Image Spatial Domain Steganography: A study of Performance Evaluation Parameters

Author(s):  
Mohanad Najm Abdulwahedand ◽  
S. T. Mustafa ◽  
Mohd Shafry Mohd Rahim
2021 ◽  
Author(s):  
Navroop Kaur ◽  
Meenakshi Bansal ◽  
Sukhwinder Singh S

Abstract In modern times the firewall and antivirus packages are not good enough to protect the organization from numerous cyber attacks. Computer IDS (Intrusion Detection System) is a crucial aspect that contributes to the success of an organization. IDS is a software application responsible for scanning organization networks for suspicious activities and policy rupturing. IDS ensures the secure and reliable functioning of the network within an organization. IDS underwent huge transformations since its origin to cope up with the advancing computer crimes. The primary motive of IDS has been to augment the competence of detecting the attacks without endangering the performance of the network. The research paper elaborates on different types and different functions performed by the IDS. The NSL KDD dataset has been considered for training and testing. The seven prominent classifiers LR (Logistic Regression), NB (Naïve Bayes), DT (Decision Tree), AB (AdaBoost), RF (Random Forest), kNN (k Nearest Neighbor), and SVM (Support Vector Machine) have been studied along with their pros and cons and the feature selection have been imposed to enhance the reading of performance evaluation parameters (Accuracy, Precision, Recall, and F1Score). The paper elaborates a detailed flowchart and algorithm depicting the procedure to perform feature selection using XGB (Extreme Gradient Booster) for four categories of attacks: DoS (Denial of Service), Probe, R2L (Remote to Local Attack), and U2R (User to Root Attack). The selected features have been ranked as per their occurrence. The implementation have been conducted at five different ratios of 60-40%, 70-30%, 90-10%, 50-50%, and 80-20%. Different classifiers scored best for different performance evaluation parameters at different ratios. NB scored with the best Accuracy and Recall values. DT and RF consistently performed with high accuracy. NB, SVM, and kNN achieved good F1Score.


Author(s):  
Lalit B. Damahe ◽  
Nileshsingh V. Thakur

Image representation and compression is one of the important fields of computer vision that contribute to the reduction of size of an image and other types of application areas such as image restoration, retrieval, etc. Image representation is important with respect to storage of image information, and it further extends to the compression, which may be lossy or lossless. Image compression can be applied to various applications which mainly include medical imaging, traffic monitoring, military, multimedia transmission, smart cell devices, and almost in all the domains that require less transmission and storage cost, specifically image retrieval processing. This chapter presents the various image representation compression and retrieval approaches. The retrieval approaches on personal computer and smart cell devices are discussed. Finally, the key issues are identified for image representation compression and retrieval on the basis of performance evaluation parameters like encoding time, decoding time, compression ratio, precision, recall, and elapsed time.


2021 ◽  
Author(s):  
Yuting Wang ◽  
Changhong Wang ◽  
Mengyang Li ◽  
Yifu Yu ◽  
Bin Zhang

In this review, we summarize the reaction mechanism, in situ characterization, theoretical simulation, and kinetics analysis. The performance evaluation parameters, standard test methods, and an outlook for nitrate electroreduction are discussed.


2019 ◽  
Vol 8 (3) ◽  
pp. 7062-7065

The newer applications of Trellis Coded Modulation (TCM) beyond 5G has triggered the research activities for further inventions in this area. As a result, the inventions and research analysis on different aspects of the technique is in boom. This paper analyzes various performance evaluation parameters as applicable to coded modulation schemes which can be structured as a finite state machine. The significances of the parameters are discussed and the measurements through simulation are evaluated. Tradeoff between the decoding computational complexity and the codinggain factor improvement has been analyzed.


Author(s):  
Marc Geilhufe ◽  
Warren A. Connors ◽  
Stig. A. V. Synnes ◽  
Oivind Midtgaard ◽  
Torstein O. Saebo ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document