","DOIUrl":"https://doi.org/10.2174/2352096516666230428103829","url":null,"abstract":"\u0000\u0000Computer vision is one of the prime domains that enable to derive meaningful and crisp\u0000information from digital media, such as images, videos, and other visual inputs.\u0000\u0000\u0000\u0000Detection and correctly tracking the moving objects in a video streaming is still a\u0000challenging problem in India. Due to the high density of vehicles, it is difficult to identify the correct objects on the roads.\u0000\u0000\u0000\u0000In this work, we have used a YOLO.v5 (You Only Look Once) algorithm to identify the\u0000different objects on road, such as trucks, cars, trams, and vans. YOLO.v5 is the latest algorithm in\u0000the family of YOLO. To train the YOLO.v5, KITTY dataset was used having 11682 images having\u0000different objects in a traffic surveillance system. After training and validating the dataset, three different models have been constructed setting various parameters. To further validate the proposed\u0000approach, results have also been evaluated on the Indian traffic dataset DATS_2022.\u0000\u0000\u0000\u0000All the models have been evaluated using three performance metrics, such as precision, recall, and mean average precision (MAP). The final model has attained the best performance on\u0000KITTY dataset as 93.5% precision, 90.7% recall, and 0.67 MAP for different objects. The results\u0000attained on the Indian traffic dataset DATS_2022 included 0.65 precision, 0.78 recall value, and\u00000.74 MAP for different objects.\u0000\u0000\u0000\u0000The results depict the proposed model to have improved results as compared to stateof-the-art approaches in terms of performance and also reduce the computation time and object\u0000loss.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"120 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79425133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interpolated Implicit Pixel-based Novel Hybrid Approach towards Image Steganography 基于插值隐式像素的图像隐写新混合方法
IF 0.6
Recent Advances in Electrical & Electronic Engineering Pub Date : 2023-04-28 DOI: 10.2174/2352096516666230428104626
Ravinder Saini, Kamaldeep Joshi, Khusboo Punyani, Rajkumar Yadav, Rainu Nandal, D. Kumari
{"title":"Interpolated Implicit Pixel-based Novel Hybrid Approach towards Image Steganography","authors":"Ravinder Saini, Kamaldeep Joshi, Khusboo Punyani, Rajkumar Yadav, Rainu Nandal, D. Kumari","doi":"10.2174/2352096516666230428104626","DOIUrl":"https://doi.org/10.2174/2352096516666230428104626","url":null,"abstract":"\u0000\u0000Steganography is the approach of camouflaging the covert object within another cover object. This manuscript suggested a novel steganography approach to conceal the covert data presence. The basic idea behind this is to generate an information-hiding approach that increases the payload capacity and good PSNR value without sacrificing much distortion of the image.\u0000\u0000\u0000\u0000To develop a novel data-hiding approach that increases imperceptibility, robustness, and payload capacity.\u0000\u0000\u0000\u0000The Neighbour Mean Interpolation technique is used to scale up the original image to generate Interpolated pixels of the given image. An even-odd scheme on the interpolated stego pixel is used to camouflage the obscure code. MATLAB is used for the implementation of the new approach and results calculation.\u0000\u0000\u0000\u0000The Experimental analysis reveals that our suggested approach has a finer embedding capacity for camouflaging the secret data as the original image of size (MxN) is scaled up to size (2M-1 x2N-1) and also manages the good visuality of the cover or graven image. The proposed method is compared with Jung and Yoo, and Selvrani's method. The result of this comparison shows that the proposed method has finer imperceptibility than these two previously existing techniques.\u0000\u0000\u0000\u0000A novel approach towards image steganography using neighbor mean interpolation has been proposed and implemented. A new steganography method is used for camouflaging the confidential code into the cover object using NMI without producing any major differences in the input image. The new approach provides better imperceptibility, robustness, and payload capacity.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"45 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76490913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信